Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks

Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigated social engineering and phishing email desig...

Full description

Bibliographic Details
Main Authors: Brent Pethers, Abubakar Bello
Format: Article
Language:English
Published: MDPI AG 2023-01-01
Series:Future Internet
Subjects:
Online Access:https://www.mdpi.com/1999-5903/15/1/29
_version_ 1797442250470326272
author Brent Pethers
Abubakar Bello
author_facet Brent Pethers
Abubakar Bello
author_sort Brent Pethers
collection DOAJ
description Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigated social engineering and phishing email design and influence techniques in susceptibility to cyber sextortion attacks. Using a quantitative methodology, a survey measured susceptibility to cyber sextortion with a focus on four different email design cues. One-way repeated measures ANOVA, post hoc comparison tests, Friedman nonparametric test, and Spearman correlation tests were conducted with results indicating that attention to email source and title/subject line significantly increased individuals’ susceptibility, while attention to grammar and spelling, and urgency cues, had lesser influence. As such, the influence of these message-related factors should be considered when implementing effective security controls to mitigate the risks and vulnerabilities to cyber sextortion attacks.
first_indexed 2024-03-09T12:39:07Z
format Article
id doaj.art-a3a53728e83d4f5c9415babe6179ae87
institution Directory Open Access Journal
issn 1999-5903
language English
last_indexed 2024-03-09T12:39:07Z
publishDate 2023-01-01
publisher MDPI AG
record_format Article
series Future Internet
spelling doaj.art-a3a53728e83d4f5c9415babe6179ae872023-11-30T22:20:45ZengMDPI AGFuture Internet1999-59032023-01-011512910.3390/fi15010029Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing AttacksBrent Pethers0Abubakar Bello1School of Social Sciences, Western Sydney University, Penrith, NSW 2751, AustraliaSchool of Social Sciences, Western Sydney University, Penrith, NSW 2751, AustraliaCyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigated social engineering and phishing email design and influence techniques in susceptibility to cyber sextortion attacks. Using a quantitative methodology, a survey measured susceptibility to cyber sextortion with a focus on four different email design cues. One-way repeated measures ANOVA, post hoc comparison tests, Friedman nonparametric test, and Spearman correlation tests were conducted with results indicating that attention to email source and title/subject line significantly increased individuals’ susceptibility, while attention to grammar and spelling, and urgency cues, had lesser influence. As such, the influence of these message-related factors should be considered when implementing effective security controls to mitigate the risks and vulnerabilities to cyber sextortion attacks.https://www.mdpi.com/1999-5903/15/1/29cybersecurityprivacysextortionphishingsocial engineering
spellingShingle Brent Pethers
Abubakar Bello
Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks
Future Internet
cybersecurity
privacy
sextortion
phishing
social engineering
title Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks
title_full Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks
title_fullStr Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks
title_full_unstemmed Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks
title_short Role of Attention and Design Cues for Influencing Cyber-Sextortion Using Social Engineering and Phishing Attacks
title_sort role of attention and design cues for influencing cyber sextortion using social engineering and phishing attacks
topic cybersecurity
privacy
sextortion
phishing
social engineering
url https://www.mdpi.com/1999-5903/15/1/29
work_keys_str_mv AT brentpethers roleofattentionanddesigncuesforinfluencingcybersextortionusingsocialengineeringandphishingattacks
AT abubakarbello roleofattentionanddesigncuesforinfluencingcybersextortionusingsocialengineeringandphishingattacks