[HTML][HTML] Cyber security threats: A never-ending challenge for e-commerce
This study explores the challenge of cyber security threats that e-commerce technology and
business are facing. Technology applications for e-commerce are attracting attention from …
business are facing. Technology applications for e-commerce are attracting attention from …
Human factors in phishing attacks: a systematic literature review
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …
trustworthy entity in digital communication. It is a type of cyber attack often successful …
[HTML][HTML] Addressing human factors in cybersecurity leadership
WJ Triplett - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
This article identifies human factors in workplaces that contribute to the challenges faced by
cybersecurity leadership within organizations and discusses strategic communication …
cybersecurity leadership within organizations and discusses strategic communication …
A survey on blockchain, SDN and NFV for the smart-home security
Due to millions of loosely coupled devices, the smart-home security is gaining the attention
of industry professionals, attackers, and academic researchers. The smart home is a typical …
of industry professionals, attackers, and academic researchers. The smart home is a typical …
[HTML][HTML] An empirical assessment of endpoint detection and response systems against advanced persistent threats attack vectors
G Karantzas, C Patsakis - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Advanced persistent threats pose a significant challenge for blue teams as they apply
various attacks over prolonged periods, impeding event correlation and their detection. In …
various attacks over prolonged periods, impeding event correlation and their detection. In …
Towards an improved understanding of human factors in cybersecurity
Cybersecurity cannot be addressed by technology alone; the most intractable aspects are in
fact sociotechnical. As a result, the'human factor'has been recognised as being the weakest …
fact sociotechnical. As a result, the'human factor'has been recognised as being the weakest …
[HTML][HTML] The impact of formal and informal organizational norms on susceptibility to phishing: Combining survey and field experiment data
G Petrič, K Roer - Telematics and Informatics, 2022 - Elsevier
Phishing is one of the most common forms of social engineering that exploits human
vulnerabilities and causes immense personal and organizational costs. This study advances …
vulnerabilities and causes immense personal and organizational costs. This study advances …
How senior management and workplace norms influence information security attitudes and self-efficacy
S Cuganesan, C Steele, A Hart - Behaviour & Information …, 2018 - Taylor & Francis
Prior information security research establishes the need to investigate the informal factors
that influence employee attitudes and self-efficacy beliefs about information security. Two …
that influence employee attitudes and self-efficacy beliefs about information security. Two …
A systematic literature review: Information security culture
Human behavior inside organizations is considered the main threat to organizations.
Moreover, in information security the human element consider the most of weakest link in …
Moreover, in information security the human element consider the most of weakest link in …
[HTML][HTML] A systematic review of scales for measuring information security culture
Purpose The concept of information security culture, which recently gained increased
attention, aims to comprehensively grasp socio-cultural mechanisms that have an impact on …
attention, aims to comprehensively grasp socio-cultural mechanisms that have an impact on …