Skip to main content
Log in

Enacting social engineering: the emotional experience of information security deception

  • Published:
Crime, Law and Social Change Aims and scope Submit manuscript

Abstract

Social engineering is a modern form of fraud that is widely implicated in contributing to information security breaches. This study situates social engineering in past criminological work on fraud and analyzes qualitative interviews with social engineers to elucidate the emotional experiences of perpetrating such frauds. The results of this analysis indicate that social engineering interactions are characterized by an emotional experience of situational tension and the subsequent resolution of that tension. The analysis then turns to factors that modulate the quality and intensity of the emotional experience of social engineering perpetration. These factors include the social distance between the social engineer and the mark, the social engineer’s framing the mark, and both perceived and actual efficacy in utilizing skills involved in management of self and situation. This study suggests that the emotional experience of social engineering parallels that of other frauds and is revelatory of the motivations behind the experiences.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

Notes

  1. Self-report questions were used to derive the percentage of those engaged in prior criminal social engineering. Fifteen participants in total admitted to or described engaging in some form of illegal social engineering (12 security auditors and 3 non-professional social engineers). The percentage omits an additional 2 security auditors who reported retroactively discovering having engaged in behavior that violated laws while conducting security audits.

References

  • Abraham, S., & Chengalur-Smith, I. S. (2010). An overview of social engineering malware. Technology in Society, 32, 183–196.

    Article  Google Scholar 

  • Aleroud, A., & Zhou, L. (2017). Phishing environments, techniques, and countermeasures: A survey. Computers and Security, 68, 160–196.

    Article  Google Scholar 

  • Aurigemma, S., & Mattson, T. (2017). Privilege or procedure. Computers and Security, 66, 218–234.

    Article  Google Scholar 

  • Bachmann, M. (2010). Deciphering the hacker underground. In T. J. Holt & B. Schell (Eds.), Corporate hacking and technology-driven crime (pp. 105–126). IGI Global.

    Google Scholar 

  • Balleisen, E. J. (2017). Fraud: An American history from Barnum to Madoff. Princeton University Press.

    Book  Google Scholar 

  • Ben-Asher, N., & Gonzalez, C. (2015). Effects of cyber security knowledge on attack detection. Computers in Human Behavior, 48, 51–61.

    Article  Google Scholar 

  • Berg, B. L. (2004). Qualitative research methods for the social sciences. Pearson.

    Google Scholar 

  • Biegelman, M. T. (2013). Faces of fraud: Cases and lessons from a life fighting fraudsters. John Wiley & Sons Inc.

    Book  Google Scholar 

  • Blumer, H. (1998). Symbolic interactionism. University of California Press.

    Google Scholar 

  • Bouffard, J., Exum, M. L., & Paternoster, R. (2000). Wither the beast? The role of emotions in a rational choice theory of crime. Of crime & criminality: The use of theory in everyday life (pp. 159–178). Sage Publications Inc.

    Chapter  Google Scholar 

  • Bullée, J. W. H., Montoya, L., Pieters, W., Junger, M., & Hartel, P. (2018). On the anatomy of social engineering attacks. Journal of Investigative Psychology and Offender Profiling, 15(1), 20–45.

    Article  Google Scholar 

  • Caldwell, T. (2011). Ethical hackers: Putting on the white hat. Network Security, 7, 10–13.

    Article  Google Scholar 

  • Charmaz, K. (2002). Qualitative interviewing and grounded theory analysis. In J. F. Gubrium & J. A. Holstein (Eds.), Handbook of interview research (pp. 675–694). Sage Publications Inc.

    Google Scholar 

  • Charmaz, K. (2006). Constructing grounded theory. Sage Publications Inc.

    Google Scholar 

  • Clarke, A. E. (2005). Situational analysis. Sage.

    Book  Google Scholar 

  • Clarke, R. V. (2014). Affect and cognition in criminal decision making. In Affect and the reasoning criminal (pp. 20–41). Routledge.

  • Corbin, J., & Strauss, A. (1990). Grounded theory research. Qualitative Sociology, 13(1), 3–21.

    Article  Google Scholar 

  • Crewe, B., Warr, J., Bennett, P., & Smith, A. (2014). The emotional geography of prison life. Theoretical Criminology, 18(1), 56–74.

    Article  Google Scholar 

  • Cross, C. (2019). Is online fraud just fraud? Examining the efficacy of the digital divide. Journal of Criminological Research, Policy and Practice, 5(2), 120–131.

    Article  Google Scholar 

  • Cross, C., Dragiewicz, M., & Richards, K. (2018). Understanding romance fraud: Insights from domestic violence research. British Journal of Criminology, 58, 1303–1322.

    Article  Google Scholar 

  • Curtis, S. R., Rajivan, P., Jones, D. N., & Gonzalez, C. (2018). Phishing attempts among the dark triad. Computers in Human Behavior, 87, 174–182.

    Article  Google Scholar 

  • Doocy, J. H., Shichor, D., Sechrest, D. K., & Geis, G. (2001). Telemarketing fraud: Who are the tricksters and what makes them trick? Security Journal, 14(3), 7–26.

    Article  Google Scholar 

  • Duffield, G., & Grabosky, P. (2001). The psychology of fraud. Trends & Issues in Crime and Criminal Justice, 199, 1–6.

    Google Scholar 

  • Ferrell, J. (2004). Boredom, crime and criminology. Theoretical Criminology, 8(3), 287–302.

    Article  Google Scholar 

  • Ferrell, J., Hayward, K., & Young, J. (2015). Cultural criminology: An invitation (2nd ed.). Sage.

    Book  Google Scholar 

  • Gibbs, J. P. (1975). Crime, punishment, and deterrence. Elsevier Scientific.

    Google Scholar 

  • Glaser, B. G., & Strauss, A. L. (1967). The discovery of grounded theory. Aldine Publishing Company.

    Google Scholar 

  • Goffman, E. (1956). The presentation of self in everyday life. Anchor Books.

    Google Scholar 

  • Goldsmith, A., & Wall, D. S. (2019, Online First). The seductions of cybercrime: Adolescence and the thrills of digital transgression. European Journal of Criminology.

  • Hadnagy, C. (2018). Social engineering: The science of human hacking. Wiley.

    Book  Google Scholar 

  • Hochstetler, A., & Copes, H. (2003). Managing fear to commit felony theft. In their own words: Criminals on crime (pp. 87–98). Roxbury Publishing Company.

    Google Scholar 

  • Hoeschele, M., & Rogers, M. (2006). Detecting social engineering. In IFIP International Conference on Digital Forensics (Vol. 194, pp. 67–77).

  • Holt, T. J. (2010). Examining the role of technology in the formation of deviant subcultures. Social Science Computer Review, 28, 466–481.

    Article  Google Scholar 

  • Holt, T. J. (2017). On the value of honeypots to produce policy recommendations. Criminology & Public Policy, 16(3), 739–747.

    Article  Google Scholar 

  • Hutchings, A. (2013). Hacking and fraud: Qualitative analysis of online offending and victimization. In K. Jaishankar & N. Ronel (Eds.), Global criminology: Crime and victimization in a globalized era. CRC Press.

    Google Scholar 

  • Jackson, J. E. (1994). Fraud masters: Professional credit card offenders and crime. Criminal Justice Review, 19(1), 24–55.

    Article  Google Scholar 

  • Jacobs, B. A., & Cherbonneau, M. (2017). Nerve management and crime accomplishment. Journal of Research in Crime and Delinquency, 54(5), 617–638.

    Article  Google Scholar 

  • Jacobs, B. A., & Cherbonneau, M. (2019). Reconciling emotion and rational choice: Negativistic auto theft, consequence irrelevance, and the seduction of destruction. Journal of Research in Crime and Delinquency, 1–33.

  • Jordanoska, A. (2018). The social ecology of white-collar crime: Applying Situational Action Theory to white-collar offending. Deviant Behavior, 39(11), 1427–1449.

    Article  Google Scholar 

  • Katz, J. (1988). Seductions of crime. Basic Books.

    Google Scholar 

  • Lee, C. J., & Andrade, E. B. (2015). Fear, excitement, and financial risk-taking. Cognition and Emotion, 29(1), 178–187.

    Article  Google Scholar 

  • Leukfeldt, E. R. (2017). The human factor of cybercrime and cybersecurity. Eleven International Publishing.

    Google Scholar 

  • Lundquist, T., Ellingsen, T., Gribbe, E., & Johannesson, M. (2009). The aversion to lying. Journal of Economic Behavior & Organization, 70, 81–92.

    Article  Google Scholar 

  • Lyng, S. (1990). Edgework. American Journal of Sociology, 95(4), 851–886.

    Article  Google Scholar 

  • Lyng, S. (2004). Crime, edgework and corporeal transaction. Theoretical Criminology, 8(3), 359–375.

    Article  Google Scholar 

  • Maimon, D., Alper, M., Sobesto, B., & Cukier, M. (2014). Restrictive deterrent effects of a warning banner in an attacked computer system. Criminology, 52, 33–59.

    Article  Google Scholar 

  • Maurer, D. W. (1940/1999). The big con. Anchor Books.

  • McCarthy, B., & Hagan, J. (2005). Danger and the decision to offend. Social Forces, 83(3), 1065–1096.

    Article  Google Scholar 

  • McGuire, M. (2016). Cybercrime 4.0: Now what is to be done? In R. Matthews (Ed.), What is to be done about crime and punishment: Towards a ‘public criminology’ (pp. 251–279). Macmillan Publishers Ltd.

    Google Scholar 

  • Mouton, F., Leenen, L., & Venter, H. S. (2016). Social engineering attack examples, templates and scenarios. Computers and Security, 59, 186–209.

    Article  Google Scholar 

  • Muhr, T. (2004). ATLAS.ti (Version 7) [Software]. Available from http://atlasti.com

  • Paternoster, R. (2010). How much do we really know about criminal deterrence? The Journal of Criminal Law & Criminology, 100(3), 765–823.

    Google Scholar 

  • Paternoster, R., & Simpson, S. (1996). Sanction threats and appeals to morality: Testing a rational choice model of corporate crime. Law & Society Review, 30(3), 549–584.

    Article  Google Scholar 

  • Paternoster, R., & Pogarsky, G. (2009). Rational choice, agency and thoughtfully reflective decision making: The short and long-term consequences of making good choices. Journal of Quantitative Criminology, 25(2), 103–127.

    Article  Google Scholar 

  • Powell, A., Stratton, G., & Cameron, R. (2018). Digital criminology: Crime and justice in digital society. Routledge.

    Book  Google Scholar 

  • Schlenker, B. R., & Leary, M. R. (1982). Social anxiety and self-presentation. Psychological Bulletin, 92(3), 641–669.

    Article  Google Scholar 

  • Shover, N., Coffey, G. S., & Hobbs, D. (2003). Crime on the line. British Journal of Criminology, 43, 489–505.

    Article  Google Scholar 

  • Smith, C. A., & Ellsworth, P. C. (1985). Patterns of cognitive appraisal in emotion. Journal of Personality and Social Psychology, 48(4), 813–838.

    Article  Google Scholar 

  • Steinmetz, K. F. (2016). Hacked: A radical approach to hacker culture and crime. NYU Press.

    Book  Google Scholar 

  • Steinmetz, K. F. (2017). Ruminations on warning banners, deterrence, and system intrusion research. Criminology & Public Policy, 16(3), 727–737.

    Article  Google Scholar 

  • Steinmetz, K. F., Schaefer, B. P., & Green, E. L. W. (2017). Anything but boring. Theoretical Criminology, 21(3), 342–360.

    Article  Google Scholar 

  • Stotland, E. (1977). White collar criminals. Journal of Social Issues, 33(4), 179–196.

    Article  Google Scholar 

  • Sykes, G. M., & Matza, D. (1957). Techniques of neutralization. American Sociological Review, 22(6), 664–670.

    Article  Google Scholar 

  • Sutherland, E. H. (1937/1989). The professional thief. The University of Chicago Press.

  • Taylor, P. A. (1999). Hackers: Crime in the digital sublime. Routledge.

    Google Scholar 

  • Testa, A., Maimon, D., Sobesto, B., & Cukier, M. (2017). Illegal roaming and file manipulation on target computers. Criminology & Public Policy, 16(3), 689–726.

    Article  Google Scholar 

  • Thakur, K., Shan, J., & Pathan, A. S. K. (2018). Innovations of phishing defense: The mechanism, measurement and defense strategies. International Journal of Communication Networks and Information Security, 10(1), 19–27.

    Google Scholar 

  • Thomas, D. (2002). Hacker culture. University of Minnesota Press.

    Google Scholar 

  • Tudor, K. (2019). Symbolic survival and harm: Serious fraud and consumer capitalism’s perversion of the Causa Sui project. British Journal of Criminology, 59, 1237–1253.

    Article  Google Scholar 

  • Tunnell, K. D. (2002). The impulsiveness and routinization of decision-making. In A. R. Piquero & S. G. Tibbetts (Eds.), Rational Choice and Criminal Behavior: Recent Research and Future Challenges (pp. 265–278). Routledge.

    Google Scholar 

  • Turgeman-Goldschmidt, O. (2008). Meanings that hackers assign to their being a hacker. International Journal of Cybercriminology, 2(2), 382–396.

    Google Scholar 

  • van Onna, J. H. R. (2020). From the avalanche to the game: White-collar offenders on crime, bonds and morality. Crime, Law, and Social Change, 74, 405–431.

    Article  Google Scholar 

  • Whitty, M. T. (2013). The scammers persuasive techniques model. British Journal of Criminology, 53(4), 665–684.

    Article  Google Scholar 

  • Williams, J., & Milton, T. B. (2015). The con men. Columbia University Press.

    Book  Google Scholar 

  • Williams, E. J., Beardmore, A., & Joinson, A. N. (2017). Individual differences in susceptibility to online influence. Computers in Human Behavior, 72, 412–421.

    Article  Google Scholar 

  • Wilson, T., Maimon, D., Sobesto, B., & Cukier, M. (2015). The effect of a surveillance banner in an attacked computer system. Journal of Research in Crime and Delinquency, 52, 829–855.

    Article  Google Scholar 

  • Worthen, M. G. F., & Baker, S. A. (2016). Pushing up on the glass ceiling of female muscularity: Women’s bodybuilding as edgework. Deviant Behavior, 37(5), 471–495.

    Article  Google Scholar 

  • Yar, M., & Steinmetz, K. F. (2019). Cybercrime & Society (3rd ed.). Sage.

    Google Scholar 

  • Young, J. (2003). Merton with energy, Katz with structure. Theoretical Criminology, 7(3), 389–414.

    Article  Google Scholar 

Download references

Acknowledgements

The authors would like to thank Dr. Richard Goe for looking over previous drafts of this manuscript. The authors would also like to thank Lynn Demyan for the many hours of interviews she transcribed for this project.

Funding

This work was supported by the US National Science Foundation [grant number SES-1616804].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Alexandra Pimentel.

Ethics declarations

Conflict of Interest

The authors declare that they have no conflict of interest.

Additional information

Publisher's note

Springer Nature remains neutral with regard to jurisdictional claims in published maps and institutional affiliations.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Pimentel, A., Steinmetz, K.F. Enacting social engineering: the emotional experience of information security deception. Crime Law Soc Change 77, 341–361 (2022). https://doi.org/10.1007/s10611-021-09993-8

Download citation

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10611-021-09993-8

Navigation