Educating and raising awareness on cyber security social engineering: A literature review

H Aldawood, G Skinner - 2018 IEEE international conference …, 2018 - ieeexplore.ieee.org
Social engineering, due in part to the increasing popularity and advancements in
information technology and ubiquity of devices, has emerged as one of the most challenging …

A literature survey on social engineering attacks: Phishing attack

S Gupta, A Singhal, A Kapoor - 2016 international conference …, 2016 - ieeexplore.ieee.org
Phishing is a network type attack where the attacker creates the fake of an existing webpage
to fool an online user into elicit personal Information. The prime objective of this review is to …

Social engineering attack examples, templates and scenarios

F Mouton, L Leenen, HS Venter - Computers & Security, 2016 - Elsevier
The field of information security is a fast-growing discipline. Even though the effectiveness of
security measures to protect sensitive information is increasing, people remain susceptible …

Social engineering in cybersecurity: The evolution of a concept

JM Hatfield - Computers & Security, 2018 - Elsevier
This paper offers a history of the concept of social engineering in cybersecurity and argues
that while the term began its life in the study of politics, and only later gained usage within …

Digital Deception: Generative artificial intelligence in social engineering and phishing

M Schmitt, I Flechais - Artificial Intelligence Review, 2024 - Springer
Abstract The advancement of Artificial Intelligence (AI) and Machine Learning (ML) has
profound implications for both the utility and security of our digital interactions. This paper …

Covid-19 and phishing: Effects of human emotions, behavior, and demographics on the success of phishing attempts during the pandemic

H Abroshan, J Devos, G Poels, E Laermans - Ieee Access, 2021 - ieeexplore.ieee.org
Phishing is an online scam where criminals trick users with various strategies, with the goal
of obtaining sensitive information or compromising accounts, systems, and/or other personal …

Improving software security awareness using a serious game

A Yasin, L Liu, T Li, R Fatima, W Jianmin - IET Software, 2019 - Wiley Online Library
Protecting people from cyber threats imposes great challenges, not only technically, but also
socially. To achieve the intended level of awareness, software security principles need to be …

Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)

A Yasin, L Liu, T Li, J Wang, D Zowghi - Information and Software …, 2018 - Elsevier
Context: Security, in digitally connected organizational environments of today, involves
many different perspectives, including social, physical, and technical factors. In order to …

How social engineers use persuasion principles during vishing attacks

KS Jones, ME Armstrong, MKK Tornblad… - … & Computer Security, 2021 - emerald.com
Purpose This study aims to examine how social engineers use persuasion principles during
vishing attacks. Design/methodology/approach In total, 86 examples of real-world vishing …

Social engineering: IE based model of human weakness for attack and defense investigations

W Fan, L Kevin, R Rong - IJ Computer Network and Information Security, 2017 - oa.upm.es
Social engineering is the attack aimed to manipulate dupe to divulge sensitive information or
take actions to help the adversary bypass the secure perimeter in front of the information …