[HTML][HTML] Sensors for context-aware smart healthcare: A security perspective

E Batista, MA Moncusi, P López-Aguilar… - Sensors, 2021 - mdpi.com
The advances in the miniaturisation of electronic devices and the deployment of cheaper
and faster data networks have propelled environments augmented with contextual and real …

[HTML][HTML] Information security and privacy in railway transportation: A systematic review

P López-Aguilar, E Batista, A Martínez-Ballesté… - Sensors, 2022 - mdpi.com
Intelligent transportation systems will play a key role in the smart cities of the future. In
particular, railway transportation is gaining attention as a promising solution to cope with the …

Spear-phishing susceptibility stemming from personality traits

S Eftimie, R Moinescu, C Răcuciu - IEEE Access, 2022 - ieeexplore.ieee.org
This study explores the psychological aspects of social engineering by analyzing personality
traits in the context of spear-phishing attacks. Phishing emails were constructed by …

Personality types and ransomware victimisation

Y Yilmaz, O Çetin, C Grigore, B Arief… - … Threats: Research and …, 2023 - dl.acm.org
Ransomware remains one of the most prevalent cyberthreats to individuals and businesses
alike. Psychological techniques are often employed by attackers when infecting victims' …

The role of extraversion in phishing victimisation: A systematic literature review

P López-Aguilar, C Patsakis… - 2022 APWG Symposium …, 2022 - ieeexplore.ieee.org
Over the last decade, phishing attacks have become preeminent and increasingly
successful. Anti-phishing strategies focus on raising awareness and training users to identify …

Discovering the correlation between phishing susceptibility causing data biases and big five personality traits using C-GAN

AU Rahman, F Al-Obeidat, A Tubaishat… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
Recently, on social media, various kinds of social engineering (SE) have made individuals
more susceptible to attacks. A phishing attempt is a widely used SE technique that takes …

[HTML][HTML] Mental states: A key point in scam compliance and warning compliance in real life

X Wen, L Xu, J Wang, Y Gao, J Shi, K Zhao… - International Journal of …, 2022 - mdpi.com
The internet's convenience and anonymity have facilitated different types of covert fraud,
resulting in economic, mental, and social harm to victims. Understanding why people are …

Enhancing Cybersecurity: The Crucial Role of Self-Regulation, Information Processing, and Financial Knowledge in Combating Phishing Attacks

M Waqas, A Hania, F Yahya, I Malik - SAGE Open, 2023 - journals.sagepub.com
In today's technologically advanced world, the escalating prevalence of phishing attacks
necessitates an urgent exploration of effective countermeasures. This study delves into the …

Cyber Security Concerns for IoB

S Patil, A Vanmali, R Bansode - Internet of Behaviors (IoB), 2023 - taylorfrancis.com
Internet of Behavior (IoB) deals in analyzing the behavioral psychology of customers through
a wide variety of data gathered through various IoT platforms. This integration of behavioral …

[PDF][PDF] You Know What?-Evaluation of a Personalised Phishing Training Based on Users' Phishing Knowledge and Detection Skills

L Schöni, V Carles, M Strohmeier… - The 2024 European …, 2024 - eurousec24.kau.se
Training is important to support users in phishing detection. To better match phishing
training content with users' current skills, personalised training has huge potential …