Proceedings of the 5th Conference on Information Technology Education 2004
DOI: 10.1145/1029533.1029577
|View full text |Cite
|
Sign up to set email alerts
|

The urgency for effective user privacy-education to counter social engineering attacks on secure computer systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

1
57
0

Year Published

2007
2007
2021
2021

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 96 publications
(62 citation statements)
references
References 0 publications
1
57
0
Order By: Relevance
“…Human factors have been mentioned to be the greatest risk and as such require the most focus. Much research has been placed either on education, training and awareness [14], [16], [21], [26] or technical controls. Although each HOT dimension has its own weaknesses or vulnerabilities, as all encompass some human involvement, education can close the gap between all the dimensions (e.g.…”
Section: Resultsmentioning
confidence: 99%
See 2 more Smart Citations
“…Human factors have been mentioned to be the greatest risk and as such require the most focus. Much research has been placed either on education, training and awareness [14], [16], [21], [26] or technical controls. Although each HOT dimension has its own weaknesses or vulnerabilities, as all encompass some human involvement, education can close the gap between all the dimensions (e.g.…”
Section: Resultsmentioning
confidence: 99%
“…According to Orgill [21], social engineering attacks usually entail two facets namely: the physical aspect (e.g. workplace, online) and the psychological aspect or a combination using both aspects to gain desired information.…”
Section: Phishing Explainedmentioning
confidence: 99%
See 1 more Smart Citation
“…The information that will be gathered can be any available personal or organizational information, such as name, age, work, position, interests, hobbies, address, banks the victims deals with, friends the victim trusts, or even the car a victim dreams to have. Some of the information available might not be useful by its own; however, it can be used by a social engineer to gain more information that is valuable [23].…”
Section: Social Networking Sites (Environment)mentioning
confidence: 99%
“…Zimbardo (2007), explains that the level of familiarization with problems is different in different people; some believe that a predicament is more relevant to them, while others are not concerned with the same affliction [68]. The extent of activity in this behavior varies depending on the feelings a person attaches to a predicament and the amount of loss that may be incurred in the case that an attack occurs [23]. The knowledge of constraints shows the degree to which people consider their mannerisms to be restrained by issues that are uncontrollable.…”
Section: E Risk Beliefmentioning
confidence: 99%