Defining social engineering in cybersecurity

Z Wang, L Sun, H Zhu - IEEe Access, 2020 - ieeexplore.ieee.org
Social engineering has posed a serious security threat to infrastructure, user, data and
operations of cyberspace. Nevertheless, there are many conceptual deficiencies (such as …

SoK: a comprehensive reexamination of phishing research from the security perspective

A Das, S Baki, A El Aassal, R Verma… - … Surveys & Tutorials, 2019 - ieeexplore.ieee.org
Phishing and spear phishing are typical examples of masquerade attacks since trust is built
up through impersonation for the attack to succeed. Given the prevalence of these attacks …

A survey of phishing attack techniques, defence mechanisms and open research challenges

AK Jain, BB Gupta - Enterprise Information Systems, 2022 - Taylor & Francis
Phishing is an identity theft, which deceives Internet users into revealing their sensitive data,
eg, login information, credit/debit card details, and so on. Researchers have developed …

Large language model lateral spear phishing: A comparative study in large-scale organizational settings

M Bethany, A Galiopoulos, E Bethany… - arxiv preprint arxiv …, 2024 - arxiv.org
The critical threat of phishing emails has been further exacerbated by the potential of LLMs
to generate highly targeted, personalized, and automated spear phishing attacks. Two …

Exploring the human factor in cyber-enabled and cyber-dependent crime victimisation: A lifestyle routine activities approach

N Akdemir, CJ Lawless - Internet Research, 2020 - emerald.com
Purpose The purpose of this study was to explore human factors as the possible facilitator of
cyber-dependent (hacking and malware infection) and cyber-enabled (phishing) crimes …

Examining the effect of regulatory factors on avoiding online blackmail threats on social media: A structural equation modeling approach

B AlGhanboosi, S Ali, A Tarhini - Computers in Human Behavior, 2023 - Elsevier
Individuals and organizations rely on social media to share files and knowledge. On the
other hand, criminals find social media applications a rich place to attack through techniques …

“Get a red-hot poker and open up my eyes, it's so boring” 1: Employee perceptions of cybersecurity training

A Reeves, D Calic, P Delfabbro - Computers & security, 2021 - Elsevier
Organisations and security professionals design Security Education, Training, and
Awareness (SETA) programs to improve cybersecurity behaviour, but they are often poorly …

Cognition in social engineering empirical research: a systematic literature review

P Burda, L Allodi, N Zannone - ACM Transactions on Computer-Human …, 2024 - dl.acm.org
The interdisciplinarity of the Social Engineering (SE) domain creates crucial challenges for
the development and advancement of empirical SE research, making it particularly difficult to …

Unraveling the behavioral influence of social media on phishing susceptibility: A Personality-Habit-Information Processing model

ED Frauenstein, S Flowerday, S Mishi… - Information & …, 2023 - Elsevier
Frequent and habitual engagement with social media can reinforce certain activities such as
sharing, clicking hyperlinks, and liking, which may be performed with insufficient cognition …

Beyond self-disclosure: Disclosure of information about others in social network sites

M Koohikamali, DA Peak, VR Prybutok - Computers in Human Behavior, 2017 - Elsevier
Massive amounts of information about others are disclosed across the world on social
network sites every day. Disclosure of information about others may precipitate …