Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

CyberPsycho Attacks: Techniques, Causes, Effects and Recommendations to End-Users

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Prashant Gupta, Manisha J. Nene

Prashant Gupta and Manisha J Nene. CyberPsycho Attacks: Techniques, Causes, Effects and Recommendations to End-Users. International Journal of Computer Applications 156(11):11-16, December 2016. BibTeX

	author = {Prashant Gupta and Manisha J. Nene},
	title = {CyberPsycho Attacks: Techniques, Causes, Effects and Recommendations to End-Users},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2016},
	volume = {156},
	number = {11},
	month = {Dec},
	year = {2016},
	issn = {0975-8887},
	pages = {11-16},
	numpages = {6},
	url = {},
	doi = {10.5120/ijca2016912556},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


From recent years, online social network services are mostly used for marketing, social, political, religious campaign more than just connecting to the friends. Now-a-days, government of most of the countries actively participate on network enabled platforms. Many researchers worldwide are working on social network analysis to extract information from social network services to increase productivity, awareness, learning as well as finding malicious links, phishing, spams & trending viral contents. The study in this paper focuses on causes and effects of persuasive messages based on current trending news and events which effectively may influence an individual’s behavior. We name this effect as Cyberspace plus Psychology effect leading to CyberPsycho attacks. In CyberPsycho attacks an attacker uses cyber space & social network to affect or change attitude or behavior, and achieve certain goals to attain political, religious, economical, social gains. It motivates social media users towards a certain objective by spreading the persuasive messages in the form of texts, images or videos. The study is unique, valuable and compels the experts in academia, researchers, technologists and end-users to understand & acknowledge the serious impact of psychological, social and cultural aspects of internet addiction. In this paper, we propose three fundamental models to address and analyze the above concerns. These three proposed models to identify occurrence of cyberpsycho attacks is the major contribution of this paper.


  1. Vince Farhat, Bridget McCarthy and Richard Raysman, Holland & Knight LLP, The Practical Law Company white paper. Cyber Attacks: Prevention and Proactive Responses.
  3. Wani, Gayatri, and Nilesh Alone. Survey on Impact of Social Media on Election System.
  4. Erika Lisa Panuccio. ISIS Network Warriors. Making Jihad on the web
  5. accessed on 18 October 2016
  6. Yeo, A. C., Rahim, M. M., & Ren, Y. Y. (2008). Use of Persuasive Technology to Change End-Users’ IT Security Aware Behaviour: A Pilot Study. World Academy of Science, Engineering and Technology, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering, 2(10), 1086-1092.
  7. Wiederhold, B. K. (2014). The role of psychology in enhancing cyber-security. Cyberpsychology, Behavior, and Social Networking, 17(3), 131-132.
  8. Hong, J., Das, S., Kim, T. H. J., & Dabbish, L. Social Cybersecurity: Applying Social Psychology to Cybersecurity.
  9. Gharbaghi, A., Aris, B., Ahmad, M. H., & Rosli, M. S. (2013). Technological Persuasive Pedagogy: A New Way to Persuade Students in the Computer-based Mathematics Learning. Journal of Education and Practice, 4(14), 43-49.
  10. Zapico, J. L., Turpeinen, M., & Brandt, N. (2009, April). Climate persuasive services: changing behavior towards low-carbon lifestyles. In Proceedings of the 4th International Conference on Persuasive Technology (p. 14). ACM.
  11. Hyman, J. A. (2003). Computer vision based people tracking for motivating behavior in public spaces (Doctoral dissertation, Massachusetts Institute of Technology).
  12. Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., & Zhao, B. Y. (2010, November). Detecting and characterizing social spam campaigns. In Proc of the 10th ACM SIGCOMM conf on Internet measurement (pp. 35-47). ACM.
  13. Shrivastava, N., Majumder, A., & Rastogi, R. (2008, April). Mining (social) network graphs to detect random link attacks. In 2008 IEEE 24th International Conference on Data Engineering (pp. 486-495). IEEE.
  14. Fogg B.J., Persuasive Technology: using computers to change what we think and do, Morgan Kaufmann Publishers, CA, 2003
  15. B. J. (1997, March). Captology: the study of computers as persuasive technologies. In CHI'97 Extended Abstracts on Human Factors in Computing Systems (pp. 129-129). ACM.


Cyberpsycho Attack, Persuasive Technology, Social Network Analysis, Social Media, Semantic Analysis, Online Campaigns, Text Analysis, Cyber Attacks, Cyberpsychology.