scholarly journals Model of Social Influence in Analysis of Socio-engineering Attacks

2021 ◽  
pp. 97-107
Author(s):  
T. V. Tulupieva ◽  
M. V. Abramov ◽  
A. L. Tulupiev

The purpose of this study is to study the modernization of the model of an attacker’s social engineering attack on a user, taking into account a wider range of factors influencing the success of a social engineering attack associated with the principles of social influence. Methods. To achieve this goal, the approaches to social influence and the components of social influence were analyzed. An integrated circuit of social influence is built, grounding in the context of socio-engineering attacks. Results. A model of social influence is proposed, built in the context of an attacker’s social engineering attack on a user. A new interpretation of the term user vulnerability in the context of information security has been proposed. Conclusion. The result obtained forms the potential of filling the user and attacker models with specific vulnerabilities and competencies, which will lead to a more accurate assessment of the success of the attacker’s social engineering attack on the user, due to the aggregation of information from incidents that have occurred.

2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Nur Syaedah Kamis ◽  
Norazlina Abd. Wahab

Purpose This paper aims to explore the level of hibah knowledge among Muslims in Kedah and investigate its determinants, consisting of education level, education stream, religiosity, social influence and social media. Design/methodology/approach This study is quantitative in nature. Questionnaires were distributed to collect data from Muslims in Alor Setar, Kedah. In total, 195 questionnaires were collected and data were analyzed using descriptive analysis, correlation analysis and multiple regression analysis. Findings The study finds that Muslims in Alor Setar, Kedah have good knowledge of hibah. Further, education stream, religiosity, social influence and social media were identified as significant factors that influence their knowledge of hibah. Research limitations/implications The first limitation is its narrow focus in surveying Muslims only in Alor Setar, Kedah. The second limitation is the limited number of determinants used in investigating hibah knowledge among Muslims and the techniques used in analyzing the data. Despite these limitations, the study’s findings provide invaluable insights into the factors influencing hibah knowledge among Muslims in Alor Setar, Kedah. Practical implications This study provides insights regarding the significant personal factors and environmental factors to increase Muslims’ knowledge of hibah. The link between the Islamic education stream and hibah knowledge provides a clear indication that Islamic education can curb the economic problems caused by the substantial amounts of frozen and unclaimed assets in Malaysia. A significant relationship between the environmental factors (social influence and social media) and hibah knowledge also implies that the government and private agencies related to Islamic estate planning and management may use these significant determinants as part of the marketing strategy to increase the usage of hibah as an alternative tool for estate planning. Originality/value This study contributes to a better understanding of Muslims’ knowledge about hibah. The government and related agencies in Islamic estate planning and management can now gain better insights into Muslims’ level of knowledge about hibah and the factors influencing their knowledge of hibah as an effective tool for Islamic estate planning and management. Hence, more effective strategies can be recommended to enhance the knowledge of Muslims on hibah. The findings of this study should be of value to the government in its effort to address the increasing number of frozen estates in Malaysia.


Author(s):  
Brad J. Sagarin ◽  
Mary Lynn Miller Henningsen

This chapter reviews research on resistance to influence, active or passive processes that reduce the impact of a potential source of social influence. This chapter begins with a discussion of the antecedents of resistance: characteristics of the influence target (strong attitudes, demographics, and personality), perceived aspects of the influence attempt (manipulative intent, threats to freedoms), or counterinfluence messages from a third party (forewarning, inoculation, stealing thunder, the poison parasite defense, resistance to social engineering) that motivate resistance. The chapter proceeds to a discussion of internal mechanisms of resistance (counterarguing, bolstering initial attitudes, derogating the source, attributing negative affect to the message or source, attempting to correct for bias) and external mechanisms of resistance (interpersonal strategies of communicating resistance and issuing refusals) and concludes with a discussion of the consequences of resistance for attitudes and relationships.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Ayodele Samuel Adegoke ◽  
Timothy Tunde Oladokun ◽  
Timothy Oluwafemi Ayodele ◽  
Samson Efuwape Agbato ◽  
Ahmed Ademola Jinadu

PurposeThe study analysed the factors influencing real estate firms' (REFs) decision to adopt virtual reality (VR) technology using the Decision-Making Trial and Evaluation Laboratory (DEMATEL) method. This was done to enhance the practice of real estate agency in Nigeria.Design/methodology/approachData were elicited from eight real estate experts. These experts were heads of the agency department of firms that had been in existence for a minimum of five years in the Lagos property market. The data analysed in this study were collected with the aid of a questionnaire.FindingsThe result revealed that use intention was influenced by performance expectancy, effort expectancy, social influence, facilitating conditions, hedonic motivation, price value and UB. Also, facilitating conditions, habit and use intention did not influence use behaviour. Overall, six constructs, which include price value (Ri − Cj value = 0.1284), use behaviour (Ri − Cj value = 0.0666), social influence (Ri − Cj value = 0.0583), facilitating conditions (Ri − Cj value = 0.0323), performance expectancy (Ri − Cj value = 0.0196) and effort expectancy (Ri − Cj value = 0.0116), were significant predictors of the factors influencing the decision of REFs to adopt VR. Of these constructs, the Ri − Cj values indicated that price value had the highest causative influence.Practical implicationsThe result of this study will bring REFs to the consciousness of the factors that could affect their adoption of VR technology. This study will also assist the Nigerian Institution of Estate Surveyors and Valuers in appropriately enlightening REFs on the integration of VR technology into the agency practice especially at this time when all health protocols and guidelines need to be observed to help flatten the curve of the Covid-19 pandemic.Originality/valueThis study is the first to have an insight into the analysis of the factors influencing REFs' decision to adopt VR technology using the DEMATEL method.


2021 ◽  
Vol 17 (1) ◽  
pp. 150-166
Author(s):  
Andrei L. LOMAKIN ◽  
Evgenii Yu. KHRUSTALEV ◽  
Gleb A. KOSTYURIN

Subject. As the socio-economic relationships are getting digitalized so quickly, the society faces more and more instances of cybercrime. To effectively prevent arising threats to personal information security, it is necessary to know key social engineering methods and security activities to mitigate consequences of emerging threats. Objectives. We herein analyze and detect arising information security threats associated with social engineering. We set forth basic guidelines for preventing threats and improving the personal security from social engineering approaches. Methods. The study relies upon methods of systems analysis, synthesis, analogy and generalization. Results. We determined the most frequent instances associated with social engineering, which cause personal information security threats and possible implications. The article outlines guidelines for improving the persona; security from social engineering approaches as an information security threat. Conclusions and Relevance. To make information security threats associated with social engineering less probable, there should be a comprehensive approach implying two strategies. First, the information security protection should be technologically improved, fitted with various data protection, antivirus, anti-fishing software. Second, people should be more aware of information security issues. Raising the public awareness, the government, heads of various departments, top executives of public and private organizations should set an integrated training system for people, civil servants, employees to proliferate the knowledge of information security basics.


2021 ◽  
pp. 1-19
Author(s):  
Rita Mascio ◽  
Megan Best ◽  
Sandra Lynch ◽  
Jane Phillips ◽  
Kate Jones

Abstract Objectives The aim was to identify determinants of nurse spiritual/existential care practices toward end-of-life patients. Nurses can play a significant role in providing spiritual/existential care, but they actually provide this care less frequently than desired by patients. Methods A systematic search was performed for peer-reviewed articles that reported factors that influenced nurses’ spiritual/existential care practices toward adult end-of-life patients. Results The review identified 42 studies and included the views of 4,712 nurses across a range of hospital and community settings. The most frequently reported factors/domains that influenced nurse practice were patient-related social influence, skills, social/professional role and identity, intentions and goals, and environmental context and resources. Significance of results A range of personal, organizational, and patient-related factors influence nurse provision of spiritual/existential care to end-of-life patients. This complete list of factors can be used to gauge a unit's conduciveness to nurse provision of spiritual/existential care and can be used as inputs to nurse competency frameworks.


2015 ◽  
Vol 23 (2) ◽  
pp. 178-199 ◽  
Author(s):  
Waldo Rocha Flores ◽  
Hannes Holm ◽  
Marcus Nohlberg ◽  
Mathias Ekstedt

Purpose – The purpose of the study was twofold: to investigate the correlation between a sample of personal psychological and demographic factors and resistance to phishing; and to investigate if national culture moderates the strength of these correlations. Design/methodology/approach – To measure potential determinants, a survey was distributed to 2,099 employees of nine organizations in Sweden, USA and India. Then, the authors conducted unannounced phishing exercises, in which a phishing attack targeted the same sample. Findings – Intention to resist social engineering, general information security awareness, formal IS training and computer experience were identified to have a positive significant correlation to phishing resilience. Furthermore, the results showed that the correlation between phishing determinants and employees’ observed that phishing behavior differs between Swedish, US and Indian employees in 6 out of 15 cases. Research limitations/implications – The identified determinants had, even though not strong, a significant positive correlation. This suggests that more work needs to be done to more fully understand determinants of phishing. The study assumes that culture effects apply to all individuals in a nation. However, differences based on cultures might exist based on firm characteristics within a country. The Swedish sample is dominating, while only 40 responses from Indian employees were collected. This unequal size of samples suggests that conclusions based on the results from the cultural analysis should be drawn cautiously. A natural continuation of the research is therefore to further explore the generalizability of the findings by collecting data from other nations with similar cultures as Sweden, USA and India. Originality/value – Using direct observations of employees’ security behaviors has rarely been used in previous research. Furthermore, analyzing potential differences in theoretical models based on national culture is an understudied topic in the behavioral information security field. This paper addresses both these issues.


Information ◽  
2019 ◽  
Vol 10 (9) ◽  
pp. 281 ◽  
Author(s):  
Chia-Ming Chang ◽  
Li-Wei Liu ◽  
Hsiu-Chin Huang ◽  
Huey-Hong Hsieh

As people feel more comfortable using the Internet, online hotel bookings has become popular in recent years. Understanding the drivers of online booking intention and behavior can help hotel managers to apply corresponding strategies to increase hotel booking rates. Thus the purpose of this study is to investigate the factors influencing the use intention and behavioral intention of online hotel booking. The proposed model has assimilated factors from the extended Unified theory of Acceptance and use of Technology (UTAUT2) along with age, gender, and experience as moderators. Data were collected by conducting a field survey questionnaire completed by 488 participants. The results showed that behavioral intention is significantly and positively influenced by performance expectancy, social influence, facilitating condition, hedonic motivation, price value, and habit behavior. Use behavior is positively influenced by facilitating condition and hedonic motivation. As for moderators, gender moderates the relationships between performance expectancy, social influence, and behavioral intention. Age moderates the relationships between effort expectancy, social influence, hedonic motivation, and behavioral intention. Experience moderates the relationships between social influence, price value, and behavioral intention and between habit behavior and use behavior. Based on the results, recommendations for hotel managers are proposed. Furthermore, research limitations and future directions are discussed.


Sign in / Sign up

Export Citation Format

Share Document