[HTML][HTML] Cyber security threats: A never-ending challenge for e-commerce

X Liu, SF Ahmad, MK Anser, J Ke, M Irshad… - Frontiers in …, 2022 - frontiersin.org
This study explores the challenge of cyber security threats that e-commerce technology and
business are facing. Technology applications for e-commerce are attracting attention from …

Human factors in phishing attacks: a systematic literature review

G Desolda, LS Ferro, A Marrella, T Catarci… - ACM Computing …, 2021 - dl.acm.org
Phishing is the fraudulent attempt to obtain sensitive information by disguising oneself as a
trustworthy entity in digital communication. It is a type of cyber attack often successful …

[HTML][HTML] Addressing human factors in cybersecurity leadership

WJ Triplett - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
This article identifies human factors in workplaces that contribute to the challenges faced by
cybersecurity leadership within organizations and discusses strategic communication …

A survey on blockchain, SDN and NFV for the smart-home security

M Bhuyan, S Kashihara, D Fall, Y Taenaka… - Internet of Things, 2022 - Elsevier
Due to millions of loosely coupled devices, the smart-home security is gaining the attention
of industry professionals, attackers, and academic researchers. The smart home is a typical …

[HTML][HTML] An empirical assessment of endpoint detection and response systems against advanced persistent threats attack vectors

G Karantzas, C Patsakis - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Advanced persistent threats pose a significant challenge for blue teams as they apply
various attacks over prolonged periods, impeding event correlation and their detection. In …

Towards an improved understanding of human factors in cybersecurity

J Jeong, J Mihelcic, G Oliver… - 2019 IEEE 5th …, 2019 - ieeexplore.ieee.org
Cybersecurity cannot be addressed by technology alone; the most intractable aspects are in
fact sociotechnical. As a result, the'human factor'has been recognised as being the weakest …

[HTML][HTML] The impact of formal and informal organizational norms on susceptibility to phishing: Combining survey and field experiment data

G Petrič, K Roer - Telematics and Informatics, 2022 - Elsevier
Phishing is one of the most common forms of social engineering that exploits human
vulnerabilities and causes immense personal and organizational costs. This study advances …

How senior management and workplace norms influence information security attitudes and self-efficacy

S Cuganesan, C Steele, A Hart - Behaviour & Information …, 2018 - Taylor & Francis
Prior information security research establishes the need to investigate the informal factors
that influence employee attitudes and self-efficacy beliefs about information security. Two …

A systematic literature review: Information security culture

A Mahfuth, S Yussof, AA Baker… - … Conference on Research …, 2017 - ieeexplore.ieee.org
Human behavior inside organizations is considered the main threat to organizations.
Moreover, in information security the human element consider the most of weakest link in …

[HTML][HTML] A systematic review of scales for measuring information security culture

Š Orehek, G Petrič - Information & Computer Security, 2021 - emerald.com
Purpose The concept of information security culture, which recently gained increased
attention, aims to comprehensively grasp socio-cultural mechanisms that have an impact on …