Results 31 to 40 of about 52,374 (182)

Assessing the role of conceptual knowledge in an anti-phishing game [PDF]

open access: yes, 2014
Copyright @ 2014 IEEE. This is the author accepted version of this article.Games can be used to support learning and confidence development in several domains, including the secure use of computers.
Arachchilage, NAG, Ghinea, G, Scott, MJ
core   +1 more source

The Phishing Master Anti-Phishing Game

open access: yes, 2022
Games are one type of measure developed to raise security awareness. We present the design of a anti-phishing game for public events or for public spaces. We collected feedback on the game and got an impression of individuals' interaction with the game, through a small user study with a convenience sample at a public event.
Dietmann, Heike   +8 more
openaire   +3 more sources

COVID-19 and Phishing: Effects of Human Emotions, Behavior, and Demographics on the Success of Phishing Attempts During the Pandemic

open access: yesIEEE Access, 2021
Phishing is an online scam where criminals trick users with various strategies, with the goal of obtaining sensitive information or compromising accounts, systems, and/or other personal or organisational Information Technology resources. Multiple studies
Hossein Abroshan   +3 more
doaj   +1 more source

Emerging Phishing Trends and Effectiveness of the Anti-Phishing Landing Page

open access: yes, 2014
Each month, more attacks are launched with the aim of making web users believe that they are communicating with a trusted entity which compels them to share their personal, financial information.
Gupta, Srishti, Kumaraguru, Ponnurangam
core   +1 more source

Phishing Happens Beyond Technology: The Effects of Human Behaviors and Demographics on Each Step of a Phishing Process

open access: yesIEEE Access, 2021
Prior studies have shown that the behaviours and attitudes of Internet users influence the likelihood of being victimised by phishing attacks. Many scammers design a step-by-step approach to phishing in order to gain the potential victim’s trust ...
Hossein Abroshan   +3 more
doaj   +1 more source

CERT strategy to deal with phishing attacks

open access: yes, 2017
Every day, internet thieves employ new ways to obtain personal identity people and get access to their personal information. Phishing is a somehow complex method that has recently been considered by internet thieves.The present study aims to explain ...
Sedaghat, Shahrzad
core   +1 more source

Classification of Phishing Email Using Random Forest Machine Learning Technique

open access: yesJournal of Applied Mathematics, 2014
Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals.
Andronicus A. Akinyelu   +1 more
doaj   +1 more source

International phishing gangs and operation Phish & Chip [PDF]

open access: yesDigital Evidence and Electronic Signature Law Review, 2014
Francesco Cajani provides an insight to the practical problems when dealing with cross-border crime.
openaire   +1 more source

Categorizing human phishing difficulty: a Phish Scale [PDF]

open access: yesJournal of Cybersecurity, 2020
Abstract As organizations continue to invest in phishing awareness training programs, many chief information security officers (CISOs) are concerned when their training exercise click rates are high or variable, as they must justify training budgets to organization officials who question the efficacy of awareness training when click ...
Michelle Steves   +2 more
openaire   +1 more source

Plugging the “Phishing” Hole: Legislation Versus Technology [PDF]

open access: yes, 2005
This iBrief analyzes the Anti-Phishing Act of 2005, legislation aimed at curbing the problem of phishing. Phishing is the sending of fraudulent emails which appear to be from legitimate businesses and thereby fooling the recipients into divulging ...
Stevenson, Robert Louis B.
core   +2 more sources

Home - About - Disclaimer - Privacy