Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Defining social engineering in cybersecurity
Social engineering has posed a serious security threat to infrastructure, user, data and
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …
SoK: a comprehensive reexamination of phishing research from the security perspective
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
up through impersonation for the attack to succeed. Given the prevalence of these attacks …
A survey of phishing attack techniques, defence mechanisms and open research challenges
AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …
eg, login information, credit/debit card details, and so on. Researchers have developed …
Large language model lateral spear phishing: A comparative study in large-scale organizational settings
The critical threat of phishing emails has been further exacerbated by the potential of LLMs
to generate highly targeted, personalized, and automated spear phishing attacks. Two …
to generate highly targeted, personalized, and automated spear phishing attacks. Two …
Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: A lifestyle routine activities approach
N Akdemir, CJ Lawless - Internet Research, 2020 - emerald.com
Purpose The purpose of this study was to explore human factors as the possible facilitator of
cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes …
cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes …
Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach
Individuals and organizations rely on social media to share files and knowledge. On the
other hand, criminals find social media applications a rich place to attack through techniques …
other hand, criminals find social media applications a rich place to attack through techniques …
“Get a red-hot poker and open up my eyes, it's so boring” 1: Employee perceptions of cybersecurity training
Organisations and security professionals design Security Education, Training, and
Awareness (SETA) programs to improve cybersecurity behaviour, but they are often poorly …
Awareness (SETA) programs to improve cybersecurity behaviour, but they are often poorly …
Cognition in social engineering empirical research: a systematic literature review
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …
the development and advancement of empirical SE research, making it particularly difficult to …
Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model
Frequent and habitual engagement with social media can reinforce certain activities such as
sharing, clicking hyperlinks, and liking, which may be performed with insufficient cognition …
sharing, clicking hyperlinks, and liking, which may be performed with insufficient cognition …
Beyond self-disclosure: Disclosure of information about others in social network sites
Massive amounts of information about others are disclosed across the world on social
network sites every day. Disclosure of information about others may precipitate …
network sites every day. Disclosure of information about others may precipitate …