Academic Trust Betrayed: Unravelling the Factors Behind Lecturers’ Vulnerability to Social Engineering Attacks

Authors

  • Samuel Adu-Gyimah Department of Information Technology Education, Akenten Appiah-Menka University of Skills Training and Entrepreneurial Development, Ghana
  • Oliver Kufour Boansi Department of Information Technology Education, Akenten Appiah-Menka University of Skills Training and Entrepreneurial Development, Ghana
  • George Asante Department of Information Technology Education, Akenten Appiah-Menka University of Skills Training and Entrepreneurial Development, Ghana https://orcid.org/0000-0001-8061-5387
  • Prince Clement Addo Department of Information Technology Education, Akenten Appiah-Menka University of Skills Training and Entrepreneurial Development, Ghana https://orcid.org/0000-0002-8105-7222

DOI:

https://doi.org/10.54536/ajet.v4i3.4773

Keywords:

Cybersecurity, Phishing, Pretexting, Susceptibility, Social Engineering Attacks

Abstract

Social engineering (SE) attacks are the most treacherous cyber-attacks, which are not rooted in the manipulation of code or exploitation of system vulnerabilities but target the human factor, which has historically been the weakest link in the security chain. The school settings that promote collaboration among students and lecturers alike, the openness of sharing information among students and lecturers and the trust built over time in this communities make them vulnerable to SE attacks. This study then seeks to investigate how effective cybersecurity education and training intervention has in reducing the susceptibility of SE attacks among the staff of higher education. 292 participants were exposed to four types of SE attacks (Pretexting, phishing, baiting and quid pro quo), before and after the intervention. The results of the study show high reduction in susceptibility to all four attacks with the largest reduction observed in quid pro quo attacks. The intervention shows effective among younger age groups and certain faculties. Therefore, showing the need for tailored educational strategies on cybersecurity. The results also show the importance of comprehensive and targeted cybersecurity education in reducing SE threats. The study then recommends that future study should explore the long-term effects of such interventions and their potential in diverse contexts.

Downloads

Download data is not yet available.

Author Biographies

  • Samuel Adu-Gyimah, Department of Information Technology Education, Akenten Appiah-Menka University of Skills Training and Entrepreneurial Development, Ghana

    Department of Information Technology Education

  • Oliver Kufour Boansi, Department of Information Technology Education, Akenten Appiah-Menka University of Skills Training and Entrepreneurial Development, Ghana

    Department of Information Technology Education

  • Prince Clement Addo, Department of Information Technology Education, Akenten Appiah-Menka University of Skills Training and Entrepreneurial Development, Ghana

     Department of Information Technology Education

References

Must-Know Phishing Statistics for 2023 | IT Governance. (n.d.). Retrieved April 21, 2025, from https://www.itgovernance.co.uk/blog/51-must-know-phishing-statistics-for-2023

Adu-Gyimah, S., Asante, G., & Boansi, O. K. (2022). Social engineering attacks: a clearer perspective. International Journal of Computer Applications, 975, 8887.

Al-Hamar, Y., Kolivand, H., Tajdini, M., … T. S.-C. & E., & 2021, undefined. (n.d.). Enterprise Credential Spear-phishing attack detection. Elsevier. Retrieved April 21, 2025, from https://www.sciencedirect.com/science/article/pii/S0045790621003335

Alawida, M., Omolara, A., & … O. A.-J. of K. S. (2022). A deeper look into cybersecurity issues in the wake of Covid-19: A survey. Elsevier. https://www.sciencedirect.com/science/article/pii/S1319157822002762

Almutairi, B., Security, A. A.-J. of I., & 2022, undefined. (2022). The Role of Social Engineering in Cybersecurity and Its Impact. Scirp.Org, 13, 363–379. https://doi.org/10.4236/jis.2022.134020

Alseadoon, I., Othman, M. F. I., & Chan, T. (2015). What is the influence of users’ characteristics on their ability to detect phishing emails? Lecture Notes in Electrical Engineering, 315, 949–962. https://doi.org/10.1007/978-3-319-07674-4_89

Arachchilage, N., & Behavior, S. L.-C. (2014). Security awareness of computer users: A phishing threat avoidance perspective. ElsevierNAG Arachchilage, S LoveComputers in Human Behavior, 2014. Elsevier. https://www.sciencedirect.com/science/article/pii/S0747563214003331

Aslan, Ö., Aktuğ, S. S., Ozkan-Okay, M., Yilmaz, A. A., & Akin, E. (2023). A comprehensive review of cyber security vulnerabilities, threats, attacks, and solutions. Electronics, 12(6), 1333. https://doi.org/10.3390/electronics12061333

Birthriya, S. K., Ahlawat, P., & Jain, A. K. (2025). A comprehensive survey of social engineering attacks: taxonomy of attacks, prevention, and mitigation strategies. Journal of Applied Security Research, 20(2), 244-292. https://doi.org/10.1080/19361610.2024.2372986

Burita, L., Matoulek, P., Halouzka, K., & Kozak, P. (2021). Analysis of phishing emails. AIMS Electronics and Electrical Engineering, 5(1), 93–116. https://doi.org/10.3934/ELECTRENG.2021006

Burns, A., Johnson, M., Organizational, D. C.-J. of, & 2019, undefined. (2019). Spear phishing in a barrel: Insights from a targeted phishing campaign. Taylor & Francis, 29(1), 24–39. https://doi.org/10.1080/10919392.2019.1552745

Campbell, C. C. (2019). Solutions for counteracting human deception in social engineering attacks. Information Technology & People, 32(5), 1130-1152.

Cochran, K. A. (2024). Social Engineering: Manipulating the Human Element. Cybersecurity Essentials, 365–384. https://doi.org/10.1007/979-8-8688-0432-8_13

Creese, S., Dutton, W. H., Esteve-González, P., & Shillair, R. (2021). Cybersecurity capacity-building: cross-national benefits and international divides. Journal of Cyber Policy, 6(2), 214–235. https://doi.org/10.1080/23738871.2021.1979617

EDUCAUSE Center for Analysis and Research (2021). The Increasing Threat of Ransomware in Higher Education. Why IT Matters to Higher Education. https://er.educause.edu/articles/2021/6/the-increasing-threat-of-ransomware-in-higher-education

Femi-Oyewole, F., Osamor, V., & Okunbor, D. (2024, April). A systematic review of social engineering attacks & techniques: The past, present, and future. In 2024 International Conference on Science, Engineering and Business for Driving Sustainable Development Goals (SEB4SDG) (pp. 1-12). IEEE. https://doi.org/10.1109/SEB4SDG60871.2024.10629836

Gururaj, H., Janhavi, V., & Ambika, V. (2024). Social Engineering in Cybersecurity: Threats and Defenses.

Hadan, H., Wang, D. M., Nacke, L. E., & Zhang-Kennedy, L. (2024, May). Privacy in immersive extended reality: Exploring user perceptions, concerns, and coping strategies. In Proceedings of the 2024 CHI Conference on Human Factors in Computing Systems (pp. 1-24).https://doi.org/10.1145/3613904.3642104

Hadlington, L. (2017). Human factors in cybersecurity; examining the link between Internet addiction, impulsivity, attitudes towards cybersecurity, and risky cybersecurity behaviours. Heliyon, 3(7), https://doi.org/10.1016/j.heliyon.2017.e00346

Hussain, H., & Abbas, R. (2025). The role of social engineering and human factors in cybersecurity defense. https://www.theseus.fi/handle/10024/878762

Jeong, J., Mihelcic, J., Oliver, G., & Rudolph, C. (2019, December). Towards an improved understanding of human factors in cybersecurity. In 2019 IEEE 5th international conference on collaboration and internet computing (CIC) (pp. 338-345). IEEE. https://ieeexplore.ieee.org/abstract/document/8998491/

Jones, K. S., Armstrong, M. E., Tornblad, M. K., & Siami Namin, A. (2020). How social engineers use persuasion principles during vishing attacks. Information and Computer Security, 29(2), 314–331. https://doi.org/10.1108/ICS-07-2020-0113/FULL/HTML

Karthikeyan, S. (n.d.). Cybersecurity in Education: Safeguarding Digital Learning Environments. Researchgate.Net. Retrieved April 22, 2025

Kendall, C. (2022). Kendall, C. L. (2022). The Openness of Higher Education and Implications on Cybersecurity (Master’s thesis, Utica University).

Kirda, E., Computer, C. K.-29th A. I., & 2005, undefined. (n.d.). Protecting users against phishing attacks with antiphish. Ieeexplore.Ieee.Org. Retrieved April 21, 2025

Kruger, H. A., & Kearney, W. D. (2006). A prototype for assessing information security awareness. Computers & security, 25(4), 289-296.

Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L. F., Hong, J., & Nunge, E. (2007, April). Protecting people from phishing: the design and evaluation of an embedded training email system. In Proceedings of the SIGCHI conference on Human factors in computing systems (pp. 905-914).

Lallie, H. S., Thompson, A., Titis, E., & Stephens, P. (2025). Analysing cyber attacks and cyber security vulnerabilities in the university sector. Computers, 14(2), 49.

Langlois, P. (2020). 2020 data breach investigations report. https://www.cisecurity.org/-/jssmedia/Project/cisecurity/cisecurity/data/media/files/uploads/2020/07/The-2020-Verizon-Data-Breach-Investigations-Report-DBIR.pdf

Marble, J. L., Lawless, W. F., Mittu, R., Coyne, J., Abramson, M., & Sibley, C. (2015). The human factor in cybersecurity: Robust & intelligent defense. Advances in Information Security, 56, 173–206. https://doi.org/10.1007/978-3-319-14039-1_9

Mouton, F., Leenen, L., & Security, H. V.-C. &. (2016). Social engineering attack examples, templates and scenarios. Elsevier. https://www.sciencedirect.com/science/article/pii/S0167404816300268

Mouton, F., Leenen, L., & Venter, H. S. (2016). Social engineering attack examples, templates and scenarios. Computers & Security, 59, 186–209. https://doi.org/10.1016/J.COSE.2016.03.004

Mudi, S. (2024). Social Engineering Techniques and Their Impact on National Values in Higher Education.

Pfleeger, S. L., & Caputo, D. D. (2012). Leveraging behavioral science to mitigate cyber security risk. Computers & security, 31(4), 597-611.

Puhakainen, P., & Siponen, M. (2010). Improving employees’ compliance through information systems security training: An action research study. MIS Quarterly: Management Information Systems, 34(4), 757–778. https://doi.org/10.2307/25750704

Riahi, E., & Islam, M. S. (2025). Employees’ information security awareness (ISA) in public organisations: insights from cross-cultural studies in Sweden, France, and Tunisia. Behaviour & Information Technology, 44(1), 79-101. https://doi.org/10.1080/0144929X.2024.2311734

Schmitt, M., & Flechais, I. (2024). Digital deception: generative artificial intelligence in social engineering and phishing. Artificial Intelligence Review, 57(12), 324. https://doi.org/10.1007/S10462-024-10973-2

Shillair, R., Author, F., Esteve-González, P., Dutton, W. H., Creese, S., Nagyfejeo, E., & Von Solms, B. (n.d.). Cybersecurity education, awareness raising, and training initiatives: National level evidence-based results, challenges, and promise. Elsevier. Retrieved April 21, 2025, from https://www.sciencedirect.com/science/article/pii/S0167404822001511

Singh, T. (2025). Social Engineering: Exploiting Human Psychology. In Cybersecurity, Psychology and People Hacking (pp. 95-100). Cham: Springer Nature Switzerland. https://doi.org/10.1007/978-3-031-85994-6_7

Ustundag Soykan, E., & Bagriyanik, M. (2020). The effect of SMiShing attack on security of demand response programs. Energies, 13(17), 4542.

Vishwanath, A. (2015). Examining the distinct antecedents of e-mail habits and its influence on the outcomes of a phishing attack. Journal of Computer-Mediated Communication, 20(5), 570-584. https://doi.org/10.1111/jcc4.12126

Weimann, G. (2015). Terrorism in cyberspace: The next generation.

Downloads

Published

2025-08-28

How to Cite

Adu-Gyimah, S., Kufour Boansi , O., Asante, G., & Addo, P. C. (2025). Academic Trust Betrayed: Unravelling the Factors Behind Lecturers’ Vulnerability to Social Engineering Attacks. American Journal of Education and Technology, 4(3), 53-61. https://doi.org/10.54536/ajet.v4i3.4773

Similar Articles

11-20 of 43

You may also start an advanced similarity search for this article.