Results 81 to 90 of about 50,838 (183)

Anti-phishing as a web-based user service [PDF]

open access: yes, 2006
This paper describes the recent phenomenon of phishing, in which email messages are sent to unwitting recipients in order to elicit personal information and perpetrate identity theft and financial fraud.
Cranston, C., Weir, G.R.S.
core  

Usability Evaluation of a Push‐Based Passwordless Authentication Model Using Public‐Key Cryptography

open access: yesIET Biometrics, Volume 2026, Issue 1, 2026.
Despite major advancements in the sphere of the public‐key authentication specifically in the instances of the newly established standards like WebAuthn and the FIDO2, the practical implementation of the passwordless login systems is still hindered by the usability factors, platform‐related requirements, and the very nature of the deployment process is
Ghulam Mustafa   +6 more
wiley   +1 more source

Cyber-crime Science = Crime Science + Information Security [PDF]

open access: yes, 2010
Cyber-crime Science is an emerging area of study aiming to prevent cyber-crime by combining security protection techniques from Information Security with empirical research methods used in Crime Science.
Hartel, Pieter   +2 more
core   +2 more sources

A Systematic Literature Review of Information Security Practices in Higher Education Contexts

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino   +4 more
wiley   +1 more source

Securing the Weakest Link: Exploring Affective States Exploited in Phishing Emails With Large Language Models

open access: yesIEEE Access
Cyberattacks often begin with a phishing email designed to exploit human factors, widely regarded as the weakest link in cybersecurity defences. Although previous research has identified factors that make individuals susceptible to scams and fraud, it is
Faithful Chiagoziem Onwuegbuche   +5 more
doaj   +1 more source

PhishED: Automated contextual feedback for reported Phishing [PDF]

open access: yes, 2022
When people receive malicious emails that claim to be from a trusted entity like their bank, they can be frightened and uncertain about how safe it is to ignore or delete the message. The uncertainty is hard on users and it may lead them to engage in unsafe actions like clicking on links ``just to check.'' In this work we look at how to provide quick ...
Jenkins, Adam   +2 more
openaire  

Your employees: the front line in cyber security [PDF]

open access: yes, 2016
First published in The Chemical Engineer and reproduced by Crest - Centre for Research and Evidence on Security Threats, 26/01/2016 (https://crestresearch.ac.uk/comment/employees-front-line-cyber-security/
Ashenden, D
core  

bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection

open access: yes, 2014
Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained
Aggarwal, Anupama   +2 more
core   +1 more source

A State-of-the-Art Review on Phishing Website Detection Techniques

open access: yesIEEE Access
Phishing attacks remain a significant cybersecurity threat, with phishing websites serving as a primary tool for attackers to deceive users and steal sensitive information.
Wenhao Li   +4 more
doaj   +1 more source

A socio-cognitive and computational model for decision making and user modelling in social phishing [PDF]

open access: yes
Systems software quality, and system security in particular, is often compromised by phishing attacks. The latter were relatively easy to detect through phishing content filters, in the past.
Berki , Eleni   +4 more
core  

Home - About - Disclaimer - Privacy