Skip to main content
Top

2018 | Supplement | Chapter

Social Media Information Security Threats: Anthropomorphic Emoji Analysis on Social Engineering

Author : Kennedy Njenga

Published in: IT Convergence and Security 2017

Publisher: Springer Singapore

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

The evolution of anthropomorphism and affective design principles in Social Medial has allowed friends and colleagues to create content across organizational settings that now provision for emotions through the popular use of emoji. Of concern to information systems security practitioners is that the use emoji can be effective in social engineering through facilitating escalated malevolent attacks to unsuspecting victims. The article applies theories from social psychology, criminology and information systems while using the Elaboration Likelihood Model (ELM) to determine the possibility of using emoji as tools for effective social engineering. A university setting was used and student–actors enlisted to execute social engineering scenarios under carefully controlled environments. Screen shots of social engineering using emoji were taken by student-actors and sent to researcher for analysis. Qualitative data analysis involved prepossessing emoji data through tokenization and normalization. Results reveal two important findings. Firstly, that the effective use of emoji is more likely to persuade victims because of unsuspecting emotional appeal. Secondly, more time was taken to persuade a victim when only textual words instead of emoji were used in the interaction process. The results of findings are discussed in the main article.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Zuber, M.: A survey of data mining techniques for social network analysis. Int. J. Res. Comput. Eng. Electron. 3(6) (2014) Zuber, M.: A survey of data mining techniques for social network analysis. Int. J. Res. Comput. Eng. Electron. 3(6) (2014)
2.
go back to reference Pohl, H., Domin, C., Rohs, M.: Beyond just text: semantic emoji similarity modeling to support expressive communication. ACM Trans. Comput. Hum. Interact. (TOCHI) 24(1), 6 (2017)CrossRef Pohl, H., Domin, C., Rohs, M.: Beyond just text: semantic emoji similarity modeling to support expressive communication. ACM Trans. Comput. Hum. Interact. (TOCHI) 24(1), 6 (2017)CrossRef
3.
go back to reference Shin, D.-H.: The effects of trust, security and privacy in social networking: a security-based approach to understand the pattern of adoption. Interact. Comput. 22(5), 428–438 (2010)CrossRef Shin, D.-H.: The effects of trust, security and privacy in social networking: a security-based approach to understand the pattern of adoption. Interact. Comput. 22(5), 428–438 (2010)CrossRef
4.
go back to reference Workman, M.: Wisecrackers: a theory-grounded investigation of phishing and pretext social engineering threats to information security. J. Am. Soc. Inform. Sci. Technol. 59(4), 662–674 (2008)CrossRef Workman, M.: Wisecrackers: a theory-grounded investigation of phishing and pretext social engineering threats to information security. J. Am. Soc. Inform. Sci. Technol. 59(4), 662–674 (2008)CrossRef
5.
go back to reference Barlow, J.B., et al.: Don’t make excuses! Discouraging neutralization to reduce IT policy violation. Comput. Secur. 39, 145–159 (2013)CrossRef Barlow, J.B., et al.: Don’t make excuses! Discouraging neutralization to reduce IT policy violation. Comput. Secur. 39, 145–159 (2013)CrossRef
6.
go back to reference Browne, S., Lang, M., Golden, W.: The insider threat-understanding the aberrant thinking of the rogue“trusted agent”. In: ECIS (2015) Browne, S., Lang, M., Golden, W.: The insider threat-understanding the aberrant thinking of the rogue“trusted agent”. In: ECIS (2015)
7.
go back to reference D’Arcy, J., Hovav, A., Galletta, D.: User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inf. Syst. Res. 20(1), 79–98 (2009)CrossRef D’Arcy, J., Hovav, A., Galletta, D.: User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach. Inf. Syst. Res. 20(1), 79–98 (2009)CrossRef
8.
go back to reference Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3), 523–548 (2010)CrossRef Bulgurcu, B., Cavusoglu, H., Benbasat, I.: Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS Q. 34(3), 523–548 (2010)CrossRef
9.
go back to reference Warkentin, M., Malimage, N., Malimage, K.: Impact of Protection motivation and deterrence on IS security policy compliance: a multi-cultural view. In: Proceedings of the Pre-ICIS Workshop on Information Security and Privacy, Orlando, Paper (2012) Warkentin, M., Malimage, N., Malimage, K.: Impact of Protection motivation and deterrence on IS security policy compliance: a multi-cultural view. In: Proceedings of the Pre-ICIS Workshop on Information Security and Privacy, Orlando, Paper (2012)
10.
go back to reference DiSalvo, C., Gemperle, F.: From seduction to fulfillment: the use of anthropomorphic form in design. In: Proceedings of the 2003 International Conference on Designing Pleasurable Products and Interfaces. ACM (2003) DiSalvo, C., Gemperle, F.: From seduction to fulfillment: the use of anthropomorphic form in design. In: Proceedings of the 2003 International Conference on Designing Pleasurable Products and Interfaces. ACM (2003)
12.
go back to reference Mitnick, K.D., Simon, W.L.: The Art of Deception: Controlling the Human Element of Security. Wiley, New York (2011) Mitnick, K.D., Simon, W.L.: The Art of Deception: Controlling the Human Element of Security. Wiley, New York (2011)
13.
go back to reference Granger, S.: Social engineering fundamentals, part I: hacker tactics. SecurityFocus 18 (2001) Granger, S.: Social engineering fundamentals, part I: hacker tactics. SecurityFocus 18 (2001)
14.
go back to reference Palumbo, J.: Social engineering: what is it, why is so little said about it and what can be done? SANS Institute (2000) Palumbo, J.: Social engineering: what is it, why is so little said about it and what can be done? SANS Institute (2000)
15.
go back to reference Gao, W., Kim, J.: Robbing the cradle is like taking candy from a baby. In: Proceedings of the Annual Conference of the Security Policy Institute (GCSPI) (2007) Gao, W., Kim, J.: Robbing the cradle is like taking candy from a baby. In: Proceedings of the Annual Conference of the Security Policy Institute (GCSPI) (2007)
16.
go back to reference Calluzzo, V.J., Cante, C.J.: Ethics in information technology and software use. J. Bus. Ethics 51(3), 301–312 (2004)CrossRef Calluzzo, V.J., Cante, C.J.: Ethics in information technology and software use. J. Bus. Ethics 51(3), 301–312 (2004)CrossRef
17.
go back to reference Hu, X., et al.: Unsupervised sentiment analysis with emotional signals. In: Proceedings of the 22nd international conference on World Wide Web. ACM (2013) Hu, X., et al.: Unsupervised sentiment analysis with emotional signals. In: Proceedings of the 22nd international conference on World Wide Web. ACM (2013)
18.
go back to reference Cialdini, R.B.: Science and Practice (2001) Cialdini, R.B.: Science and Practice (2001)
19.
go back to reference Pak, A., Paroubek, P.: Twitter as a corpus for sentiment analysis and opinion mining. In: LREC (2010) Pak, A., Paroubek, P.: Twitter as a corpus for sentiment analysis and opinion mining. In: LREC (2010)
20.
go back to reference Bifet, A., Frank, E.: Sentiment knowledge discovery in twitter streaming data. In: International Conference on Discovery Science. Springer, Heidelberg (2010) Bifet, A., Frank, E.: Sentiment knowledge discovery in twitter streaming data. In: International Conference on Discovery Science. Springer, Heidelberg (2010)
21.
go back to reference Kouloumpis, E., Wilson, T., Moore, J.D.: Twitter sentiment analysis: the good the bad and the omg! ICWSM 11(538–541), 164 (2011) Kouloumpis, E., Wilson, T., Moore, J.D.: Twitter sentiment analysis: the good the bad and the omg! ICWSM 11(538–541), 164 (2011)
Metadata
Title
Social Media Information Security Threats: Anthropomorphic Emoji Analysis on Social Engineering
Author
Kennedy Njenga
Copyright Year
2018
Publisher
Springer Singapore
DOI
https://doi.org/10.1007/978-981-10-6454-8_24

Premium Partner