Contemplating social engineering studies and attack scenarios: A review study

A Yasin, R Fatima, L Liu, A Yasin… - Security and …, 2019 - Wiley Online Library
The previous year has seen an enormous increase in the studies related to social
engineering. This increase is partly due to increasing number of social engineering attacks …

Social engineering attack examples, templates and scenarios

F Mouton, L Leenen, HS Venter - Computers & Security, 2016 - Elsevier
The field of information security is a fast-growing discipline. Even though the effectiveness of
security measures to protect sensitive information is increasing, people remain susceptible …

A principlist framework for cybersecurity ethics

P Formosa, M Wilson, D Richards - Computers & Security, 2021 - Elsevier
The ethical issues raised by cybersecurity practices and technologies are of critical
importance. However, there is disagreement about what is the best ethical framework for …

[HTML][HTML] An interdisciplinary view of social engineering: A call to action for research

AH Washo - Computers in Human Behavior Reports, 2021 - Elsevier
Social engineering is the act of using manipulation and deception to obtain access to
confidential information. It is considered one of the leading threats to information security …

On the anatomy of social engineering attacks—A literature‐based dissection of successful attacks

JWH Bullée, L Montoya, W Pieters… - Journal of …, 2018 - Wiley Online Library
The aim of this study was to explore the extent to which persuasion principles are used in
successful social engineering attacks. Seventy‐four scenarios were extracted from 4 books …

A Comprehensive Taxonomy of Social Engineering Attacks and Defense Mechanisms: Towards Effective Mitigation Strategies

M Zaoui, B Yousra, S Yassine, M Yassine… - IEEE Access, 2024 - ieeexplore.ieee.org
Social engineering (SE) attacks are a growing concern for organizations that rely on
technology to protect sensitive data. Identifying and preventing these attacks can be …

Virtuous human hacking: The ethics of social engineering in penetration-testing

JM Hatfield - Computers & Security, 2019 - Elsevier
This paper offers a virtue ethics analysis of social engineering in penetration-testing. It
begins by considering previous research on this topic and argues that such attempts …

Understanding and deciphering of social engineering attack scenarios

A Yasin, R Fatima, L Liu, J Wang, R Ali… - Security and …, 2021 - Wiley Online Library
Malicious scammers and social engineers are causing great harms to modern society, as
they have led to the loss of data, information, money, and many more for individuals and …

A data analytics approach to the cybercrime underground economy

J An, HW Kim - Ieee Access, 2018 - ieeexplore.ieee.org
Despite the rapid escalation of cyber threats, there has still been little research into the
foundations of the subject or methodologies that could serve to guide information systems …

Social engineering awareness and resilience in Egypt: a quantitative exploration

A Shehata, M Eldakar - Library Hi Tech, 2024 - emerald.com
Purpose Social engineering is crucial in today's digital landscape. As technology advances,
malicious individuals exploit human judgment and trust. This study explores how age …