How effective are social engineering interventions? A meta-analysis

JW Bullee, M Junger - Information & Computer Security, 2020 - emerald.com
Purpose Social engineering is a prominent aspect of online crime. Various interventions
have been developed to reduce the success of this type of attacks. This paper aims to …

Key factors influencing knowledge sharing practices and its relationship with organizational performance within the oil and gas industry

A Abdelwhab Ali, DDD Panneer selvam… - Journal of Knowledge …, 2019 - emerald.com
Purpose This study aims to investigate the key elements that influence knowledge sharing
practice, primarily the relationship between knowledge sharing practice and organizational …

[图书][B] Persuasion: Social influence and compliance gaining

RH Gass, JS Seiter - 2022 - taylorfrancis.com
The seventh edition of this field-leading textbook provides an accessible and rigorous
presentation of major theories of persuasion and their applications to a variety of real-world …

Managing cyber and information risks in supply chains: insights from an exploratory analysis

C Colicchia, A Creazza, DA Menachof - Supply Chain Management …, 2019 - emerald.com
Purpose The purpose of this paper is to explore how companies approach the management
of cyber and information risks in their supply chain, what initiatives they adopt to this aim …

Privacy concerns and disclosure of biometric and behavioral data for travel

A Ioannou, I Tussyadiah, Y Lu - International Journal of Information …, 2020 - Elsevier
In light of mounting privacy concerns over the increasing collection and use of biometric and
behavioral information for travel facilitation, this study examines travelers' online privacy …

Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?

Z Yan, T Robertson, R Yan, SY Park, S Bordoff… - Computers in Human …, 2018 - Elsevier
It has been widely recognized in the psychology of cybersecurity literature that ordinary
users rather than technology systems are the weakest link in cybersecurity. The present …

Analysis of the risk-sharing ratio in PPP projects based on government minimum revenue guarantees

Y Wang, P Cui, J Liu - International Journal of Project Management, 2018 - Elsevier
Public-private partnership (PPP) projects have been widely applied in infrastructure
construction. A suitable risk distribution strategy is crucial for promoting negotiations …

[HTML][HTML] An interdisciplinary view of social engineering: A call to action for research

AH Washo - Computers in Human Behavior Reports, 2021 - Elsevier
Social engineering is the act of using manipulation and deception to obtain access to
confidential information. It is considered one of the leading threats to information security …

How perceived social distance and trust influence reciprocity expectations and eWOM sharing intention in social commerce

X Yang - Industrial Management & Data Systems, 2019 - emerald.com
Purpose Currently, consumers can easily access social media to share information and
experiences. How a relationship between these consumers influences their decisions has …

Teenagers' perception of risk behaviors regarding digital technologies

A Lareki, JIM de Morentin, J Altuna… - Computers in Human …, 2017 - Elsevier
This article analyses young people's perception of risk behaviors in relation to the use of
technology. To do this a study was conducted, in which 1486 young people aged from 9 to …