A new direction in social network analysis: Online social network analysis problems and applications

U Can, B Alatas - Physica A: Statistical Mechanics and its Applications, 2019 - Elsevier
The use of online social networks has made significant progress in recent years as the use
of the Internet has become widespread worldwide as the technological infrastructure and the …

Defining social engineering in cybersecurity

Z Wang, L Sun, H Zhu - IEEE Access, 2020 - ieeexplore.ieee.org
Social engineering has posed a serious security threat to infrastructure, user, data and
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …

Advanced social engineering attacks

K Krombholz, H Hobel, M Huber, E Weippl - Journal of Information Security …, 2015 - Elsevier
Social engineering has emerged as a serious threat in virtual communities and is an
effective means to attack information systems. The services used by today's knowledge …

Social engineering attack examples, templates and scenarios

F Mouton, L Leenen, HS Venter - Computers & Security, 2016 - Elsevier
The field of information security is a fast-growing discipline. Even though the effectiveness of
security measures to protect sensitive information is increasing, people remain susceptible …

Social engineering in cybersecurity: The evolution of a concept

JM Hatfield - Computers & Security, 2018 - Elsevier
This paper offers a history of the concept of social engineering in cybersecurity and argues
that while the term began its life in the study of politics, and only later gained usage within …

Personalized persuasion: Quantifying susceptibility to information exploitation in spear-phishing attacks

T Xu, K Singh, P Rajivan - Applied Ergonomics, 2023 - Elsevier
Many cyberattacks begin with a malicious email message, known as spear phishing,
targeted at unsuspecting victims. Although security technologies have improved significantly …

A serious game for eliciting social engineering security requirements

K Beckers, S Pape - 2016 IEEE 24th International …, 2016 - ieeexplore.ieee.org
Social engineering is the acquisition of information about computer systems by methods that
deeply include nontechnical means. While technical security of most critical systems is high …

Usable security for QR code

R Focardi, FL Luccio, HAM Wahsheh - Journal of Information Security and …, 2019 - Elsevier
QR codes are widely used in various settings such as consumer advertising, commercial
tracking, ticketing and marketing. People tend to scan QR codes and trust their content, but …

[HTML][HTML] Panning for gold: Automatically analysing online social engineering attack surfaces

M Edwards, R Larson, B Green, A Rashid, A Baron - computers & security, 2017 - Elsevier
The process of social engineering targets people rather than IT infrastructure. Attackers use
deceptive ploys to create compelling behavioural and cosmetic hooks, which in turn lead a …

A critical appraisal of contemporary cyber security social engineering solutions: Measures, policies, tools and applications

HA Aldawood, G Skinner - 2018 26th International Conference …, 2018 - ieeexplore.ieee.org
Social engineering is one of the biggest threats organizations face today, as more and more
companies are adopting digitalization. This study presents a critical review of the existing …