Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues
H Aldawood, G Skinner - Future internet, 2019 - mdpi.com
The idea and perception of good cyber security protection remains at the forefront of many
organizations' information and communication technology strategy and investment …
organizations' information and communication technology strategy and investment …
Survey on wireless network security
A wireless network is used to connect various wired organizational structures and provide
connectivity within the organization for employees to move freely by avoiding the hurdle of a …
connectivity within the organization for employees to move freely by avoiding the hurdle of a …
A regressional study on the impact of organizational security culture and transformational leadership on social engineering awareness among bank employees: The …
OO Olaniyi, CU Asonze, SO Olabanji… - Asian Journal of …, 2023 - papers.ssrn.com
Organizations across various sectors are increasingly vulnerable to cybersecurity breaches
in an era characterized by unprecedented technological advancements and a rapidly …
in an era characterized by unprecedented technological advancements and a rapidly …
Two-factor authentication scheme for mobile money: A review of threat models and countermeasures
The proliferation of digital financial innovations like mobile money has led to the rise in
mobile subscriptions and transactions. It has also increased the security challenges …
mobile subscriptions and transactions. It has also increased the security challenges …
[HTML][HTML] An effective approach to mobile device management: Security and privacy issues associated with mobile applications
Consumers and organizations often rely on permissions requested during the installation of
mobile applications (apps) and on official privacy policies to determine how safe an app is …
mobile applications (apps) and on official privacy policies to determine how safe an app is …
Cybersecurity threats in FinTech: A systematic review
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …
advancements have given rise to sophisticated cyber threats that traditional methods cannot …
[HTML][HTML] An interdisciplinary view of social engineering: A call to action for research
AH Washo - Computers in Human Behavior Reports, 2021 - Elsevier
Social engineering is the act of using manipulation and deception to obtain access to
confidential information. It is considered one of the leading threats to information security …
confidential information. It is considered one of the leading threats to information security …
A critical appraisal of contemporary cyber security social engineering solutions: Measures, policies, tools and applications
HA Aldawood, G Skinner - 2018 26th International Conference …, 2018 - ieeexplore.ieee.org
Social engineering is one of the biggest threats organizations face today, as more and more
companies are adopting digitalization. This study presents a critical review of the existing …
companies are adopting digitalization. This study presents a critical review of the existing …
The impact of cyberattacks awareness on customers' trust and commitment: an empirical evidence from the Pakistani banking sector
Purpose The banking industry has always been vulnerable to cyberattacks. In recent years,
Pakistan's banking sector experienced the most intense cyberattack in its over 70-year …
Pakistan's banking sector experienced the most intense cyberattack in its over 70-year …
Challenges of implementing training and awareness programs targeting cyber security social engineering
H Aldawood, G Skinner - 2019 cybersecurity and …, 2019 - ieeexplore.ieee.org
Information security is one of the growing sources of concern that organizations are dealing
with today. With increased levels of sophistication of social engineering threats, the exploits …
with today. With increased levels of sophistication of social engineering threats, the exploits …