Publication Cover
Victims & Offenders
An International Journal of Evidence-based Research, Policy, and Practice
Volume 17, 2022 - Issue 3
604
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Organizational Characteristics Associated with Vulnerability to Social Engineering Deception: A Qualitative Analysis

, &
Pages 421-438 | Published online: 30 Jun 2021
 

ABSTRACT

Social engineering, the manipulation and deception of individuals to gain access to otherwise secure systems and information, has become a major vector to compromise the information security of organizations. Little research has explored characteristics associated with organizations vulnerable to social engineering, particularly from the perspective of persons experienced in such deceptions. To address this gap, the current study uses a qualitative, grounded theory-based approach to analyze interviews with both professional and nonprofessional social engineers (n = 37). Results reveals six themes corresponding to traits participants associated with organizations vulnerable to social engineering. These themes concern an organization’s value, structural controls, organizational efficacy, openness, size, and purpose. This study concludes by exploring directions for future research and policy implications.

Disclosure statement

No potential conflict of interest was reported by the author(s).

Notes

1. Many studies have examined the characteristics of organizations that may give rise to criminality among members. While informative, this analysis restricts itself for the purposes of clarity to consideration of literature which examines characteristics associated with organizations themselves becoming the targets of crime. Failure to limit the review of the literature in this manner would make it difficult to disentangle factors conducive to criminality and those which are associated with victimization. Further, a general weakness of available research is that it tends to focus on crimes against organizations by insiders and neglects outsider threats like those that typically define social engineering. Despite this limitation, extant research remains informative.

2. The IRB protocol number for this study is 8194.

3. The concept of “structural controls” is like the concept of “internal controls” used by some scholars of white-collar crime – a term referring to the “internal processes to deal with offending employees” used by organizations (Holtfreter, Citation2005, p. 256). We use structural controls because the concept, as we understand it, is broader than internal controls and more adequately captures the span of controls described by study participants.

4. Many studies define organizational efficacy as perceptions held by organizational members of their colleague’s abilities to carry out their interdependent tasks (e.g., Bohn, Citation2010). Bandura (Citation1997, pp. 468–469), however, distinguishes between organizational efficacy (the actual ability of members to carry out interdependent tasks) and perceived organizational efficacy.

5. It should be noted that while structural controls and efficacy may be interlinked, we consider them to be separate concepts. Structural controls denote the intentional and formal measures taken by an organization to regulate its members and their work. Efficacy, on the other hand, pertains to the shared attitudes, beliefs, and commitments among members.

6. Ellipses indicates unnecessary text was removed.

7. This dynamic applied mostly to in-person based deceptions.

8. Organizational theorists sometimes refer to organizational purpose as “technology” or “the work performed by an organization” including “the hardware used in performing the work,” “the skills and knowledge of workers,” and “the characteristics of the objects on which work is performed.” This analysis uses the term “organizational purpose” instead of “technology” to avoid confusion with our discussion of information security technologies and social engineering. The two terms, however, can likely be used interchangeably.

9. The observation that organizational members may be unwilling to disclose security infractions if they are made to fear harsh punishments resonates with deterrence theory which has long held that overly severe sanctions may encourage additional infractions to avoid punishment (Beccaria, Citation1819, pp. 93–94).

10. Ellipsis indicates unnecessary text was removed.

Additional information

Funding

This work was supported by the National Science Foundation [grant number SES #1616804].

Log in via your institution

Log in to Taylor & Francis Online

PDF download + Online access

  • 48 hours access to article PDF & online version
  • Article PDF can be downloaded
  • Article PDF can be printed
USD 53.00 Add to cart

Issue Purchase

  • 30 days online access to complete issue
  • Article PDFs can be downloaded
  • Article PDFs can be printed
USD 234.00 Add to cart

* Local tax will be added as applicable

Related Research

People also read lists articles that other readers of this article have read.

Recommended articles lists articles that we recommend and is powered by our AI driven recommendation engine.

Cited by lists all citing articles based on Crossref citations.
Articles with the Crossref icon will open in a new tab.