Priming and warnings are not effective to prevent social engineering attacks
Humans tend to trust each other and to easily disclose personal information. This makes them vulnerable to social engineering attacks. The present study investigated the effectiveness of two interventions that aim to protect users against social engineering attacks, namely priming through cues to ra...
Gespeichert in:
Veröffentlicht in: | Computers in human behavior 2017-01, Vol.66, p.75-87 |
---|---|
Hauptverfasser: | , , |
Format: | Artikel |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 87 |
---|---|
container_issue | |
container_start_page | 75 |
container_title | Computers in human behavior |
container_volume | 66 |
creator | Junger, M. Montoya, L. Overink, F.-J. |
description | Humans tend to trust each other and to easily disclose personal information. This makes them vulnerable to social engineering attacks. The present study investigated the effectiveness of two interventions that aim to protect users against social engineering attacks, namely priming through cues to raise awareness about the dangers of social engineering cyber-attacks and warnings against the disclosure of personal information. A sample of visitors of the shopping district of a medium-sized town in the Netherlands was studied. Disclosure was measured by asking subjects for their email address, 9 digits from their 18 digit bank account number, and for those who previously shopped online, what they had purchased and in which web shop. Relatively high disclosure rates were found: 79.1% of the subjects filled in their email address, and 43.5% provided bank account information. Among the online shoppers, 89.8% of the subjects filled in the type of product(s) they purchased and 91.4% filled in the name of the online shop where they did these purchases. Multivariate analysis showed that neither priming questions, nor a warning influenced the degree of disclosure. Indications of an adverse effect of the warning were found. The implications of these findings are discussed.
•Shoppers easily provide personal identifiable information (PII).•Priming or a warning do not influence the degree of disclosure.•A warning, paradoxically, may even increase disclosure.•Users need to be educated about what constitutes sensitive PII.•Testing interventions is important to avoid possible adverse effects. |
doi_str_mv | 10.1016/j.chb.2016.09.012 |
format | Article |
fullrecord | <record><control><sourceid>proquest_cross</sourceid><recordid>TN_cdi_proquest_journals_1932190976</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><els_id>S0747563216306392</els_id><sourcerecordid>1932190976</sourcerecordid><originalsourceid>FETCH-LOGICAL-c368t-72026e62d23af000d3bc9a28946ef317bdd6df2b3d8cba319d761960068f26403</originalsourceid><addsrcrecordid>eNp9kDtPAzEQhC0EEiHwA-gsUd_hR2KfRYUiXlIkKKC2fPY6-Ai-YJsg_j0OoabaKWZ2Zz-EzilpKaHicmjta9-yKluiWkLZAZrQTvJGCsUO0YTImWzmgrNjdJLzQAiZz4mYoOVTCu8hrrCJDn-ZFKvO2CTAcSwYvAdbwhZwGfEmwRZiwXm0wawxxFWIAOk3XIqxb_kUHXmzznD2N6fo5fbmeXHfLB_vHhbXy8Zy0ZVGMsIECOYYN742cby3yrBOzQR4TmXvnHCe9dx1tjecKicFVYIQ0XkmZoRP0cV-7yaNH5-Qix7GzxTrSU0VZ1QRJUV10b3LpjHnBF5v6q8mfWtK9A6aHnSFpnfQNFG6QquZq30Gav1tgKSzDRAtuJAqCe3G8E_6B_MmdBY</addsrcrecordid><sourcetype>Aggregation Database</sourcetype><iscdi>true</iscdi><recordtype>article</recordtype><pqid>1932190976</pqid></control><display><type>article</type><title>Priming and warnings are not effective to prevent social engineering attacks</title><source>Access via ScienceDirect (Elsevier)</source><creator>Junger, M. ; Montoya, L. ; Overink, F.-J.</creator><creatorcontrib>Junger, M. ; Montoya, L. ; Overink, F.-J.</creatorcontrib><description>Humans tend to trust each other and to easily disclose personal information. This makes them vulnerable to social engineering attacks. The present study investigated the effectiveness of two interventions that aim to protect users against social engineering attacks, namely priming through cues to raise awareness about the dangers of social engineering cyber-attacks and warnings against the disclosure of personal information. A sample of visitors of the shopping district of a medium-sized town in the Netherlands was studied. Disclosure was measured by asking subjects for their email address, 9 digits from their 18 digit bank account number, and for those who previously shopped online, what they had purchased and in which web shop. Relatively high disclosure rates were found: 79.1% of the subjects filled in their email address, and 43.5% provided bank account information. Among the online shoppers, 89.8% of the subjects filled in the type of product(s) they purchased and 91.4% filled in the name of the online shop where they did these purchases. Multivariate analysis showed that neither priming questions, nor a warning influenced the degree of disclosure. Indications of an adverse effect of the warning were found. The implications of these findings are discussed.
•Shoppers easily provide personal identifiable information (PII).•Priming or a warning do not influence the degree of disclosure.•A warning, paradoxically, may even increase disclosure.•Users need to be educated about what constitutes sensitive PII.•Testing interventions is important to avoid possible adverse effects.</description><identifier>ISSN: 0747-5632</identifier><identifier>EISSN: 1873-7692</identifier><identifier>DOI: 10.1016/j.chb.2016.09.012</identifier><language>eng</language><publisher>Elmsford: Elsevier Ltd</publisher><subject>Cues ; Cybersecurity ; Digits ; Disclosure ; Disclosure of personal information ; Multivariate analysis ; Network security ; Personal information ; Phishing ; prevention ; Priming ; Social engineering ; Social networks ; Studies ; Warning</subject><ispartof>Computers in human behavior, 2017-01, Vol.66, p.75-87</ispartof><rights>2016</rights><rights>Copyright Elsevier Science Ltd. Jan 2017</rights><lds50>peer_reviewed</lds50><oa>free_for_read</oa><woscitedreferencessubscribed>false</woscitedreferencessubscribed><citedby>FETCH-LOGICAL-c368t-72026e62d23af000d3bc9a28946ef317bdd6df2b3d8cba319d761960068f26403</citedby><cites>FETCH-LOGICAL-c368t-72026e62d23af000d3bc9a28946ef317bdd6df2b3d8cba319d761960068f26403</cites><orcidid>0000-0002-9515-9860</orcidid></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://dx.doi.org/10.1016/j.chb.2016.09.012$$EHTML$$P50$$Gelsevier$$H</linktohtml><link.rule.ids>315,781,785,3551,27929,27930,46000</link.rule.ids></links><search><creatorcontrib>Junger, M.</creatorcontrib><creatorcontrib>Montoya, L.</creatorcontrib><creatorcontrib>Overink, F.-J.</creatorcontrib><title>Priming and warnings are not effective to prevent social engineering attacks</title><title>Computers in human behavior</title><description>Humans tend to trust each other and to easily disclose personal information. This makes them vulnerable to social engineering attacks. The present study investigated the effectiveness of two interventions that aim to protect users against social engineering attacks, namely priming through cues to raise awareness about the dangers of social engineering cyber-attacks and warnings against the disclosure of personal information. A sample of visitors of the shopping district of a medium-sized town in the Netherlands was studied. Disclosure was measured by asking subjects for their email address, 9 digits from their 18 digit bank account number, and for those who previously shopped online, what they had purchased and in which web shop. Relatively high disclosure rates were found: 79.1% of the subjects filled in their email address, and 43.5% provided bank account information. Among the online shoppers, 89.8% of the subjects filled in the type of product(s) they purchased and 91.4% filled in the name of the online shop where they did these purchases. Multivariate analysis showed that neither priming questions, nor a warning influenced the degree of disclosure. Indications of an adverse effect of the warning were found. The implications of these findings are discussed.
•Shoppers easily provide personal identifiable information (PII).•Priming or a warning do not influence the degree of disclosure.•A warning, paradoxically, may even increase disclosure.•Users need to be educated about what constitutes sensitive PII.•Testing interventions is important to avoid possible adverse effects.</description><subject>Cues</subject><subject>Cybersecurity</subject><subject>Digits</subject><subject>Disclosure</subject><subject>Disclosure of personal information</subject><subject>Multivariate analysis</subject><subject>Network security</subject><subject>Personal information</subject><subject>Phishing</subject><subject>prevention</subject><subject>Priming</subject><subject>Social engineering</subject><subject>Social networks</subject><subject>Studies</subject><subject>Warning</subject><issn>0747-5632</issn><issn>1873-7692</issn><fulltext>true</fulltext><rsrctype>article</rsrctype><creationdate>2017</creationdate><recordtype>article</recordtype><recordid>eNp9kDtPAzEQhC0EEiHwA-gsUd_hR2KfRYUiXlIkKKC2fPY6-Ai-YJsg_j0OoabaKWZ2Zz-EzilpKaHicmjta9-yKluiWkLZAZrQTvJGCsUO0YTImWzmgrNjdJLzQAiZz4mYoOVTCu8hrrCJDn-ZFKvO2CTAcSwYvAdbwhZwGfEmwRZiwXm0wawxxFWIAOk3XIqxb_kUHXmzznD2N6fo5fbmeXHfLB_vHhbXy8Zy0ZVGMsIECOYYN742cby3yrBOzQR4TmXvnHCe9dx1tjecKicFVYIQ0XkmZoRP0cV-7yaNH5-Qix7GzxTrSU0VZ1QRJUV10b3LpjHnBF5v6q8mfWtK9A6aHnSFpnfQNFG6QquZq30Gav1tgKSzDRAtuJAqCe3G8E_6B_MmdBY</recordid><startdate>201701</startdate><enddate>201701</enddate><creator>Junger, M.</creator><creator>Montoya, L.</creator><creator>Overink, F.-J.</creator><general>Elsevier Ltd</general><general>Elsevier Science Ltd</general><scope>AAYXX</scope><scope>CITATION</scope><scope>7SC</scope><scope>8FD</scope><scope>JQ2</scope><scope>L7M</scope><scope>L~C</scope><scope>L~D</scope><orcidid>https://orcid.org/0000-0002-9515-9860</orcidid></search><sort><creationdate>201701</creationdate><title>Priming and warnings are not effective to prevent social engineering attacks</title><author>Junger, M. ; Montoya, L. ; Overink, F.-J.</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-c368t-72026e62d23af000d3bc9a28946ef317bdd6df2b3d8cba319d761960068f26403</frbrgroupid><rsrctype>articles</rsrctype><prefilter>articles</prefilter><language>eng</language><creationdate>2017</creationdate><topic>Cues</topic><topic>Cybersecurity</topic><topic>Digits</topic><topic>Disclosure</topic><topic>Disclosure of personal information</topic><topic>Multivariate analysis</topic><topic>Network security</topic><topic>Personal information</topic><topic>Phishing</topic><topic>prevention</topic><topic>Priming</topic><topic>Social engineering</topic><topic>Social networks</topic><topic>Studies</topic><topic>Warning</topic><toplevel>peer_reviewed</toplevel><toplevel>online_resources</toplevel><creatorcontrib>Junger, M.</creatorcontrib><creatorcontrib>Montoya, L.</creatorcontrib><creatorcontrib>Overink, F.-J.</creatorcontrib><collection>CrossRef</collection><collection>Computer and Information Systems Abstracts</collection><collection>Technology Research Database</collection><collection>ProQuest Computer Science Collection</collection><collection>Advanced Technologies Database with Aerospace</collection><collection>Computer and Information Systems Abstracts Academic</collection><collection>Computer and Information Systems Abstracts Professional</collection><jtitle>Computers in human behavior</jtitle></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext</fulltext></delivery><addata><au>Junger, M.</au><au>Montoya, L.</au><au>Overink, F.-J.</au><format>journal</format><genre>article</genre><ristype>JOUR</ristype><atitle>Priming and warnings are not effective to prevent social engineering attacks</atitle><jtitle>Computers in human behavior</jtitle><date>2017-01</date><risdate>2017</risdate><volume>66</volume><spage>75</spage><epage>87</epage><pages>75-87</pages><issn>0747-5632</issn><eissn>1873-7692</eissn><abstract>Humans tend to trust each other and to easily disclose personal information. This makes them vulnerable to social engineering attacks. The present study investigated the effectiveness of two interventions that aim to protect users against social engineering attacks, namely priming through cues to raise awareness about the dangers of social engineering cyber-attacks and warnings against the disclosure of personal information. A sample of visitors of the shopping district of a medium-sized town in the Netherlands was studied. Disclosure was measured by asking subjects for their email address, 9 digits from their 18 digit bank account number, and for those who previously shopped online, what they had purchased and in which web shop. Relatively high disclosure rates were found: 79.1% of the subjects filled in their email address, and 43.5% provided bank account information. Among the online shoppers, 89.8% of the subjects filled in the type of product(s) they purchased and 91.4% filled in the name of the online shop where they did these purchases. Multivariate analysis showed that neither priming questions, nor a warning influenced the degree of disclosure. Indications of an adverse effect of the warning were found. The implications of these findings are discussed.
•Shoppers easily provide personal identifiable information (PII).•Priming or a warning do not influence the degree of disclosure.•A warning, paradoxically, may even increase disclosure.•Users need to be educated about what constitutes sensitive PII.•Testing interventions is important to avoid possible adverse effects.</abstract><cop>Elmsford</cop><pub>Elsevier Ltd</pub><doi>10.1016/j.chb.2016.09.012</doi><tpages>13</tpages><orcidid>https://orcid.org/0000-0002-9515-9860</orcidid><oa>free_for_read</oa></addata></record> |
fulltext | fulltext |
identifier | ISSN: 0747-5632 |
ispartof | Computers in human behavior, 2017-01, Vol.66, p.75-87 |
issn | 0747-5632 1873-7692 |
language | eng |
recordid | cdi_proquest_journals_1932190976 |
source | Access via ScienceDirect (Elsevier) |
subjects | Cues Cybersecurity Digits Disclosure Disclosure of personal information Multivariate analysis Network security Personal information Phishing prevention Priming Social engineering Social networks Studies Warning |
title | Priming and warnings are not effective to prevent social engineering attacks |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2024-12-12T12%3A45%3A28IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-proquest_cross&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rft.genre=article&rft.atitle=Priming%20and%20warnings%20are%20not%20effective%20to%20prevent%20social%20engineering%20attacks&rft.jtitle=Computers%20in%20human%20behavior&rft.au=Junger,%20M.&rft.date=2017-01&rft.volume=66&rft.spage=75&rft.epage=87&rft.pages=75-87&rft.issn=0747-5632&rft.eissn=1873-7692&rft_id=info:doi/10.1016/j.chb.2016.09.012&rft_dat=%3Cproquest_cross%3E1932190976%3C/proquest_cross%3E%3Curl%3E%3C/url%3E&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_pqid=1932190976&rft_id=info:pmid/&rft_els_id=S0747563216306392&rfr_iscdi=true |