Contemplating social engineering studies and attack scenarios: A review study

A Yasin, R Fatima, L Liu, A Yasin… - Security and …, 2019 - Wiley Online Library
The previous year has seen an enormous increase in the studies related to social
engineering. This increase is partly due to increasing number of social engineering attacks …

Developing a modified total interpretive structural model (M-TISM) for organizational strategic cybersecurity management

R Rajan, NP Rana, N Parameswar, S Dhir… - … Forecasting and Social …, 2021 - Elsevier
Cybersecurity is a serious issue that many organizations face these days. Therefore,
cybersecurity management is very important for any organization. Organizations should …

Moving beyond cyber security awareness and training to engendering security knowledge sharing

S Alahmari, K Renaud, I Omoronyia - Information Systems and e-Business …, 2023 - Springer
Employees play a critical role in improving workplace cyber security, which builds on
widespread security knowledge and expertise. To maximise knowledge levels …

Information privacy behavior in the use of Facebook apps: A personality-based vulnerability assessment

K van der Schyff, S Flowerday, PB Lowry - Heliyon, 2020 - cell.com
The unauthorized use of personal information belonging to users of apps integrated with the
Facebook platform affects millions of users. Crucially, although privacy concerns and …

Enforcing Information System Security: Policies and Procedures for Employee Compliance

A Almuqrin, I Mutambik, A Alomran… - International Journal on …, 2023 - igi-global.com
Every year brings numerous security breaches that lead to highly destructive ransomware
attacks, data leaks, and reputational damage to governments, companies, and other …

Information security education: a thematic trend analysis

PA Rodríguez-Correa, A Valencia-Arias… - …, 2025 - f1000research.com
The evolution of information technologies has led to a significant increase in information
security risks, underscoring the urgent need for professional education in this field to …

Caring Not Scaring-An Evaluation of a Workshop to Train Apprentices as Security Champions

U Menges, J Hielscher, L Kocksch, A Kluge… - Proceedings of the …, 2023 - dl.acm.org
Security champions are regular employees who have deeper knowledge in information
security and a direct connection with the security team. Through this connection, they can …

Privacy Enhancing Technologies (PETs) for connected vehicles in smart cities

NS Safa, F Mitchell, C Maple, MA Azad… - Transactions on …, 2022 - Wiley Online Library
Many Experts believe that the Internet of Things (IoT) is a new revolution in technology that
has brought many benefits for our organizations, businesses, and industries. However …

Network security and Internet of things

S Tayyaba, SA Khan, M Tariq… - Industrial Internet of Things …, 2020 - igi-global.com
Abstract Information security is the most critical component of the information system. It is
also a challenge of the organizations to build a secure network. Every organization that …

Causal analysis of attacks against honeypots based on properties of countries

M Zuzčák, P Bujok - IET Information Security, 2019 - Wiley Online Library
This study studies the influence of country attributes on the number of secure shell attacks
originating from it detected by the author's honeynet. Four statistical models are described …