Hussain Aldawood

ORCID: 0000-0003-3851-996X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Information and Cyber Security
  • Advanced Malware Detection Techniques
  • Network Security and Intrusion Detection
  • Spam and Phishing Detection
  • Cybercrime and Law Enforcement Studies
  • Privacy, Security, and Data Protection
  • Terrorism, Counterterrorism, and Political Violence
  • Digital and Cyber Forensics
  • Cloud Data Security Solutions
  • Technology-Enhanced Education Studies
  • Educational Leadership and Innovation
  • Impact of AI and Big Data on Business and Society
  • Technology Adoption and User Behaviour
  • User Authentication and Security Systems
  • VLSI and Analog Circuit Testing
  • Cryptographic Implementations and Security
  • Embedded Systems Design Techniques
  • Technology Use by Older Adults
  • Online and Blended Learning
  • Chaos-based Image/Signal Encryption
  • Advanced Data and IoT Technologies
  • Advanced Steganography and Watermarking Techniques
  • Digital Mental Health Interventions
  • Mobile Health and mHealth Applications
  • Digital Marketing and Social Media

Saudi Aramco (Saudi Arabia)
2023-2024

University of Newcastle Australia
2018-2020

King Fahd University of Petroleum and Minerals
2020

University of Notre Dame
2020

The idea and perception of good cyber security protection remains at the forefront many organizations’ information communication technology strategy investment. However, delving deeper into details its implementation reveals that human capital knowledge bases are very low. In particular, lack social engineering awareness is a concern in context risks. This study highlights pitfalls ongoing issues organizations encounter process developing to protect from attacks. A detailed literature review...

10.3390/fi11030073 article EN cc-by Future Internet 2019-03-18

Cyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, ontology development to enhance threat detection intelligence. The algorithm excels anomaly high-dimensional datasets, while autoencoders provide nonlinear capabilities adaptive feature learning. Together, they form...

10.3389/frai.2024.1394363 article EN cc-by Frontiers in Artificial Intelligence 2025-01-09

Social engineering is one of the biggest threats organizations face today, as more and are adopting digitalization. In context cyber security, social practice taking advantage human weaknesses through manipulation to accomplish a malicious goal. For better implementation methods against engineering, this qualitative study will attempt provide measures information security challenges faced by organizations. The analysis then provided answers interviewed experts in field engineering. research...

10.1109/access.2020.2983280 article EN cc-by IEEE Access 2020-01-01

The study aims to assess popular awareness training solutions and techniques used by organizations defend mitigate cyber security social engineering threats. Social threats are the most unpredicted an organization faces, leading loss of confidential data, finances, intellectual property, consumer credibility. Therefore, it is very important that well prepared its information systems against Literature in this domain presents various types contemporary at corporate level address threats, with...

10.1145/3309074.3309083 article EN 2019-01-19

Rapid technological advancement has not only resulted in a change the pace of economic development, but also led to increase cyber-threats.A social engineering attack is one such threat where an attacker accesses critical information about user through technology, manipulation.Although types attacks are different i.e. social, physical, technical or socio-technical, process same.This study creates advanced taxonomy with aim facilitating development and implementation better prevention...

10.5120/ijca2020919744 article EN International Journal of Computer Applications 2020-01-16

Information security is one of the growing sources concern that organizations are dealing with today. With increased levels sophistication social engineering threats, exploits from such attacks evolving. This study highlights some challenges encounter in process developing human knowledge to fight against attacks. Despite state-of-the-art cyber preparations and trained personnel, hackers still successful their malicious acts stealing sensitive information crucial organizations. further...

10.1109/ccc.2019.00004 article EN 2019-05-01

Social engineering is one of the biggest threats organizations face today, as more and companies are adopting digitalization. This study presents a critical review existing measures, tools, policies for protection computer entities, particularly organizations, against cyber security social engineering. These factors were examined through systematic recent studies published on subject. Our analysis highlights meaning problem it poses, outlines some previous efforts that necessitate an inquiry...

10.1109/icseng.2018.8638166 article EN 2018-12-01

Social engineering has become one of the biggest security threats facing organizations.Rather than relying upon information technical-related shortcomings to break into computer networks, social engineers make use employees' individual and organizational traits deceive them.In such a scenario, it is crucial for organizations ensure that their employees not only possess sound knowledge about but also concept emerging from attacks.This study aims test whether awareness can predict explain...

10.5120/ijca2020919891 article EN International Journal of Computer Applications 2020-02-17

Educational supervision is closely related to establishing instructional efficiency, and a multidimensional concept that varies from one setting another. Application of contemporary tools, however, facilitates mediation this complex dynamic process. At the same time, it intends help schools establish digital education leadership. The paper herein, presents different methods through which leadership can be carried out. This study includes scientific supervision, transactional efforts,...

10.1109/ceap.2019.8883484 article EN 2019-07-01

Social engineering attacks are a major threat to organizations and individuals as digitization connectivity through the internet increase.This study aims review scholarly research analyzing topic of social further chart evolution threat.The identifies methods such on various platforms devices discusses motivations behind attacks.Finally, paper analyzes nature impact presents taxonomy socially engineered by their anatomy.

10.5120/ijca2019919411 article EN International Journal of Computer Applications 2019-09-17

This study examines the effect of privacy awareness on decisions to disclose personal information related various security measures at individual level. Explaining and predicting why individuals decide or withhold security-related preferences behaviors (e.g., use password, passphrase, 2-factor authentication, frequency updating software operating systems, etc.) is a critical research practice endeavor because such highly sensitive can be detrimental when it lands in hands social engineers....

10.1109/iccit58132.2023.10273938 article EN 2023-09-13

Social engineering is a rising threat to individuals and organizations, causing massive losses every day.Contemporary innovative methods mitigate these threats are needed today more than any other time in the past.This study aimed assess different awareness programs techniques being developed or utilized against cyber security social engineering.A systematic review of various studies was performed, identifying that interactive far superior engaging traditional training sessions.

10.5120/ijca2020919793 article EN International Journal of Computer Applications 2020-01-16

Past studies have confirmed that virtual environments play a critical aspect in performing daily tasks. Investigating users' readiness to use this technology while incorporating social presence and immersion is scarce. In study, we will focus on Saudi users their business settings. Building the theoretical lenses of index, UTAUT2, presence, immersion, propose research model investigate environments. Particularly, aim understand end-users' adopt This work could stipulate better understanding...

10.1109/iccit58132.2023.10273964 article EN 2023-09-13
Coming Soon ...