[HTML][HTML] Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues

H Aldawood, G Skinner - Future internet, 2019 - mdpi.com
The idea and perception of good cyber security protection remains at the forefront of many
organizations' information and communication technology strategy and investment …

[HTML][HTML] Two-factor authentication scheme for mobile money: A review of threat models and countermeasures

G Ali, M Ally Dida, A Elikana Sam - Future Internet, 2020 - mdpi.com
The proliferation of digital financial innovations like mobile money has led to the rise in
mobile subscriptions and transactions. It has also increased the security challenges …

Cybersecurity risks, vulnerabilities, and countermeasures to prevent social engineering attacks

NY Conteh, PJ Schmick - Ethical hacking techniques and …, 2021 - igi-global.com
The broad objective of this study is to evaluate the vulnerabilities of an organization's
information technology infrastructure, which include hardware and software systems …

[HTML][HTML] An empirical assessment of endpoint detection and response systems against advanced persistent threats attack vectors

G Karantzas, C Patsakis - Journal of Cybersecurity and Privacy, 2021 - mdpi.com
Advanced persistent threats pose a significant challenge for blue teams as they apply
various attacks over prolonged periods, impeding event correlation and their detection. In …

Finding the weakest links in the weakest link: How well do undergraduate students make cybersecurity judgment?

Z Yan, T Robertson, R Yan, SY Park, S Bordoff… - Computers in Human …, 2018 - Elsevier
It has been widely recognized in the psychology of cybersecurity literature that ordinary
users rather than technology systems are the weakest link in cybersecurity. The present …

A multi-level influence model of COVID-19 themed cybercrime

R Naidoo - European Journal of Information Systems, 2020 - Taylor & Francis
The recent severity and frequency of cybercrime has been dominated by a single theme–the
COVID-19 pandemic. This research develops a multi-level influence model to explore how …

Social engineering attack strategies and defence approaches

I Ghafir, V Prenosil, A Alhejailan… - 2016 IEEE 4th …, 2016 - ieeexplore.ieee.org
This paper examines the role and value of information security awareness efforts in
defending against social engineering attacks. It categories the different social engineering …

Towards an improved understanding of human factors in cybersecurity

J Jeong, J Mihelcic, G Oliver… - 2019 IEEE 5th …, 2019 - ieeexplore.ieee.org
Cybersecurity cannot be addressed by technology alone; the most intractable aspects are in
fact sociotechnical. As a result, the'human factor'has been recognised as being the weakest …

Εnhancing social networking in smart cities: Privacy and security borderlines

V Moustaka, Z Theodosiou, A Vakali… - … Forecasting and Social …, 2019 - Elsevier
The proliferation of social platforms and the enhanced connectivity have led people of
different age groups, ethnicity, social or economic status to reveal a great deal about …

On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks

JWH Bullée, L Montoya, W Pieters… - Journal of …, 2018 - Wiley Online Library
The aim of this study was to explore the extent to which persuasion principles are used in
successful social engineering attacks. Seventy‐four scenarios were extracted from 4 books …