Skip to main content

Do Cialdini’s Persuasion Principles Still Influence Trust and Risk-Taking When Social Engineering is Knowingly Possible?

  • Conference paper
  • First Online:
Research Challenges in Information Science (RCIS 2024)

Part of the book series: Lecture Notes in Business Information Processing ((LNBIP,volume 513))

Included in the following conference series:

  • 18 Accesses

Abstract

Despite recognizing the applicability of Cialdini's principles in social engineering context, studies on their effectiveness needed more tailored and validated tests, primary data collection, and multicultural samples. Cialdini's six persuasion principles include reciprocity, commitment, liking, scarcity, social proof, and authority. We designed and face validated 12 scenarios representing the presence and absence of each principle in a situation where an acquaintance prompts online group members to install an app for testing and improving it. Through an online survey with 314 UK and 328 Arab participants, we collected data on the impact of persuasion principles on risk taking, i.e., to accept installing and trying the app, and trust in the requester, who might be knowingly a social engineer. Results across both cultural frameworks indicate significant impacts, with Social Proof and Authority being the most influential, and Scarcity the least, yet still significant. Interestingly, the principles not only influenced the decision to take the risk but also affected trust in the potential social engineer. This holds true even in less intuitive scenarios, representing Scarcity and Commitment/Consistency principles. This applies to two distinctive cultural frameworks, Arab and British, increasing robustness. The research also investigates the relationship between security attitudes, measured through SA-6 scale, and susceptibility to these principles, in terms of trust and risk taking, revealing surprising results of positive correlations. These findings emphasize the need for cybersecurity strategies that include awareness of psychological manipulation alongside technical knowledge, catering to different cultural contexts.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 149.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 139.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mahmoud, S., Alez, R.A., EL-Refai, F.: Persuasion based recommendation system. J. Al-Azhar Univ. Eng. Sect. 12(44), 894–899 (2017)

    Google Scholar 

  2. Lohani, S.: Social engineering: hacking into humans. Int. J. Adv. Stud. Sci. Res. 4(1), 385–393 (2019)

    Google Scholar 

  3. Thornburgh, T.: Social engineering: the dark art. In: Proceedings of the 1st Annual Conference on Information Security Curriculum Development, pp. 133–135 (2004)

    Google Scholar 

  4. Peltier, T.R.: Social engineering: concepts and solutions. Inf. Secur. J. 15(5), 13 (2006)

    Google Scholar 

  5. Workman, M.: A test of interventions for security threats from social engineering. Inf. Manag. Comput. Secur. 16(5), 463–483 (2008)

    Article  Google Scholar 

  6. Cialdini, R.B.: Influence: The psychology of persuasion. Collins, New York (2007)

    Google Scholar 

  7. Zalake, M., De Siqueira, A.G., Vaddiparti, K., Antonenko, P., Lok, B.: Towards understanding how virtual human's verbal persuasion strategies influence user intentions to perform health behavior. In: Proceedings of the 21st ACM International Conference on Intelligent Virtual Agents, pp. 216–223 (2021)

    Google Scholar 

  8. Cemiloglu, D., Gurgun, S., Arden-Close, E., Jiang, N., Ali, R.: Explainability as a psychological inoculation: building resistance to digital persuasion in online gambling through explainable interfaces. Int. J. Human–Comput. Interact. 1–19 (2023)

    Google Scholar 

  9. Grassegger, T., Nedbal, D.: The role of employees’ information security awareness on the intention to resist social engineering. Procedia Comput. Sci. 181, 59–66 (2021)

    Article  Google Scholar 

  10. Friestad, M., Wright, P.: The persuasion knowledge model: how people cope with persuasion attempts. J. Consum. Res. 21(1), 1–31 (1994)

    Article  Google Scholar 

  11. Lawson, P., Pearson, C.J., Crowson, A., Mayhorn, C.B.: Email phishing and signal detection: How persuasion principles and personality influence response patterns and accuracy. Appl. Ergon. 86, 103084 (2020)

    Article  Google Scholar 

  12. Spasova, L.: Impact of gender and age on susceptibility to persuasion principles in advertisement. Econ. Sociol. 15(3), 89–107 (2022)

    Article  Google Scholar 

  13. Oyibo, K., Adaji, I., Orji, R., Olabenjo, B., Vassileva, J.: Susceptibility to persuasive strategies: a comparative analysis of Nigerians vs. Canadians. In: Proceedings of the 26th Conference on User Modeling, Adaptation and Personalization, pp. 229–238 (2018)

    Google Scholar 

  14. Obeidat, B.Y., Shannak, R.O., Masa’deh, R., Al-Jarrah, I.: Toward better understanding for Arabian culture: implications based on Hofstede’s cultural model. Eur. J. Social Sci. 28(4), 512–522 (2012)

    Google Scholar 

  15. Alnunu, M., Amin, A., Abu-Rayya, H.M.: The susceptibility to Persuasion strategies among Arab Muslims: the role of culture and acculturation. Front. Psychol. 12, 574115 (2021)

    Article  Google Scholar 

  16. Pinnington, A.H., Rees-Caldwell, K.: National Culture Differences in Project Management: Comparing British and Arab Project Managers Managers’ Perceptions of Different Planning Areas (2013)

    Google Scholar 

  17. Yates, J.F., De Oliveira, S.: Culture and decision making. Organ. Behav. Hum. Decis. Process. 136, 106–118 (2016)

    Article  Google Scholar 

  18. Henrich, J., Heine, S.J., Norenzayan, A.: The weirdest people in the world? Behav. Brain Sci. 33(2–3), 61–83 (2010)

    Article  Google Scholar 

  19. Country comparison graphs country comparison graphs. (in en-GB). Geert Hofstede. https://www.hofstede-insights.com/country-comparison-tool. Accessed 16 Mar 2024

  20. Harb, C.: The Arab region: cultures, values, and identities. In: Handbook of Arab American Psychology, pp. 3–18. Routledge (2015)

    Google Scholar 

  21. Waclawski, E.: How I use it: survey monkey. Occup. Med. 62(6), 477 (2012)

    Article  Google Scholar 

  22. Thien, P.: MOBILE Panel Sample and ONLINE Surveys TGM Research. TGM Research, https://tgmresearch.com/. Accessed 16 Mar 2024

  23. Hofstede, G.: Culture’s Consequences: International Differences in Work-Related Values. Sage, Thousands Oaks (1984)

    Google Scholar 

  24. Faklaris, C., Dabbish, L.A., Hong, J.I.: A {self-report} measure of {end-user} security attitudes ({{{{{SA-6}}}}}). In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), pp. 61–77 (2019)

    Google Scholar 

  25. Kwak, S.G., Kim, J.H.: Central limit theorem: the cornerstone of modern statistics. Korean J. Anesthesiol. 70(2), 144 (2017)

    Article  Google Scholar 

  26. JASP - A Fresh Way to Do Statistics. JASP - Free and User-Friendly Statistical Software. https://jasp-stats.org/. Accessed 16 Mar 2024

  27. Jenkins, J.L., Durcikova, A., Nunamaker, J.: Mitigating the security intention-behavior gap: the moderating role of required effort on the intention-behavior relationship. Association for Information Systems (2021)

    Google Scholar 

  28. Gerdenitsch, C., Wurhofer, D., Tscheligi, M.: Working conditions and cybersecurity: time pressure, autonomy and threat appraisal shaping employees’ security behavior. Cyberpsychol. J. Psychosocial Res. Cyberspace 17(4) (2023)

    Google Scholar 

  29. Jonas, E., Sullivan, D., Greenberg, J.: Generosity, greed, norms, and death–differential effects of mortality salience on charitable behavior. J. Econ. Psychol. 35, 47–57 (2013)

    Article  Google Scholar 

  30. McGuire, W.J.: The effectiveness of supportive and refutational defenses in immunizing and restoring beliefs against persuasion. Sociometry 24(2), 184–197 (1961)

    Article  Google Scholar 

Download references

Acknowledgement

This publication was supported by NPRP 14 Cluster grant # NPRP 14C-0916-210015 from the Qatar National Research Fund (a member of Qatar Foundation). The findings herein reflect the work and are solely the responsibility of the authors.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Raian Ali .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2024 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Mollazehi, A., Abuelezz, I., Barhamgi, M., Khan, K.M., Ali, R. (2024). Do Cialdini’s Persuasion Principles Still Influence Trust and Risk-Taking When Social Engineering is Knowingly Possible?. In: Araújo, J., de la Vara, J.L., Santos, M.Y., Assar, S. (eds) Research Challenges in Information Science. RCIS 2024. Lecture Notes in Business Information Processing, vol 513. Springer, Cham. https://doi.org/10.1007/978-3-031-59465-6_17

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-59465-6_17

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-59464-9

  • Online ISBN: 978-3-031-59465-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics