A Survey of Social Engineers that did not Collect Enough Data

Cyber Security, Social Engineering

Authors

  • Adrian Dana Austin Department of Technology Systems, East Carolina University, Greenville, North Carolina, USA
  • Tijjani Mohammed Department of Technology Systems, East Carolina University, Greenville, North Carolina, USA
  • Te-Shun Chou Department of Technology Systems, East Carolina University, Greenville, North Carolina, USA
  • Carolyn Dunn Department of Technology Systems, East Carolina University, Greenville, North Carolina, USA
  • Michael Behm Department of Technology Systems, East Carolina University, Greenville, North Carolina, USA
June 2, 2022
June 2, 2022

Downloads

In The context of Information technology and Cyber Security a nexus of computers and humans occurs as Social engineering.  Defenders would like to know how this group interacts with users to gain access to secure information.  The purpose of this research initially was to find out from Social Engineers what were the best defensive techniques.  A survey was created to ask social engineers about specific defensive techniques that are prevalent in Cyber security.  Not enough data was collected from social engineers and the second half of the paper covers why this was. One of the main reasons for lack of data was due to a lack of in-group trust of the researchers by the group being researched. Much of the theory behind the why has been applied to other groups in other fields.