Saudi Arabia has seen an enormous growth in Internet usage over the past few years. With increasing adoption of this technology has come a rise in cybercrime, often enabled through use of social engineering. Phishing is a prime example, aiming to deceive users into revealing personal data. The paper describes efforts to understand individuals' responses to phishing attacks through application of the Theory of Planned Behaviour (TPB). It reports a survey that considers three common social engineering persuading strategies, Authority, Social Proof and Scarcity. Results show correlations between these strategies and TPB. In particular, between attitude and intention to respond under the Authority strategy; subjective norms and intention to res...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
The worldwide popularity of social networking sites (SNSs) and the technical features they offer use...
The use of email has been exploited by cybercriminals, as a means of carrying out their cybersecurit...
Phishing continues to be a prevalent social engineering attack. Attacks are relatively easy to setup...
Phishing continues to be a problem for both individuals and organisations, with billions of dollars ...
Phishing is one of the oldest and most flexible types of social engineering attacks and could be use...
Social engineering attacking method is a serious threat that targets the human element of informatio...
Prior studies have shown that the behaviours and attitudes of Internet users influence the likelihoo...
Phishing is a form of electronic identity theft in which a combination of social engineering and web...
Phishing, as a social engineering attack has become an increasing threat to organizations in cybersp...
PurposeSpear phishing is a fraudulent practice that targets specific and well-researched users in an...
Now-a-days, social engineering is considered to be one of the most overwhelming threats in the field...
Due to the rapid development in the technologies related to the Internet, users have changed their p...
Phishing is a social engineering scam that can result in data loss, reputational damage, identity th...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
The worldwide popularity of social networking sites (SNSs) and the technical features they offer use...
The use of email has been exploited by cybercriminals, as a means of carrying out their cybersecurit...
Phishing continues to be a prevalent social engineering attack. Attacks are relatively easy to setup...
Phishing continues to be a problem for both individuals and organisations, with billions of dollars ...
Phishing is one of the oldest and most flexible types of social engineering attacks and could be use...
Social engineering attacking method is a serious threat that targets the human element of informatio...
Prior studies have shown that the behaviours and attitudes of Internet users influence the likelihoo...
Phishing is a form of electronic identity theft in which a combination of social engineering and web...
Phishing, as a social engineering attack has become an increasing threat to organizations in cybersp...
PurposeSpear phishing is a fraudulent practice that targets specific and well-researched users in an...
Now-a-days, social engineering is considered to be one of the most overwhelming threats in the field...
Due to the rapid development in the technologies related to the Internet, users have changed their p...
Phishing is a social engineering scam that can result in data loss, reputational damage, identity th...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
The worldwide popularity of social networking sites (SNSs) and the technical features they offer use...