Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks

被引:5
作者
Pethers, Brent [1 ]
Bello, Abubakar [1 ]
机构
[1] Western Sydney Univ, Sch Social Sci, Penrith, NSW 2751, Australia
关键词
cybersecurity; privacy; sextortion; phishing; social engineering;
D O I
10.3390/fi15010029
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigated social engineering and phishing email design and influence techniques in susceptibility to cyber sextortion attacks. Using a quantitative methodology, a survey measured susceptibility to cyber sextortion with a focus on four different email design cues. One-way repeated measures ANOVA, post hoc comparison tests, Friedman nonparametric test, and Spearman correlation tests were conducted with results indicating that attention to email source and title/subject line significantly increased individuals' susceptibility, while attention to grammar and spelling, and urgency cues, had lesser influence. As such, the influence of these message-related factors should be considered when implementing effective security controls to mitigate the risks and vulnerabilities to cyber sextortion attacks.
引用
收藏
页数:19
相关论文
共 36 条
  • [1] [Anonymous], DEF
  • [2] [Anonymous], 2016, SEXTORTION AFFECTING
  • [3] Atkins B., 2013, Open J. Soc. Sci., V1, P23, DOI DOI 10.4236/JSS.2013.13004
  • [4] Bahashwan A., 2018, Journal of Cyber Security and Mobility, V8, P1
  • [5] Pragmatic Sensory Data Semantics With Service-Oriented Computing
    Bhadoria, Robin Singh
    Chaudhari, Narendra S.
    [J]. JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2019, 31 (02) : 22 - 36
  • [6] Buller DB, 1996, COMMUN THEOR, V6, P203, DOI 10.1111/j.1468-2885.1996.tb00127.x
  • [7] Quantifying Phishing Susceptibility for Detection and Behavior Decisions
    Canfield, Casey Inez
    Fischhoff, Baruch
    Davis, Alex
    [J]. HUMAN FACTORS, 2016, 58 (08) : 1158 - 1172
  • [8] Protective Measures and Security Policy Non-Compliance Intention: IT Vision Conflict as a Moderator
    Chang, Kuo-Chung
    Seow, Yoke May
    [J]. JOURNAL OF ORGANIZATIONAL AND END USER COMPUTING, 2019, 31 (01) : 1 - 21
  • [9] A survey of phishing attacks: Their types, vectors and technical approaches
    Chiew, Kang Leng
    Yong, Kelvin Sheng Chek
    Tan, Choon Lin
    [J]. EXPERT SYSTEMS WITH APPLICATIONS, 2018, 106 : 1 - 20
  • [10] Deep learning to detect Alzheimer's disease from neuroimaging: A systematic literature review
    Ebrahimighahnavieh, Mr Amir
    Luo, Suhuai
    Chiong, Raymond
    [J]. COMPUTER METHODS AND PROGRAMS IN BIOMEDICINE, 2020, 187