The effects of psychological distance on abstraction: Two meta-analyses.

CK Soderberg, SP Callahan… - Psychological …, 2015 - psycnet.apa.org
Psychological distance and abstraction both represent key variables of considerable interest
to researchers across cognitive, social, and developmental psychology. Moreover, largely …

Advanced social engineering attacks

K Krombholz, H Hobel, M Huber, E Weippl - Journal of Information Security …, 2015 - Elsevier
Social engineering has emerged as a serious threat in virtual communities and is an
effective means to attack information systems. The services used by today's knowledge …

Social engineering attack examples, templates and scenarios

F Mouton, L Leenen, HS Venter - Computers & Security, 2016 - Elsevier
The field of information security is a fast-growing discipline. Even though the effectiveness of
security measures to protect sensitive information is increasing, people remain susceptible …

Understanding password choices: How frequently entered passwords are re-used across websites

R Wash, E Rader, R Berman, Z Wellmer - Twelfth Symposium on Usable …, 2016 - usenix.org
From email to online banking, passwords are an essential component of modern internet
use. Yet, users do not always have good password security practices, leaving their accounts …

Individual differences in cyber security behaviors: an examination of who is sharing passwords

M Whitty, J Doodson, S Creese… - … , Behavior, and Social …, 2015 - liebertpub.com
In spite of the number of public advice campaigns, researchers have found that individuals
still engage in risky password practices. There is a dearth of research available on individual …

Determinants of early conformance with information security policies

F Bélanger, S Collignon, K Enget… - Information & …, 2017 - Elsevier
Individuals often fail to perform the security behaviors their organizations request to protect
informational assets. However, forcing individuals into the compliance can trigger undesired …

Why do they do what they do?: A study of what motivates users to (not) follow computer security advice

M Fagan, MMH Khan - Twelfth symposium on usable privacy and …, 2016 - usenix.org
Usable security researchers have long been interested in what users do to keep their
devices and data safe and how that compares to recommendations. Additionally, experts …

Bits under the mattress: Understanding different risk perceptions and security behaviors of crypto-asset users

S Abramova, A Voskobojnikov, K Beznosov… - Proceedings of the …, 2021 - dl.acm.org
Crypto-assets are unique in tying financial wealth to the secrecy of private keys. Prior
empirical work has attempted to study end-user security from both technical and …

[HTML][HTML] Applying staged event-driven access control to combat ransomware

T McIntosh, ASM Kayes, YPP Chen, A Ng… - Computers & Security, 2023 - Elsevier
The advancement of modern Operating Systems (OSs), and the popularity of personal
computing devices with Internet connectivity, have facilitated the proliferation of ransomware …

Digital Workplaces and Information Security Behavior of Business Employees: An Empirical Study of Saudi Arabia

S Saeed - Sustainability, 2023 - mdpi.com
In the post pandemic era, the telecommuting of business employees has widely become
acceptable in organizations, which demands extensive dependence on digital technologies …