Have a personal or library account? Click to login
Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering Cover

Illusion of Presence: Physical Deception and Direct Manipulation in Social Engineering

Open Access
|Dec 2025

Figures & Tables

Figure 1.

Classification trend and frequency of cluster themes
Classification trend and frequency of cluster themes

Figure 2.

Taxonomy of SEA based on Attacker’s Level of Proximity and Interaction
Taxonomy of SEA based on Attacker’s Level of Proximity and Interaction

Figure 3.

Taxonomy of Physical & Direct Interaction Attacks
Taxonomy of Physical & Direct Interaction Attacks

Figure 4.

Generic Methodology of Human-based Physical Social Engineering Attacks
Generic Methodology of Human-based Physical Social Engineering Attacks

Summary of issues in 31 examined classification schemes and 18 taxonomies

RefYearClassification FactorAttack(s) DiscussedObservation / Non-SEAAttacksNon-SEA Err (%)
[40]2013Computer & HumanTrojan e-mail and phishing messages, advance-fee fraud, impersonation, persuasion, bribery, shoulder surfing, and dumpster diving.Persuasion (not attack), bribery (not attack). Suggested but didn’t classify into proposed classification scheme837.50
[42]2015Operator, Type, ChannelPhishing, Shoulder surfing, Dumpster diving, RSE, Waterholing, APT, Baiting, ASE, FakeProfìle, Sybil, Spearphishing,Advanced persistent threat, Sybil attacks. But didn’t classify attack into suggested categories.1020.00
[31]2016Human & TechnicalPhishing, Pretexting, Baiting, Quid pro quo, Tailgating, dumpster diving,Suggested but didn’t classify into proposed classification scheme60.00
[21]2017SE & MalwareWebsite phishing, Email phishing, Spear phishing, Key loggers (Hardware & Software), screen loggers, Session hijacking, DNS phishing, Host file poisoning, System reconfiguration attacks, Pharming, Proxy attack, Content injection, Phishing through search engines, SpandexingKey loggers (Hardware & Software), screen loggers, Session hijacking, DNS poisoning, Host file poisoning, System reconfiguration attacks, Proxy attack, Content injection, Spandexing1675.00
[35]2018Mediumdrive-by-download, MITM, XSS, tabnapping, spear phishing, whaling, SEO Phishing, session fixation, malvertising, social engineering, JavaScript obfuscation, browser vulnerabilities, mobile phone, cloud computing and WiPhishing or Evil Twins, SQL injection, typo-squatting, and sound-squatting, ClickJacking, CAPTCHA attack, Trojan, Bot Attack (BotNet), APT, Tabnapping,MITM, XSS, session fixation, malvertising, social engineering, browser vulnerabilities (generic term), mobile phone (generic term), cloud computing (generic term), SQL injection, CAPTCHA attack, Trojan, Bot Attack (BotNet), APT, Tabnapping,2445.83
[61]2018Computer & Humantemptation to have something rare, Show the similarities with the target, Pay back the favour, style of flattery, Move with the flow, Pretexting, Reverse Social Engineering, Phishing, Spear phishing, Watering hole attackPay back the favour, show the similarities, style of flattery, temptation to have something rare. These are too general terms and do not reflect a specific attack1050.00
[36]2019Devicephishing, CSRF, malware, email, and popups. Session hijacking attacks, connection-oriented protocol attacks, SQLi, SEO poisoning, Vishing, botnets, rootkits, buffer overflow, worms, viruses, Trojan horses, bot attacks, and spywares.CSRF, malware, email (generic term), session hijacking attacks, connection-oriented protocol attacks (generic term), SQLi, botnets, rootkits, buffer overflow, worms, viruses, Trojan horses, bot attacks, and spywares.1883.33
[62]2019Behavior-Not discussed any attack, but suggested classification based on behavioural factors.00.00
[45]2019Communication TypeVishing, Phishing, Physical (F2F), Smishing,Face-to-Face (Too generic term). Suggested but didn’t classify.40.00
[19]2019Nonephishing, impersonation on help desk calls, shoulder surfing, dumpster diving, stealing important documents, diversion theft, fake software, baiting, quid pro qou, pretexting, tailgating, Pop-Up windows, Robocalls, ransomware, online social engineering, RSE, fake software, SMSishing, physical access, phishing, spear-phishing, whaling, vishing, BEC, interactive voice response phishing, Pharming attacksRansomware, Online Social Engineering (general term),Phone Social Engineering Stealing (generic term), Important Documents (General action), Whitelisting flow.Didn’t classify the attack or proposed classification scheme.2611.54
[30]2020Human & ComputerImpersonation, Pretexting, Tailgating, Quid Pro Quo, Diversion Theft, Phishing, Spear-Phishing, Whaling, Clone-Phishing, Pharming, Website Phishing, Pop-Up Windows, XSS, Spyware, Malware, Worms, Rootkits, Botnets, Ransomware, Baiting, Trojans, KeyLoggers, Screen Loggers, Malicious Links, Fake Groups, Digital Impersonation, Fake Profiles, DNS Poisoning, SSL Attack, MIMT, Compromised Web Server Attack, Host File Poisoning, Session Hijacking, SEO Phishing, SMSishing, Mobile Apps, Vishing, Similarity Attacks, Forwarding Attacks, Background Attacks, Notification Attack, Floating Attacks, (VoIP) PhishingRansomware, Botnets, Cross-Site Scripting (XSS), Rootkits, Malware, Spyware, Worms, Trojans, Key Loggers, Screen Loggers, Session Hijacking, Host File Poisoning, Compromised Web Server Attack, Man-in-the-Middle Attack, Secure Socket Layer (SSL) Attack, DNS Poisoning, Background Attacks, Floating Attacks,4055.00
[37]2020MediumPhishing (Email), Vishing, Smishing, Whaling, Spear Phishing, BEC, QRishing, Wiphishing, Social media phishing, Typo Squatting, Sound Squatting,Social Engineering, XSS (stored XSS and reflected XSS), SQLi, APT, browser sniffing, DNS cache poisoning, CAPTCHA Attack, Drive-by Download, Malvertizing, Session hijacking, Botnets, Browser Vulnerabilities, Tab-Napping, Skill squatting, 404 Error Manipulation, Click Jacking, Malicious Browsing Extensions Browser, MIMT, Application phishing, GUI-Squatting, Session Fixation, JavaScript Obfuscation,Email (generic term), IM (Too generic term), Cross-Site Scripting (XSS), CAPTCHA Attack, Social Engineering (generic term), Browser Vulnerabilities, Tab-Napping, 404 Error Manipulation, Malicious Browsing Extensions, MIMT, Mobile Phones (Generic Term), GUI-Squatting, Session Fixation, JavaScript Obfuscation, Wiphishing,3560.00
[63]2020Operator, Type, Channelonline hoaxes or advance-fee fraud, credit card, high-tech disaster and identity theft fraud, web and e-mail spoofing, instant messaging fraud, and spamming, phishingcredit card, high-tech disaster (generic term). Not discussed any attack, but suggested classification type based on Operator, Type, and Channel.825.00
[41]2021Computer & HumanBEC, Vishing, Smishing, Pharming,Discussed the classification scheme, but didn’t classify40.00
[64]2021Social, Technical, Socio-Technical, and PhysicalTrojan (20 variants), SQLi, Espionage, DDoS, DoS, Brute-Force, Impersonation, Typo-squatting, Bots (7 Variants), Spoofing, Cyber-sabotage, e-skimming, Bit-Squatting, BEC, Mal-URLs, CryptoMinors, Malware (6, Other-13 variants, Ransomware-31 variants), Worms.No attack discussed. Only the classification scheme was discussed, but it was not classified.9195.60
[32]2021Generic & TargetedPhishing, Spare-PhishingDiscussed the classification scheme, but didn’t classify20.00
[65]2021Operator, Methods, NatureImpersonation, Shoulder surfing, Dumpster diving, Phishing, Spear-phishing, Whaling, Vishing, Angler, Baiting, Pretexting, Tailgating, Ransomware, Pop-up windows, Scareware, Smishing, Quid pro quo,Ransomware, Phone Scam (generic term).Suggested classification based on Operator, Method and Nature. But, didn’t classify the attack.1711.76
[8]2021Technical & DeceptionPhishing, Spare-phishing, Whaling, Vishing and Smishing, Spoofed Website, Soshing, Malware, Key Loggers, Screen Loggers, Viruses, Worms, Spyware, Adware, Ransomware, RootKit, Session Hijacking, Web Trojans, Hosts File Poisoning, System Reconfiguration Attack, MIMT, Content Injection Phishing, Pharming, DNS Piosoning, Data Theft, SEO Phishing, URL Obfuscation Attack, ARP Poisoning, DNS spoofing,Ransomware, Malware, Key Loggers, Screen Loggers, Viruses, Worms, Data Theft (output not attack), RootKit, Session Hijacking, Web Trojans, Hosts File Poisoning, System Reconfiguration Attack, MIMT, Content Injection Phishing, ARP Poisoning, DNS spoofing2968.97
[66]2021Computer & HumanPersuasion, Impersonation, Tailgating, Piggybacking, Shoulder Surfing, Dumpster Diving, Phishing, Vishing, Watering Hole, Bot Attacks, Brand Theft, Typosquatting, Baiting,Bot Attacks, Brand Theft (Generic term)1315.38
[44]2021Computer & HumanImpersonation, Shoulder Surfing, Pigggybacking, Trailing, Pretexting, Phishing, Web-Phishing, Smishing, Whaling, WiFi-Phishing, Trojan, Baiting, Water Hole, ATP. Ransomware, XSS, CSRF, Pop-up Window, F2F, MIMT, Dumpster Diving, Vishing, RSE, Spear-phishing, Honey trap,Manipulating Conversation (generic term), Trojan attack, and Honey Trap.2540.00
[23]2021NoneImpersonation, Shoulder Surfing, Trailing, Pretexting, Phishing, Smishing, Whaling, Trojan, Water Hole, Vishing, RSE, Spare-phishing, Honey trap,Honey Trap, Manipulating conversation (too generic term, not an attack)No classification scheme, and didn’t classify137.69
[43]2021InteractionImpersonation, Shoulder surfing, Dumpster diving, Eavesdropping, Vishing, Tailgating, Quid pro quo, Phishing, Baiting, Pretexting, Water holing, Pop-up windowFound misclassification such as Vishing, Shoulder surfing and dumpster diving categorised in direct interaction, and phishing & pretexting in the indirect interaction category.120.00
[39]2022Social, Technical, Mobile, OthersWebsite spoofing, Email spoofing, spear-phishing, Ransomware, Trojan, Content Injection, Keylogger, Screen Logger, MIMT, Smishing, Vishing, WiFi-Phishing, MalApp, Compromised Web-Server, Botnet, DNS Poisoning, SoshingWebsite spoofing, Email Spoofing, Trojan horse, Content injection, Key logger, screen logger, man-in-the-middle attack, DNS poisoning, ransomware, compromised web server,1741.18
[11]2022Mediumdrive-by-download, MITM, XSS, tabnapping, spear phishing, whaling, SEO Phishing, session fixation, malvertising, social engineering, JavaScript obfuscation, browser vulnerabilities, mobile phone, cloud computing and WiPhishing or Evil Twins, SQL injection, typo-squatting, and sound-squatting, ClickJacking, Pharming, Trojan, Tabnapping,Browser Vulnerability, Clickjacking, XSS, Javascript Obfuscation, MIMT (Man-in-the-Middle), DNS Poisoning, Session Fixation, SQLi, Tabnapping, Cloud Computing, Mobile-Based (too general terms)2334.78
[52]2022Masquerading, Physical, Digitalpretexting, impersonation, physical reverse engineering (physical RE), and tailgating, passive surveillance, dumpster diving, open source reconnaissance, Vishing, Email Scam, Phishing, Smishing, Spear-phishing, Whaling, Soshing, Catphishing, Baiting, Shoulder Surfing, Web-RSE, Social-RSE, angler phishing,Email scams (generic term), Web-RSE, and Social-RSE do not justify. Open source reconnaissance is an activity.1915.79
[28]2022Human & TechnicalphishingDiscussed the classification scheme, but didn’t classify10.00
[5]2023Behaviour, Emotion, Social, CognitivePhishing, Pretexting, Impersonation, Quid pro quo, Tailgating exploitsMulticlass categorisation issue50.00
[4]2023BehaviorDumpster Diving, fake profiles, Phishing, Vishing, Smishing, Fake Websites, Hosting Fake Online Advertisements, Malvertising, USB Dropping, Juice Jacking, Email Bombing, QRshing, SEO-phishing, Befriending, Sextortion:,Web Application Hosting, Email Bombing, Juice Jacking,1414.29
[38]2024Human & SoftwareImpersonation, Pretexting, Quid pro quo, Dumpster diving, Shoulder surfing, Phishing, Spamming, Spear phishing, Whaling, Pharming, Website phishing, Pop-up windows, XSS, Malware, Virus, Worms, Spyware, Trojans, Botnets, Adware, Rootkits, Ransomware, Wiper, Mobile malware, Fileless malwar, Keyloggers, Screen Logger, Fake groups, Fake profiles, Malicious links, Digital impersonation, Baiting, Tailgating, watering hole, Sybil, Vicinity, Plug-in, Session hijacking, Host file poisoning, Graph-based, MIMT, SEO-phishing, Compromised web server, SSL attack, RSE, DNS poisoning, Smishing, Malicious apps, Vishing, Phishing,Malware, Virus, Worms, Spyware, Trojans, Botnets, Rootkits, Ransomware, Wiper, Fileless malware, Key loggers,Social network (generic term), Cross-site scripting (XSS), Pop-up, Host file poisoning, Compromised web server, Man-in-the-Middle (MitM), SSL attack, DNS poisoning, Malicious apps (generic term), Plugin attacks, Session hijacking, Graph-based attack, Spamming, Sybil attack4948.98
[33]2024No ClassificationEmail Phishing, Phishing, Spear Phishing, Whaling, Smishing, VIsshing, Angler, Romance Scam, Online Dating Scam, Cat Phishing, Military Romance, Investment Scam, Social Media Scam, Baiting, USB Drop, Fake Job Posting, Fake Software Downloading, Free WiFi, Online Surveys, RSE Pretexting, Tailgating, Impersonation, Thread Hijacking, Flamewares, Trolling, Spamming, Astronfing, RSE, Scareware Fake Anti Virus, Ransomware, Tech SupportHijacking (generic term), Flamewares, Scareware, Ransomware, Astronfing, Online Survey (generic term), Social Media Scam (generic term).Didn’t classify attacks, and there was a lack of description and evidence in many attacks3046.67
[48]2024EnvironmentPhishing, Spear phishing, Smishing, Vishing, Whaling, Baiting, quid pro quo, watering hole, Dumpster diving, Pretexting, shoulder surfing, piggybacking, Scareware, RSE, keyloggers, spyware,key loggers, spyware,1612.5

Comparative analysis of existing classification methodologies with the proposed taxonomy_

RefYearNon-SEAMisclassificationMulticlassIssue/Limitation
[40]2013Doesn’t classify as discussed, Non-SEAs included, e.g. Trojan, leads to classification ambiguity.
[42]2015Partial attacks classified, Non-SEAs included, Multi-class categorisation, e.g. Phishing in more than 1 branch (Ref Lit. Table 1). Leads classification ambiguity
[31]2016Doesn’t classify as discussed, leads to Classification Ambiguity.
[21]2017The classification scheme doesn’t cover physical attacks. Non-SEAs are included, e.g. Session Hijacking, Misclassification. Leads to Classification Ambiguity
[35]2018The classification scheme covers only internet attacks; SE itself is listed as an attack, Non-SEAs are included, e.g. XSS, Misclassification error. Multiclass error, e.g. Literature Fig.2, leads to Classification Ambiguity.
[61]2018Non-SEAs, e.g. “style of flattery”, lead to Classification Ambiguity.
[36]2019Multi-class categorisation error, Non-SEAs included, e.g. CSRF, SQLi, Multiclass error found, e.g. literature Fig.1, covers only internet-based attacks. Leads to Classification Ambiguity
[62]2019Conceptualised classification doesn’t classify as discussed, leading to Classification ambiguity.
[45]2019Doesn’t classify as discussed, doesn’t cover all attacks, e.g. Dumspter Diving, leads to Classification Ambiguity.
[19]2019Does not classify as a scheme. Non-SEAs, e.g. Ransomware, lead to classification ambiguity.
[30]2020Non-SEAs included, e.g. Rootkit & SSL. Leads to classification ambiguity
[37]2020Doesn’t cover physical attack, Non-SEAs included, e.g. APT, XSS. SE is also listed as an Attack. Misclassification error leads to classification ambiguity.
[63]2020Doesn’t classify as discussed, not cover physical attacks, Non-SEAs included, e.g. Spamming. Leads to classification ambiguity.
[41]2021Doesn’t classify the attack as discussed.
[64]2021Doesn’t classify as discussed, Non-SEA included, e.g. Brute Force, Misclassification error. Leads to classification ambiguity
[32]2021Doesn’t classify as discussed; only two variants of Phishing attacks are discussed.
[65]2021Doesn’t classify as discussed, Non-SEA included, e.g. Ransomware. Leads to classification ambiguity
[8]2021Doesn’t cover physical attacks, Non-SEAs included, e.g. Virus & Worms. Leads to classification ambiguity
[66]2021Non-SEAs included, e.g. Bot Attack. Persuasion is a principal & technique used in an attack, not an attack itself. Misclassification error. Leads to classification ambiguity
[44]2021Non-SEAs included, e.g. APT, CSRF. Influence & deception are techniques used in an attack, not an attack itself. Misclassification error. Leads to classification ambiguity.
[23]2021Non-SEAs included, e.g. Trojan.Misclassification error. Leads to classification ambiguity.
[43]2021Ambiguous distribution, e.g. vishing categorises as a direct attack, phishing and Pretexting as indirect, which contradict the classification definition. Misclassification
[39]2022SE itself is listed as a phishing subtype, Non-SEAs included, e.g. Ransomware, Trojan, BotNet.
[11]2022Non-SEA included, e.g. SQLi. Cloud Computing and Mobile Apps are not attacks, e.g. Ref Lit. Figure.2.
[52]2022Non-SEA included, e.g. passive surveillance is not an attack. Multiclass error, e.g. Shoulder Surfing as Physical Access-based, and Tailgating as Physical world-based.
[28]2022Doesn’t classify the attack as discussed.
[5]2023Only a few are classified, observed, and shared behavioural/psychological aspects among attacks. This leads to classification ambiguity.
[4]2023Doesn’t classify as discussed, Non-SEAs included, e.g. Email Bombing. Leads to classification Ambiguity
[38]2024Non-SEAs included, e.g. Wiper & SSL.Malicious App is not an attack, but an attack vector. Misclassification error. Leads to classification ambiguity.
[33]2024Non-SEAs included, e.g. Spamming & Ransomware. Multiclass error, e.g. RSE, is present in two categories. Leads to classification ambiguity
[48]2024Multiclass error, e.g. Phishing, Pretexting Tailgating, classified in more than 1 class. This leads to classification ambiguity.
This Study2025Overcome the classification ambiguity, clear distribution, independent of factors that are shared among different attacks, such as technology, communication type, behaviour, environment, and device. This will help in understanding attacker psychology and approaches within the target proximity and at a distance.
DOI: https://doi.org/10.2478/ias-2025-0008 | Journal eISSN: 1554-1029 | Journal ISSN: 1554-1010
Language: English
Page range: 125 - 144
Published on: Dec 31, 2025
In partnership with: Paradigm Publishing Services
Publication frequency: 6 issues per year

© 2025 Jibran Rasheed Khan, Sumaira Mustafa Qureshi, Farhan Ahmed Siddiqui, Syed Asim Ali, published by Cerebration Science Publishing Co., Limited
This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0 License.