Results 81 to 90 of about 50,838 (183)
Anti-phishing as a web-based user service [PDF]
This paper describes the recent phenomenon of phishing, in which email messages are sent to unwitting recipients in order to elicit personal information and perpetrate identity theft and financial fraud.
Cranston, C., Weir, G.R.S.
core
Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa +6 more
wiley +1 more source
Cyber-crime Science = Crime Science + Information Security [PDF]
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science.
Hartel, Pieter +2 more
core +2 more sources
A Systematic Literature Review of Information Security Practices in Higher Education Contexts
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino +4 more
wiley +1 more source
Cyberattacks often begin with a phishing email designed to exploit human factors, widely regarded as the weakest link in cybersecurity defences. Although previous research has identified factors that make individuals susceptible to scams and fraud, it is
Faithful Chiagoziem Onwuegbuche +5 more
doaj +1 more source
PhishED: Automated contextual feedback for reported Phishing [PDF]
When people receive malicious emails that claim to be from a trusted entity like their bank, they can be frightened and uncertain about how safe it is to ignore or delete the message. The uncertainty is hard on users and it may lead them to engage in unsafe actions like clicking on links ``just to check.'' In this work we look at how to provide quick ...
Jenkins, Adam +2 more
openaire
Your employees: the front line in cyber security [PDF]
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/
Ashenden, D
core
bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection
Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained
Aggarwal, Anupama +2 more
core +1 more source
A State-of-the-Art Review on Phishing Website Detection Techniques
Phishing attacks remain a significant cybersecurity threat, with phishing websites serving as a primary tool for attackers to deceive users and steal sensitive information.
Wenhao Li +4 more
doaj +1 more source
A socio-cognitive and computational model for decision making and user modelling in social phishing [PDF]
Systems software quality, and system security in particular, is often compromised by phishing attacks. The latter were relatively easy to detect through phishing content filters, in the past.
Berki , Eleni +4 more
core

