Contemplating social engineering studies and attack scenarios: A review study
The previous year has seen an enormous increase in the studies related to social
engineering. This increase is partly due to increasing number of social engineering attacks …
engineering. This increase is partly due to increasing number of social engineering attacks …
Social engineering attack examples, templates and scenarios
The field of information security is a fast-growing discipline. Even though the effectiveness of
security measures to protect sensitive information is increasing, people remain susceptible …
security measures to protect sensitive information is increasing, people remain susceptible …
A principlist framework for cybersecurity ethics
The ethical issues raised by cybersecurity practices and technologies are of critical
importance. However, there is disagreement about what is the best ethical framework for …
importance. However, there is disagreement about what is the best ethical framework for …
[HTML][HTML] An interdisciplinary view of social engineering: A call to action for research
AH Washo - Computers in Human Behavior Reports, 2021 - Elsevier
Social engineering is the act of using manipulation and deception to obtain access to
confidential information. It is considered one of the leading threats to information security …
confidential information. It is considered one of the leading threats to information security …
On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks
The aim of this study was to explore the extent to which persuasion principles are used in
successful social engineering attacks. Seventy‐four scenarios were extracted from 4 books …
successful social engineering attacks. Seventy‐four scenarios were extracted from 4 books …
A Comprehensive Taxonomy of Social Engineering Attacks and Defense Mechanisms: Towards Effective Mitigation Strategies
Social engineering (SE) attacks are a growing concern for organizations that rely on
technology to protect sensitive data. Identifying and preventing these attacks can be …
technology to protect sensitive data. Identifying and preventing these attacks can be …
Virtuous human hacking: The ethics of social engineering in penetration-testing
JM Hatfield - Computers & Security, 2019 - Elsevier
This paper offers a virtue ethics analysis of social engineering in penetration-testing. It
begins by considering previous research on this topic and argues that such attempts …
begins by considering previous research on this topic and argues that such attempts …
Understanding and deciphering of social engineering attack scenarios
Malicious scammers and social engineers are causing great harms to modern society, as
they have led to the loss of data, information, money, and many more for individuals and …
they have led to the loss of data, information, money, and many more for individuals and …
A data analytics approach to the cybercrime underground economy
Despite the rapid escalation of cyber threats, there has still been little research into the
foundations of the subject or methodologies that could serve to guide information systems …
foundations of the subject or methodologies that could serve to guide information systems …
Social engineering awareness and resilience in Egypt: a quantitative exploration
Purpose Social engineering is crucial in today's digital landscape. As technology advances,
malicious individuals exploit human judgment and trust. This study explores how age …
malicious individuals exploit human judgment and trust. This study explores how age …