Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach

B AlGhanboosi, S Ali, A Tarhini - Computers in Human Behavior, 2023 - Elsevier
Individuals and organizations rely on social media to share files and knowledge. On the
other hand, criminals find social media applications a rich place to attack through techniques …

The Shadow of Fraud: The Emerging Danger of AI-powered Social Engineering and its Possible Cure

J Yu, Y Yu, X Wang, Y Lin, M Yang, Y Qiao… - arXiv preprint arXiv …, 2024 - arxiv.org
Social engineering (SE) attacks remain a significant threat to both individuals and
organizations. The advancement of Artificial Intelligence (AI), including diffusion models and …

In their own words: deception detection by victims and near victims of fraud

M Junger, L Koning, P Hartel, B Veldkamp - Frontiers in psychology, 2023 - frontiersin.org
Aim Research on deception detection has usually been executed in experimental settings in
the laboratory. In contrast, the present research investigates deception detection by actual …

Mazephishing: The COVID-19 pandemic as credible social context for social engineering attacks

K Kikerpill, A Siibak - Trames: A Journal of the Humanities and Social …, 2021 - ceeol.com
The first months of the COVID-19 pandemic witnessed a surge of social engineering attacks.
Although the pandemic is certainly not the first occurrence of socially disruptive …

[PDF][PDF] Social engineering attacks: a clearer perspective

S Adu-Gyimah, G Asante… - International Journal of …, 2022 - researchgate.net
This modern time has seen a rise in technology and its associated tools. The rapid
development of technology has also grown along with what the researchers termed as …

Hey “CSIRI”, should I report this? Investigating the factors that influence employees to report cyber security incidents in the workplace

K Ahola, M Butavicius, A McCormac… - Information & Computer …, 2024 - emerald.com
Purpose Cyber security incidents pose a major threat to organisations. Reporting cyber
security incidents and providing organisations with information about their true nature, type …

[HTML][HTML] Scamming higher ed: An analysis of phishing content and trends

E Morrow - Computers in Human Behavior, 2024 - Elsevier
Universities are frequent targets of cyberattacks. This investigation seeks to explore common
phishing techniques targeting institutions of higher education. This study analyzes the …

The effects of persuasion principles on perceived honesty during shoulder surfing attacks

KS Jones, MKK Tornblad, ME Armstrong… - … & Computer Security, 2024 - emerald.com
Purpose This study aimed to investigate how honest participants perceived an attacker to be
during shoulder surfing scenarios that varied in terms of which Principle of Persuasion in …

[PDF][PDF] Machine learning for intrusion detection in cyber security: Applications, challenges, and recommendations

A Ali, S Naeem, S Anam, MM Ahmed - UMT Artif. Intell. Rev, 2022 - academia.edu
Innovative Computing Review (ICR) Page 1 Innovative Computing Review (ICR) Volume 2
Issue 2, Fall 2022 ISSN(P): 2791-0024 ISSN(E): 2791-0032 Homepage: https://journals.umt.edu.pk/index.php/ICR …

How frauds in times of crisis target people

D Taodang, RV Gundur - Victims & Offenders, 2023 - Taylor & Francis
While there are no new frauds, internet technology provides new opportunities for fraudsters
by facilitating volumes of attacks that law enforcement then struggles to address. Moreover …