Understanding responses to phishing in Saudi Arabia via the Theory of Planned Behaviour

Ahmed Alyahya, George Weir

Research output: Chapter in Book/Report/Conference proceedingChapter

3 Citations (Scopus)
56 Downloads (Pure)

Abstract

Saudi Arabia has seen an enormous growth in Internet usage over the past few years. With increasing adoption of this technology has come a rise in cybercrime, often enabled through use of social engineering. Phishing is a prime example, aiming to deceive users into revealing personal data. The paper describes efforts to understand individuals' responses to phishing attacks through application of the Theory of Planned Behaviour (TPB). It reports a survey that considers three common social engineering persuading strategies, Authority, Social Proof and Scarcity. Results show correlations between these strategies and TPB. In particular, between attitude and intention to respond under the Authority strategy; subjective norms and intention to respond under the Social Proof strategy; and subjective norms and intention to respond under the Scarcity strategy.
Original languageEnglish
Title of host publicationNational Computing Colleges Conference (NCCC), 2021
Place of PublicationNew York, N.Y.
PublisherIEEE
Number of pages6
ISBN (Electronic)9781728167190
ISBN (Print)9781728167206
DOIs
Publication statusPublished - 14 May 2021
EventNational Computing Colleges Conference 2021 - Virtual, Taif, Saudi Arabia
Duration: 27 Mar 202128 Mar 2021
Conference number: 4
https://events.vtools.ieee.org/m/257054

Publication series

NameProceedings - 2021 IEEE 4th National Computing Colleges Conference, NCCC 2021

Conference

ConferenceNational Computing Colleges Conference 2021
Abbreviated titleNCCC 2021
Country/TerritorySaudi Arabia
CityTaif
Period27/03/2128/03/21
Internet address

Keywords

  • social engineering persuading strategies
  • phishing
  • Theory of Planned Behaviour

Fingerprint

Dive into the research topics of 'Understanding responses to phishing in Saudi Arabia via the Theory of Planned Behaviour'. Together they form a unique fingerprint.

Cite this