The Art of Deception: Controlling the Human Element of Security
The Art of Deception: Controlling the Human Element of Security
Network Security First-Step
Psychological antecedents of institution-based consumer trust in e-retailing
Information and Management
Privacy and Rationality in Individual Decision Making
IEEE Security and Privacy
Punishment and ethics deterrents: A study of insider security contravention
Journal of the American Society for Information Science and Technology
Corporate Computer and Network Security
Corporate Computer and Network Security
Information systems security and human behaviour
Behaviour & Information Technology
Computers in Human Behavior
Goal Setting and Trust in a Security Management Context
Information Security Journal: A Global Perspective
Social Engineering: Hacking the Wetware!
Information Security Journal: A Global Perspective
Effectiveness of Physical, Social and Digital Mechanisms against Laptop Theft in Open Organizations
GREENCOM-CPSCOM '10 Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing
Cultural and organisational commitment in the context of e-banking
International Journal of Internet Technology and Secured Transactions
Graphical passwords: Learning from the first twelve years
ACM Computing Surveys (CSUR)
Information systems user security: A structured model of the knowing-doing gap
Computers in Human Behavior
Project Commitment in the Context of Information Security
International Journal of Information Technology Project Management
Social Engineering: The Neglected Human Factor for Information Security Management
Information Resources Management Journal
A Composite Framework for Behavioral Compliance with Information Security Policies
Journal of Organizational and End User Computing
A Composite Framework for Behavioral Compliance with Information Security Policies
Journal of Organizational and End User Computing
Hi-index | 0.00 |
Recently, research on information security has expanded from its purely technological orientation into striving to understand and explain the role of human behavior in security breaches. However, an area that has been lacking theory-grounded empirical study is in social engineering attacks. While there exists an extensive body of anecdotal literature, factors that account for attack success remains largely speculative. To better understand this increasing phenomenon, we developed a theoretical framework and conducted an empirical field study to investigate social engineering attacks, and from these results, we make recommendations for practice and further research.