A new direction in social network analysis: Online social network analysis problems and applications
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …
of the Internet has become widespread worldwide as the technological infrastructure and the …
Defining social engineering in cybersecurity
Social engineering has posed a serious security threat to infrastructure, user, data and
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …
Advanced social engineering attacks
Social engineering has emerged as a serious threat in virtual communities and is an
effective means to attack information systems. The services used by today's knowledge …
effective means to attack information systems. The services used by today's knowledge …
Social engineering attack examples, templates and scenarios
The field of information security is a fast-growing discipline. Even though the effectiveness of
security measures to protect sensitive information is increasing, people remain susceptible …
security measures to protect sensitive information is increasing, people remain susceptible …
Social engineering in cybersecurity: The evolution of a concept
JM Hatfield - Computers & Security, 2018 - Elsevier
This paper offers a history of the concept of social engineering in cybersecurity and argues
that while the term began its life in the study of politics, and only later gained usage within …
that while the term began its life in the study of politics, and only later gained usage within …
Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks
Many cyberattacks begin with a malicious email message, known as spear phishing,
targeted at unsuspecting victims. Although security technologies have improved significantly …
targeted at unsuspecting victims. Although security technologies have improved significantly …
A serious game for eliciting social engineering security requirements
Social engineering is the acquisition of information about computer systems by methods that
deeply include nontechnical means. While technical security of most critical systems is high …
deeply include nontechnical means. While technical security of most critical systems is high …
Usable security for QR code
QR codes are widely used in various settings such as consumer advertising, commercial
tracking, ticketing and marketing. People tend to scan QR codes and trust their content, but …
tracking, ticketing and marketing. People tend to scan QR codes and trust their content, but …
[HTML][HTML] Panning for gold: Automatically analysing online social engineering attack surfaces
The process of social engineering targets people rather than IT infrastructure. Attackers use
deceptive ploys to create compelling behavioural and cosmetic hooks, which in turn lead a …
deceptive ploys to create compelling behavioural and cosmetic hooks, which in turn lead a …
A critical appraisal of contemporary cyber security social engineering solutions: Measures, policies, tools and applications
HA Aldawood, G Skinner - 2018 26th International Conference …, 2018 - ieeexplore.ieee.org
Social engineering is one of the biggest threats organizations face today, as more and more
companies are adopting digitalization. This study presents a critical review of the existing …
companies are adopting digitalization. This study presents a critical review of the existing …