Social engineering attacks prevention: A systematic literature review
W Syafitri, Z Shukur, U Asma'Mokhtar… - IEEE …, 2022 - ieeexplore.ieee.org
Social engineering is an attack on information security for accessing systems or networks.
Social engineering attacks occur when victims do not recognize methods, models, and …
Social engineering attacks occur when victims do not recognize methods, models, and …
The dark side of using online social networks: a review of Individuals' negative experiences
Research on online social networks (OSNs) has focused overwhelmingly on their benefits
and potential, with their negative effects overlooked. This study builds on the limited existing …
and potential, with their negative effects overlooked. This study builds on the limited existing …
Social media user behavior analysis applied to the fashion and apparel industry in the big data era
Z Xue, Q Li, X Zeng - Journal of Retailing and Consumer Services, 2023 - Elsevier
With the rapid development of the Internet and new media, the enormous data from social
media and other public platforms have attracted increasing attention to user behavior …
media and other public platforms have attracted increasing attention to user behavior …
Crisis and changes in learning behaviours: technology-enhanced assessment in language learning contexts
The outbreak of COVID-19 has posed a sudden and unprecedented change to the
educational system. This study investigated the impact of this sudden change on EFL …
educational system. This study investigated the impact of this sudden change on EFL …
The impact of ignorance and bias on information security protection motivation: a case of e-waste handling
H Chen, Y Yuan - Internet Research, 2022 - emerald.com
Purpose Protection motivation theory (PMT) explains that the intention to cope with
information security risks is based on informed threat and coping appraisals. However …
information security risks is based on informed threat and coping appraisals. However …
Would you go invisible on social media? An empirical study on the antecedents of users' lurking behavior
Y Hong, J Hu, Y Zhao - Technological Forecasting and Social Change, 2023 - Elsevier
With the ubiquity of social networks, users of social network apps are likelier to lurk rather
than interact. Accordingly, users' lurking behavior in online communities deserves more …
than interact. Accordingly, users' lurking behavior in online communities deserves more …
[HTML][HTML] Predicting individuals' vulnerability to social engineering in social networks
SM Albladi, GRS Weir - Cybersecurity, 2020 - Springer
The popularity of social networking sites has attracted billions of users to engage and share
their information on these networks. The vast amount of circulating data and information …
their information on these networks. The vast amount of circulating data and information …
Antecedents for enhanced level of cyber-security in organisations
Purpose The present study aims to identify and investigate the antecedents of enhanced
level of cyber-security at the organisational level from both the technical and the human …
level of cyber-security at the organisational level from both the technical and the human …
Assessing the pre-conditions for the pedagogical use of digital tools in the Nigerian higher education sector
Currently, there is a burgeoning interest in digitalization as evidenced in extant literature.
Nevertheless, the effect, based on teachers' own perspectives, of the pedagogical use of …
Nevertheless, the effect, based on teachers' own perspectives, of the pedagogical use of …
[HTML][HTML] Integrating an information systems success model with perceived privacy, perceived security, and trust: the moderating role of Facebook addiction
M Maqableh, HY Hmoud, M Jaradat - Heliyon, 2021 - cell.com
Purpose The purpose of this study is to investigate the influence of perceived security,
perceived privacy, and satisfaction on Facebook user continuance intention. In addition, the …
perceived privacy, and satisfaction on Facebook user continuance intention. In addition, the …