Rizzoni et al., 2022 - Google Patents
Phishing simulation exercise in a large hospital: A case studyRizzoni et al., 2022
View PDF- Document ID
- 994723647567744369
- Author
- Rizzoni F
- Magalini S
- Casaroli A
- Mari P
- Dixon M
- Coventry L
- Publication year
- Publication venue
- Digital Health
External Links
Snippet
Background Phishing is a major threat to the data and infrastructure of healthcare organizations and many cyberattacks utilize this socially engineered pathway. Phishing simulation is used to identify weaknesses and risks in the human defences of organizations …
- 238000004088 simulation 0 title abstract description 56
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/06—Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
- G06Q10/063—Operations research or analysis
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q10/00—Administration; Management
- G06Q10/10—Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
-
- G—PHYSICS
- G09—EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
- G09B—EDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
- G09B7/00—Electrically-operated teaching apparatus or devices working with questions and answers
- G09B7/02—Electrically-operated teaching apparatus or devices working with questions and answers of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06N—COMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
- G06N99/00—Subject matter not provided for in other groups of this subclass
- G06N99/005—Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06Q—DATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
- G06Q50/00—Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
- G06Q50/10—Services
- G06Q50/20—Education
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Rizzoni et al. | Phishing simulation exercise in a large hospital: A case study | |
Aldawood et al. | Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues | |
Grama | Legal and Privacy Issues in Information Security | |
Tsai et al. | Understanding online safety behaviors: A protection motivation theory perspective | |
Canfield et al. | Setting priorities in behavioral interventions: An application to reducing phishing risk | |
Leeuw et al. | Cyber society and digital policies: Challenges to evaluation? | |
Alohali et al. | Information security behavior: Recognizing the influencers | |
Zhuo et al. | SoK: Human-centered phishing susceptibility | |
Campbell | Practical information security management | |
Carlton | Development of a cybersecurity skills index: A scenarios-based, hands-on measure of non-IT professionals' cybersecurity skills | |
Maimon et al. | A routine activities approach to evidence-based risk assessment: Findings from two simulated phishing attacks | |
Murire et al. | Narrative review: Social media use by employees and the risk to institutional and personal information security compliance in South Africa | |
Jerry-Egemba | Safe and sound: Strengthening cybersecurity in healthcare through robust staff educational programs | |
Kamar et al. | The moderating role of thoughtfully reflective decision-making on the relationship between information security messages and smishing victimization: An experiment | |
Jacob et al. | The effect of communication and disinformation during the Covid-19 pandemic | |
Morrow | Scamming higher ed: An analysis of phishing content and trends | |
Dittrich | The ethics of social honeypots | |
Jansen | Do you bend or break?: Preventing online banking fraud victimization through online resilience | |
Alotaibi | Evaluation and enhancement of public cyber security awareness | |
Goh | Humans as the weakest link in maintaining cybersecurity: Building cyber resilience in humans | |
Ciftci et al. | Supporting students’ knowledge and skills in information technology security through a security portal | |
HOE | Culture and cyber security: How cultural tightness-looseness moderates the effects of threat and coping appraisals on mobile cyber hygiene | |
Torten | A quantitative regression study of the impact of security awareness on information technology professionals' desktop security behavior | |
Neufeld | Computer crime motives: Do we have it right? | |
Anti et al. | Explanations of Insider Deviant Behavior in Information Security: A Systematic Literature Review |