Understanding Social Engineering Based Scams 2016
DOI: 10.1007/978-1-4939-6457-4_4
|View full text |Cite
|
Sign up to set email alerts
|

Persuasion in Scams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
11
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(11 citation statements)
references
References 10 publications
0
11
0
Order By: Relevance
“…Investors can sustain the scheme not only by their financial contribution but also by expanding the network through their connections (Rantala, 2019, p. 30). Ferreira and Jakobsson (2016) stated that to attract potential victims, various persuasion techniques are often used by fraud offenders during interactions to trick them into believing in their false promises. According to Ferreira et al (2015), to ensure their effectiveness, scam messages are often devised using the psychological principles of “authority”, “social proof”, “liking, similarity and deception”, “commitment, reciprocation and consistency” and “distraction”: The “authority” principle is associated with how people are generally used to respond to authority without questioning (Ferreira and Jakobsson, 2016, p. 31).…”
Section: Investment Fraud At a Glancementioning
confidence: 99%
See 3 more Smart Citations
“…Investors can sustain the scheme not only by their financial contribution but also by expanding the network through their connections (Rantala, 2019, p. 30). Ferreira and Jakobsson (2016) stated that to attract potential victims, various persuasion techniques are often used by fraud offenders during interactions to trick them into believing in their false promises. According to Ferreira et al (2015), to ensure their effectiveness, scam messages are often devised using the psychological principles of “authority”, “social proof”, “liking, similarity and deception”, “commitment, reciprocation and consistency” and “distraction”: The “authority” principle is associated with how people are generally used to respond to authority without questioning (Ferreira and Jakobsson, 2016, p. 31).…”
Section: Investment Fraud At a Glancementioning
confidence: 99%
“…Thus, conformity to authoritative figures’ wishes and commands is believed by society to be beneficial for one’s life (Milgram, 1974). The “social proof” principle concerns with people’s tendency to mimic what most of the people around them do or seem to be doing (Ferreira and Jakobsson, 2016, p. 31). This principle views social evidence as a basis for people’s actions.…”
Section: Investment Fraud At a Glancementioning
confidence: 99%
See 2 more Smart Citations
“…First, liking, similarity, and deception ; authority ; and distraction were the three most common principles used in phishing emails, with fewer occurrences of commitment, reciprocation and consistency (Ferreira and Chilro, 2017; Ferreira et al , 2015; Ferreira and Lenzini, 2015). Second, the most common PPSE pairs included authority and/or distraction , suggesting attackers use these PPSEs in conjunction with other PPSEs (Ferreira et al , 2015; Ferreira and Jakobsson, 2016). Finally, social proof was rarely used in phishing emails (Ferreira and Lenzini, 2015; Ferreira and Teles, 2019).…”
Section: An Integrated Taxonomy Of Persuasion During Social Engineering Attacksmentioning
confidence: 99%