Search the World's Largest Database of Information Science & Technology Terms & Definitions
InfInfoScipedia LogoScipedia
A Free Service of IGI Global Publishing House
Below please find a list of definitions for the term that
you selected from multiple scholarly research resources.

What is Social engineering

Modern Theories and Practices for Cyber Ethics and Security Compliance
The manipulation of victims to obtain trust for exploitation.
Published in Chapter:
Towards a Theory for Explaining Socially-Engineered Cyber Deception and Theft
Paul Danquah (Heritage Christian College, Ghana), Olumide Babatope Longe (American University of Nigeria, Nigeria), Jojo Desmond Lartey (Heritage Christian College, Ghana), and Peter Ebo Tobbin (Center for IT Professional Development, Ghana)
DOI: 10.4018/978-1-7998-3149-5.ch003
Abstract
Socially engineered cyber deception and theft seems to have gained prominence in cybercrime. Given the contextual background of inadequate theoretical explanations of socially engineered cyber deception and theft cybercrime, there is the need for theory to better explain and possibly predict activities involved in socially engineered cyber deception and theft. This chapter proposes a theory of socially engineered cyber deception and theft (SECT), with routine activity theory, crime displacement theory, the space transition theory, and empirical review as its foundation. It iteratively combines deductive and inductive approaches to infer the occurrence of socially engineered cyber deception and theft. While the deductive approach serves the deduction leading to the inference, the inductive approach extracts and suggests empirical evidence for a deterministic prediction of the crime occurrence. It is recommended that the theory is further validated to test its applicability.
Full Text Chapter Download: US $37.50 Add to Cart
More Results
Full Text Chapter Download: US $37.50 Add to Cart
Combating Computer Fraud
An activity that is conducted by perpetrators on individuals in the hopes of gaining some personal information, such as credit card numbers, banking information, user names, passwords, and so forth. Social engineering can take the form of e-mails, mail, and phone calls. The authors of social engineering activities exploit individuals willing to trust, often with bad consequences. It often relies on non-technical means and involves tricking individuals to give up personal information. Social engineering perpetrators often rely on the goodness and natural tendency of people to help others.
Full Text Chapter Download: US $37.50 Add to Cart
Social Research Methods in Cybersecurity: From Criminology to Industrial Cybersecurity
It can be defined as the mechanism to obtain information or data of a sensitive nature. In essence, they are persuasive tactics that tend to use the goodwill and lack of caution of users.
Full Text Chapter Download: US $37.50 Add to Cart
The Ethics of Deception in Cyberspace
Techniques to manipulate people to obtain information from them that they would not give you voluntarily.
Full Text Chapter Download: US $37.50 Add to Cart
Hacking: Evolution, Conceptualization, and the Perpetrators
Type of attack in which human vulnerabilities are exploited, through interaction, to breach cybersecurity ( Wang et al . , 2021 ).
Full Text Chapter Download: US $37.50 Add to Cart
Understanding Computer Security
An activity that is conducted by perpetrators on individuals in the hopes of gaining some personal information, such as credit card numbers, banking information, user names, passwords, and so forth. Social engineering can take the form of e-mails, mail, and phone calls. The authors of social engineering activities exploit individuals willing to trust, often with bad consequences. It often relies on non-technical means and involves tricking individuals to give up personal information. Social engineering perpetrators often rely on the goodness and natural tendency of people to help others.
Full Text Chapter Download: US $37.50 Add to Cart
Attributed State Actors
Uses various real-world and electronic methods to coerce users into unknowingly facilitate a compromise whether it be revealing credentials or trying to persuade them to click on a malicious URL link or malware laden file.
Full Text Chapter Download: US $37.50 Add to Cart
Social Engineering and Data Privacy
The use of deception to let someone disclose their personal/ confidential information that may be used later for malicious intent
Full Text Chapter Download: US $37.50 Add to Cart
Enhancing Cybersecurity Protocols in Modern Healthcare Systems: Strategies and Best Practices
This is the psychological manipulation of people into performing actions or divulging confidential information. In healthcare cybersecurity, social engineering poses a significant threat as attackers may trick healthcare professionals into revealing sensitive information or granting access to secure systems.
Full Text Chapter Download: US $37.50 Add to Cart
Guarding Corporate Data from Social Engineering Attacks
The act of gaining either unauthorized access to a system or sensitive information, such as passwords, through the use of trust and relationship building with those who have access to such information.
Full Text Chapter Download: US $37.50 Add to Cart
The Insider Threat Landscape and the FinTech Sector: Attacks, Defenses, and Emerging Challenges
Tricking human users and relying on their actions to gain access to restricted information or systems, e.g., calling an employee pretending to be the human resource department and getting them to grant access to their private documents.
Full Text Chapter Download: US $37.50 Add to Cart
The Anatomy of Phishing Attacks and the Detection and Prevention of Fake Domain Names
It refers to a broad range of malicious activities performed through human interactions. It uses psychological manipulation to trick users into revealing sensitive information or making security mistakes.
Full Text Chapter Download: US $37.50 Add to Cart
Emerging Cyber Security Threats During the COVID-19 Pandemic and Possible Countermeasures
Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into breaking normal security procedures and best practices to gain unauthorized access to systems, networks, or physical locations or for financial gain.
Full Text Chapter Download: US $37.50 Add to Cart
Realizing a Multi-Layered Mobile Strategy for Underserved Areas for Cybersecurity Leadership
Full Text Chapter Download: US $37.50 Add to Cart
Security in Digital Marketing: Challenges and Opportunities
In the context of information security, it refers to the psychological manipulation of people to perform actions or to disclose confidential information.
Full Text Chapter Download: US $37.50 Add to Cart
An Overview of Threats to Information Security
An attack where the perpetrator uses social skills to trick or manipulate a legitimate employee into providing confidential company information.
Full Text Chapter Download: US $37.50 Add to Cart
Online Phishing and Solutions
An attack that uses personal and social skills to persuade the target to behave in violation of security principles.
Full Text Chapter Download: US $37.50 Add to Cart
Social Engineering in Information Security Breaches and the Factors That Explain Its Success: An Organizational Perspective
An attack technique carried out by social engineers seeking unauthorized access to valuable information assets. This technique exploits human vulnerability in the interaction with humans by using deception and manipulation in order to bypass information security policy.
Full Text Chapter Download: US $37.50 Add to Cart
Online Social and Business Networks’ Implications for Corporate Strategy
Act of manipulating people into performing actions or divulging confidential information, rather than by breaking in or using technical cracking techniques.
Full Text Chapter Download: US $37.50 Add to Cart
Marketing Vulnerabilities in an Age of Online Commerce
Manipulating people through their natural trust or desire to help in order to trick them into divulging information or performing actions.
Full Text Chapter Download: US $37.50 Add to Cart
Marketing Vulnerabilities in an Age of Online Commerce
Manipulating people through their natural trust or desire to help in order to trick them into divulging information or performing actions.
Full Text Chapter Download: US $37.50 Add to Cart
Network Worms
A type of attack taking advantage of human gullibility.
Full Text Chapter Download: US $37.50 Add to Cart
Privacy of Information and Data: Policies, Threats, and Solutions
It refers to attempts to gain unauthorized access to information and data by exploiting human psychology.
Full Text Chapter Download: US $37.50 Add to Cart
The Importance of the Human-Centric Approach in Combating Cyber Threats
The psychological manipulation of victims by cyber perpetrators, in order to get victims to divulge sensitive confidential information, or to perform certain actions that help perpetrators to successfully execute their cyberattacks.
Full Text Chapter Download: US $37.50 Add to Cart
Reviewing the Security Features in Contemporary Security Policies and Models for Multiple Platforms
It is the art of manipulating the mental state of the people in an attempt of divulging the sensitive information. It is the most dangerous danger that today’s enterprises are facing.
Full Text Chapter Download: US $37.50 Add to Cart
The Complex New World of Information Security
A collection of techniques used to manipulate people, often via a computer or telephone, into performing acts or divulging confidential information to facilitate the execution of a fraud.
Full Text Chapter Download: US $37.50 Add to Cart
Dark Web: A Breeding Ground for ID Theft and Financial Crimes
The art of influencing and manipulating an individual into acting a certain way that they may or may not intend to do otherwise, and that may or may not be in their best interest.
Full Text Chapter Download: US $37.50 Add to Cart
The Vulnerability of Children in Cyberspace
Social engineering involves criminals making direct contact with you usually by phone or email. They want to gain your confidence and usually pose as a customer service agent so you’ll give the necessary information needed. This is typically a password, the company you work for, or bank information. Cybercriminals will find out what they can about you on the internet and then attempt to add you as a friend on social accounts. Once they gain access to an account, they can sell your information or secure accounts in your name.
Full Text Chapter Download: US $37.50 Add to Cart
Data Privacy vs. Data Security
Manipulating people to reveal confidential information that will usually be used in criminal activities.
Full Text Chapter Download: US $37.50 Add to Cart
The Security Impacts on Social Media Platforms
The act of obtaining private information through non-technical means.
Full Text Chapter Download: US $37.50 Add to Cart
New Generation Mobile Cyber Security Threats: QR Codes and Social Engineering Threats
In the context of information security, it is the psychological manipulation of people to perform actions or disclose confidential information.
Full Text Chapter Download: US $37.50 Add to Cart
Social Engineering and its Countermeasures
The exploitation of psychological triggers and cognitive biases as a means to gain unauthorized access to information or information systems.
Full Text Chapter Download: US $37.50 Add to Cart
Trends in Malware Attacks: Identification and Mitigation Strategies
Social engineering, in the context of information security, is the psychological manipulation of people into performing actions or divulging confidential information.
Full Text Chapter Download: US $37.50 Add to Cart
Emerging Cybercrime Variants in the Socio-Technical Space
the design and implementation of logical procedures to persuade victims to supply confidential information to a spoofed entity.
Full Text Chapter Download: US $37.50 Add to Cart
Social Engineering Techniques, Password Selection, and Health Care Legislation: A Health Care Setting
The art and science of manipulating people and processes to get what an attacker wants.
Full Text Chapter Download: US $37.50 Add to Cart
Digital Security Strategy
A form of cyberattack that involves psychologically manipulating people into providing sensitive information (e.g., usernames, passwords, credit card numbers).
Full Text Chapter Download: US $37.50 Add to Cart
Potential Threats of Social Engineering Practices to Social Work: Concepts, Challenges, and Solutions
It refers to a wide range of malicious activities carried out through human interactions. It is based on psychological manipulation to trick users into revealing sensitive information or making security mistakes.
Full Text Chapter Download: US $37.50 Add to Cart
Critical Success Factors and Indicators to Improve Information Systems Security Management Actions
Acquiring information about computer systems through non-technical means (Winkler, 1996). Also defined as the practice of obtaining confidential information by manipulation of legitimate users (Wikipedia, 2006).
Full Text Chapter Download: US $37.50 Add to Cart
Malicious Software in Mobile Devices
Social engineering is an attack method taking advantage of human nature.
Full Text Chapter Download: US $37.50 Add to Cart
Safe Distances: Online and RL Hyper-Personal Relationships as Potential Attack Surfaces
The manipulation of another human being to reveal sensitive or private information (such as through deception), often used to commit fraud.
Full Text Chapter Download: US $37.50 Add to Cart
Identity Theft through the Web
Full Text Chapter Download: US $37.50 Add to Cart
A Routine Activity Theory-Based Framework for Combating Cybercrime
Psychological manipulation of people into performing actions or divulging confidential information.
Full Text Chapter Download: US $37.50 Add to Cart
eContent Pro Discount Banner
InfoSci OnDemandECP Editorial ServicesAGOSR