TY - CHAP
T1 - Principles of persuasion in social engineering and their use in phishing
AU - Ferreira, Ana
AU - Coventry, Lynne
AU - Lenzini, Gabriele
PY - 2015/7/21
Y1 - 2015/7/21
N2 - Research on marketing and deception has identified principles of persuasion that influence human decisions. However, this research is scattered: it focuses on specific contexts and produces different taxonomies. In regard to frauds and scams, three taxonomies are often referred in the literature: Cialdini’s principles of influence, Gragg’s psychological triggers, and Stajano et al. principles of scams. It is unclear whether these relate but clearly some of their principles seem overlapping whereas others look complementary. We propose a way to connect those principles and present a merged and reviewed list for them. Then, we analyse various phishing emails and show that our principles are used therein in specific combinations. Our analysis of phishing is based on peer review and further research is needed to make it automatic, but the approach we follow, together with principles we propose, can be applied more consistently and more comprehensively than the original taxonomies.
AB - Research on marketing and deception has identified principles of persuasion that influence human decisions. However, this research is scattered: it focuses on specific contexts and produces different taxonomies. In regard to frauds and scams, three taxonomies are often referred in the literature: Cialdini’s principles of influence, Gragg’s psychological triggers, and Stajano et al. principles of scams. It is unclear whether these relate but clearly some of their principles seem overlapping whereas others look complementary. We propose a way to connect those principles and present a merged and reviewed list for them. Then, we analyse various phishing emails and show that our principles are used therein in specific combinations. Our analysis of phishing is based on peer review and further research is needed to make it automatic, but the approach we follow, together with principles we propose, can be applied more consistently and more comprehensively than the original taxonomies.
KW - social engineering
UR - https://www.scopus.com/pages/publications/84944031269
U2 - 10.1007/978-3-319-20376-8_4
DO - 10.1007/978-3-319-20376-8_4
M3 - Chapter
SN - 9783319203751
VL - 9190
T3 - Lecture Notes in Computer Science
SP - 36
EP - 47
BT - Human Aspects of Information Security, Privacy, and Trust
A2 - Tryfonas, Theo
A2 - Askoxylakis, Ioannis
PB - Springer
CY - London
ER -