Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application
A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. One form, in particular, is a social engineer...
Saved in:
Main Authors: | , , |
---|---|
Format: | Article |
Language: | English |
Published: |
Wiley
2022-01-01
|
Series: | Human Behavior and Emerging Technologies |
Online Access: | http://dx.doi.org/10.1155/2022/5738969 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
_version_ | 1832568184185552896 |
---|---|
author | Nuri Wulandari Mohammad Syauqi Adnan Chastio Bayu Wicaksono |
author_facet | Nuri Wulandari Mohammad Syauqi Adnan Chastio Bayu Wicaksono |
author_sort | Nuri Wulandari |
collection | DOAJ |
description | A rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. One form, in particular, is a social engineering-based cyber attack. Unfortunately, not much research has been conducted on the susceptibility factors that cause this to happen. This study attempts to understand what factors make a person susceptible to cyber attacks that can be seen from three perspectives: habitual perspective, perception perspective, and social and motivation perspective. The objective of the research is to identify specific characteristics and drivers regarding the social engineering-based cyber attack (SECA) susceptibility of a consumer exposed to social media messaging applications. A quantitative survey was employed to test a total of 114 respondents in Indonesia who are categorized as active Internet users. The study found variables within two of the three perspectives that positively contributed to a consumer’s susceptibility to cyberattack. These factors will provide valuable insight into prevention and knowledge of related risks of cyberattacks based on social engineering in the future. |
format | Article |
id | doaj-art-eb6d7d80569447f1ba709cabd610bf05 |
institution | Kabale University |
issn | 2578-1863 |
language | English |
publishDate | 2022-01-01 |
publisher | Wiley |
record_format | Article |
series | Human Behavior and Emerging Technologies |
spelling | doaj-art-eb6d7d80569447f1ba709cabd610bf052025-02-03T00:59:37ZengWileyHuman Behavior and Emerging Technologies2578-18632022-01-01202210.1155/2022/5738969Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging ApplicationNuri Wulandari0Mohammad Syauqi Adnan1Chastio Bayu Wicaksono2Indonesia Banking SchoolIndonesia Banking SchoolIndonesia Banking SchoolA rise in working and studying from home, activities which depend on the Internet, and the exchange of data coupled with a lack of understanding about security for interacting in cyberspace have made cybersecurity one of the most pressing concerns today. One form, in particular, is a social engineering-based cyber attack. Unfortunately, not much research has been conducted on the susceptibility factors that cause this to happen. This study attempts to understand what factors make a person susceptible to cyber attacks that can be seen from three perspectives: habitual perspective, perception perspective, and social and motivation perspective. The objective of the research is to identify specific characteristics and drivers regarding the social engineering-based cyber attack (SECA) susceptibility of a consumer exposed to social media messaging applications. A quantitative survey was employed to test a total of 114 respondents in Indonesia who are categorized as active Internet users. The study found variables within two of the three perspectives that positively contributed to a consumer’s susceptibility to cyberattack. These factors will provide valuable insight into prevention and knowledge of related risks of cyberattacks based on social engineering in the future.http://dx.doi.org/10.1155/2022/5738969 |
spellingShingle | Nuri Wulandari Mohammad Syauqi Adnan Chastio Bayu Wicaksono Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application Human Behavior and Emerging Technologies |
title | Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application |
title_full | Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application |
title_fullStr | Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application |
title_full_unstemmed | Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application |
title_short | Are You a Soft Target for Cyber Attack? Drivers of Susceptibility to Social Engineering-Based Cyber Attack (SECA): A Case Study of Mobile Messaging Application |
title_sort | are you a soft target for cyber attack drivers of susceptibility to social engineering based cyber attack seca a case study of mobile messaging application |
url | http://dx.doi.org/10.1155/2022/5738969 |
work_keys_str_mv | AT nuriwulandari areyouasofttargetforcyberattackdriversofsusceptibilitytosocialengineeringbasedcyberattacksecaacasestudyofmobilemessagingapplication AT mohammadsyauqiadnan areyouasofttargetforcyberattackdriversofsusceptibilitytosocialengineeringbasedcyberattacksecaacasestudyofmobilemessagingapplication AT chastiobayuwicaksono areyouasofttargetforcyberattackdriversofsusceptibilitytosocialengineeringbasedcyberattacksecaacasestudyofmobilemessagingapplication |