Results 81 to 90 of about 53,867 (205)
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers.
Böhme, Rainer +7 more
core +1 more source
Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello +5 more
wiley +1 more source
Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse
Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific type of domain squatting called "combosquatting," in which attackers register ...
Alex Gontmakher +21 more
core +1 more source
The economy of phishing: A survey of the operations of the phishing market
Phishing has been defined as the fraudulent acquisition of personal information by tricking an individual into believing the attacker is a trustworthy entity [1]. Phishing attacks are becoming more sophisticated and are on the rise. In order to develop effective strategies and solutions to combat the phishing problem, one needs to understand the ...
openaire +1 more source
Balancing Digital Transformation and Modernization: Pathways for Public Managers
ABSTRACT This study examines the interplay between digital modernization and transformation in the public sector, challenging the notion that they are mutually exclusive strategies. Through interviews with public sector leaders, we find that modernization and transformation can be jointly implemented rather than managed as competing efforts.
Marc E. B. Picavet +4 more
wiley +1 more source
Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan +2 more
wiley +1 more source
Datasets for phishing websites detection
Phishing stands for a fraudulent process, where an attacker tries to obtain sensitive information from the victim. Usually, these kinds of attacks are done via emails, text messages, or websites.
Grega Vrbančič +2 more
doaj +1 more source
Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks
Phishing is an especially challenging cyber security threat as it does not attack computer systems, but targets the user who works on that system by relying on the vulnerability of their decision-making ability.
Arachchilage, Nalin Asanka Gamagedara +2 more
core
bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection
Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained
Aggarwal, Anupama +2 more
core +1 more source
Access Control in Healthcare IoT: A Comprehensive Survey
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir +3 more
wiley +1 more source

