Understanding UK University Students’ Susceptibility to Social Engineering Attacks through Scenarios: A Case of Smartphone Interfaces

Understanding UK University Students’ Susceptibility to Social Engineering Attacks through Scenarios: A Case of Smartphone Interfaces

Understanding UK University Students’ Susceptibility to Social Engineering Attacks through Scenarios: A Case of Smartphone Interfaces

Published on, Sept 19, 2024 — Supervised by, Dr. Burak Merdenyan

Published on, Sept 19, 2024 — Supervised by, Dr. Burak Merdenyan

Published on, Sept 19, 2024 — Supervised by, Dr. Burak Merdenyan

Background

Background

Background

This research was conducted in partial fulfilment of my Master's Degree in Human-Centred Interactive Technologies at the University of York, under the guidance of Dr. Burak Merdenyan.


The decision to pursue research in Human-Centred Cybersecurity stemmed from my interest in Human Factors: Technology in Context and my desire to explore a new area beyond interaction design, which is my field of expertise. This research study gave me a unique opportunity to explore how users interact with technology in their everyday life that involves security threats.

This research was conducted in partial fulfilment of my Master's Degree in Human-Centred Interactive Technologies at the University of York, under the guidance of Dr. Burak Merdenyan.


The decision to pursue research in Human-Centred Cybersecurity stemmed from my interest in Human Factors: Technology in Context and my desire to explore a new area beyond interaction design, which is my field of expertise. This research study gave me a unique opportunity to explore how users interact with technology in their everyday life that involves security threats.

This research was conducted in partial fulfilment of my Master's Degree in Human-Centred Interactive Technologies at the University of York, under the guidance of Dr. Burak Merdenyan.


The decision to pursue research in Human-Centred Cybersecurity stemmed from my interest in Human Factors: Technology in Context and my desire to explore a new area beyond interaction design, which is my field of expertise. This research study gave me a unique opportunity to explore how users interact with technology in their everyday life that involves security threats.

Team

Team

Team

Researcher x 1

Supervisor x 1

Researcher x 1

Supervisor x 1

Researcher x 1

Supervisor x 1

Duration

Duration

Duration

3 Months (June - Aug 2024)

3 Months (June - Aug 2024)

3 Months (June - Aug 2024)

Skills

Skills

Skills

Literature Review

Qualitative Research

Thematic Analysis

Advanced Prototyping

Literature Review

Qualitative Research

Thematic Analysis

Advanced Prototyping

Literature Review

Qualitative Research

Thematic Analysis

Advanced Prototyping

Overview

Overview

Overview

The study investigates UK university students' susceptibility to social engineering attacks through smartphones. Through a qualitative study approach, 13 UK university students were observed in a scenario based observation study that simulated various social engineering attacks.


The findings of the study showed that despite claiming high cyber security knowledge, many students failed to detect common social engineering attacks. Other findings include, gap in knowledge and application, reduced caution in familiar contexts and so on. The main takeaway is that while students are aware of basic phishing tactics, their knowledge does not fully extend to newer forms of social engineering, particularly on mobile platforms. This highlights the need for targeted cybersecurity education, focusing on both technical defences and behavioural strategies to mitigate the growing risks of mobile-based social engineering attacks.

The study investigates UK university students' susceptibility to social engineering attacks through smartphones. Through a qualitative study approach, 13 UK university students were observed in a scenario based observation study that simulated various social engineering attacks.


The findings of the study showed that despite claiming high cyber security knowledge, many students failed to detect common social engineering attacks. Other findings include, gap in knowledge and application, reduced caution in familiar contexts and so on. The main takeaway is that while students are aware of basic phishing tactics, their knowledge does not fully extend to newer forms of social engineering, particularly on mobile platforms. This highlights the need for targeted cybersecurity education, focusing on both technical defences and behavioural strategies to mitigate the growing risks of mobile-based social engineering attacks.

The study investigates UK university students' susceptibility to social engineering attacks through smartphones. Through a qualitative study approach, 13 UK university students were observed in a scenario based observation study that simulated various social engineering attacks.


The findings of the study showed that despite claiming high cyber security knowledge, many students failed to detect common social engineering attacks. Other findings include, gap in knowledge and application, reduced caution in familiar contexts and so on. The main takeaway is that while students are aware of basic phishing tactics, their knowledge does not fully extend to newer forms of social engineering, particularly on mobile platforms. This highlights the need for targeted cybersecurity education, focusing on both technical defences and behavioural strategies to mitigate the growing risks of mobile-based social engineering attacks.

Research Gap

Research Gap

Research Gap

As a UX Designer, I led the redesign of the onboarding experience for restaurants onto Foaps. My primary responsibility was to integrate WhatsApp as a new ordering channel, ensuring a seamless user experience while adhering to Meta’s API requirements. I was involved in all phases of the project, from gathering requirements to designing high-fidelity prototypes for Meta approval and the Beta release. I collaborated closely with the onboarding, sales, and development teams to ensure the solution was scalable and future-proof.

As a UX Designer, I led the redesign of the onboarding experience for restaurants onto Foaps. My primary responsibility was to integrate WhatsApp as a new ordering channel, ensuring a seamless user experience while adhering to Meta’s API requirements. I was involved in all phases of the project, from gathering requirements to designing high-fidelity prototypes for Meta approval and the Beta release. I collaborated closely with the onboarding, sales, and development teams to ensure the solution was scalable and future-proof.

As a UX Designer, I led the redesign of the onboarding experience for restaurants onto Foaps. My primary responsibility was to integrate WhatsApp as a new ordering channel, ensuring a seamless user experience while adhering to Meta’s API requirements. I was involved in all phases of the project, from gathering requirements to designing high-fidelity prototypes for Meta approval and the Beta release. I collaborated closely with the onboarding, sales, and development teams to ensure the solution was scalable and future-proof.

Research Questions

Research Questions

Research Questions

  • RQ1. Do UK university students check for browser security cues and the legibility of websites when interacting with them online on their smartphones?


  • RQ2. Do UK university students check for security cues and the legitimacy of emails and social media profiles to avoid phishing and impersonation when interacting with them on their smartphones?


  • RQ3. What are the typical responses and actions taken by UK university students upon identifying a social engineering attack on their smartphones?


  • RQ4. What level of cyber security awareness does the UK university students have and how does this influence their susceptibility to social engineering attacks on smartphones?


  • RQ5. What past experience do UK university students have as victims of social engineering attacks, and how does this influence their susceptibility to social engineering attacks on smartphones?

  • RQ1. Do UK university students check for browser security cues and the legibility of websites when interacting with them online on their smartphones?


  • RQ2. Do UK university students check for security cues and the legitimacy of emails and social media profiles to avoid phishing and impersonation when interacting with them on their smartphones?


  • RQ3. What are the typical responses and actions taken by UK university students upon identifying a social engineering attack on their smartphones?


  • RQ4. What level of cyber security awareness does the UK university students have and how does this influence their susceptibility to social engineering attacks on smartphones?


  • RQ5. What past experience do UK university students have as victims of social engineering attacks, and how does this influence their susceptibility to social engineering attacks on smartphones?

  • RQ1. Do UK university students check for browser security cues and the legibility of websites when interacting with them online on their smartphones?


  • RQ2. Do UK university students check for security cues and the legitimacy of emails and social media profiles to avoid phishing and impersonation when interacting with them on their smartphones?


  • RQ3. What are the typical responses and actions taken by UK university students upon identifying a social engineering attack on their smartphones?


  • RQ4. What level of cyber security awareness does the UK university students have and how does this influence their susceptibility to social engineering attacks on smartphones?


  • RQ5. What past experience do UK university students have as victims of social engineering attacks, and how does this influence their susceptibility to social engineering attacks on smartphones?

Methodology

Methodology

Methodology

  • A concurrent think-aloud observation study, followed by an interview and a questionnaire with 13 UK university students.

  • Complete a set of tasks for all five scenarios that were carefully designed to simulate different types of social engineering attacks on a smart phone.

  • An inductive thematic analysis of qualitative data to develop codes and themes.

  • A concurrent think-aloud observation study, followed by an interview and a questionnaire with 13 UK university students.

  • Complete a set of tasks for all five scenarios that were carefully designed to simulate different types of social engineering attacks on a smart phone.

  • An inductive thematic analysis of qualitative data to develop codes and themes.

  • A concurrent think-aloud observation study, followed by an interview and a questionnaire with 13 UK university students.

  • Complete a set of tasks for all five scenarios that were carefully designed to simulate different types of social engineering attacks on a smart phone.

  • An inductive thematic analysis of qualitative data to develop codes and themes.

Scenario Design

Scenario Design

Scenario Design

The selection of type of attacks for each scenario is based on both the practicality of simulating these attacks and the gaps found in the literature. In each scenario, at various points the participants are promoted to enter personal information from the persona. These points are referred to as “deception points”. These points are categorised into levels based on the sensitivity of the information shared and the stage at which the participants fell for the attack.

The selection of type of attacks for each scenario is based on both the practicality of simulating these attacks and the gaps found in the literature. In each scenario, at various points the participants are promoted to enter personal information from the persona. These points are referred to as “deception points”. These points are categorised into levels based on the sensitivity of the information shared and the stage at which the participants fell for the attack.

The selection of type of attacks for each scenario is based on both the practicality of simulating these attacks and the gaps found in the literature. In each scenario, at various points the participants are promoted to enter personal information from the persona. These points are referred to as “deception points”. These points are categorised into levels based on the sensitivity of the information shared and the stage at which the participants fell for the attack.

Scenario 1: Smishing

Scenario 1: Smishing

Scenario 1: Smishing

Story

Story

Story

Yesterday, you ordered a new set of headphones from Amazon. You were expecting it to be delivered by today, however, this morning you received a text message saying that there has been a delay with your package.

Yesterday, you ordered a new set of headphones from Amazon. You were expecting it to be delivered by today, however, this morning you received a text message saying that there has been a delay with your package.

Yesterday, you ordered a new set of headphones from Amazon. You were expecting it to be delivered by today, however, this morning you received a text message saying that there has been a delay with your package.

Tasks

Tasks

Tasks

  1. Track your package.

  2. Claim the gift voucher.

  1. Track your package.

  2. Claim the gift voucher.

  1. Track your package.

  2. Claim the gift voucher.

Scenario 2: Impersonation

Scenario 2: Impersonation

Scenario 2: Impersonation

Part 1: Instagram

Part 1: Instagram

Part 1: Instagram

Story

Story

Story

One day, you received a follow request on Instagram from a distant cousin of yours. She is almost the same age as you, and you haven't talked to her for ages. Recognising her, you accept the request without much hesitation. A week later, while you were scrolling through the instagram feed you

received a message.

One day, you received a follow request on Instagram from a distant cousin of yours. She is almost the same age as you, and you haven't talked to her for ages. Recognising her, you accept the request without much hesitation. A week later, while you were scrolling through the instagram feed you

received a message.

One day, you received a follow request on Instagram from a distant cousin of yours. She is almost the same age as you, and you haven't talked to her for ages. Recognising her, you accept the request without much hesitation. A week later, while you were scrolling through the instagram feed you

received a message.

Tasks

Tasks

Tasks

  1. Check the messages and react/respond accordingly.

  1. Check the messages and react/respond accordingly.

  1. Check the messages and react/respond accordingly.

Part 2: WhatsApp

Part 2: WhatsApp

Part 2: WhatsApp

Story

Story

Story

Harry King is a guy you know from Uni. He does MSc. in Computer Science and you know he is a genius in programming and 3D modelling. One day you got a text from Harry, on WhatsApp.

Harry King is a guy you know from Uni. He does MSc. in Computer Science and you know he is a genius in programming and 3D modelling. One day you got a text from Harry, on WhatsApp.

Harry King is a guy you know from Uni. He does MSc. in Computer Science and you know he is a genius in programming and 3D modelling. One day you got a text from Harry, on WhatsApp.

Tasks

Tasks

Tasks

1. Check the messages and react/respond accordingly.

2. Forward the WhatsApp message.

1. Check the messages and react/respond accordingly.

2. Forward the WhatsApp message.

1. Check the messages and react/respond accordingly.

2. Forward the WhatsApp message.

Scenario 3: Pharming

Scenario 3: Pharming

Scenario 3: Pharming

Story

Story

Story

You have invited your parents for your graduation in York and your parents have agreed to fly in to attend the ceremony. To show your gratitude, you decided to book a hotel for them. However, hotels in York were expensive due to graduation season and you are on a tight budget. While searching for

decent affordable hotels online, you come across a banner ad on a popular hotel booking website that catches your attention.

You have invited your parents for your graduation in York and your parents have agreed to fly in to attend the ceremony. To show your gratitude, you decided to book a hotel for them. However, hotels in York were expensive due to graduation season and you are on a tight budget. While searching for

decent affordable hotels online, you come across a banner ad on a popular hotel booking website that catches your attention.

You have invited your parents for your graduation in York and your parents have agreed to fly in to attend the ceremony. To show your gratitude, you decided to book a hotel for them. However, hotels in York were expensive due to graduation season and you are on a tight budget. While searching for

decent affordable hotels online, you come across a banner ad on a popular hotel booking website that catches your attention.

Tasks

Tasks

Tasks

  1. Book the hotel for your parents.

  1. Book the hotel for your parents.

  1. Book the hotel for your parents.

Scenario 4: Spear Phishing

Scenario 4: Spear Phishing

Scenario 4: Spear Phishing

Story

Story

Story

You have been working part-time at Sainsbury’s Supermarket for almost 6 months now. Your manager James has been very supportive throughout your job ever since you joined Sainsbury’s. One day you receive an email from the James.

You have been working part-time at Sainsbury’s Supermarket for almost 6 months now. Your manager James has been very supportive throughout your job ever since you joined Sainsbury’s. One day you receive an email from the James.

You have been working part-time at Sainsbury’s Supermarket for almost 6 months now. Your manager James has been very supportive throughout your job ever since you joined Sainsbury’s. One day you receive an email from the James.

Tasks

Tasks

Tasks

  1. Check the email and react/respond accordingly.

  1. Check the email and react/respond accordingly.

  1. Check the email and react/respond accordingly.

Scenario 5: Baiting

Scenario 5: Baiting

Scenario 5: Baiting

Story

Story

Story

You are a Spotify user and you have been thinking of getting a premium membership.

You are a Spotify user and you have been thinking of getting a premium membership.

You are a Spotify user and you have been thinking of getting a premium membership.

Tasks

Tasks

Tasks

  1. Get the student discount for your account.

  1. Get the student discount for your account.

  1. Get the student discount for your account.

Key Findings

Key Findings

Key Findings

  • While students have a general awareness of security cues, they sometimes lack the knowledge to interpret them. They do not actively check for these indicators unless they are visiting unfamiliar sites or receiving email or SMS from unknown sources. It is more of a preventive measure in unfamiliar contexts.


  • Familiarity with the user interface and procedure reduces vigilance. Many students fell victim to attacks involving popular sites like Amazon or Spotify. The trust in the interface led students to overlook security cues, such as the full URL and legitimacy of email. This highlights the importance of user interface design in creating a false sense of security, showing that social engineers can exploit this trust and familiarity to increase the effectiveness of their attack.


  • Students exhibit selective cybersecurity awareness. While most UK university students were familiar with phishing attacks, they were less aware of other forms of social engineering, such as smishing and social media impersonation.


  • Previous experience with cyber attacks play a crucial role in shaping security behaviour. Participants who had encountered phishing or similar attacks in the past demonstrated more caution and had developed personal coping mechanisms, such as using separate accounts for potentially risky and suspicious activities.


  • Huge gap between perceived and actual cybersecurity knowledge. Many participants overestimated their cyber security knowledge, rating themselves highly in the questionnaire despite falling victim to several attacks during the simulation. This suggests that overconfidence may contribute to increased vulnerability, as students may not feel the need to be vigilant if they believe they are already well-protected.

  • While students have a general awareness of security cues, they sometimes lack the knowledge to interpret them. They do not actively check for these indicators unless they are visiting unfamiliar sites or receiving email or SMS from unknown sources. It is more of a preventive measure in unfamiliar contexts.


  • Familiarity with the user interface and procedure reduces vigilance. Many students fell victim to attacks involving popular sites like Amazon or Spotify. The trust in the interface led students to overlook security cues, such as the full URL and legitimacy of email. This highlights the importance of user interface design in creating a false sense of security, showing that social engineers can exploit this trust and familiarity to increase the effectiveness of their attack.


  • Students exhibit selective cybersecurity awareness. While most UK university students were familiar with phishing attacks, they were less aware of other forms of social engineering, such as smishing and social media impersonation.


  • Previous experience with cyber attacks play a crucial role in shaping security behaviour. Participants who had encountered phishing or similar attacks in the past demonstrated more caution and had developed personal coping mechanisms, such as using separate accounts for potentially risky and suspicious activities.


  • Huge gap between perceived and actual cybersecurity knowledge. Many participants overestimated their cyber security knowledge, rating themselves highly in the questionnaire despite falling victim to several attacks during the simulation. This suggests that overconfidence may contribute to increased vulnerability, as students may not feel the need to be vigilant if they believe they are already well-protected.

  • While students have a general awareness of security cues, they sometimes lack the knowledge to interpret them. They do not actively check for these indicators unless they are visiting unfamiliar sites or receiving email or SMS from unknown sources. It is more of a preventive measure in unfamiliar contexts.


  • Familiarity with the user interface and procedure reduces vigilance. Many students fell victim to attacks involving popular sites like Amazon or Spotify. The trust in the interface led students to overlook security cues, such as the full URL and legitimacy of email. This highlights the importance of user interface design in creating a false sense of security, showing that social engineers can exploit this trust and familiarity to increase the effectiveness of their attack.


  • Students exhibit selective cybersecurity awareness. While most UK university students were familiar with phishing attacks, they were less aware of other forms of social engineering, such as smishing and social media impersonation.


  • Previous experience with cyber attacks play a crucial role in shaping security behaviour. Participants who had encountered phishing or similar attacks in the past demonstrated more caution and had developed personal coping mechanisms, such as using separate accounts for potentially risky and suspicious activities.


  • Huge gap between perceived and actual cybersecurity knowledge. Many participants overestimated their cyber security knowledge, rating themselves highly in the questionnaire despite falling victim to several attacks during the simulation. This suggests that overconfidence may contribute to increased vulnerability, as students may not feel the need to be vigilant if they believe they are already well-protected.

Last Update — April, 2024