Social engineering attacks prevention: A systematic literature review

W Syafitri, Z Shukur, U Asma'Mokhtar… - IEEE …, 2022 - ieeexplore.ieee.org
Social engineering is an attack on information security for accessing systems or networks.
Social engineering attacks occur when victims do not recognize methods, models, and …

The dark side of using online social networks: a review of Individuals' negative experiences

L Boroon, B Abedin, E Erfani - Journal of Global Information …, 2021 - igi-global.com
Research on online social networks (OSNs) has focused overwhelmingly on their benefits
and potential, with their negative effects overlooked. This study builds on the limited existing …

Social media user behavior analysis applied to the fashion and apparel industry in the big data era

Z Xue, Q Li, X Zeng - Journal of Retailing and Consumer Services, 2023 - Elsevier
With the rapid development of the Internet and new media, the enormous data from social
media and other public platforms have attracted increasing attention to user behavior …

Crisis and changes in learning behaviours: technology-enhanced assessment in language learning contexts

SM Alavi, R Dashtestani, M Mellati - Journal of Further and Higher …, 2022 - Taylor & Francis
The outbreak of COVID-19 has posed a sudden and unprecedented change to the
educational system. This study investigated the impact of this sudden change on EFL …

The impact of ignorance and bias on information security protection motivation: a case of e-waste handling

H Chen, Y Yuan - Internet Research, 2022 - emerald.com
Purpose Protection motivation theory (PMT) explains that the intention to cope with
information security risks is based on informed threat and coping appraisals. However …

Would you go invisible on social media? An empirical study on the antecedents of users' lurking behavior

Y Hong, J Hu, Y Zhao - Technological Forecasting and Social Change, 2023 - Elsevier
With the ubiquity of social networks, users of social network apps are likelier to lurk rather
than interact. Accordingly, users' lurking behavior in online communities deserves more …

[HTML][HTML] Predicting individuals' vulnerability to social engineering in social networks

SM Albladi, GRS Weir - Cybersecurity, 2020 - Springer
The popularity of social networking sites has attracted billions of users to engage and share
their information on these networks. The vast amount of circulating data and information …

Antecedents for enhanced level of cyber-security in organisations

S Kumar, B Biswas, MS Bhatia, M Dora - Journal of Enterprise …, 2021 - emerald.com
Purpose The present study aims to identify and investigate the antecedents of enhanced
level of cyber-security at the organisational level from both the technical and the human …

Assessing the pre-conditions for the pedagogical use of digital tools in the Nigerian higher education sector

IJ Orji, F Ojadi, UK Okwara - The International Journal of Management …, 2022 - Elsevier
Currently, there is a burgeoning interest in digitalization as evidenced in extant literature.
Nevertheless, the effect, based on teachers' own perspectives, of the pedagogical use of …

[HTML][HTML] Integrating an information systems success model with perceived privacy, perceived security, and trust: the moderating role of Facebook addiction

M Maqableh, HY Hmoud, M Jaradat - Heliyon, 2021 - cell.com
Purpose The purpose of this study is to investigate the influence of perceived security,
perceived privacy, and satisfaction on Facebook user continuance intention. In addition, the …