This is an unedited manuscript accepted for publication and provided as an Article in Press for early access at the author’s request. The article will undergo copyediting, typesetting, and galley proof review before final publication. Please be aware that errors may be identified during production that could affect the content. All legal disclaimers of the journal apply.
Vidhi Katira Jivrajani,
Hiren Kumar Thakor,
- Assistant Professor, Faculty of Computer Application, Harivandana College, Rajkot, Gujarat, India
- Associate Professor, Faculty of Computer Application, Nobel University, Junagadh, Gujarat, India
Abstract
Social engineering, the strategic manipulation of individualities through cerebral tactics, thrives on social media platforms, where specific dynamics enhance its impact. This study delves into the styles social masterminds employ to exploit social media, assaying common strategies like phishing, impersonation, misinformation, and emotional prayers. Social media provides rich ground for these tactics through features similar as algorithmic modification, stoner obscurity, and echo chambers, which allow social masterminds to reach and impact large cult with ease. These styles frequently affect serious consequences, including sequestration breaches, fiscal losses, and a corrosion of trust in both individualities and institutions. By examining notable case studies, this study underscores the significant impact of social engineering on druggies and society as a whole. Exemplifications include cryptocurrency swindles on Twitter, where bushwhackers use high-profile accounts to deceive followers; political misinformation juggernauts on Facebook, which influence targeted advertisements and fake accounts to sway public opinion; and love swindles on dating platforms, where manipulators exploit feelings for fiscal gain. These cases illustrate the wide-ranging and profound goods of social engineering on colorful social media druggies, from fiscal victims to those affected by misinformation. Addressing these pitfalls requires a multi-faceted approach. This study advocates for increased stoner education, as mindfulness is a critical defense against manipulation. Policy reforms, including stricter verification measures and translucency norms, can help reduce the impact of social engineering tactics. Also, technological safeguards, similar as bettered discovery algorithms and stoner-reporting mechanisms, are essential in bridling the reach of social engineering on social media. By feting these pitfalls and enforcing visionary results, we can produce a more secure and flexible social media terrain, better guarding individualities and society from the potentially ruinous goods of social engineering.
Keywords: Social engineering, social media, phishing, misinformation, algorithmic amplification, privacy, cybersecurity, online manipulation, digital trust, authentication, clarity, feedback, prevention, environment, exploitation, identity, emotional appeals, insularity
[This article belongs to Journal Of Network security (jons)]
Vidhi Katira Jivrajani, Hiren Kumar Thakor. The Power of Persuasion: How Social Engineers Exploit Social Media Dynamics. Journal Of Network security. 2025; 13(01):37-44.
Vidhi Katira Jivrajani, Hiren Kumar Thakor. The Power of Persuasion: How Social Engineers Exploit Social Media Dynamics. Journal Of Network security. 2025; 13(01):37-44. Available from: https://journals.stmjournals.com/jons/article=2025/view=196976
References
- Akyeşilmen N, Alhosban A. Non-Technical Cyber-Attacks and International Cybersecurity: The Case of Social Engineering. Gaziantep Univ J Soc Sci. 2024 Jan 1; 23(1): 342–
- Alseadoon IM. The power of intention in detecting social engineering attacks. International Journal on Information Technologies & Security (IJITS). 2023 Jul 1; 15(3): 75–86.
- Aldawood H, Alashoor T, Skinner G. Does awareness of social engineering make employees more secure? Int J Comput Appl. 2020 Feb; 177(38): 45–
- Bada M, Nurse JR. The social and psychological impact of cyberattacks. In Emerging cyber threats and cognitive vulnerabilities. Academic press; New York, United States. 2020 Jan 1; 73–92.
- Cialdini R. Principles of persuasion. Arizona State University, eBrand Media Publication;
- Ivaturi K, Janczewski L. A taxonomy for social engineering attacks. AIS eLibrary. 2011.
- Matz SC, Kosinski M, Nave G, Stillwell DJ. Psychological targeting as an effective approach to digital mass persuasion. Proc Natl Acad Sci. 2017 Nov 28; 114(48): 12714–
- Nimon-Peters A. Working with Influence: Nine principles of persuasion to accelerate your career. Bloomsbury Publishing; London, United Kingdom. 2022 Jun 9.
- Naz A, Sarwar M, Kaleem M, Mushtaq MA, Rashid S. A comprehensive survey on social engineering-based attacks on social networks. Int J Adv Appl Sci. 2024; 11(4): 139–154.
- Siddiqi MA, Pak W, Siddiqi MA. A study on the psychology of social engineering-based cyberattacks and existing countermeasures. Appl Sci. 2022 Jun 14; 12(12): 6042.
Journal Of Network security
Volume | 13 |
Issue | 01 |
Received | 20/12/2024 |
Accepted | 15/01/2025 |
Published | 04/02/2025 |