CFP last date
20 January 2025
Reseach Article

Evaluating Contemporary Digital Awareness Programs for Future Application within the Cyber Security Social Engineering Domain

by Hussain Aldawood, Geoffrey Skinner
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 177 - Number 31
Year of Publication: 2020
Authors: Hussain Aldawood, Geoffrey Skinner
10.5120/ijca2020919793

Hussain Aldawood, Geoffrey Skinner . Evaluating Contemporary Digital Awareness Programs for Future Application within the Cyber Security Social Engineering Domain. International Journal of Computer Applications. 177, 31 ( Jan 2020), 57-61. DOI=10.5120/ijca2020919793

@article{ 10.5120/ijca2020919793,
author = { Hussain Aldawood, Geoffrey Skinner },
title = { Evaluating Contemporary Digital Awareness Programs for Future Application within the Cyber Security Social Engineering Domain },
journal = { International Journal of Computer Applications },
issue_date = { Jan 2020 },
volume = { 177 },
number = { 31 },
month = { Jan },
year = { 2020 },
issn = { 0975-8887 },
pages = { 57-61 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume177/number31/31102-2020919793/ },
doi = { 10.5120/ijca2020919793 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T00:47:26.593465+05:30
%A Hussain Aldawood
%A Geoffrey Skinner
%T Evaluating Contemporary Digital Awareness Programs for Future Application within the Cyber Security Social Engineering Domain
%J International Journal of Computer Applications
%@ 0975-8887
%V 177
%N 31
%P 57-61
%D 2020
%I Foundation of Computer Science (FCS), NY, USA
Abstract

Social engineering is a rising threat to individuals and organizations, causing massive losses every day. Contemporary and innovative methods to mitigate these threats are needed today more than any other time in the past. This study aimed to assess the different awareness programs and techniques being developed or utilized against cyber security social engineering. A systematic review of various studies was performed, identifying that interactive awareness programs against social engineering are far superior and more engaging than traditional training sessions.

References
  1. Flores, W. R. and Ekstedt, M. Shaping intention to resist social engineering through transformational leadership, information security culture and awareness. computers & security, 59 (2016), 26-44.
  2. Aldawood, H. and Skinner, G. A Taxonomy for Social Engineering Attacks via Personal Devices. International Journal of Computer Applications, 975 (2019), 8887.
  3. Abass, I. A. M. Social Engineering Threat and Defense: A Literature Survey. Journal of Information Security, 9, 04 (2018), 257.
  4. Aldawood, H. and Skinner, G. Educating and Raising Awareness on Cyber Security Social Engineering: A Literature Review. City, 2018.
  5. Bakhshi, T. Social engineering: revisiting end-user awareness and susceptibility to classic attack vectors. IEEE, City, 2017.
  6. Hauser, D. Social Engineering Awareness in Business and Academia (2016).
  7. Fan, W., Kevin, L. and Rong, R. Social engineering: Ie based model of human weakness for attack and defense investigations. IJ Computer Network and Information Security, 9, 1 (2017), 1-11.
  8. Al-Hamdani, W. A. Assessment of need and method of delivery for information security awareness program. ACM, City, 2006.
  9. Salahdine, F. and Kaabouch, N. Social Engineering Attacks: A Survey. Future Internet, 11, 4 (2019), 89.
  10. Aldawood, H. and Skinner, G. Reviewing Cyber Security Social Engineering Training and Awareness Programs—Pitfalls and Ongoing Issues. Future Internet, 11, 3 (2019), 73.
  11. Abawajy, J. User preference of cyber security awareness delivery methods. Behaviour & Information Technology, 33, 3 (2014), 237-248.
  12. Sallai, G. Social Engineering Audit and Security Awareness Programme. KPMG (2016).
  13. Caputo, D. D., Pfleeger, S. L., Freeman, J. D. and Johnson, M. E. Going spear phishing: Exploring embedded training and awareness. IEEE Security & Privacy, 12, 1 (2014), 28-38.
  14. Aggarwal, G. General awareness on cyber crime. International Journal of Advanced Research in Computer Science and Software Engineering, 5, 8 (2015), 204-206.
  15. Manadhata, P. K. and Rao, P. V. Security alert prioritization. Google Patents, City, 2015.
  16. Belani, R., Higbee, A. and Greaux, S. Performance benchmarking for simulated phishing attacks. Google Patents, City, 2017.
  17. Yasin, A., Liu, L., Li, T., Fatima, R. and Jianmin, W. Improving software security awareness using a serious game. IET Software, 13, 2 (2018), 159-169.
  18. Onashoga, A. S., Ojo, O. E. and Soyombo, O. O. Securix: a 3D game-based learning approach for phishing attack awareness. Journal of Cyber Security Technology (2019), 1-17.
  19. Wen, Z. A., Lin, Z., Chen, R. and Andersen, E. What. Hack: Engaging Anti-Phishing Training Through a Role-playing Phishing Simulation Game. ACM, City, 2019.
  20. Beckers, K. and Pape, S. A serious game for eliciting social engineering security requirements. IEEE, City, 2016.
  21. Holmes, R. and Walker, R. J. Customized awareness: recommending relevant external change events. ACM, City, 2010.
  22. Soares, A. G. M., dos Santos, C. G. R., Mendonça, S., Carneiro, N. J. S., Miranda, B. P., de Araújo, T. D. O., de Freitas, A. A., de Morais, J. M. and Meiguins, B. S. A review of ways and strategies on how to collaborate in information visualization applications. IEEE, City, 2016.
  23. Bauer, S. and Bernroider, E. W. From information security awareness to reasoned compliant action: analyzing information security policy compliance in a large banking organization. ACM SIGMIS Database: the DATABASE for Advances in Information Systems, 48, 3 (2017), 44-68.
  24. Chinta, M., Alaparthi, J. and Kodali, E. A Study on Social Engineering Attacks and Defence Mechanisms (
  25. Wilcox, H. and Bhattacharya, M. Countering social engineering through social media: An enterprise security perspective. City, 2015.
  26. Shakti, S. and Dhanoa, R. CYBER – CRIME AWARENESS. International Journal in Multidisciplinary and Academic Research, Vol. 2, No. 2 (2015).
  27. Ng, K. K. Technology Solutions to Fight Cybercrime. City, 2010.
  28. Olanrewaju, A.-S. T. and Zakaria, N. H. Social engineering awareness game (SEAG): an empirical evaluation of using game towards improving information security awareness. City, 2015.
  29. Awojana, T. and Chou, T.-S. Overview of Learning Cybersecurity Through Game Based Systems (2019).
  30. Alotaibi, F., Furnell, S., Stengel, I. and Papadaki, M. A review of using gaming technology for cyber-security awareness. Int. J. Inf. Secur. Res.(IJISR), 6, 2 (2016), 660-666.
Index Terms

Computer Science
Information Sciences

Keywords

Cyber Security Social Engineering Information Security Awareness Programs Security Awareness Phishing Awareness Anti-Social Engineering Cyber Security Awareness Information Security Awareness.