The extent of awareness of social engineering methods and their impact on electronic shopping: a field study on a sample of members of Saudi society

مدى الوعي بأساليب الهندسة الاجتماعية وانعكاسها على التسوق الإلكتروني: دراسة ميدانية على عينة من أفراد المجتمع السعودي

Authors

  • Entesar Saleh Al-Halabi Associate Professor of Housing and Home Management, College of Applied Sciences, Taif University, Saudi Arabia , أستاذ مشارك السكن وإدارة المنزل، الكلية التطبيقية، جامعة الطائف، المملكة العربية السعودية , Professeur associé en gestion du logement et de l'habitat, Faculté des sciences appliquées, Université de Taïf, Arabie saoudite Author
  • Eman Abdulaziz Tashkandi Applied College, Taif University, Saudi Arabia , Collège appliqué, Université de Taïf, Arabie saoudite , الكلية التطبيقية، جامعة الطائف، المملكة العربية السعودية Author

DOI:

https://doi.org/10.61856/mr6eq096

Keywords:

Social engineering techniques, electronic shopping.

Abstract

 Amid the rapid digital transformation taking place in Saudi society and the growing shift toward e-commerce, cyber risks facing consumers have become more prevalent. One of the most prominent of these risks is what is known as social engineering, which relies on the psychological and behavioral manipulation of individuals to easily obtain their personal or financial information, without the need for direct technical hacking. The security and confidentiality of information exchanged between the seller and the buyer are among the most critical and essential issues for the success of e-commerce. The research problem is to understand the impact of Saudi society’s awareness of social engineering techniques used through digital technologies and how individuals deal with them during the online shopping process. This study aims to explore the relationship between social engineering and various aspects of online shopping, and its impact on members of Saudi society. The main question is: What is the level of awareness among the sampled individuals from Saudi society regarding social engineering? Is there a correlational relationship between social engineering and the dimensions of electronic shopping among individuals in Saudi society (research sample)? This study adopts the descriptive, correlational, and comparative approach. It aims to accurately describe the level of the awareness of the research sample, then to describe the correlation between social engineering techniques and electronic shopping. The sample of the study (200) was individuals from Saudi society across various regions of Saudi Arabia. Key findings revealed a significant positive correlation at the (0.01) level between the participants’ scores on the social engineering variable and the electronic shopping variable.

References

Arabic References

Al-Bataineh, Mohammed, & Al-Afeef, Mohammed. (2018). Al-Tasawuq ‘Abr Al-Internet: Wijhat Nazar Al-Nazariya Al-Muwahhada Li-Qabool Wa Istikhdam Al-Taqniya (UTAUT): Dirasah Maydaniya Ala Al-Mustahlikin Fi Muhafazat Irbid, Jarash, Ajloun, Wa Al-Mafraq. Majallat Jami’at Al-Najah Lil-Abhath, 32(12). https://journals.najah.edu/media/journals/full_texts/5_8v7HIAl.pdf

Al-Juraifani, Ghaida. (2004). Al-Tasweeq Al-Electroni Fi Al-Mamlaka Al-Arabiya Al-Saudiya. Paper presented at the Second Administrative Forum, Saudi Management Association, Riyadh.

Al-Jallad, Samer, & Al-Shar’ah, Mohammed. (2022). Athar Al-Qima Al-Mudraka Wa Al-Thiqa Ala Niyat Al-Shira’ Al-Electroni Lada Al-Mustahlik Al-Filastini: Dirasah Maydaniya Ala Jeel Al-Alfiya Fi Al-Diffa Al-Gharbiya. Majallat Al-Jami’a Al-Islamiya Lil-Dirasat Al-Iqtisadiya Wa Al-Idariya, 30(1), 25–45.

Al-Ziyadat, Akef Youssef. (2019). Al-Awamil Al-Mu’athira Ala Al-Tasawuq Al-Electroni Fi Al-Urdun: Dirasah Tatbeeqiya Ala Mawaqi’ Al-Tasawuq Al-Electroni. Al-Majalla Al-Arabiya Lil-Nashr Al-Ilmi, (11).

Al-Sulami, Mohammed, et al. (2021). Qiyas Al-Wa’i Bil-Handasa Al-Ijtima’iya Fi Al-Qita’ Al-Ta’leemi Fi Al-Mamlaka Al-Arabiya Al-Saudiya. Information, 12(5), 208. https://doi.org/10.3390/info12050208

Al-Shawabkeh, Mohammed Amin. (2004). Jara’im Al-Hasoob Wa Al-Internet (Al-Jareema Al-Ma’loumatiya). Dar Al-Thaqafa Lil-Nashr Wa Al-Tawzee’.

Al-Omari, Saleh, & Al-Omari, Abdulrahman. (2024). Al-Athar Al-Ijtima’iya Lil-Handasa Al-Ijtima’iya Fi Al-Fadaa Al-Raqmi Ala Al-Mujtama’ Al-Saudi: Dirasah Wasfiya Ala Talabat Jami’at Malik Abdulaziz. Al-Majalla Al-Arabiya Li-Buhooth Al-Uloom Al-Ijtima’iya, 12(1), 145–168. https://ijdar.journals.ekb.eg/article_336343.html

Al-Feel, Khaled Tawfiq, & Abu Salem, Ahmed Ismail. (2018). Dirasat Ta’theer Istikhdam Al-Shabab Lil-Internet Wa Mawaqi’ Al-Tawasul Al-Ijtima’i. Majallat Al-Minufiya Lil-Uloom Al-Zira’iya Wa Al-Iqtisadiya Wa Al-Ijtima’iya, 3.

Matali, Leila. (2016). Ittijahat Al-Mustahlikin Al-Jaza’iriyeen Nahwa Al-Tasawuq ‘Abr Al-Internet. Majallat Al-Buhooth Al-Iqtisadiya Wa Al-Maliya, (6). Jami’at Abu Al-Bouqi.

Al-Nounou, Imad. (2007). Al-Tasawuq ‘Abr Al-Internet Aw Al-Rafd: Dirasah Maydaniya. Unpublished doctoral dissertation, American University of Science, Gaza.

English References

Chaffey, D. (2019). Digital Business and E-Commerce Management (7th ed.). Pearson.

Chaffey, D., Ellis-Chadwick, F., Johnston, K., & Mayer, R. (2006). Internet Marketing: Strategy, Implementation and Practice (3rd ed.). Pearson Education.

Chitrey, A., Singh, D., & Singh, V. (2012). A comprehensive study of social engineering based attacks in India to develop a conceptual model. International Journal of Information and Network Security, 1(2), 45–53.

CNNIC. (2022). The 49th Statistical Report on China’s Internet Development. Retrieved from https://www.cnnic.net.cn/n4/2022/0401/c88-1131.html

Cole, E. (2002). Hackers Beware: Defending Your Network from the Willy Hacker. New Riders Publishing.

Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340. https://doi.org/10.2307/249008

Gefen, D., Karahanna, E., & Straub, D. W. (2003). Trust and TAM in online shopping: An integrated model. MIS Quarterly, 27(1), 51–90. https://doi.org/10.2307/30036519

Hadnagy, C. (2010). Social Engineering: The Art of Human Hacking (2nd ed.). Wiley.

Kotler, P., & Keller, K. L. (2016). Marketing Management (15th ed.). Pearson.

Mann, I. (2008). Hacking the Human: Social Engineering Techniques and Security Countermeasures. Gower Publishing.

Mitnick, K. D., & Simon, W. L. (2002). The Art of Deception: Controlling the Human Element of Security. Wiley.

Mitnick, K. D., & Simon, W. L. (2003). The Art of Deception: Controlling the Human Element of Security. John Wiley & Sons.

Mouton, F., Leenen, L., & Venter, H. S. (2016). Social engineering attack examples, templates and scenarios. Computers & Security, 59, 186–209. https://doi.org/10.1016/j.cose.2016.03.004

Parker, C. J., & Kuo, H.-Y. (2022). What drives generation-Y women to buy fashion items online? Journal of Marketing Theory & Practice, 30(3), 279–294. https://doi.org/10.1080/10696679.2021.1934877

Zeithaml, V. A. (1988). Consumer perceptions of price, quality, and value: A means–end model and synthesis of evidence. Journal of Marketing, 52(3), 2–22. https://doi.org/10.1177/002224298805200302

Downloads

Published

08/27/2025

How to Cite

Entesar Saleh Al-Halabi, & Eman Abdulaziz Tashkandi. (2025). The extent of awareness of social engineering methods and their impact on electronic shopping: a field study on a sample of members of Saudi society: مدى الوعي بأساليب الهندسة الاجتماعية وانعكاسها على التسوق الإلكتروني: دراسة ميدانية على عينة من أفراد المجتمع السعودي. Gateway Journal for Modern Studies and Research (GJMSR), 2(3). https://doi.org/10.61856/mr6eq096

Similar Articles

You may also start an advanced similarity search for this article.