Results 51 to 60 of about 52,374 (182)

A phishing attack awareness framework for a South African University of Technology

open access: yesSouth African Journal of Information Management
Background: Phishing is a deceptive tactic in which an attacker impersonates a trusted entity to steal sensitive information from Internet users. This creates significant risks for university end-users who depend on computer networks, underscoring the ...
Japhet M. Kayomb   +2 more
doaj   +1 more source

A Method for Domain Detection and Web Page Analysis Targeting Web3 Phishing Websites [PDF]

open access: yesJisuanji gongcheng
As the paradigm of ″decentralized next-generation Internet,″ Web3, relying on blockchain technology, has become an emerging field with great potential in the digital intelligence service ecosystem. However, Web3 phishing websites pose a serious threat to
LIU Ronglong, LI Ziwei, WAN Yue, WU Jiajing, JIANG Zigui
doaj   +1 more source

Assessing the impact of affective feedback on end-user security awareness [PDF]

open access: yes, 2017
A lack of awareness regarding online security behaviour can leave users and their devices vulnerable to compromise. This paper highlights potential areas where users may fall victim to online attacks, and reviews existing tools developed to raise users ...
Archibald, Jacqueline   +2 more
core   +2 more sources

People have different expectations for their own versus others' use of AI‐mediated communication tools

open access: yesBritish Journal of Psychology, EarlyView.
Abstract Artificial intelligence (AI) can enhance human communication, for example, by improving the quality of our writing, voice or appearance. However, AI mediated communication also has risks—it may increase deception, compromise authenticity or yield widespread mistrust. As a result, both policymakers and technology firms are developing approaches
Zoe A. Purcell   +4 more
wiley   +1 more source

Security awareness and affective feedback:categorical behaviour vs. reported behaviour [PDF]

open access: yes, 2017
A lack of awareness surrounding secure online behaviour can lead to end-users, and their personal details becoming vulnerable to compromise. This paper describes an ongoing research project in the field of usable security, examining the relationship ...
Archibald, Jacqueline   +1 more
core   +4 more sources

Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda

open access: yesInformation Systems Journal, EarlyView.
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello   +5 more
wiley   +1 more source

Particle Swarm Optimization-Based Feature Weighting for Improving Intelligent Phishing Website Detection

open access: yesIEEE Access, 2020
Over the last few years, web phishing attacks have been constantly evolving causing customers to lose trust in e-commerce and online services. Various tools and systems based on a blacklist of phishing websites are applied to detect the phishing websites.
Waleed Ali, Sharaf Malebary
doaj   +1 more source

Balancing Digital Transformation and Modernization: Pathways for Public Managers

open access: yesPublic Administration Review, EarlyView.
ABSTRACT This study examines the interplay between digital modernization and transformation in the public sector, challenging the notion that they are mutually exclusive strategies. Through interviews with public sector leaders, we find that modernization and transformation can be jointly implemented rather than managed as competing efforts.
Marc E. B. Picavet   +4 more
wiley   +1 more source

“I Paid A Bribe”—Lessons and Insights From Crowdsourced Corruption Reporting in India

open access: yesRegulation &Governance, EarlyView.
ABSTRACT Preventing and reducing corruption has proven to be an enormous challenge. An important step in this process is to produce and use good metrics to identify where anti‐corruption resources would be most beneficial. Most measures of corruption, however, rely on surveys of perceptions or bribery incidence.
Ina Kubbe   +2 more
wiley   +1 more source

OFS-NN: An Effective Phishing Websites Detection Model Based on Optimal Feature Selection and Neural Network

open access: yesIEEE Access, 2019
Phishing attack is now a big threat to people's daily life and networking environment. Through disguising illegal URLs as legitimate ones, attackers can induce users to visit the phishing URLs to get private information and other benefits.
Erzhou Zhu   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy