Social engineering attacks prevention: A systematic literature review
Social engineering is an attack on information security for accessing systems or networks.
Social engineering attacks occur when victims do not recognize methods, models, and …
Social engineering attacks occur when victims do not recognize methods, models, and …
[HTML][HTML] Learning from safety science: A way forward for studying cybersecurity incidents in organizations
In the aftermath of cybersecurity incidents within organizations, explanations of their causes
often revolve around isolated technical or human events such as an Advanced Persistent …
often revolve around isolated technical or human events such as an Advanced Persistent …
Security operations center: A systematic study and open challenges
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …
importance has grown significantly, especially over the last five years. This is mainly due to …
Social engineering in cybersecurity: The evolution of a concept
JM Hatfield - Computers & Security, 2018 - Elsevier
This paper offers a history of the concept of social engineering in cybersecurity and argues
that while the term began its life in the study of politics, and only later gained usage within …
that while the term began its life in the study of politics, and only later gained usage within …
Cyber risk assessment in small and medium‐sized enterprises: A multilevel decision‐making approach for small e‐tailors
The role played by information and communication technologies in today's businesses
cannot be underestimated. While such technological advancements provide numerous …
cannot be underestimated. While such technological advancements provide numerous …
[HTML][HTML] Exploring the evidence for email phishing training: A sco** review
Background Phishing emails are a pervasive threat to the security of confidential
information. To mitigate this risk, a range of training measures have been developed to …
information. To mitigate this risk, a range of training measures have been developed to …
Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework
The notion that the human user is the weakest link in information security has been strongly,
and, we argue, rightly contested in recent years. Here, we take a step further showing that …
and, we argue, rightly contested in recent years. Here, we take a step further showing that …
Remote work during the COVID-19 pandemic: identification of working life impacts, employees' data protection abilities and trust outcomes
T Kähkönen - Journal of organizational change management, 2023 - emerald.com
Purpose This study examined employees' experiences of remote work and the impact of
remote work on working life. Design/methodology/approach This was a mixed-methods …
remote work on working life. Design/methodology/approach This was a mixed-methods …
Time to Change the CVSS?
According to its creators, the Common Vulnerability Scoring System (CVSS)" provides a way
to capture the principal characteristics of a vulnerability... reflecting its severity... to help …
to capture the principal characteristics of a vulnerability... reflecting its severity... to help …
The role of cue utilization in the detection of phishing emails
This study was designed to examine the roles of cue utilization, phishing features and time
pressure in the detection of phishing emails. During two experiments, participants completed …
pressure in the detection of phishing emails. During two experiments, participants completed …