ANALYZING THE ROLE OF LANGUAGE IN PHISHING ATTACKS; HOW LANGUAGE TECHNIQUES MANIPULATE VICTIMS.
Abstract
Phishing attacks have become one of the most prevalent cyber threats, exploiting human psychology through deceptive language techniques. While previous research has focused on the technical and psychological aspects of phishing, this study examines the role of linguistic manipulation in deceiving victims. By analyzing various phishing strategies, including urgency and fear appeals, authority-based persuasion, emotional manipulation, and lexical choices, this paper highlights how cybercriminals exploit language to enhance credibility and influence decision-making. Understanding these linguistic tactics is essential for developing effective cybersecurity measures, improving user awareness, and mitigating phishing risks.
References
Ackerley, M., Morrison, B., Ingrey, K., Wiggins, M., Bayl-Smith, P., & Morrison, N. (2022). Errors, irregularities, and misdirection: cue utilisation and cognitive reflection in the diagnosis of phishing emails. AJIS. Australasian Journal of Information Systems/AJIS. Australian Journal of Information Systems/Australian Journal of Information Systems, 26. https://doi.org/10.3127/ajis.v26i0.3615
Cardona, J. (2024). Grammatical deviations in Philippine phishing emails. International Journal of English Language Studies, 6(2), 124–129. https://doi.org/10.32996/ijels.2024.6.2.18
Carroll, F., Adejobi, J. A., & Montasari, R. (2022). How good are we at detecting a phishing attack? Investigating the evolving phishing attack email and why it continues to successfully deceive society. SN Computer Science, 3(2). https://doi.org/10.1007/s42979-022-01069-1
Goel, S., Williams, K., & Dincelli, E. (2017). Got phished? Internet security and human vulnerability. Journal of the Association for Information Systems, 18(1), 22–44. https://doi.org/10.17705/1jais.00447
House, Deanna and Raja, M. K., "Phishing: message appraisal and the exploration of fear and self-confidence" (2019). Information Systems and Quantitative Analysis Faculty Publications. 104.
https://digitalcommons.unomaha.edu/isqafacpub/104
Jones, C. (2022, January 18). 50 phishing stats you should know in 2022. 50 Phishing Stats You Should Know in 2022. Retrieved January 27, 2022, from https://expertinsights.com/insights/50-phishing-stats-you-should-know/
Loewenstein, G. F., Weber, E. U., Hsee, C. K., & Welch, N. (2001). Risk as feelings. Psychological Bulletin, 127(2), 267–286. https://doi.org/10.1037/0033-2909.127.2.267
Montañez, R., Golob, E., & Xu, S. (2020). Human cognition through the lens of social engineering cyberattacks. Frontiers in Psychology, 11, 1755. https://doi.org/10.3389/fpsyg.2020.01755
Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L. F., & Downs, J. (2010, April). Who falls for phish? A demographic analysis of phishing susceptibility and effectiveness of interventions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (pp. 373-382).
Steinberg, J. (n.d.). Why scammers make spelling and grammar mistakes. Joseph Steinberg. Retrieved February 28, 2025, from https://josephsteinberg.com/why-scammers-make-spelling-and-grammar-mistakes/
Verizon. (2021). Data brand investigations report [Online]. Retrieved February 9, 2022, from https://www.verizon.com/business/resources/reports/2021-data-breach-investigations-report.pdf