Skip to main content
Top

2023 | OriginalPaper | Chapter

4. (M)asking for a Return: Social Hypocrisy and Social Engineering

Author : Kristjan Kikerpill

Published in: Masks and Human Connections

Publisher: Springer International Publishing

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Our encounters with deception in everyday life have increased manifold since the emergence of social media platforms. Instead of using masks—real or metaphorical—for the purpose of conjuring a sense of being different, or a distinctive “other”, these devices of impression management have been employed to create authentifakes: intentionally deceptive representations of someone or something that has an unnatural accordance with the expectations, wishes, and desires of target audiences in particular social contexts. On many occasions, such simulations are less than truthful but otherwise mostly benign. In some instances, however, these simulations are primarily created for the specific purpose of exploiting the audience, and in doing so, causing them harm. Thus, the use of masks and the subsequent creation of authentifakes emerges from a person’s aim to gain some form of return. Since we all use masks in this way to some extent in outgoing communication, we must consider the social hypocrisy element associated with these practices when being critical of such (m)asks in the expectations set for incoming communications. In this chapter, I analyse the social engineering practices of influencers and cybercriminals to better comprehend the worryingly thin line between relatively benign, everyday authentifakes and the criminal exploitation of the same.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
go back to reference Abidin, C. (2017). Influencer Extravaganza: Commercial “lifestyle” Microcelebrities in Singapore. In L. Hjorth, H. Horst, A. Galloway, & G. Bell (Eds.), Routledge Companion to Digital Ethnography (pp. 158–168). Routledge. Abidin, C. (2017). Influencer Extravaganza: Commercial “lifestyle” Microcelebrities in Singapore. In L. Hjorth, H. Horst, A. Galloway, & G. Bell (Eds.), Routledge Companion to Digital Ethnography (pp. 158–168). Routledge.
go back to reference Abidin, C. (2020). L8r h8r: Commoditized Privacy, Influencer Wars, and Productive Disorder in the Influencer Industry. In R. A. Lind (Ed.), Produsing Theory in a Digital World: The Intersection of Audiences and Production in Contemporary Theory (Vol. 3) (pp. 31–48). Peter Lang. Abidin, C. (2020). L8r h8r: Commoditized Privacy, Influencer Wars, and Productive Disorder in the Influencer Industry. In R. A. Lind (Ed.), Produsing Theory in a Digital World: The Intersection of Audiences and Production in Contemporary Theory (Vol. 3) (pp. 31–48). Peter Lang.
go back to reference Alexander, J., & Schmidt, J. K. H. W. (1996). Social Engineering: Genealogy of a Concept. In A. Podgorecki, J. Alexander, & R. Shields (Eds.), Social Engineering (pp. 1–19). McGill-Queen’s University Press. Alexander, J., & Schmidt, J. K. H. W. (1996). Social Engineering: Genealogy of a Concept. In A. Podgorecki, J. Alexander, & R. Shields (Eds.), Social Engineering (pp. 1–19). McGill-Queen’s University Press.
go back to reference Attrill, A. (2015). The Manipulation of Online Self-Presentation: Create, Edit, Re-edit and Present. Palgrave Macmillan.CrossRef Attrill, A. (2015). The Manipulation of Online Self-Presentation: Create, Edit, Re-edit and Present. Palgrave Macmillan.CrossRef
go back to reference Brown, S. (2022). Get Rich Or Lie Trying: Ambition and Deceit in the New Influencer Economy. Atlantic Books. Brown, S. (2022). Get Rich Or Lie Trying: Ambition and Deceit in the New Influencer Economy. Atlantic Books.
go back to reference Button, M., & Cross, C. (2017). Cyber Frauds, Scams and Their Victims. Routledge.CrossRef Button, M., & Cross, C. (2017). Cyber Frauds, Scams and Their Victims. Routledge.CrossRef
go back to reference Chiluwa, I. (2019). “Congratulations, Your Email Account Has Won You €1,000,000”: Analyzing the Discourse Structures of Scam Emails. In T. Docan-Morgan (Ed.), The Palgrave Handbook of Deceptive Communication (pp. 897–912). Springer.CrossRef Chiluwa, I. (2019). “Congratulations, Your Email Account Has Won You €1,000,000”: Analyzing the Discourse Structures of Scam Emails. In T. Docan-Morgan (Ed.), The Palgrave Handbook of Deceptive Communication (pp. 897–912). Springer.CrossRef
go back to reference Cross, C., Dragiewicz, M., & Richards, K. (2018). Understanding Romance Fraud: Insights from Domestic Violence Research. British Journal of Criminology, 58, 1303–1322.CrossRef Cross, C., Dragiewicz, M., & Richards, K. (2018). Understanding Romance Fraud: Insights from Domestic Violence Research. British Journal of Criminology, 58, 1303–1322.CrossRef
go back to reference Enli, G. (2015). Mediated Authenticity: How the Media Constructs Reality. Peter Lang.CrossRef Enli, G. (2015). Mediated Authenticity: How the Media Constructs Reality. Peter Lang.CrossRef
go back to reference Gierich, L. (2016). ‘It’s like we’re all competing to make the best computer screen saver and the winner gets crowned most authentic’: An Investigation of the Idea of Authenticity on the Photo Sharing Platform Instagram. Master’s Thesis. Uppsala University. Gierich, L. (2016). ‘It’s like we’re all competing to make the best computer screen saver and the winner gets crowned most authentic’: An Investigation of the Idea of Authenticity on the Photo Sharing Platform Instagram. Master’s Thesis. Uppsala University.
go back to reference Goffman, E. (1959). The Presentation of Self in Everyday Life. Anchor Books. Goffman, E. (1959). The Presentation of Self in Everyday Life. Anchor Books.
go back to reference Hadnagy, C. (2018). Social Engineering: The Science of Human Hacking. Wiley.CrossRef Hadnagy, C. (2018). Social Engineering: The Science of Human Hacking. Wiley.CrossRef
go back to reference Haimson, O. L., Liu, T., Zhang, B. Z., & Corvite, S. (2021). The Online Authenticity Paradox: What ‘authentic’ on Social Media Means, and Barriers to Achieving It. Proceedings of the ACM on Human-Computer Interaction, 5, CSCW2, Article no. 423. https://doi.org/10.1145/3479567 Haimson, O. L., Liu, T., Zhang, B. Z., & Corvite, S. (2021). The Online Authenticity Paradox: What ‘authentic’ on Social Media Means, and Barriers to Achieving It. Proceedings of the ACM on Human-Computer Interaction, 5, CSCW2, Article no. 423. https://​doi.​org/​10.​1145/​3479567
go back to reference Harrington, B. (2012). The Sociology of Financial Fraud. In K. Knorr Cetina & A. Preda (Eds.), The Oxford Handbook of the Sociology of Finance (pp. 631–654). Oxford University Press. Harrington, B. (2012). The Sociology of Financial Fraud. In K. Knorr Cetina & A. Preda (Eds.), The Oxford Handbook of the Sociology of Finance (pp. 631–654). Oxford University Press.
go back to reference Heyd, T. (2008). Email Hoaxes: Form, Function, Genre Ecology. John Benjamins Publishing Company.CrossRef Heyd, T. (2008). Email Hoaxes: Form, Function, Genre Ecology. John Benjamins Publishing Company.CrossRef
go back to reference Kikerpill, K. (2021). Crime-as-Communication: Detecting Diagnostically Useful Information from the Content and Context of Social Engineering Attacks. University of Tartu Press. Kikerpill, K. (2021). Crime-as-Communication: Detecting Diagnostically Useful Information from the Content and Context of Social Engineering Attacks. University of Tartu Press.
go back to reference Levine, T. R. (2019). Duped: Truth-Default Theory and the Social Science of Lying and Deception. University of Alabama Press. Levine, T. R. (2019). Duped: Truth-Default Theory and the Social Science of Lying and Deception. University of Alabama Press.
go back to reference Mandeville, B. D. ([1724] 1988). The Fable of the Bees Or Private Vices, Publick Benefits. With a Commentary Critical, History, and Explanatory by F. B. Kaye (Vol. 1). Liberty Fund. Mandeville, B. D. ([1724] 1988). The Fable of the Bees Or Private Vices, Publick Benefits. With a Commentary Critical, History, and Explanatory by F. B. Kaye (Vol. 1). Liberty Fund.
go back to reference Rosenbaum, J. E., Johnson, B. K., Stepman, P. A., & Nuijten, K. C. M. (2013). “Looking the part” and “staying true”: Balancing Impression Management on Facebook. In C. Cunningham (Ed.), Social Networking and Impression Management: Self-presentation in the Digital Age (pp. 35–60). Lexington Books. Rosenbaum, J. E., Johnson, B. K., Stepman, P. A., & Nuijten, K. C. M. (2013). “Looking the part” and “staying true”: Balancing Impression Management on Facebook. In C. Cunningham (Ed.), Social Networking and Impression Management: Self-presentation in the Digital Age (pp. 35–60). Lexington Books.
go back to reference Westerlund, M. (2019). The Emergence of Deepfake Technology: A Review. Technology Innovation Management Review, 9(11), 39–52.CrossRef Westerlund, M. (2019). The Emergence of Deepfake Technology: A Review. Technology Innovation Management Review, 9(11), 39–52.CrossRef
go back to reference Zielinska, O. A., Welk, A. K., Mayhorn, C. B., & Murphy-Hill, E. (2016). A Temporal Analysis of Persuasion Principles in Phishing Emails. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 60(1), 765–769.CrossRef Zielinska, O. A., Welk, A. K., Mayhorn, C. B., & Murphy-Hill, E. (2016). A Temporal Analysis of Persuasion Principles in Phishing Emails. Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 60(1), 765–769.CrossRef
Metadata
Title
(M)asking for a Return: Social Hypocrisy and Social Engineering
Author
Kristjan Kikerpill
Copyright Year
2023
DOI
https://doi.org/10.1007/978-3-031-16673-0_4