Update search
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
Filter
- All
- Title
- Author
- Author Affiliations
- Full Text
- Abstract
- Keyword
- DOI
- ISBN
- EISBN
- ISSN
- EISSN
- Issue
- Volume
- References
NARROW
Format
Journal
Type
Date
Availability
1-2 of 2
Keywords: Risk-taking
Close
Follow your search
Access your saved searches in your account
Would you like to receive an alert when new items match your search?
Sort by
Journal Articles
Does security attitude really predict susceptibility to persuasion tactics in social engineering attempts?
Available to PurchaseAya Muhanad, Tourjana Islam Supti, Israa Abuelezz, Ala Yankouskaya, Khaled M. Khan, Mahmoud Barhamgi, Armstrong Nhlabatsi, Raian Ali
Journal:
Information and Computer Security
Information and Computer Security (2025)
Published: 01 April 2025
... principles Risk-taking Arab UK Persuasion is a form of human communication with the goal of influencing the choices and perceptions of others (Jones and Simons, 2017). It is used in multiple situations, from parents advising their children (Azizah, 2020), to entities seeking confidential...
Journal Articles
How demographic and appearance cues of a potential social engineer influence trust perception and risk-taking among targets?
Available to Purchase
Journal:
Information and Computer Security
Information and Computer Security (2025) 33 (3): 320–343.
Published: 11 September 2024
... similarity and appearance formality. H2. There are significant differences in risk-taking levels toward potential social engineers based on their age, gender, ethnic similarity and appearance formality. With advancements in technology, the risk of technical vulnerabilities has grown...
