CFP last date
22 July 2024
Reseach Article

CyberPsycho Attacks: Techniques, Causes, Effects and Recommendations to End-Users

by Prashant Gupta, Manisha J. Nene
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 156 - Number 11
Year of Publication: 2016
Authors: Prashant Gupta, Manisha J. Nene

Prashant Gupta, Manisha J. Nene . CyberPsycho Attacks: Techniques, Causes, Effects and Recommendations to End-Users. International Journal of Computer Applications. 156, 11 ( Dec 2016), 11-16. DOI=10.5120/ijca2016912556

@article{ 10.5120/ijca2016912556,
author = { Prashant Gupta, Manisha J. Nene },
title = { CyberPsycho Attacks: Techniques, Causes, Effects and Recommendations to End-Users },
journal = { International Journal of Computer Applications },
issue_date = { Dec 2016 },
volume = { 156 },
number = { 11 },
month = { Dec },
year = { 2016 },
issn = { 0975-8887 },
pages = { 11-16 },
numpages = {9},
url = { },
doi = { 10.5120/ijca2016912556 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
%0 Journal Article
%1 2024-02-07T00:02:19.779490+05:30
%A Prashant Gupta
%A Manisha J. Nene
%T CyberPsycho Attacks: Techniques, Causes, Effects and Recommendations to End-Users
%J International Journal of Computer Applications
%@ 0975-8887
%V 156
%N 11
%P 11-16
%D 2016
%I Foundation of Computer Science (FCS), NY, USA

From recent years, online social network services are mostly used for marketing, social, political, religious campaign more than just connecting to the friends. Now-a-days, government of most of the countries actively participate on network enabled platforms. Many researchers worldwide are working on social network analysis to extract information from social network services to increase productivity, awareness, learning as well as finding malicious links, phishing, spams & trending viral contents. The study in this paper focuses on causes and effects of persuasive messages based on current trending news and events which effectively may influence an individual’s behavior. We name this effect as Cyberspace plus Psychology effect leading to CyberPsycho attacks. In CyberPsycho attacks an attacker uses cyber space & social network to affect or change attitude or behavior, and achieve certain goals to attain political, religious, economical, social gains. It motivates social media users towards a certain objective by spreading the persuasive messages in the form of texts, images or videos. The study is unique, valuable and compels the experts in academia, researchers, technologists and end-users to understand & acknowledge the serious impact of psychological, social and cultural aspects of internet addiction. In this paper, we propose three fundamental models to address and analyze the above concerns. These three proposed models to identify occurrence of cyberpsycho attacks is the major contribution of this paper.

  1. Vince Farhat, Bridget McCarthy and Richard Raysman, Holland & Knight LLP, The Practical Law Company white paper. Cyber Attacks: Prevention and Proactive Responses.
  3. Wani, Gayatri, and Nilesh Alone. Survey on Impact of Social Media on Election System.
  4. Erika Lisa Panuccio. ISIS Network Warriors. Making Jihad on the web
  5. accessed on 18 October 2016
  6. Yeo, A. C., Rahim, M. M., & Ren, Y. Y. (2008). Use of Persuasive Technology to Change End-Users’ IT Security Aware Behaviour: A Pilot Study. World Academy of Science, Engineering and Technology, International Journal of Social, Behavioral, Educational, Economic, Business and Industrial Engineering, 2(10), 1086-1092.
  7. Wiederhold, B. K. (2014). The role of psychology in enhancing cyber-security. Cyberpsychology, Behavior, and Social Networking, 17(3), 131-132.
  8. Hong, J., Das, S., Kim, T. H. J., & Dabbish, L. Social Cybersecurity: Applying Social Psychology to Cybersecurity.
  9. Gharbaghi, A., Aris, B., Ahmad, M. H., & Rosli, M. S. (2013). Technological Persuasive Pedagogy: A New Way to Persuade Students in the Computer-based Mathematics Learning. Journal of Education and Practice, 4(14), 43-49.
  10. Zapico, J. L., Turpeinen, M., & Brandt, N. (2009, April). Climate persuasive services: changing behavior towards low-carbon lifestyles. In Proceedings of the 4th International Conference on Persuasive Technology (p. 14). ACM.
  11. Hyman, J. A. (2003). Computer vision based people tracking for motivating behavior in public spaces (Doctoral dissertation, Massachusetts Institute of Technology).
  12. Gao, H., Hu, J., Wilson, C., Li, Z., Chen, Y., & Zhao, B. Y. (2010, November). Detecting and characterizing social spam campaigns. In Proc of the 10th ACM SIGCOMM conf on Internet measurement (pp. 35-47). ACM.
  13. Shrivastava, N., Majumder, A., & Rastogi, R. (2008, April). Mining (social) network graphs to detect random link attacks. In 2008 IEEE 24th International Conference on Data Engineering (pp. 486-495). IEEE.
  14. Fogg B.J., Persuasive Technology: using computers to change what we think and do, Morgan Kaufmann Publishers, CA, 2003
  15. B. J. (1997, March). Captology: the study of computers as persuasive technologies. In CHI'97 Extended Abstracts on Human Factors in Computing Systems (pp. 129-129). ACM.
Index Terms

Computer Science
Information Sciences


Cyberpsycho Attack Persuasive Technology Social Network Analysis Social Media Semantic Analysis Online Campaigns Text Analysis Cyber Attacks Cyberpsychology.