Social engineering attacks prevention: A systematic literature review

W Syafitri, Z Shukur, U Asma'Mokhtar… - IEEE …, 2022 - ieeexplore.ieee.org
Social engineering is an attack on information security for accessing systems or networks.
Social engineering attacks occur when victims do not recognize methods, models, and …

[HTML][HTML] Learning from safety science: A way forward for studying cybersecurity incidents in organizations

N Ebert, T Schaltegger, B Ambuehl, L Schöni… - Computers & …, 2023 - Elsevier
In the aftermath of cybersecurity incidents within organizations, explanations of their causes
often revolve around isolated technical or human events such as an Advanced Persistent …

Security operations center: A systematic study and open challenges

M Vielberth, F Böhm, I Fichtinger, G Pernul - Ieee Access, 2020 - ieeexplore.ieee.org
Since the introduction of Security Operations Centers (SOCs) around 15 years ago, their
importance has grown significantly, especially over the last five years. This is mainly due to …

Social engineering in cybersecurity: The evolution of a concept

JM Hatfield - Computers & Security, 2018 - Elsevier
This paper offers a history of the concept of social engineering in cybersecurity and argues
that while the term began its life in the study of politics, and only later gained usage within …

Cyber risk assessment in small and medium‐sized enterprises: A multilevel decision‐making approach for small e‐tailors

A Sukumar, HA Mahdiraji, V Jafari‐Sadeghi - Risk Analysis, 2023 - Wiley Online Library
The role played by information and communication technologies in today's businesses
cannot be underestimated. While such technological advancements provide numerous …

[HTML][HTML] Exploring the evidence for email phishing training: A sco** review

N Marshall, D Sturman, JC Auton - Computers & Security, 2024 - Elsevier
Background Phishing emails are a pervasive threat to the security of confidential
information. To mitigate this risk, a range of training measures have been developed to …

Detecting semantic social engineering attacks with the weakest link: Implementation and empirical evaluation of a human-as-a-security-sensor framework

R Heartfield, G Loukas - Computers & Security, 2018 - Elsevier
The notion that the human user is the weakest link in information security has been strongly,
and, we argue, rightly contested in recent years. Here, we take a step further showing that …

Remote work during the COVID-19 pandemic: identification of working life impacts, employees' data protection abilities and trust outcomes

T Kähkönen - Journal of organizational change management, 2023 - emerald.com
Purpose This study examined employees' experiences of remote work and the impact of
remote work on working life. Design/methodology/approach This was a mixed-methods …

Time to Change the CVSS?

J Spring, E Hatleback, A Householder… - IEEE Security & …, 2021 - ieeexplore.ieee.org
According to its creators, the Common Vulnerability Scoring System (CVSS)" provides a way
to capture the principal characteristics of a vulnerability... reflecting its severity... to help …

The role of cue utilization in the detection of phishing emails

D Sturman, C Valenzuela, O Plate, T Tanvir, JC Auton… - Applied Ergonomics, 2023 - Elsevier
This study was designed to examine the roles of cue utilization, phishing features and time
pressure in the detection of phishing emails. During two experiments, participants completed …