Review and Meta: Analysis Psychological Conceptual Frameworks and Concepts Applied in Social Engineering
Independent thesis Advanced level (degree of Master (Two Years)), 20 credits / 30 HE creditsStudent thesis
Social Engineering, which is the act of deceiving people to gain access to their personal data, has been gaining lots of attention in recent times amongst researchers and practitioners. As a consensus, IT organizations have started to manage this risk with regards to their sensitive and core corporate property via security tools and processes. Social engineering attacks are more challenging to manage since they depend on human behavior and involve taking advantage of vulnerable employees and businesses today. The understanding of the psychological concepts and frameworks set out by social engineers enable us tackle the menace. It must be tackled utilizing a combination of technology solutions and user awareness to help protect corporate information. This research provides a review and Meta - analysis for representation of these studied result of identified research works. We reflected on Psychological conceptual frameworks and concepts applied in Social Engineering attacks and conducts a paradigmatic analysis of eight researchers' work to identify the different concepts and approaches that these researchers conducted their research on. We also outline the different methodologies that aid the researchers to accomplish their work and detailed paradigmatic analysis of these eight researchers is contrasted. The Meta-Analysis enables us to identify patterns amongst the study results and shows disagreement amongst them. The final research output help researchers (readers) to understand social engineering aspect in psychological perspective and create measures to defend against these attacks. This provides a better premise for an empirical study into the area of research as well.
Place, publisher, year, edition, pages
2013. , 65 p.
Technology, Social Engineering, Psychological Conceptual Framework, Ontology, Epistemology, Methodology
IdentifiersURN: urn:nbn:se:ltu:diva-45096Local ID: 2d3dafd4-c085-47b1-bcf9-364b14fa1d39OAI: oai:DiVA.org:ltu-45096DiVA: diva2:1018376
Subject / course
Student thesis, at least 30 credits
Information Security, master's level
Validerat; 20130709 (global_studentproject_submitter)2016-10-042016-10-04Bibliographically approved