Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application

A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. One form, in particular, is a social engineer...

Full description

Saved in:
Bibliographic Details
Main Authors: Nuri Wulandari, Mohammad Syauqi Adnan, Chastio Bayu Wicaksono
Format: Article
Language:English
Published: Wiley 2022-01-01
Series:Human Behavior and Emerging Technologies
Online Access:http://dx.doi.org/10.1155/2022/5738969
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1832568184185552896
author Nuri Wulandari
Mohammad Syauqi Adnan
Chastio Bayu Wicaksono
author_facet Nuri Wulandari
Mohammad Syauqi Adnan
Chastio Bayu Wicaksono
author_sort Nuri Wulandari
collection DOAJ
description A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. One form, in particular, is a social engineering-based cyber attack. Unfortunately, not much research has been conducted on the susceptibility factors that cause this to happen. This study attempts to understand what factors make a person susceptible to cyber attacks that can be seen from three perspectives: habitual perspective, perception perspective, and social and motivation perspective. The objective of the research is to identify specific characteristics and drivers regarding the social engineering-based cyber attack (SECA) susceptibility of a consumer exposed to social media messaging applications. A quantitative survey was employed to test a total of 114 respondents in Indonesia who are categorized as active Internet users. The study found variables within two of the three perspectives that positively contributed to a consumer’s susceptibility to cyberattack. These factors will provide valuable insight into prevention and knowledge of related risks of cyberattacks based on social engineering in the future.
format Article
id doaj-art-eb6d7d80569447f1ba709cabd610bf05
institution Kabale University
issn 2578-1863
language English
publishDate 2022-01-01
publisher Wiley
record_format Article
series Human Behavior and Emerging Technologies
spelling doaj-art-eb6d7d80569447f1ba709cabd610bf052025-02-03T00:59:37ZengWileyHuman Behavior and Emerging Technologies2578-18632022-01-01202210.1155/2022/5738969Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging ApplicationNuri Wulandari0Mohammad Syauqi Adnan1Chastio Bayu Wicaksono2Indonesia Banking SchoolIndonesia Banking SchoolIndonesia Banking SchoolA rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. One form, in particular, is a social engineering-based cyber attack. Unfortunately, not much research has been conducted on the susceptibility factors that cause this to happen. This study attempts to understand what factors make a person susceptible to cyber attacks that can be seen from three perspectives: habitual perspective, perception perspective, and social and motivation perspective. The objective of the research is to identify specific characteristics and drivers regarding the social engineering-based cyber attack (SECA) susceptibility of a consumer exposed to social media messaging applications. A quantitative survey was employed to test a total of 114 respondents in Indonesia who are categorized as active Internet users. The study found variables within two of the three perspectives that positively contributed to a consumer’s susceptibility to cyberattack. These factors will provide valuable insight into prevention and knowledge of related risks of cyberattacks based on social engineering in the future.http://dx.doi.org/10.1155/2022/5738969
spellingShingle Nuri Wulandari
Mohammad Syauqi Adnan
Chastio Bayu Wicaksono
Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
Human Behavior and Emerging Technologies
title Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
title_full Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
title_fullStr Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
title_full_unstemmed Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
title_short Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
title_sort are you a soft target for cyber attack drivers of susceptibility to social engineering based cyber attack seca a case study of mobile messaging application
url http://dx.doi.org/10.1155/2022/5738969
work_keys_str_mv AT nuriwulandari areyouasofttargetforcyberattackdriversofsusceptibilitytosocialengineeringbasedcyberattacksecaacasestudyofmobilemessagingapplication
AT mohammadsyauqiadnan areyouasofttargetforcyberattackdriversofsusceptibilitytosocialengineeringbasedcyberattacksecaacasestudyofmobilemessagingapplication
AT chastiobayuwicaksono areyouasofttargetforcyberattackdriversofsusceptibilitytosocialengineeringbasedcyberattacksecaacasestudyofmobilemessagingapplication