Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach
Individuals and organizations rely on social media to share files and knowledge. On the
other hand, criminals find social media applications a rich place to attack through techniques …
other hand, criminals find social media applications a rich place to attack through techniques …
The Shadow of Fraud: The Emerging Danger of AI-powered Social Engineering and its Possible Cure
Social engineering (SE) attacks remain a significant threat to both individuals and
organizations. The advancement of Artificial Intelligence (AI), including diffusion models and …
organizations. The advancement of Artificial Intelligence (AI), including diffusion models and …
In their own words: deception detection by victims and near victims of fraud
Aim Research on deception detection has usually been executed in experimental settings in
the laboratory. In contrast, the present research investigates deception detection by actual …
the laboratory. In contrast, the present research investigates deception detection by actual …
Mazephishing: The COVID-19 pandemic as credible social context for social engineering attacks
K Kikerpill, A Siibak - Trames: A Journal of the Humanities and Social …, 2021 - ceeol.com
The first months of the COVID-19 pandemic witnessed a surge of social engineering attacks.
Although the pandemic is certainly not the first occurrence of socially disruptive …
Although the pandemic is certainly not the first occurrence of socially disruptive …
[PDF][PDF] Social engineering attacks: a clearer perspective
S Adu-Gyimah, G Asante… - International Journal of …, 2022 - researchgate.net
This modern time has seen a rise in technology and its associated tools. The rapid
development of technology has also grown along with what the researchers termed as …
development of technology has also grown along with what the researchers termed as …
Hey “CSIRI”, should I report this? Investigating the factors that influence employees to report cyber security incidents in the workplace
K Ahola, M Butavicius, A McCormac… - Information & Computer …, 2024 - emerald.com
Purpose Cyber security incidents pose a major threat to organisations. Reporting cyber
security incidents and providing organisations with information about their true nature, type …
security incidents and providing organisations with information about their true nature, type …
[HTML][HTML] Scamming higher ed: An analysis of phishing content and trends
E Morrow - Computers in Human Behavior, 2024 - Elsevier
Universities are frequent targets of cyberattacks. This investigation seeks to explore common
phishing techniques targeting institutions of higher education. This study analyzes the …
phishing techniques targeting institutions of higher education. This study analyzes the …
The effects of persuasion principles on perceived honesty during shoulder surfing attacks
KS Jones, MKK Tornblad, ME Armstrong… - … & Computer Security, 2024 - emerald.com
Purpose This study aimed to investigate how honest participants perceived an attacker to be
during shoulder surfing scenarios that varied in terms of which Principle of Persuasion in …
during shoulder surfing scenarios that varied in terms of which Principle of Persuasion in …
[PDF][PDF] Machine learning for intrusion detection in cyber security: Applications, challenges, and recommendations
A Ali, S Naeem, S Anam, MM Ahmed - UMT Artif. Intell. Rev, 2022 - academia.edu
Innovative Computing Review (ICR) Page 1 Innovative Computing Review (ICR) Volume 2
Issue 2, Fall 2022 ISSN(P): 2791-0024 ISSN(E): 2791-0032 Homepage: https://journals.umt.edu.pk/index.php/ICR …
Issue 2, Fall 2022 ISSN(P): 2791-0024 ISSN(E): 2791-0032 Homepage: https://journals.umt.edu.pk/index.php/ICR …
How frauds in times of crisis target people
D Taodang, RV Gundur - Victims & Offenders, 2023 - Taylor & Francis
While there are no new frauds, internet technology provides new opportunities for fraudsters
by facilitating volumes of attacks that law enforcement then struggles to address. Moreover …
by facilitating volumes of attacks that law enforcement then struggles to address. Moreover …