Educating and raising awareness on cyber security social engineering: A literature review
H Aldawood, G Skinner - 2018 IEEE international conference …, 2018 - ieeexplore.ieee.org
Social engineering, due in part to the increasing popularity and advancements in
information technology and ubiquity of devices, has emerged as one of the most challenging …
information technology and ubiquity of devices, has emerged as one of the most challenging …
A literature survey on social engineering attacks: Phishing attack
Phishing is a network type attack where the attacker creates the fake of an existing webpage
to fool an online user into elicit personal Information. The prime objective of this review is to …
to fool an online user into elicit personal Information. The prime objective of this review is to …
Social engineering attack examples, templates and scenarios
The field of information security is a fast-growing discipline. Even though the effectiveness of
security measures to protect sensitive information is increasing, people remain susceptible …
security measures to protect sensitive information is increasing, people remain susceptible …
Social engineering in cybersecurity: The evolution of a concept
JM Hatfield - Computers & Security, 2018 - Elsevier
This paper offers a history of the concept of social engineering in cybersecurity and argues
that while the term began its life in the study of politics, and only later gained usage within …
that while the term began its life in the study of politics, and only later gained usage within …
Digital Deception: Generative artificial intelligence in social engineering and phishing
M Schmitt, I Flechais - Artificial Intelligence Review, 2024 - Springer
Abstract The advancement of Artificial Intelligence (AI) and Machine Learning (ML) has
profound implications for both the utility and security of our digital interactions. This paper …
profound implications for both the utility and security of our digital interactions. This paper …
Covid-19 and phishing: Effects of human emotions, behavior, and demographics on the success of phishing attempts during the pandemic
Phishing is an online scam where criminals trick users with various strategies, with the goal
of obtaining sensitive information or compromising accounts, systems, and/or other personal …
of obtaining sensitive information or compromising accounts, systems, and/or other personal …
Improving software security awareness using a serious game
Protecting people from cyber threats imposes great challenges, not only technically, but also
socially. To achieve the intended level of awareness, software security principles need to be …
socially. To achieve the intended level of awareness, software security principles need to be …
Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)
Context: Security, in digitally connected organizational environments of today, involves
many different perspectives, including social, physical, and technical factors. In order to …
many different perspectives, including social, physical, and technical factors. In order to …
How social engineers use persuasion principles during vishing attacks
Purpose This study aims to examine how social engineers use persuasion principles during
vishing attacks. Design/methodology/approach In total, 86 examples of real-world vishing …
vishing attacks. Design/methodology/approach In total, 86 examples of real-world vishing …
Social engineering: IE based model of human weakness for attack and defense investigations
W Fan, L Kevin, R Rong - IJ Computer Network and Information Security, 2017 - oa.upm.es
Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or
take actions to help the adversary bypass the secure perimeter in front of the information …
take actions to help the adversary bypass the secure perimeter in front of the information …