
INTERNATIONAL JOURNAL OF LATEST TECHNOLOGY IN ENGINEERING,
MANAGEMENT & APPLIED SCIENCE (IJLTEMAS)
ISSN 2278-2540 | DOI: 10.51583/IJLTEMAS | Volume XIV, Issue XI, November 2025
www.ijltemas.in Page 528
34. J. L. Parrish Jr., J. L. Bailey, and J. F. Courtney, “A personality-based model for determining
susceptibility to phishing attacks,” in Proc. Southwest Decision Sciences Institute Annu. Meeting (SDSI
’09). Oklahoma City, OK, 2009, pp. 285–296.
35. A. Vishwanath, T. Herath, R. Chen, J. Wang, and H. R. Rao, “Why do people get phished? Testing
individual differences in phishing vulnerability within an integrated, information processing model,”
Decision Support Syst., vol. 51, no. 3, pp. 576–586, Jun. 2011.
36. A. Darwish, A. El Zarka, and F. Aloul, “Towards understanding phishing victims' profile,” in Proc. Int.
Conf. Comput. Sys and Industrial Informatics, Sharjah, UAE, Dec. 2012, pp. 1–5.
37. M. Huber, S. Kowalski, M. Nohlberg, and S. Tjoa, “Towards automating social engineering using social
networking sites,” in Proc. Int. Conf. Computational Science and Engineering, Vancouver, Canada, Aug.
2009, vol. 3, pp. 117–124.
38. S. Abraham and I. Chengalur-Smith, “An overview of social engineering malware: Trends, tactics, and
implications,” Technol. in Soc., vol. 32, no. 3, pp. 183–196, 2010.
39. J. W. Scheeres, “Establishing the human firewall: reducing an individual's vulnerability to social
engineering attacks,” MS thesis, Dept. Elec. & Comput. Eng., Air Inst. Technol., Dayton, OH, 2008.
40. I. Ghafir and V. Prenosil, “Proposed approach for targeted attacks detection,” in Advanced Computer
and Communication Engineering Technology: Proceedings of ICOCOE 2015 (Lecture Notes in Elect.
Eng, vol. 362), H. A. Sulaiman, M. A. Othman, M. F. I. Othman, Y. A. Rahim, and N. C. Pee, Eds. Cham,
Switzerland: Springer, 2016, pp. 73–80.
41. A. Algarni, Y. Xu, T. Chan, and Y.-C. Tian, “Social engineering in social networking sites: Affect-based
model,” in Proc. 8th Int. Conf. Internet Technology and Secured Transactions (ICITST ’13), London,
UK, Dec. 2013, pp. 508–515
42. A. Kumar, M. Chaudhary, and N. Kumar, “Social engineering threats and awareness: a survey,”
European J. Advances Eng. & Technol., vol. 2, no. 11, pp. 15–19, 2015.
43. E. Albrechtsen and J. Hovden, “The information security digital divide between information security
managers and users,” Comput. & Security, vol. 28, no. 6, pp. 476–490, Sep. 2009.
44. A. Da Veiga and J. H. Eloff, “A framework and assessment instrument for information security culture,”
Comput. & Security, vol. 29, no. 2, pp. 196–207, Mar. 2010.
45. J. Abawajy, “User preference of cyber security awareness delivery methods,” Behavior & Inform.
Technol., vol. 33, no. 3, pp. 237–248, Aug. 2014.
46. J. Holdsworth and E. Apeh, “An effective immersive cyber security awareness learning platform for
businesses in the hospitality sector,” in Proc. 25th IEEE Int. Requirements Engineering Conf. Workshops
(REW ’17), Lisbon, Portugal, Sep. 2017, pp. 111–117.
47. K. Korpela, “Improving cyber security awareness and training programs with data analytics,” Inform.
Security J.: A Global Perspective, vol. 24, no. 1–3, pp. 72–77, Jun. 2015.
48. M. Junger, L. Montoya, and F. J. Overink, “Priming and warnings are not effective to prevent social
engineering attacks,” Comput. Human Behavior, vol. 66, pp. 75–87, Jan. 2017.
49. R. Butler, “Investigation of phishing to develop guidelines to protect the internet consumer’s identity
against attacks by phishers, ” South African J. Inform.Manage., vol. 7, no. 3, Sep. 2005.
50. W. Rocha Flores and M. Ekstedt, “Shaping intention to resist social engineering through transformational
leadership, information security culture and awareness,” Comput. & Security, vol. 59, pp. 26–44, Jun.
2016.
51. M. E. Whitman, “ In defense of the realm: understanding the threats to information security,” Int. J.
Inform. Manage., vol. 24, no. 1, pp. 43–57, Feb. 2004.
52. J. Merete Hagen, E. Albrechtsen, and J. Hovden, “Implementation and effectiveness of organizational
information security measures,” Inform. Manage.& Comput. Security, vol. 16, no. 4, pp. 377–397, 2008.
53. Q. Ma, M. B. Schmidt, and J. M. Pearson, “An integrated framework for information security
management,” Rev. Bus., vol. 30, no. 1, p. 58, 2009.
54. P. Puhakainen and M. Siponen, “Improving employees' compliance through information systems security
training: An action research study,” MIS Quarterly, pp. 757–778, 2010.
55. E. Albrechtsen and J. Hovden, “Improving information security awareness and behaviour through
dialogue, participation and collective reflection. An intervention study,” Comput. & Security, vol. 29,
no. 4, pp. 432–445, Jun. 2010.