Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues

H Aldawood, G Skinner - Future internet, 2019 - mdpi.com
The idea and perception of good cyber security protection remains at the forefront of many
organizations' information and communication technology strategy and investment …

Survey on wireless network security

R Nazir, AA Laghari, K Kumar, S David… - Archives of Computational …, 2021 - Springer
A wireless network is used to connect various wired organizational structures and provide
connectivity within the organization for employees to move freely by avoiding the hurdle of a …

A regressional study on the impact of organizational security culture and transformational leadership on social engineering awareness among bank employees: The …

OO Olaniyi, CU Asonze, SO Olabanji… - Asian Journal of …, 2023 - papers.ssrn.com
Organizations across various sectors are increasingly vulnerable to cybersecurity breaches
in an era characterized by unprecedented technological advancements and a rapidly …

Two-factor authentication scheme for mobile money: A review of threat models and countermeasures

G Ali, M Ally Dida, A Elikana Sam - Future Internet, 2020 - mdpi.com
The proliferation of digital financial innovations like mobile money has led to the rise in
mobile subscriptions and transactions. It has also increased the security challenges …

[HTML][HTML] An effective approach to mobile device management: Security and privacy issues associated with mobile applications

D Hayes, F Cappa, NA Le-Khac - Digital Business, 2020 - Elsevier
Consumers and organizations often rely on permissions requested during the installation of
mobile applications (apps) and on official privacy policies to determine how safe an app is …

Cybersecurity threats in FinTech: A systematic review

D Javaheri, M Fahmideh, H Chizari, P Lalbakhsh… - Expert Systems with …, 2023 - Elsevier
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …

[HTML][HTML] An interdisciplinary view of social engineering: A call to action for research

AH Washo - Computers in Human Behavior Reports, 2021 - Elsevier
Social engineering is the act of using manipulation and deception to obtain access to
confidential information. It is considered one of the leading threats to information security …

A critical appraisal of contemporary cyber security social engineering solutions: Measures, policies, tools and applications

HA Aldawood, G Skinner - 2018 26th International Conference …, 2018 - ieeexplore.ieee.org
Social engineering is one of the biggest threats organizations face today, as more and more
companies are adopting digitalization. This study presents a critical review of the existing …

The impact of cyberattacks awareness on customers' trust and commitment: an empirical evidence from the Pakistani banking sector

IA Bajwa, S Ahmad, M Mahmud… - Information & Computer …, 2023 - emerald.com
Purpose The banking industry has always been vulnerable to cyberattacks. In recent years,
Pakistan's banking sector experienced the most intense cyberattack in its over 70-year …

Challenges of implementing training and awareness programs targeting cyber security social engineering

H Aldawood, G Skinner - 2019 cybersecurity and …, 2019 - ieeexplore.ieee.org
Information security is one of the growing sources of concern that organizations are dealing
with today. With increased levels of sophistication of social engineering threats, the exploits …