Results 101 to 110 of about 1,061,727 (224)

Digital Transformation and the Evolution of Professional Identity: A Qualitative Study on the Perceptions of Office Management and Secretarial Students

open access: yesHuman Behavior and Emerging Technologies, Volume 2026, Issue 1, 2026.
To date, understanding the future of the office management and secretarial profession, which is rapidly changing under the influence of technology, has consistently been approached through sector‐based analyses. This study, however, shifts the perspective to focus on the hearts and minds of the young people preparing for this journey.
Hüsnü Ergün, David C. Mohr
wiley   +1 more source

Phish-IRIS: A New Approach for Vision Based Brand Prediction of Phishing Web Pages via Compact Visual Descriptors

open access: yes, 2018
Phishing, a continuously growing cyber threat, aims to obtain innocent users' credentials by deceiving them via presenting fake web pages which mimic their legitimate targets.
Aydos, Murat   +2 more
core   +1 more source

Unlocking the Mediating and Moderating Role of Information Security in Information Systems: A Combined TAM, ISM, and HBM Model

open access: yesHuman Behavior and Emerging Technologies, Volume 2026, Issue 1, 2026.
Purpose This study examines the mediating and moderating roles of information security in information systems, focusing on the integration of the Technology Acceptance Model (TAM), Interpretive Structural Model (ISM), and the Health Belief Model (HBM).
Md. Mominul Islam   +5 more
wiley   +1 more source

A socio-cognitive and computational model for decision making and user modelling in social phishing [PDF]

open access: yes
Systems software quality, and system security in particular, is often compromised by phishing attacks. The latter were relatively easy to detect through phishing content filters, in the past.
Berki , Eleni   +4 more
core  

AAPM working group on cybersecurity report 438: A white paper on cybersecurity management for business continuity in radiology and radiation therapy

open access: yesJournal of Applied Clinical Medical Physics, Volume 26, Issue 12, December 2025.
Abstract A growing number of clinics have experienced disruptions of clinical services due to cyberattacks. To provide continuity of care, medical physicists should work with Information Technology (IT) staff to develop a business continuity plan.
R. Alfredo Siochi   +7 more
wiley   +1 more source

High‐Dimensional Regression With Missing Data: An Asymptotic Study

open access: yesStat, Volume 14, Issue 4, December 2025.
ABSTRACT We present an asymptotic analysis of high‐dimensional linear regression with missing data and propose a novel method to approximate leave‐one‐out cross validation, facilitating faster hyperparameter tuning. Our analysis extends beyond standard ridge regression to include adversarial training, introducing a robust formulation specifically ...
Yue Xing, Alireza Aghasi, Saeed Ghadimi
wiley   +1 more source

Research on the Credulity of Spear-Phishing Attacks for Lithuanian Education Institutions’ Employees

open access: yesApplied Sciences
Organizational security assurance is a complex and multi-dimensional task. One of the biggest threats to an organization is the credulity of phishing attacks for its employees.
Justinas Rastenis   +4 more
doaj   +1 more source

An Empirical Approach to Phishing Countermeasures Through Smart Glasses and Validation Agents

open access: yesIEEE Access, 2019
Phishing attacks have been persistent for more than two decades despite mitigation efforts from academia and industry. We believe that users fall victim to attacks not only because of lack of knowledge and awareness, but also because they are not ...
Jema David Ndibwile   +5 more
doaj   +1 more source

Reaction to New Security Threat Class [PDF]

open access: yes, 2014
Each new identified security threat class triggers new research and development efforts by the scientific and professional communities. In this study, we investigate the rate at which the scientific and professional communities react to new identified ...
Elovici, Yuval, Rokach, Lior
core  

Evasion Attacks and Defense Mechanisms for Machine Learning-Based Web Phishing Classifiers

open access: yesIEEE Access
Phishing is an electronic fraud through which an attacker can access user credentials. Phishing websites are the ones that mimic legitimate websites. Fraudsters can replace them within hours to evade their detection.
Manu J. Pillai   +4 more
doaj   +1 more source

Home - About - Disclaimer - Privacy