Searched for: subject%3A%22Security%22
(1 - 3 of 3)
document
Bullée, Jan Willem Hendrik (author), Montoya, Lorena (author), Pieters, W. (author), Junger, M. (author), Hartel, P.H. (author)
The aim of this study was to explore the extent to which persuasion principles are used in successful social engineering attacks. Seventy-four scenarios were extracted from 4 books on social engineering (written by social engineers) and analysed. Each scenario was split into attack steps, containing single interactions between offender and...
journal article 2018
document
Allhoff, Fritz (author), Henschke, A.H. (author)
This paper surveys foundational ethical issues that attach to the Internet of Things (IoT). In Section 1, we provide an overview of the technology, indicating both current and future applications. Subsequent sections consider particular ethical issues, including: informed consent (Section 2), privacy (Section 3), information security (Section...
journal article 2018
document
Molin, E.J.E. (author), Meeuwisse, Kirsten (author), Pieters, W. (author), Chorus, C.G. (author)
It is often suggested in the literature that employees regard technical security measures (TSMs) as user-unfriendly, indicating a trade-off between security and usability. However, there is little empirical evidence of such a trade-off, nor about the strength of the associated negative correlation and the importance employees attach to both...
journal article 2018