Results 101 to 110 of about 1,061,727 (224)
To date, understanding the future of the office management and secretarial profession, which is rapidly changing under the influence of technology, has consistently been approached through sector‐based analyses. This study, however, shifts the perspective to focus on the hearts and minds of the young people preparing for this journey.
Hüsnü Ergün, David C. Mohr
wiley +1 more source
Phishing, a continuously growing cyber threat, aims to obtain innocent users' credentials by deceiving them via presenting fake web pages which mimic their legitimate targets.
Aydos, Murat +2 more
core +1 more source
Purpose This study examines the mediating and moderating roles of information security in information systems, focusing on the integration of the Technology Acceptance Model (TAM), Interpretive Structural Model (ISM), and the Health Belief Model (HBM).
Md. Mominul Islam +5 more
wiley +1 more source
A socio-cognitive and computational model for decision making and user modelling in social phishing [PDF]
Systems software quality, and system security in particular, is often compromised by phishing attacks. The latter were relatively easy to detect through phishing content filters, in the past.
Berki , Eleni +4 more
core
Abstract A growing number of clinics have experienced disruptions of clinical services due to cyberattacks. To provide continuity of care, medical physicists should work with Information Technology (IT) staff to develop a business continuity plan.
R. Alfredo Siochi +7 more
wiley +1 more source
High‐Dimensional Regression With Missing Data: An Asymptotic Study
ABSTRACT We present an asymptotic analysis of high‐dimensional linear regression with missing data and propose a novel method to approximate leave‐one‐out cross validation, facilitating faster hyperparameter tuning. Our analysis extends beyond standard ridge regression to include adversarial training, introducing a robust formulation specifically ...
Yue Xing, Alireza Aghasi, Saeed Ghadimi
wiley +1 more source
Research on the Credulity of Spear-Phishing Attacks for Lithuanian Education Institutions’ Employees
Organizational security assurance is a complex and multi-dimensional task. One of the biggest threats to an organization is the credulity of phishing attacks for its employees.
Justinas Rastenis +4 more
doaj +1 more source
An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents
Phishing attacks have been persistent for more than two decades despite mitigation efforts from academia and industry. We believe that users fall victim to attacks not only because of lack of knowledge and awareness, but also because they are not ...
Jema David Ndibwile +5 more
doaj +1 more source
Reaction to New Security Threat Class [PDF]
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core
Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers
Phishing is an electronic fraud through which an attacker can access user credentials. Phishing websites are the ones that mimic legitimate websites. Fraudsters can replace them within hours to evade their detection.
Manu J. Pillai +4 more
doaj +1 more source

