Investigating the experience of social engineering victims: Exploratory and user testing study

Bilikis Banire*, Dena Al Thani, Yin Yang

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

6 Citations (Scopus)

Abstract

The advent of mobile technologies and social network applications has led to an increase in malicious scams and social engineering (SE) attacks which are causing loss of money and breaches of personal information. Understanding how SE attacks spread can provide useful information in curbing them. Artificial Intelligence (AI) has demonstrated efficacy in detecting SE attacks, but the acceptability of such a detection approach is yet to be investigated across users with different levels of SE awareness. This paper conducted two studies: (1) exploratory study where qualitative data were collected from 20 victims of SE attacks to inform the development of an AI-based tool for detecting fraudulent messages; and (2) a user testing study with 48 participants with different occupations to determine the detection tool acceptability. Overall, six major themes emerged from the victims’ actions “experiences: reasons for falling for attacks; attack methods; advice on preventing attacks; detection methods; attack context and victims”. The user testing study showed that the AI-based tool was accepted by all users irrespective of their occupation. The categories of users’ occupations can be attributed to the level of SE awareness. Information security awareness should not be limited to organizational levels but extend to social media platforms as public information.

Original languageEnglish
Article number2709
JournalElectronics (Switzerland)
Volume10
Issue number21
DOIs
Publication statusPublished - 1 Nov 2021

Keywords

  • Exploratory study
  • Grounded theory
  • Social engineering
  • User testing study

Fingerprint

Dive into the research topics of 'Investigating the experience of social engineering victims: Exploratory and user testing study'. Together they form a unique fingerprint.

Cite this