Investigating the Experience of Social Engineering Victims: Exploratory and User Testing Study
Abstract
:1. Introduction
- RQ1: Which of the SE attack scenarios are obscure to victims?
- RQ2: What are the reasons for successful SE attacks?
- RQ3: How do users respond to SE attacks?
- RQ4: What strategy is suitable for accessible and acceptable SE security mechanisms?
2. Materials and Methods
2.1. Participant Recruitment
2.2. Procedures
2.3. Data Description and Analysis
3. Results
3.1. Exploratory Study
3.2. User Testing Study
- Third item. The rating score for every question in odd numbers (1, 3, 5, 7, and 9) was less by 1.
- Every question in even numbers (2, 4, 6, 8, and 10) was subtracted from 5.
- The sum of the values obtained from steps 1 and 2 was multiplied by 2.5
- The average score for all respondents is found by adding the SUS score from each respondent and dividing it by the number of respondents. This is the formula to calculate the SUS score:
4. Discussion
4.1. Experience of SE Victims
4.2. Chatbot User-Evaluation
“SPAM can be difficult to detect, in identifying spam messages, senders’ number might be a key indicator for consideration in providing a verdict if the message is SPAM.” (P11).
4.3. The Practical Benefit of This Study and Recommendations for Future Work
- The information of SE criminals, be it mobile contact, Account details, or URL information, can be incorporated into the detection algorithm for effective spam detection.
- A social chatbot that can assist in identifying smishing attempts.
- Constant awareness on social media platforms from verified intuitions on cyber-attacks targeted to the public. This awareness material may include short video clips on identity theft.
- A common platform for victims to share their experiences and thus assist others in understanding the new trends of attack.
- Telecommunication companies need to further work on mechanisms in identifying potential vishing.
4.4. Limitation
5. Conclusions
Author Contributions
Funding
Informed Consent Statement
Acknowledgments
Conflicts of Interest
Appendix A. Chatbot Assessment
# | Sum of Squares | 1 | 2 | 3 | 4 | 5 |
---|---|---|---|---|---|---|
1 | I think that I would like to use this Chatbot frequently. | |||||
2 | I found the Chatbot unnecessarily complex. | |||||
3 | I thought the Chatbot was easy to use. | |||||
4 | I think that I would need the support of a technical person to be able to use this Chatbot. | |||||
5 | I found the various functions in this Chatbot were well integrated. | |||||
6 | I thought there was too much inconsistency in this Chatbot. | |||||
7 | I would imagine that most people would learn to use this Chatbot very quickly. | |||||
8 | I found the Chatbot very cumbersome to use. | |||||
9 | I felt very confident using the Chatbot. | |||||
10 | I needed to learn a lot of things before I could get going with this Chatbot. |
Appendix B. SUS Score
Users | Q1 | Q2 | Q3 | Q4 | Q5 | Q6 | Q7 | Q8 | Q9 | Q10 | Raw Score | SUS Score | Users’ Occupation |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
P1 | 5 | 2 | 5 | 2 | 4 | 2 | 5 | 2 | 4 | 2 | 33 | 82.5 | E |
P2 | 3 | 2 | 4 | 2 | 3 | 3 | 3 | 2 | 3 | 2 | 25 | 62.5 | E |
P3 | 4 | 2 | 4 | 2 | 4 | 2 | 4 | 2 | 4 | 2 | 30 | 75 | E |
P4 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 20 | 50 | E |
P5 | 4 | 4 | 4 | 2 | 2 | 2 | 2 | 4 | 3 | 3 | 20 | 50 | E |
P6 | 5 | 1 | 5 | 2 | 3 | 2 | 4 | 2 | 4 | 2 | 32 | 80 | E |
P7 | 4 | 2 | 4 | 1 | 4 | 3 | 5 | 2 | 4 | 1 | 32 | 80 | E |
P8 | 1 | 2 | 2 | 2 | 2 | 2 | 4 | 2 | 2 | 4 | 19 | 47.5 | E |
P9 | 4 | 4 | 3 | 3 | 4 | 2 | 3 | 2 | 4 | 2 | 25 | 62.5 | E |
P10 | 3 | 2 | 3 | 3 | 4 | 3 | 4 | 2 | 4 | 2 | 26 | 65 | E |
P11 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 20 | 50 | E |
P12 | 5 | 2 | 5 | 2 | 4 | 2 | 4 | 2 | 4 | 2 | 32 | 80 | E |
P13 | 5 | 2 | 2 | 2 | 4 | 2 | 5 | 1 | 5 | 2 | 32 | 80 | E |
P14 | 5 | 1 | 5 | 1 | 5 | 1 | 5 | 1 | 4 | 1 | 39 | 97.5 | E |
P15 | 4 | 1 | 3 | 2 | 4 | 4 | 4 | 4 | 5 | 4 | 25 | 62.5 | E |
P16 | 1 | 5 | 5 | 1 | 4 | 1 | 5 | 1 | 4 | 2 | 29 | 72.5 | E |
P17 | 2 | 3 | 4 | 2 | 2 | 3 | 4 | 3 | 4 | 2 | 23 | 57.5 | E |
P18 | 3 | 2 | 4 | 2 | 4 | 2 | 4 | 2 | 1 | 2 | 26 | 65 | E |
P19 | 1 | 4 | 5 | 1 | 5 | 1 | 4 | 1 | 5 | 1 | 32 | 80 | E |
P20 | 2 | 4 | 4 | 2 | 3 | 3 | 4 | 2 | 3 | 2 | 23 | 57.5 | E |
P21 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 3 | 20 | 50 | E |
P22 | 3 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 2 | 3 | 20 | 50 | E |
P23 | 2 | 2 | 3 | 4 | 3 | 2 | 4 | 4 | 3 | 2 | 21 | 52.5 | E |
P24 | 2 | 4 | 4 | 3 | 4 | 2 | 4 | 4 | 4 | 3 | 22 | 55 | E |
P25 | 1 | 4 | 3 | 1 | 4 | 1 | 5 | 1 | 5 | 2 | 29 | 72.5 | E |
P26 | 5 | 2 | 4 | 2 | 4 | 3 | 4 | 2 | 4 | 2 | 30 | 75 | S |
P27 | 4 | 1 | 4 | 1 | 5 | 1 | 5 | 1 | 5 | 1 | 38 | 95 | S |
P28 | 5 | 1 | 5 | 1 | 5 | 1 | 1 | 1 | 5 | 1 | 36 | 90 | S |
P29 | 3 | 4 | 3 | 4 | 4 | 2 | 4 | 2 | 2 | 4 | 20 | 50 | S |
P30 | 1 | 4 | 4 | 2 | 5 | 2 | 5 | 1 | 5 | 1 | 30 | 75 | S |
P31 | 2 | 4 | 4 | 1 | 4 | 2 | 5 | 1 | 5 | 1 | 31 | 77.5 | S |
P32 | 1 | 4 | 4 | 1 | 3 | 2 | 4 | 2 | 3 | 1 | 25 | 62.5 | S |
P33 | 3 | 1 | 5 | 1 | 4 | 2 | 4 | 1 | 3 | 2 | 32 | 80 | U |
P34 | 1 | 2 | 1 | 1 | 5 | 1 | 5 | 2 | 5 | 1 | 30 | 75 | U |
P35 | 5 | 4 | 2 | 2 | 3 | 1 | 4 | 2 | 4 | 3 | 26 | 65 | U |
P36 | 4 | 2 | 4 | 1 | 4 | 2 | 5 | 2 | 4 | 2 | 32 | 80 | U |
P37 | 2 | 4 | 5 | 4 | 4 | 2 | 4 | 2 | 5 | 2 | 26 | 65 | U |
P38 | 1 | 5 | 5 | 1 | 5 | 1 | 5 | 1 | 5 | 1 | 32 | 80 | U |
Average (SD) | 27.0 (5.3) | 68.0 (13.4) | - |
References
- Beckers, K.; Pape, S. A serious game for eliciting social engineering security requirements. In Proceedings of the 2016 IEEE 24th International Requirements Engineering Conference (RE), Beijing, China, 12–16 September 2016; pp. 16–25. [Google Scholar]
- Yasin, A.; Fatima, R.; Liu, L.; Yasin, A.; Wang, J. Contemplating social engineering studies and attack scenarios: A review study. Secur. Priv. 2019, 2, e73. [Google Scholar] [CrossRef] [Green Version]
- Bullée, J.W.H.; Montoya, L.; Pieters, W.; Junger, M.; Hartel, P. On the anatomy of social engineering attacks—A literature-based dissection of successful attacks. J. Investig. Psychol. Offender Profiling 2018, 15, 20–45. [Google Scholar] [CrossRef]
- Gupta, S.; Singhal, A.; Kapoor, A. A literature survey on social engineering attacks: Phishing attack. In Proceedings of the 2016 International Conference on Computing, Communication and Automation (ICCCA), Greater Noida, India, 29–30 April 2016; pp. 537–540. [Google Scholar]
- Ghafir, I.; Prenosil, V.; Alhejailan, A.; Hammoudeh, M. Social engineering attack strategies and defence approaches. In Proceedings of the 2016 IEEE 4th international conference on future internet of things and cloud (FiCloud), Vienna, Austria, 22–24 August 2016; pp. 145–149. [Google Scholar]
- Balim, C.; Gunal, E.S. Automatic Detection of Smishing Attacks by Machine Learning Methods. In Proceedings of the 2019 1st International Informatics and Software Engineering Conference (UBMYK), Ankara, Turkey, 6–7 November 2019. [Google Scholar]
- Zainab, A.; Syed, D.; Al-Thani, D. Deployment of deep learning models to mobile devices for spam classification. In Proceedings of the 2019 IEEE First International Conference on Cognitive Machine Intelligence (CogMI), Los Angeles, CA, USA, 12–14 December 2019; pp. 112–117. [Google Scholar]
- Makkar, A.; Garg, S.; Kumar, N.; Hossain, M.S.; Ghoneim, A.; Alrashoud, M. An efficient spam detection technique for IoT devices using machine learning. IEEE Trans. Ind. Inform. 2020, 17, 903–912. [Google Scholar] [CrossRef]
- Radovanović, D.; Krstajić, B. Review spam detection using machine learning. In Proceedings of the 2018 23rd International Scientific-Professional Conference on Information Technology (IT), Zabljak, Montenegro, 19–24 February 2018; pp. 1–4. [Google Scholar]
- Binsaeed, K.; Stringhini, G.; Youssef, A.E. Detecting Spam in Twitter Microblogging Services: A Novel Machine Learning Approach based on Domain Popularity. Int. J. Adv. Comput. Sci. Appl. 2020, 11. [Google Scholar] [CrossRef]
- Kumari, K.V.; Kavitha, C. Spam detection using machine learning in R. In International Conference on Computer Networks and Communication Technologies; Springer: Singapore, 2019; pp. 55–64. [Google Scholar]
- Jain, A.K.; Yadav, S.K.; Choudhary, N. A Novel Approach to Detect Spam and Smishing SMS using Machine Learning Techniques. Int. J. E-Serv. Mob. Appl. 2020, 12, 21–38. [Google Scholar] [CrossRef]
- Yasin, A.; Fatima, R.; Liu, L.; Wang, J.; Ali, R.; Wei, Z. Understanding and deciphering of social engineering attack scenarios. Secur. Priv. 2020, 4, e161. [Google Scholar]
- Budimir, S.; Fontaine, J.R.; Roesch, E.B. Emotional experiences of cybersecurity breach victims. Cyberpsychol. Behav. Soc. Netw. 2021, 24, 612–616. [Google Scholar] [CrossRef] [PubMed]
- Whitty, M.; Doodson, J.; Creese, S.; Hodges, D. Individual differences in cyber security behaviors: An examination of who is sharing passwords. Cyberpsychol. Behav. Soc. Netw. 2015, 18, 3–7. [Google Scholar] [CrossRef] [PubMed] [Green Version]
- Younis, Y.A.; Musbah, M. A framework to protect against phishing attacks. In Proceedings of the 6th International Conference on Engineering & MIS 2020, New York, NY, USA, 14–16 September 2020. [Google Scholar]
- Shaabany, G.; Anderl, R. Designing an effective course to improve cybersecurity awareness for engineering faculties. In International Conference on Applied Human Factors and Ergonomics; Springer: Cham, Switzerland, 2018; pp. 203–211. [Google Scholar]
- Robles, A.; Norris, J.; Watson, S.; Browne, A.F. Survey of non-malicious user actions that introduce network and system vulnerabilities and exploits. In Proceedings of the SoutheastCon 2018, St. Petersburg, FL, USA, 19–22 April 2018; pp. 1–5. [Google Scholar]
- Handcock, M.S.; Gile, K.J. Comment: On the concept of snowball sampling. Sociol. Methodol. 2011, 41, 367–371. [Google Scholar] [CrossRef] [Green Version]
- Cridland, E.K.; Jones, S.C.; Caputi, P.; Magee, C.A. Qualitative research with families living with autism spectrum disorder: Recommendations for conducting semistructured interviews. J. Intellect. Dev. Disabil. 2015, 40, 78–91. [Google Scholar] [CrossRef] [Green Version]
- Denscombe, M. The Good Research Guide: For Small-Scale Social Research Projects; McGraw-Hill Education (UK): London, UK, 2014. [Google Scholar]
- Brooke, J. SUS: A retrospective. J. Usability Stud. 2013, 8, 29–40. [Google Scholar]
- Corbin, J.; Strauss, A. Basics of Qualitative Research: Techniques and Procedures for Developing Grounded Theory; SAGE Publications: New York, NY, USA, 2014. [Google Scholar]
- Sauro, J. 5 Ways to Interpret a SUS Score. Available online: https://measuringu.com/interpret-sus-score/ (accessed on 10 September 2021).
- Bangor, A.; Kortum, P.; Miller, J. Determining what individual SUS scores mean: Adding an adjective rating scale. J. Usability Stud. 2009, 4, 114–123. [Google Scholar]
- Love, J.; Selker, R.; Marsman, M.; Jamil, T.; Dropmann, D.; Verhagen, J.; Ly, A.; Gronau, Q.F.; Smira, M.; Epskamp, S. JASP: Graphical statistical software for common statistical designs. J. Stat. Softw. 2019, 88, 1–17. [Google Scholar] [CrossRef] [Green Version]
- Edhlund, B.; McDougall, A. Nvivo 11 Essentials; Lulu.com: Morrisville, NC, USA, 2017. [Google Scholar]
- Obuhuma, J.; Zivuku, S. Social Engineering Based Cyber-Attacks in Kenya. In Proceedings of the 2020 IST-Africa Conference (IST-Africa), Kampala, Uganda, 18–22 May 2020. [Google Scholar]
Excerpts | Conceptualization | Categories |
---|---|---|
P12: Do not open this message (spam) or do not reply to them. It will harm you. | Maintaining best practices in cyber security. | Avoid Instructional Messages |
P11: It is about vigilance. It is about awareness. | Obtaining the right information from institutions | Awareness |
P20: I think it is good if some of the social media can also use filtering as security measures | Applying security measures for all forms of social communication | Effective Security Checks |
P16: I will say that people should be conscious of the number they are sending their details. | Seeking clarity on senders’ information | Verification |
P13: The message you will typically get is somebody sending you an email that you should click on a link to claim a gift. | Emotional and physiological persuasion | Enticement |
P12: They (messages) are only for marketing purposes. | Advertisement of products, Targeting users’ interest | Marketing strategies |
P4: she said we noticed a transfer; we have stopped the transfer, and we need your credit card details. | Receiving directives on personal details | Request for Personal Information |
P17: The email read if I do not pay $2000, they will expose some of my personal information to my contacts. | Escalating false claims with consequences | Threat |
P11: This is something (spam message) I get roughly on a weekly basis, mostly my emails. | Email as means of cyber-attack | Phishing |
P10: I received is a text message about three weeks ago. | SMS as means of cyber-attack, group attack and Identity theft | Smishing |
P11: I do not really get SMS, but I do get phone calls. | Phone call as means of SE attack | Vishing |
P13: We also have security tools that help us analyze it ahead of time. | Mitigating cyber-attack with security tools | Advanced Security Measures |
P12: It is quite difficult to totally restrict these messages (spam). | Deceptive and obscure attack techniques | Difficult to Identify Spam |
Main Categories (Tree Nodes) | Categories (Free Nodes) | Implication of Main Categories |
---|---|---|
Advice on Preventing Attacks | -Avoid Instructional Messages -Awareness -Effective Security Checks -Verification | -Always on the lookout for instructional messages either from known or unknown contacts. -Skills and modus operandi awareness is crucial for cyber security mechanisms. |
Attack Context | -Enticement -Marketing strategies -Request for Personal Information -Threat | Messages or calls which are centered on enticement, advertisement, requests for personal information, and threats need to be scrutinized properly before taking action. |
Attack Methods | -Phishing -Smishing -Vishing | The trending methods of cyber-attacks are mainly emails, SMS, and phone calls. |
Detection Methods | -Advanced Security Measures -Difficult to Identify Spam -Experience and Awareness -Incorrect Presentation -Instructional Contents -Requesting for personal information -Spelling Mistakes | The trending methods of cyber-attacks are mainly emails, SMS, and phone calls. Cyber-attacks are difficult to identify. However, the common detection methods used aside from the security tools are experience, awareness, the style of the presentation, and the content of the message or call. |
Reasons for Falling for Attacks | -Absent-mindedness -Ignorance -Inadequate Security Measures -Situation (Circumstance) -Trusted Contacts | Despite the detection methods, users still fall for attacks due to ignorance, absent-mindedness, circumstances surrounding the user, and trust. |
Victims’ Actions | -Block Contact -Compliance -Delete Message -Do Nothing -Ignore Phishing and Smishing -Informing Friends and Families -Inquire from People -Query the Attacker -Report to Authorities | The actions that users after receiving spam messages or calls could be compliant, in doubt, totally ignored depending on the experience, awareness, and present situation of users. |
Cases | Sum of Squares | df | Mean Square | F | p |
---|---|---|---|---|---|
Occupation | 712.884 | 2 | 356.442 | 2.014 | 0.149 |
Residuals | 6195.833 | 35 | 177.024 |
Publisher’s Note: MDPI stays neutral with regard to jurisdictional claims in published maps and institutional affiliations. |
© 2021 by the authors. Licensee MDPI, Basel, Switzerland. This article is an open access article distributed under the terms and conditions of the Creative Commons Attribution (CC BY) license (https://creativecommons.org/licenses/by/4.0/).
Share and Cite
Banire, B.; Al Thani, D.; Yang, Y. Investigating the Experience of Social Engineering Victims: Exploratory and User Testing Study. Electronics 2021, 10, 2709. https://doi.org/10.3390/electronics10212709
Banire B, Al Thani D, Yang Y. Investigating the Experience of Social Engineering Victims: Exploratory and User Testing Study. Electronics. 2021; 10(21):2709. https://doi.org/10.3390/electronics10212709
Chicago/Turabian StyleBanire, Bilikis, Dena Al Thani, and Yin Yang. 2021. "Investigating the Experience of Social Engineering Victims: Exploratory and User Testing Study" Electronics 10, no. 21: 2709. https://doi.org/10.3390/electronics10212709
APA StyleBanire, B., Al Thani, D., & Yang, Y. (2021). Investigating the Experience of Social Engineering Victims: Exploratory and User Testing Study. Electronics, 10(21), 2709. https://doi.org/10.3390/electronics10212709