[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Rizzoni et al., 2022 - Google Patents

Phishing simulation exercise in a large hospital: A case study

Rizzoni et al., 2022

View PDF @Full View
Document ID
994723647567744369
Author
Rizzoni F
Magalini S
Casaroli A
Mari P
Dixon M
Coventry L
Publication year
Publication venue
Digital Health

External Links

Snippet

Background Phishing is a major threat to the data and infrastructure of healthcare organizations and many cyberattacks utilize this socially engineered pathway. Phishing simulation is used to identify weaknesses and risks in the human defences of organizations …
Continue reading at journals.sagepub.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/06Resources, workflows, human or project management, e.g. organising, planning, scheduling or allocating time, human or machine resources; Enterprise planning; Organisational models
    • G06Q10/063Operations research or analysis
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q10/00Administration; Management
    • G06Q10/10Office automation, e.g. computer aided management of electronic mail or groupware; Time management, e.g. calendars, reminders, meetings or time accounting
    • GPHYSICS
    • G09EDUCATION; CRYPTOGRAPHY; DISPLAY; ADVERTISING; SEALS
    • G09BEDUCATIONAL OR DEMONSTRATION APPLIANCES; APPLIANCES FOR TEACHING, OR COMMUNICATING WITH, THE BLIND, DEAF OR MUTE; MODELS; PLANETARIA; GLOBES; MAPS; DIAGRAMS
    • G09B7/00Electrically-operated teaching apparatus or devices working with questions and answers
    • G09B7/02Electrically-operated teaching apparatus or devices working with questions and answers of the type wherein the student is expected to construct an answer to the question which is presented or wherein the machine gives an answer to the question presented by a student
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06NCOMPUTER SYSTEMS BASED ON SPECIFIC COMPUTATIONAL MODELS
    • G06N99/00Subject matter not provided for in other groups of this subclass
    • G06N99/005Learning machines, i.e. computer in which a programme is changed according to experience gained by the machine itself during a complete run
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06QDATA PROCESSING SYSTEMS OR METHODS, SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES; SYSTEMS OR METHODS SPECIALLY ADAPTED FOR ADMINISTRATIVE, COMMERCIAL, FINANCIAL, MANAGERIAL, SUPERVISORY OR FORECASTING PURPOSES, NOT OTHERWISE PROVIDED FOR
    • G06Q50/00Systems or methods specially adapted for a specific business sector, e.g. utilities or tourism
    • G06Q50/10Services
    • G06Q50/20Education

Similar Documents

Publication Publication Date Title
Rizzoni et al. Phishing simulation exercise in a large hospital: A case study
Aldawood et al. Reviewing cyber security social engineering training and awareness programs—Pitfalls and ongoing issues
Grama Legal and Privacy Issues in Information Security
Tsai et al. Understanding online safety behaviors: A protection motivation theory perspective
Canfield et al. Setting priorities in behavioral interventions: An application to reducing phishing risk
Leeuw et al. Cyber society and digital policies: Challenges to evaluation?
Alohali et al. Information security behavior: Recognizing the influencers
Zhuo et al. SoK: Human-centered phishing susceptibility
Campbell Practical information security management
Carlton Development of a cybersecurity skills index: A scenarios-based, hands-on measure of non-IT professionals' cybersecurity skills
Maimon et al. A routine activities approach to evidence-based risk assessment: Findings from two simulated phishing attacks
Murire et al. Narrative review: Social media use by employees and the risk to institutional and personal information security compliance in South Africa
Jerry-Egemba Safe and sound: Strengthening cybersecurity in healthcare through robust staff educational programs
Kamar et al. The moderating role of thoughtfully reflective decision-making on the relationship between information security messages and smishing victimization: An experiment
Jacob et al. The effect of communication and disinformation during the Covid-19 pandemic
Morrow Scamming higher ed: An analysis of phishing content and trends
Dittrich The ethics of social honeypots
Jansen Do you bend or break?: Preventing online banking fraud victimization through online resilience
Alotaibi Evaluation and enhancement of public cyber security awareness
Goh Humans as the weakest link in maintaining cybersecurity: Building cyber resilience in humans
Ciftci et al. Supporting students’ knowledge and skills in information technology security through a security portal
HOE Culture and cyber security: How cultural tightness-looseness moderates the effects of threat and coping appraisals on mobile cyber hygiene
Torten A quantitative regression study of the impact of security awareness on information technology professionals' desktop security behavior
Neufeld Computer crime motives: Do we have it right?
Anti et al. Explanations of Insider Deviant Behavior in Information Security: A Systematic Literature Review