@inproceedings{8ed1f44950f04a6b8d3f0f17779a9a56,
title = "Social media information security threats: Anthropomorphic emoji analysis on social engineering",
abstract = "The evolution of anthropomorphism and affective design principles in Social Medial has allowed friends and colleagues to create content across organizational settings that now provision for emotions through the popular use of emoji. Of concern to information systems security practitioners is that the use emoji can be effective in social engineering through facilitating escalated malevolent attacks to unsuspecting victims. The article applies theories from social psychology, criminology and information systems while using the Elaboration Likelihood Model (ELM) to determine the possibility of using emoji as tools for effective social engineering. A university setting was used and student–actors enlisted to execute social engineering scenarios under carefully controlled environments. Screen shots of social engineering using emoji were taken by student-actors and sent to researcher for analysis. Qualitative data analysis involved prepossessing emoji data through tokenization and normalization. Results reveal two important findings. Firstly, that the effective use of emoji is more likely to persuade victims because of unsuspecting emotional appeal. Secondly, more time was taken to persuade a victim when only textual words instead of emoji were used in the interaction process. The results of findings are discussed in the main article.",
keywords = "Emoji, Information security, Social engineering, Social media",
author = "Kennedy Njenga",
note = "Publisher Copyright: {\textcopyright} 2018, Springer Nature Singapore Pte Ltd.; 7th International Conference on IT Convergence and Security, ICITCS 2017 ; Conference date: 25-09-2017 Through 28-09-2017",
year = "2017",
doi = "10.1007/978-981-10-6454-8_24",
language = "English",
isbn = "9789811064531",
series = "Lecture Notes in Electrical Engineering",
publisher = "Springer Verlag",
pages = "185--192",
editor = "Kim, {Kuinam J.} and Nakhoon Baek and Hyuncheol Kim",
booktitle = "IT Convergence and Security 2017",
address = "Germany",
}