Jump to ContentJump to Main Navigation
Six Degrees of Social InfluenceScience, Application, and the Psychology of Robert Cialdini$
Users without a subscription are not able to see the full content.

Douglas T. Kenrick, Noah J. Goldstein, and Sanford L. Braver

Print publication date: 2012

Print ISBN-13: 9780199743056

Published to Oxford Scholarship Online: March 2015

DOI: 10.1093/acprof:osobl/9780199743056.001.0001

Show Summary Details
Page of

PRINTED FROM OXFORD SCHOLARSHIP ONLINE (www.oxfordscholarship.com). (c) Copyright Oxford University Press, 2019. All Rights Reserved. Under the terms of the licence agreement, an individual user may print out a PDF of a single chapter of a monograph in OSO for personal use (for details see www.oxfordscholarship.com/page/privacy-policy).date: 18 June 2019

The Path of Least Resistance

The Path of Least Resistance

Chapter:
(p.27) Chapter 3 The Path of Least Resistance
Source:
Six Degrees of Social Influence
Author(s):

Brad J. Sagarin

Kevin D. Mitnick

Publisher:
Oxford University Press
DOI:10.1093/acprof:osobl/9780199743056.003.0003

This chapter examines how “social engineering” can be used in computer hacking to gain access to highly secret computer codes and other confidential information, and how to defend yourself against such influence-based attacks. Drawing on Robert Cialdini's principles of influence, the chapter explores the concept of resistance to unwanted persuasion by describing Motorola's experience with a social engineering attack from the perspective of the perpetrator. It also considers the points of vulnerability exploited by the attack and the methods by which individuals and organizations can protect themselves against such attacks and thus avoid the path of least resistance.

Keywords:   resistance, persuasion, social engineering, computer hacking, computer codes, confidential information, Robert Cialdini, influence, Motorola, least resistance

Oxford Scholarship Online requires a subscription or purchase to access the full text of books within the service. Public users can however freely search the site and view the abstracts and keywords for each book and chapter.

Please, subscribe or login to access full text content.

If you think you should have access to this title, please contact your librarian.

To troubleshoot, please check our FAQs , and if you can't find the answer there, please contact us .