2020
DOI: 10.3389/fpsyg.2020.01755
|View full text |Cite
|
Sign up to set email alerts
|

Human Cognition Through the Lens of Social Engineering Cyberattacks

Abstract: Social engineering cyberattacks are a major threat because they often prelude sophisticated and devastating cyberattacks. Social engineering cyberattacks are a kind of psychological attack that exploits weaknesses in human cognitive functions. Adequate defense against social engineering cyberattacks requires a deeper understanding of what aspects of human cognition are exploited by these cyberattacks, why humans are susceptible to these cyberattacks, and how we can minimize or at least mitigate their damage. T… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

1
35
0

Year Published

2021
2021
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 51 publications
(50 citation statements)
references
References 119 publications
(196 reference statements)
1
35
0
Order By: Relevance
“…The percentage of articles addressing the organisational cyber resilience policies and governance is found to be less reported (as outlined in RQ2, [ 6 , 17 , 30 , 31 ]), along with the number of articles that address methodologies for healthcare organisations to conduct cybersecurity risk assessments (as presented in RQ3, [ 7 , 17 , 25 , 40 , 41 , 43 , 48 , 49 ]). The articles reporting on the training and awareness of cybersecurity among healthcare stakeholders are presented in the literature with equal distribution of relevance as highlighted in Figure 3 for RQ4 [ 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 ]. From the percentage results presented in Figure 3 for RQ5, it appears that there is a critical lack of national audits within the healthcare industry, which reports on the cyber resilience [ 8 , 9 , 10 , 22 , 31 , 50 , 51 , 52 ].…”
Section: Resultsmentioning
confidence: 99%
See 4 more Smart Citations
“…The percentage of articles addressing the organisational cyber resilience policies and governance is found to be less reported (as outlined in RQ2, [ 6 , 17 , 30 , 31 ]), along with the number of articles that address methodologies for healthcare organisations to conduct cybersecurity risk assessments (as presented in RQ3, [ 7 , 17 , 25 , 40 , 41 , 43 , 48 , 49 ]). The articles reporting on the training and awareness of cybersecurity among healthcare stakeholders are presented in the literature with equal distribution of relevance as highlighted in Figure 3 for RQ4 [ 8 , 9 , 10 , 11 , 12 , 13 , 14 , 15 , 16 , 17 ]. From the percentage results presented in Figure 3 for RQ5, it appears that there is a critical lack of national audits within the healthcare industry, which reports on the cyber resilience [ 8 , 9 , 10 , 22 , 31 , 50 , 51 , 52 ].…”
Section: Resultsmentioning
confidence: 99%
“…A well-known social engineering method is phishing. The role and impact of phishing attacks have been well studied in the literature [ 8 , 9 , 10 , 13 , 15 , 16 , 17 , 18 , 41 , 43 , 55 , 56 ].…”
Section: Resultsmentioning
confidence: 99%
See 3 more Smart Citations