Results 51 to 60 of about 50,838 (183)

A Method for Domain Detection and Web Page Analysis Targeting Web3 Phishing Websites [PDF]

open access: yesJisuanji gongcheng
As the paradigm of ″decentralized next-generation Internet,″ Web3, relying on blockchain technology, has become an emerging field with great potential in the digital intelligence service ecosystem. However, Web3 phishing websites pose a serious threat to
LIU Ronglong, LI Ziwei, WAN Yue, WU Jiajing, JIANG Zigui
doaj   +1 more source

“I Paid A Bribe”—Lessons and Insights From Crowdsourced Corruption Reporting in India

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Preventing and reducing corruption has proven to be an enormous challenge. An important step in this process is to produce and use good metrics to identify where anti‐corruption resources would be most beneficial. Most measures of corruption, however, rely on surveys of perceptions or bribery incidence.
Ina Kubbe   +2 more
wiley   +1 more source

A phishing attack awareness framework for a South African University of Technology

open access: yesSouth African Journal of Information Management
Background: Phishing is a deceptive tactic in which an attacker impersonates a trusted entity to steal sensitive information from Internet users. This creates significant risks for university end-users who depend on computer networks, underscoring the ...
Japhet M. Kayomb   +2 more
doaj   +1 more source

AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites

open access: yesIEEE Access, 2020
Phishing is a type of social web-engineering attack in cyberspace where criminals steal valuable data or information from insensitive or uninformed users of the internet.
Yazan Ahmad Alsariera   +3 more
doaj   +1 more source

Security awareness and affective feedback:categorical behaviour vs. reported behaviour [PDF]

open access: yes, 2017
A lack of awareness surrounding secure online behaviour can lead to end-users, and their personal details becoming vulnerable to compromise. This paper describes an ongoing research project in the field of usable security, examining the relationship ...
Archibald, Jacqueline   +1 more
core   +4 more sources

Personalized Model‐Driven Interventions for Decisions From Experience

open access: yesTopics in Cognitive Science, EarlyView.
Abstract Cognitive models that represent individuals provide many benefits for understanding the full range of human behavior. One way in which individual differences emerge is through differences in knowledge. In dynamic situations, where decisions are made from experience, models built upon a theory of experiential choice (instance‐based learning ...
Edward A. Cranford   +6 more
wiley   +1 more source

Particle Swarm Optimization-Based Feature Weighting for Improving Intelligent Phishing Website Detection

open access: yesIEEE Access, 2020
Over the last few years, web phishing attacks have been constantly evolving causing customers to lose trust in e-commerce and online services. Various tools and systems based on a blacklist of phishing websites are applied to detect the phishing websites.
Waleed Ali, Sharaf Malebary
doaj   +1 more source

Ethical AI for Young Digital Citizens: A Call to Action on Privacy Governance

open access: yesSECURITY AND PRIVACY, Volume 9, Issue 2, March/April 2026.
ABSTRACT The rapid expansion of artificial intelligence (AI) in digital platforms used by youth has created significant challenges related to privacy, autonomy, and data protection. While AI‐driven personalization offers enhanced user experiences, it often operates without clear ethical boundaries, leaving young digital users vulnerable to data ...
Austin Shouli   +3 more
wiley   +1 more source

OFS-NN: An Effective Phishing Websites Detection Model Based on Optimal Feature Selection and Neural Network

open access: yesIEEE Access, 2019
Phishing attack is now a big threat to people's daily life and networking environment. Through disguising illegal URLs as legitimate ones, attackers can induce users to visit the phishing URLs to get private information and other benefits.
Erzhou Zhu   +4 more
doaj   +1 more source

Phishing Techniques in Mobile Devices

open access: yes, 2018
The rapid evolution in mobile devices and communication technology has increased the number of mobile device users dramatically. The mobile device has replaced many other devices and is used to perform many tasks ranging from establishing a phone call to
Amro, Belal
core   +1 more source

Home - About - Disclaimer - Privacy