Results 151 to 160 of about 50,838 (183)
Interoceptive Accuracy Enhances Deception Detection in Older Adults. [PDF]
Heemskerk A +10 more
europepmc +1 more source
Unveiling personalized and gamification-based cybersecurity risks within financial institutions. [PDF]
Shahzadi A +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Journal of Computer Information Systems, 2021
While phishing has evolved over the years, it still exploits one of the weakest links in any information system — humans.
Bartlomiej Hanus +2 more
openaire +1 more source
While phishing has evolved over the years, it still exploits one of the weakest links in any information system — humans.
Bartlomiej Hanus +2 more
openaire +1 more source
2023
Phishing is a cybercrime in active growth that could cause several damages for its victims, such as identity theft. Specifically, in the last years, cybercrime has been of particular concern due to several attacks developed against society in general.
Liliana Queirós Ribeiro +2 more
openaire +3 more sources
Phishing is a cybercrime in active growth that could cause several damages for its victims, such as identity theft. Specifically, in the last years, cybercrime has been of particular concern due to several attacks developed against society in general.
Liliana Queirós Ribeiro +2 more
openaire +3 more sources
Phishing for phishing awareness
Behaviour & Information Technology, 2013Using various social-engineering techniques, criminals run havoc on the Internet and defraud many people in a number of different ways. This puts various organisational communities at risk. Therefore, it is important that people within such communities should learn how to protect themselves when active in cyberspace, or when dealing with cyber-related ...
K. Jansson, R. von Solms
openaire +1 more source
One Phish, Two Phish, How to Avoid the Internet Phish
Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 2014Phishing is a social engineering tactic that targets internet users in an attempt to trick them into divulging personal information. When opening an email, users are faced with the decision of determining if an email is legitimate or an attempt at phishing.
Olga A. Zielinska +5 more
openaire +1 more source
How persuasive is a phishing email? A phishing game for phishing awareness
Journal of Computer Security, 2019Context: In the current era of digital technology, social engineers are using various tactics to undermine human weaknesses. Social Engineers target human psychology to achieve their target(s) which are in the form of data, account details, or IT devices etc. According to our research, one of the first methods social engineers used to target victims is
Fatima, Rubia +3 more
openaire +1 more source

