Psycholinguistic Aspects of Humanitarian Component of Cybersecurity

IF 0.5 Q3 LINGUISTICS Psycholinguistics Pub Date : 2019-11-12 DOI:10.31470/2309-1797-2019-26-1-199-215
Юлія Крилова-Грек
{"title":"Psycholinguistic Aspects of Humanitarian Component of Cybersecurity","authors":"Юлія Крилова-Грек","doi":"10.31470/2309-1797-2019-26-1-199-215","DOIUrl":null,"url":null,"abstract":"Introduction. The paper focuses on language means exploited by social engineers in their activities in terms of humanitarian aspects of cybersecurity. The goal of this research is to analyze the methods and techniques employed by social engineers in their malicious activity and its features from a psycholinguistic point of view for further development of counteraction mechanisms. \nMethods. To obtain results we used the following methods: primary source analysis, analysis of spoken and written speech and speech products, and intent analysis. \nResults. The activity theory has been successfully applied to consider the key features of social engineers’ work. On the base of AT we presented a three-component model which we may consider only in the case of a social engineer’s successful attack (action). \nBased on the analysis of the sources, we distinguished the types of spoken and written communication actions (these types correspond to direct and indirect actions), used by social engineers to affect the cognitive processes for retrieving “sensitive data” and confidential information. Besides, we also categorized psychological and language means, which social engineers evidently apply in their activities. We stress that in most cases social engineers’ activities are aimed at a) affecting the person’s emotions and feelings; b) blocking rational and critical thinking; c) manipulating moral and ethic values, and d) using positive incentives that have an interest to a user. Taking into account the abovementioned types of communication, psychological and language means, we systematized and described the general techniques of using oral and written forms of language and technologies: 1) techniques related to the use of spoken speech; 2) techniques related to the use of written speech; 3) techniques related to the use of USB flash drives, applications, and program software. \nThe findings are applicable for developing a mechanism to counter social engineers’ attacks and contribute to improving the level of cyber literacy.","PeriodicalId":42961,"journal":{"name":"Psycholinguistics","volume":"33 1","pages":""},"PeriodicalIF":0.5000,"publicationDate":"2019-11-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"2","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Psycholinguistics","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.31470/2309-1797-2019-26-1-199-215","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"Q3","JCRName":"LINGUISTICS","Score":null,"Total":0}
引用次数: 2

Abstract

Introduction. The paper focuses on language means exploited by social engineers in their activities in terms of humanitarian aspects of cybersecurity. The goal of this research is to analyze the methods and techniques employed by social engineers in their malicious activity and its features from a psycholinguistic point of view for further development of counteraction mechanisms. Methods. To obtain results we used the following methods: primary source analysis, analysis of spoken and written speech and speech products, and intent analysis. Results. The activity theory has been successfully applied to consider the key features of social engineers’ work. On the base of AT we presented a three-component model which we may consider only in the case of a social engineer’s successful attack (action). Based on the analysis of the sources, we distinguished the types of spoken and written communication actions (these types correspond to direct and indirect actions), used by social engineers to affect the cognitive processes for retrieving “sensitive data” and confidential information. Besides, we also categorized psychological and language means, which social engineers evidently apply in their activities. We stress that in most cases social engineers’ activities are aimed at a) affecting the person’s emotions and feelings; b) blocking rational and critical thinking; c) manipulating moral and ethic values, and d) using positive incentives that have an interest to a user. Taking into account the abovementioned types of communication, psychological and language means, we systematized and described the general techniques of using oral and written forms of language and technologies: 1) techniques related to the use of spoken speech; 2) techniques related to the use of written speech; 3) techniques related to the use of USB flash drives, applications, and program software. The findings are applicable for developing a mechanism to counter social engineers’ attacks and contribute to improving the level of cyber literacy.
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
网络安全人道主义成分的心理语言学方面
介绍。本文着重于社会工程师在网络安全的人道主义方面的活动中利用的语言手段。本研究的目的是从心理语言学的角度分析社会工程师在其恶意活动中使用的方法和技术及其特征,以进一步发展对抗机制。方法。为了获得结果,我们使用了以下方法:原始来源分析,口头和书面语音和语音产品分析,以及意图分析。结果。活动理论已经成功地应用于考虑社会工程师工作的关键特征。在AT的基础上,我们提出了一个三组件模型,我们只考虑社会工程师成功攻击(行动)的情况。基于对来源的分析,我们区分了口头和书面交流行为的类型(这些类型对应于直接和间接的行为),社会工程师使用这些类型来影响检索“敏感数据”和机密信息的认知过程。此外,我们还对社会工程师在其活动中明显使用的心理和语言手段进行了分类。我们强调,在大多数情况下,社会工程师的活动旨在a)影响人的情绪和感受;B)阻碍理性和批判性思维;C)操纵道德和伦理价值观,d)使用用户感兴趣的积极激励。考虑到上述类型的沟通,心理和语言手段,我们系统地描述了使用口头和书面形式的语言和技术的一般技术:1)与使用口语有关的技术;2)与使用书面演讲相关的技巧;3)与使用USB闪存驱动器、应用程序和程序软件相关的技术。研究结果适用于开发对抗社会工程师攻击的机制,并有助于提高网络素养水平。
本文章由计算机程序翻译,如有差异,请以英文原文为准。
求助全文
约1分钟内获得全文 去求助
来源期刊
Psycholinguistics
Psycholinguistics LINGUISTICS-
CiteScore
1.00
自引率
0.00%
发文量
18
审稿时长
20 weeks
期刊最新文献
The Impact of the Source-Text Syntactic Characteristics on the Sight-Translation Strategies and Quality Метод незакінчених речень в міждисциплінарному дослідженні соціально-демографічних та лінгвокультурних особливостей засуджених за колабораційну діяльність Information and Psychological Security of the Media Space. Ukrainian Experience of Implementation of Psycholinguistic Component Into Media Education The Use of Jordanian Arabic Possessive Pronouns by Children with Autism Spectrum Disorder The Impact of Music on Verbal Memory: Evidence from Jordanian University Students
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1