Social engineering attacks: A survey

F Salahdine, N Kaabouch - Future internet, 2019 - mdpi.com
The advancements in digital communication technology have made communication
between humans more accessible and instant. However, personal and sensitive information …

Exposing the darkness within: A review of dark personality traits, models, and measures and their relationship to insider threats

PD Harms, A Marbut, AC Johnston, P Lester… - Journal of Information …, 2022 - Elsevier
Insider threats are a pernicious threat to modern organizations that involve individuals
intentionally or unintentionally engaging in behaviors that undermine or abuse information …

[HTML][HTML] Using protection motivation theory in the design of nudges to improve online security behavior

R Van Bavel, N Rodríguez-Priego, J Vila… - International Journal of …, 2019 - Elsevier
We conducted an online experiment (n= 2024) on a representative sample of internet users
in Germany, Sweden, Poland, Spain and the UK to explore the effect of notifications on …

Addressing human factors in cybersecurity leadership

WJ Triplett - Journal of Cybersecurity and Privacy, 2022 - mdpi.com
This article identifies human factors in workplaces that contribute to the challenges faced by
cybersecurity leadership within organizations and discusses strategic communication …

Detecting insider threat via a cyber-security culture framework

A Georgiadou, S Mouzakitis… - Journal of Computer …, 2022 - Taylor & Francis
Insider threat has been recognized by both scientific community and security professionals
as one of the gravest security hazards for private companies, institutions, and governmental …

[HTML][HTML] Human factors in electronic health records cybersecurity breach: an exploratory analysis

LH Yeo, J Banfield - Perspectives in health information …, 2022 - ncbi.nlm.nih.gov
The healthcare sector continues to be the industry suffering one of the highest costs of a
data security breach. Healthcare lags behind other industries in cybersecurity preparedness …

Employees' behavioural intention to smartphone security: A gender-based, cross-national study

N Ameen, A Tarhini, MH Shah, NO Madichie - Computers in Human …, 2020 - Elsevier
Despite the benefits of bring your own device (BYOD) programmes, they are considered one
of the top security risks companies are facing. Furthermore, there is a gap in the literature in …

A conceptual model for cybersecurity governance

S Yusif, A Hafeez-Baig - Journal of applied security research, 2021 - Taylor & Francis
Cybersecurity is a growing problem associated with everything an individual or an
organization does that is facilitated by the Internet. It is a multi-facetted program that can be …

Cybersecurity Capabilities in Develo** Nations and Its Impact on Global Security: A Survey of Social Engineering Attacks and Steps for Mitigation of These Attacks

N Yathiraju, G Jakka, SK Parisa, O Oni - … Capabilities in Develo** …, 2022 - igi-global.com
Cybersecurity refers to the organizational practices followed by the different multinational
companies to defend their computers, servers, mobile devices, and networks from malicious …

Planning for Cyber Security in Schools: The Human Factor.

MD Richardson, PA Lemoine, WE Stephens… - Educational Planning, 2020 - ERIC
Cybersecurity has emerged as one of the most critical issues confronting schools in the 21st
century. Computer security is an essential instrument for protecting children, but K-12 …