- Information and Cyber Security
- Advanced Malware Detection Techniques
- Network Security and Intrusion Detection
- Spam and Phishing Detection
- Cybercrime and Law Enforcement Studies
- Privacy, Security, and Data Protection
- Terrorism, Counterterrorism, and Political Violence
- Digital and Cyber Forensics
- Cloud Data Security Solutions
- Technology-Enhanced Education Studies
- Educational Leadership and Innovation
- Impact of AI and Big Data on Business and Society
- Technology Adoption and User Behaviour
- User Authentication and Security Systems
- VLSI and Analog Circuit Testing
- Cryptographic Implementations and Security
- Embedded Systems Design Techniques
- Technology Use by Older Adults
- Online and Blended Learning
- Chaos-based Image/Signal Encryption
- Advanced Data and IoT Technologies
- Advanced Steganography and Watermarking Techniques
- Digital Mental Health Interventions
- Mobile Health and mHealth Applications
- Digital Marketing and Social Media
Saudi Aramco (Saudi Arabia)
2023-2024
University of Newcastle Australia
2018-2020
King Fahd University of Petroleum and Minerals
2020
University of Notre Dame
2020
The idea and perception of good cyber security protection remains at the forefront many organizations’ information communication technology strategy investment. However, delving deeper into details its implementation reveals that human capital knowledge bases are very low. In particular, lack social engineering awareness is a concern in context risks. This study highlights pitfalls ongoing issues organizations encounter process developing to protect from attacks. A detailed literature review...
Cyber situational awareness is critical for detecting and mitigating cybersecurity threats in real-time. This study introduces a comprehensive methodology that integrates the Isolation Forest autoencoder algorithms, Structured Threat Information Expression (STIX) implementation, ontology development to enhance threat detection intelligence. The algorithm excels anomaly high-dimensional datasets, while autoencoders provide nonlinear capabilities adaptive feature learning. Together, they form...
Social engineering is one of the biggest threats organizations face today, as more and are adopting digitalization. In context cyber security, social practice taking advantage human weaknesses through manipulation to accomplish a malicious goal. For better implementation methods against engineering, this qualitative study will attempt provide measures information security challenges faced by organizations. The analysis then provided answers interviewed experts in field engineering. research...
The study aims to assess popular awareness training solutions and techniques used by organizations defend mitigate cyber security social engineering threats. Social threats are the most unpredicted an organization faces, leading loss of confidential data, finances, intellectual property, consumer credibility. Therefore, it is very important that well prepared its information systems against Literature in this domain presents various types contemporary at corporate level address threats, with...
Rapid technological advancement has not only resulted in a change the pace of economic development, but also led to increase cyber-threats.A social engineering attack is one such threat where an attacker accesses critical information about user through technology, manipulation.Although types attacks are different i.e. social, physical, technical or socio-technical, process same.This study creates advanced taxonomy with aim facilitating development and implementation better prevention...
Information security is one of the growing sources concern that organizations are dealing with today. With increased levels sophistication social engineering threats, exploits from such attacks evolving. This study highlights some challenges encounter in process developing human knowledge to fight against attacks. Despite state-of-the-art cyber preparations and trained personnel, hackers still successful their malicious acts stealing sensitive information crucial organizations. further...
Social engineering is one of the biggest threats organizations face today, as more and companies are adopting digitalization. This study presents a critical review existing measures, tools, policies for protection computer entities, particularly organizations, against cyber security social engineering. These factors were examined through systematic recent studies published on subject. Our analysis highlights meaning problem it poses, outlines some previous efforts that necessitate an inquiry...
Social engineering has become one of the biggest security threats facing organizations.Rather than relying upon information technical-related shortcomings to break into computer networks, social engineers make use employees' individual and organizational traits deceive them.In such a scenario, it is crucial for organizations ensure that their employees not only possess sound knowledge about but also concept emerging from attacks.This study aims test whether awareness can predict explain...
Educational supervision is closely related to establishing instructional efficiency, and a multidimensional concept that varies from one setting another. Application of contemporary tools, however, facilitates mediation this complex dynamic process. At the same time, it intends help schools establish digital education leadership. The paper herein, presents different methods through which leadership can be carried out. This study includes scientific supervision, transactional efforts,...
Social engineering attacks are a major threat to organizations and individuals as digitization connectivity through the internet increase.This study aims review scholarly research analyzing topic of social further chart evolution threat.The identifies methods such on various platforms devices discusses motivations behind attacks.Finally, paper analyzes nature impact presents taxonomy socially engineered by their anatomy.
This study examines the effect of privacy awareness on decisions to disclose personal information related various security measures at individual level. Explaining and predicting why individuals decide or withhold security-related preferences behaviors (e.g., use password, passphrase, 2-factor authentication, frequency updating software operating systems, etc.) is a critical research practice endeavor because such highly sensitive can be detrimental when it lands in hands social engineers....
Social engineering is a rising threat to individuals and organizations, causing massive losses every day.Contemporary innovative methods mitigate these threats are needed today more than any other time in the past.This study aimed assess different awareness programs techniques being developed or utilized against cyber security social engineering.A systematic review of various studies was performed, identifying that interactive far superior engaging traditional training sessions.
Past studies have confirmed that virtual environments play a critical aspect in performing daily tasks. Investigating users' readiness to use this technology while incorporating social presence and immersion is scarce. In study, we will focus on Saudi users their business settings. Building the theoretical lenses of index, UTAUT2, presence, immersion, propose research model investigate environments. Particularly, aim understand end-users' adopt This work could stipulate better understanding...