Cybersecurity threats in FinTech: A systematic review
D Javaheri, M Fahmideh, H Chizari, P Lalbakhsh… - Expert Systems with …, 2024 - Elsevier
The rapid evolution of the Smart-everything movement and Artificial Intelligence (AI)
advancements have given rise to sophisticated cyber threats that traditional methods cannot …
advancements have given rise to sophisticated cyber threats that traditional methods cannot …
Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues
H Aldawood, G Skinner - Future internet, 2019 - mdpi.com
The idea and perception of good cyber security protection remains at the forefront of many
organizations' information and communication technology strategy and investment …
organizations' information and communication technology strategy and investment …
Survey on wireless network security
R Nazir, AA Laghari, K Kumar, S David… - Archives of Computational …, 2021 - Springer
A wireless network is used to connect various wired organizational structures and provide
connectivity within the organization for employees to move freely by avoiding the hurdle of a …
connectivity within the organization for employees to move freely by avoiding the hurdle of a …
Internet-based social engineering psychology, attacks, and defenses: A survey
TT Longtchi, RM Rodriguez, L Al-Shawaf… - Proceedings of the …, 2024 - ieeexplore.ieee.org
Internet-based social engineering (SE) attacks are a major cyber threat. These attacks often
serve as the first step in a sophisticated sequence of attacks that target, among other things …
serve as the first step in a sophisticated sequence of attacks that target, among other things …
The impact of cyberattacks awareness on customers' trust and commitment: an empirical evidence from the Pakistani banking sector
Purpose The banking industry has always been vulnerable to cyberattacks. In recent years,
Pakistan's banking sector experienced the most intense cyberattack in its over 70-year …
Pakistan's banking sector experienced the most intense cyberattack in its over 70-year …
[PDF][PDF] A critical review of emerging cybersecurity threats in financial technologies
The rapid evolution of financial technologies (FinTech) has revolutionized the financial
landscape, providing unprecedented convenience and efficiency. However, this …
landscape, providing unprecedented convenience and efficiency. However, this …
[HTML][HTML] An interdisciplinary view of social engineering: A call to action for research
AH Washo - Computers in Human Behavior Reports, 2021 - Elsevier
Social engineering is the act of using manipulation and deception to obtain access to
confidential information. It is considered one of the leading threats to information security …
confidential information. It is considered one of the leading threats to information security …
[HTML][HTML] Two-factor authentication scheme for mobile money: A review of threat models and countermeasures
G Ali, M Ally Dida, A Elikana Sam - Future Internet, 2020 - mdpi.com
The proliferation of digital financial innovations like mobile money has led to the rise in
mobile subscriptions and transactions. It has also increased the security challenges …
mobile subscriptions and transactions. It has also increased the security challenges …
[HTML][HTML] An effective approach to mobile device management: Security and privacy issues associated with mobile applications
D Hayes, F Cappa, NA Le-Khac - Digital Business, 2020 - Elsevier
Consumers and organizations often rely on permissions requested during the installation of
mobile applications (apps) and on official privacy policies to determine how safe an app is …
mobile applications (apps) and on official privacy policies to determine how safe an app is …
A critical appraisal of contemporary cyber security social engineering solutions: Measures, policies, tools and applications
HA Aldawood, G Skinner - 2018 26th International Conference …, 2018 - ieeexplore.ieee.org
Social engineering is one of the biggest threats organizations face today, as more and more
companies are adopting digitalization. This study presents a critical review of the existing …
companies are adopting digitalization. This study presents a critical review of the existing …