Results 151 to 160 of about 50,838 (183)

Interoceptive Accuracy Enhances Deception Detection in Older Adults. [PDF]

open access: yesJ Gerontol B Psychol Sci Soc Sci
Heemskerk A   +10 more
europepmc   +1 more source

Phish Me, Phish Me Not

Journal of Computer Information Systems, 2021
While phishing has evolved over the years, it still exploits one of the weakest links in any information system — humans.
Bartlomiej Hanus   +2 more
openaire   +1 more source

Phishing

2023
Phishing is a cybercrime in active growth that could cause several damages for its victims, such as identity theft. Specifically, in the last years, cybercrime has been of particular concern due to several attacks developed against society in general.
Liliana Queirós Ribeiro   +2 more
openaire   +3 more sources

Phishing for phishing awareness

Behaviour & Information Technology, 2013
Using various social-engineering techniques, criminals run havoc on the Internet and defraud many people in a number of different ways. This puts various organisational communities at risk. Therefore, it is important that people within such communities should learn how to protect themselves when active in cyberspace, or when dealing with cyber-related ...
K. Jansson, R. von Solms
openaire   +1 more source

One Phish, Two Phish, How to Avoid the Internet Phish

Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 2014
Phishing is a social engineering tactic that targets internet users in an attempt to trick them into divulging personal information. When opening an email, users are faced with the decision of determining if an email is legitimate or an attempt at phishing.
Olga A. Zielinska   +5 more
openaire   +1 more source

How persuasive is a phishing email? A phishing game for phishing awareness

Journal of Computer Security, 2019
Context: In the current era of digital technology, social engineers are using various tactics to undermine human weaknesses. Social Engineers target human psychology to achieve their target(s) which are in the form of data, account details, or IT devices etc. According to our research, one of the first methods social engineers used to target victims is
Fatima, Rubia   +3 more
openaire   +1 more source

Home - About - Disclaimer - Privacy