To read this content please select one of the options below:

How social engineers use persuasion principles during vishing attacks

Keith S. Jones (Department of Psychological Sciences, Texas Tech University, Lubbock, Texas, USA)
Miriam E. Armstrong (Department of Psychological Sciences, Texas Tech University, Lubbock, Texas, USA)
McKenna K. Tornblad (Department of Psychological Sciences, Texas Tech University, Lubbock, Texas, USA)
Akbar Siami Namin (Department of Computer Science, Texas Tech University, Lubbock, Texas, USA)

Information and Computer Security

ISSN: 2056-4961

Article publication date: 7 December 2020

Issue publication date: 3 August 2021

1413

Abstract

Purpose

This study aims to examine how social engineers use persuasion principles during vishing attacks.

Design/methodology/approach

In total, 86 examples of real-world vishing attacks were found in articles and videos. Each example was coded to determine which persuasion principles were present in that attack and how they were implemented, i.e. what specific elements of the attack contributed to the presence of each persuasion principle.

Findings

Authority (A), social proof (S) and distraction (D) were the most widely used persuasion principles in vishing attacks, followed by liking, similarity and deception (L). These four persuasion principles occurred in a majority of vishing attacks, while commitment, reciprocation and consistency (C) did not. Further, certain sets of persuasion principles (i.e. authority, distraction, liking, similarity, and deception and social proof; , authority, commitment, reciprocation, and consistency, distraction, liking, similarity and deception, and social proof; and authority, distraction and social proof) were used more than others. It was noteworthy that despite their similarities, those sets of persuasion principles were implemented in different ways, and certain specific ways of implementing certain persuasion principles (e.g. vishers claiming to have authority over the victim) were quite rare.

Originality/value

To the best of authors’ knowledge, this study is the first to investigate how social engineers use persuasion principles during vishing attacks. As such, it provides important insight into how social engineers implement vishing attacks and lays a critical foundation for future research investigating the psychological aspects of vishing attacks. The present results have important implications for vishing countermeasures and education.

Keywords

Acknowledgements

This research was supported by the National Science Foundation (NSF) under award # 1723765. Opinions, findings and conclusions are those of the authors and do not necessarily reflect the views of NSF.

Citation

Jones, K.S., Armstrong, M.E., Tornblad, M.K. and Siami Namin, A. (2021), "How social engineers use persuasion principles during vishing attacks", Information and Computer Security, Vol. 29 No. 2, pp. 314-331. https://doi.org/10.1108/ICS-07-2020-0113

Publisher

:

Emerald Publishing Limited

Copyright © 2020, Emerald Publishing Limited

Related articles