Results 81 to 90 of about 53,867 (205)

Herding Vulnerable Cats: A Statistical Approach to Disentangle Joint Responsibility for Web Security in Shared Hosting

open access: yes, 2017
Hosting providers play a key role in fighting web compromise, but their ability to prevent abuse is constrained by the security practices of their own customers.
Böhme, Rainer   +7 more
core   +1 more source

Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda

open access: yesInformation Systems Journal, Volume 36, Issue 3, Page 364-385, May 2026.
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello   +5 more
wiley   +1 more source

Hiding in Plain Sight: A Longitudinal Study of Combosquatting Abuse

open access: yes, 2017
Domain squatting is a common adversarial practice where attackers register domain names that are purposefully similar to popular domains. In this work, we study a specific type of domain squatting called "combosquatting," in which attackers register ...
Alex Gontmakher   +21 more
core   +1 more source

The economy of phishing: A survey of the operations of the phishing market

open access: yesFirst Monday, 2005
Phishing has been defined as the fraudulent acquisition of personal information by tricking an individual into believing the attacker is a trustworthy entity [1]. Phishing attacks are becoming more sophisticated and are on the rise. In order to develop effective strategies and solutions to combat the phishing problem, one needs to understand the ...
openaire   +1 more source

Balancing Digital Transformation and Modernization: Pathways for Public Managers

open access: yesPublic Administration Review, Volume 86, Issue 3, Page 610-625, May/June 2026.
ABSTRACT This study examines the interplay between digital modernization and transformation in the public sector, challenging the notion that they are mutually exclusive strategies. Through interviews with public sector leaders, we find that modernization and transformation can be jointly implemented rather than managed as competing efforts.
Marc E. B. Picavet   +4 more
wiley   +1 more source

Identification and Authentication Failures: Foundational Aspects of Strong Detection Mechanisms

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
A review of recent techniques for detecting Identification and Authentication Failures in online platforms storing sensitive user data. Analyzed methods include biometric, hierarchical, blockchain, IoT‐based, EPICS, and VAP authentication systems. ABSTRACT Online platforms, such as e‐commerce and online apps, have become crucial in daily activities ...
Md. Maruf Hassan   +2 more
wiley   +1 more source

Datasets for phishing websites detection

open access: yesData in Brief, 2020
Phishing stands for a fraudulent process, where an attacker tries to obtain sensitive information from the victim. Usually, these kinds of attacks are done via emails, text messages, or websites.
Grega Vrbančič   +2 more
doaj   +1 more source

Phish Phinder: A Game Design Approach to Enhance User Confidence in Mitigating Phishing Attacks

open access: yes, 2017
Phishing is an especially challenging cyber security threat as it does not attack computer systems, but targets the user who works on that system by relying on the vulnerability of their decision-making ability.
Arachchilage, Nalin Asanka Gamagedara   +2 more
core  

bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection

open access: yes, 2014
Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained
Aggarwal, Anupama   +2 more
core   +1 more source

Access Control in Healthcare IoT: A Comprehensive Survey

open access: yesEngineering Reports, Volume 8, Issue 4, April 2026.
This survey analyses access control mechanisms in Healthcare IoT, reviewing traditional and emerging models, identifying security and privacy challenges, and highlighting open research issues. It provides a comparative perspective to support the design of secure, scalable, and patient‐centric healthcare IoT systems.
Aleena Nazir   +3 more
wiley   +1 more source

Home - About - Disclaimer - Privacy