Abstract
Despite recognizing the applicability of Cialdini's principles in social engineering context, studies on their effectiveness needed more tailored and validated tests, primary data collection, and multicultural samples. Cialdini's six persuasion principles include reciprocity, commitment, liking, scarcity, social proof, and authority. We designed and face validated 12 scenarios representing the presence and absence of each principle in a situation where an acquaintance prompts online group members to install an app for testing and improving it. Through an online survey with 314 UK and 328 Arab participants, we collected data on the impact of persuasion principles on risk taking, i.e., to accept installing and trying the app, and trust in the requester, who might be knowingly a social engineer. Results across both cultural frameworks indicate significant impacts, with Social Proof and Authority being the most influential, and Scarcity the least, yet still significant. Interestingly, the principles not only influenced the decision to take the risk but also affected trust in the potential social engineer. This holds true even in less intuitive scenarios, representing Scarcity and Commitment/Consistency principles. This applies to two distinctive cultural frameworks, Arab and British, increasing robustness. The research also investigates the relationship between security attitudes, measured through SA-6 scale, and susceptibility to these principles, in terms of trust and risk taking, revealing surprising results of positive correlations. These findings emphasize the need for cybersecurity strategies that include awareness of psychological manipulation alongside technical knowledge, catering to different cultural contexts.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mahmoud, S., Alez, R.A., EL-Refai, F.: Persuasion based recommendation system. J. Al-Azhar Univ. Eng. Sect. 12(44), 894–899 (2017)
Lohani, S.: Social engineering: hacking into humans. Int. J. Adv. Stud. Sci. Res. 4(1), 385–393 (2019)
Thornburgh, T.: Social engineering: the dark art. In: Proceedings of the 1st Annual Conference on Information Security Curriculum Development, pp. 133–135 (2004)
Peltier, T.R.: Social engineering: concepts and solutions. Inf. Secur. J. 15(5), 13 (2006)
Workman, M.: A test of interventions for security threats from social engineering. Inf. Manag. Comput. Secur. 16(5), 463–483 (2008)
Cialdini, R.B.: Influence: The psychology of persuasion. Collins, New York (2007)
Zalake, M., De Siqueira, A.G., Vaddiparti, K., Antonenko, P., Lok, B.: Towards understanding how virtual human's verbal persuasion strategies influence user intentions to perform health behavior. In: Proceedings of the 21st ACM International Conference on Intelligent Virtual Agents, pp. 216–223 (2021)
Cemiloglu, D., Gurgun, S., Arden-Close, E., Jiang, N., Ali, R.: Explainability as a psychological inoculation: building resistance to digital persuasion in online gambling through explainable interfaces. Int. J. Human–Comput. Interact. 1–19 (2023)
Grassegger, T., Nedbal, D.: The role of employees’ information security awareness on the intention to resist social engineering. Procedia Comput. Sci. 181, 59–66 (2021)
Friestad, M., Wright, P.: The persuasion knowledge model: how people cope with persuasion attempts. J. Consum. Res. 21(1), 1–31 (1994)
Lawson, P., Pearson, C.J., Crowson, A., Mayhorn, C.B.: Email phishing and signal detection: How persuasion principles and personality influence response patterns and accuracy. Appl. Ergon. 86, 103084 (2020)
Spasova, L.: Impact of gender and age on susceptibility to persuasion principles in advertisement. Econ. Sociol. 15(3), 89–107 (2022)
Oyibo, K., Adaji, I., Orji, R., Olabenjo, B., Vassileva, J.: Susceptibility to persuasive strategies: a comparative analysis of Nigerians vs. Canadians. In: Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization, pp. 229–238 (2018)
Obeidat, B.Y., Shannak, R.O., Masa’deh, R., Al-Jarrah, I.: Toward better understanding for Arabian culture: implications based on Hofstede’s cultural model. Eur. J. Social Sci. 28(4), 512–522 (2012)
Alnunu, M., Amin, A., Abu-Rayya, H.M.: The susceptibility to Persuasion strategies among Arab Muslims: the role of culture and acculturation. Front. Psychol. 12, 574115 (2021)
Pinnington, A.H., Rees-Caldwell, K.: National Culture Differences in Project Management: Comparing British and Arab Project Managers Managers’ Perceptions of Different Planning Areas (2013)
Yates, J.F., De Oliveira, S.: Culture and decision making. Organ. Behav. Hum. Decis. Process. 136, 106–118 (2016)
Henrich, J., Heine, S.J., Norenzayan, A.: The weirdest people in the world? Behav. Brain Sci. 33(2–3), 61–83 (2010)
Country comparison graphs country comparison graphs. (in en-GB). Geert Hofstede. https://www.hofstede-insights.com/country-comparison-tool. Accessed 16 Mar 2024
Harb, C.: The Arab region: cultures, values, and identities. In: Handbook of Arab American Psychology, pp. 3–18. Routledge (2015)
Waclawski, E.: How I use it: survey monkey. Occup. Med. 62(6), 477 (2012)
Thien, P.: MOBILE Panel Sample and ONLINE Surveys TGM Research. TGM Research, https://tgmresearch.com/. Accessed 16 Mar 2024
Hofstede, G.: Culture’s Consequences: International Differences in Work-Related Values. Sage, Thousands Oaks (1984)
Faklaris, C., Dabbish, L.A., Hong, J.I.: A {self-report} measure of {end-user} security attitudes ({{{{{SA-6}}}}}). In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), pp. 61–77 (2019)
Kwak, S.G., Kim, J.H.: Central limit theorem: the cornerstone of modern statistics. Korean J. Anesthesiol. 70(2), 144 (2017)
JASP - A Fresh Way to Do Statistics. JASP - Free and User-Friendly Statistical Software. https://jasp-stats.org/. Accessed 16 Mar 2024
Jenkins, J.L., Durcikova, A., Nunamaker, J.: Mitigating the security intention-behavior gap: the moderating role of required effort on the intention-behavior relationship. Association for Information Systems (2021)
Gerdenitsch, C., Wurhofer, D., Tscheligi, M.: Working conditions and cybersecurity: time pressure, autonomy and threat appraisal shaping employees’ security behavior. Cyberpsychol. J. Psychosocial Res. Cyberspace 17(4) (2023)
Jonas, E., Sullivan, D., Greenberg, J.: Generosity, greed, norms, and death–differential effects of mortality salience on charitable behavior. J. Econ. Psychol. 35, 47–57 (2013)
McGuire, W.J.: The effectiveness of supportive and refutational defenses in immunizing and restoring beliefs against persuasion. Sociometry 24(2), 184–197 (1961)
Acknowledgement
This publication was supported by NPRP 14 Cluster grant # NPRP 14C-0916-210015 from the Qatar National Research Fund (a member of Qatar Foundation). The findings herein reflect the work and are solely the responsibility of the authors.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Mollazehi, A., Abuelezz, I., Barhamgi, M., Khan, K.M., Ali, R. (2024). Do Cialdini’s Persuasion Principles Still Influence Trust and Risk-Taking When Social Engineering is Knowingly Possible?. In: Araújo, J., de la Vara, J.L., Santos, M.Y., Assar, S. (eds) Research Challenges in Information Science. RCIS 2024. Lecture Notes in Business Information Processing, vol 513. Springer, Cham. https://doi.org/10.1007/978-3-031-59465-6_17
Download citation
DOI: https://doi.org/10.1007/978-3-031-59465-6_17
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-59464-9
Online ISBN: 978-3-031-59465-6
eBook Packages: Computer ScienceComputer Science (R0)