IDEAS home Printed from https://ideas.repec.org/a/aac/ijirss/v8y2025i3p115-129id6443.html
   My bibliography  Save this article

The rising tide of social engineering: Trends, impacts, and multi-layered mitigation strategies

Author

Listed:
  • Rami Almatarneh
  • Mohammad Aljaidi
  • Ayoub Alsarhan
  • Sami Aziz Alshammari
  • Nayef H. Alshammari

Abstract

In this paper, an analytical study explores the upcoming threat of social engineering attacks that will be presented. A comprehensive comparison among various types of social engineering, including phishing, spear phishing, vishing, pretexting, baiting, and impersonation, will be discussed in this study, highlighting their psychological manipulation tactics, increasing sophistication, and distinct operational dynamics. Historical data from 2016 to 2024 were analyzed to predict future trends and to reveal a significant rise in both the frequency and financial losses associated with these attacks. The study emphasizes the importance of human-centered mitigation strategies, particularly employee training programs combined with clear-cut security protocols, which could substantially reduce the success of attacks. In addition, in this paper, technical defenses such as domain monitoring and advanced fraud detection will be examined. The results also indicated that a multi-layered defense strategy that incorporated both technological solutions and human awareness could reduce social engineering incidents by up to 75%. Key insights from the study into the evolving landscape of cyber threats emphasized the need for continuous investment in comprehensive security measures.

Suggested Citation

  • Rami Almatarneh & Mohammad Aljaidi & Ayoub Alsarhan & Sami Aziz Alshammari & Nayef H. Alshammari, 2025. "The rising tide of social engineering: Trends, impacts, and multi-layered mitigation strategies," International Journal of Innovative Research and Scientific Studies, Innovative Research Publishing, vol. 8(3), pages 115-129.
  • Handle: RePEc:aac:ijirss:v:8:y:2025:i:3:p:115-129:id:6443
    as

    Download full text from publisher

    File URL: https://ijirss.com/index.php/ijirss/article/view/6443/1235
    Download Restriction: no
    ---><---

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:aac:ijirss:v:8:y:2025:i:3:p:115-129:id:6443. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Natalie Jean (email available below). General contact details of provider: https://ijirss.com/index.php/ijirss/ .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.