Triggering Empathy out of Malicious Intent: The Role of Empathy in Social Engineering Attacks

Verena Distler, Yasmeen Abdrabou, Felix Dietz, Florian Alt

Research output: Chapter in Book/Report/Conference proceedingConference article in proceedingsScientificpeer-review

3 Citations (Scopus)

Abstract

Social engineering is a popular attack vector among cyber criminals. During such attacks, impostors often attempt to trigger empathy to manipulate victims into taking dangerous actions, for example, sharing their credentials or clicking on malicious email attachments. The objective of this position paper is to initiate a conversation on the tension between positive and negative aspects of empathy in HCI as it pertains to security-relevant behaviors. To this end, we focus on the malicious ways in which empathy can be instrumentalized in social engineering. We describe examples of such empathy-related social engineering attacks, explore potential solutions (including the automated detection of empathy-triggering communication, or of empathetic communication on the part of a potential victim), and discuss technical, social as well as organizational interventions. We highlight research challenges and directions for future work.

Original languageEnglish
Title of host publicationProceedings of the 2nd Empathy-Centric Design Workshop, EmpathiCH 2023 - Collocated with ACM CHI Conference on Human Factors in Computing Systems
PublisherACM
ISBN (Electronic)9798400707490
DOIs
Publication statusPublished - 23 Apr 2023
MoE publication typeA4 Conference publication
EventEmpathy-Centric Design Workshop - Hamburg, Germany
Duration: 23 Apr 202323 Apr 2023
Conference number: 2

Conference

ConferenceEmpathy-Centric Design Workshop
Abbreviated titleEmpathiCH
Country/TerritoryGermany
CityHamburg
Period23/04/202323/04/2023

Keywords

  • Empathy
  • Security
  • Social Engineering

Fingerprint

Dive into the research topics of 'Triggering Empathy out of Malicious Intent: The Role of Empathy in Social Engineering Attacks'. Together they form a unique fingerprint.

Cite this