Results 31 to 40 of about 7,255 (230)
AI Meta-Learners and Extra-Trees Algorithm for the Detection of Phishing Websites
Phishing is a type of social web-engineering attack in cyberspace where criminals steal valuable data or information from insensitive or uninformed users of the internet.
Yazan Ahmad Alsariera +3 more
doaj +1 more source
AI-Based Phishing Detection and Student Cybersecurity Awareness in the Digital Age
Phishing attacks are an increasingly common cybersecurity threat and are characterized by deceiving people into giving out their private credentials via emails, websites, and messages.
Zeinab Shahbazi +2 more
doaj +1 more source
Major Cybersecurity Breaches: Shaping Corporate Cybersecurity Policies and Closing the Gaps
ABSTRACT As digitalization accelerates, cybercrime has intensified in both scale and impact over the past two decades. This study aims to critically examine major cybersecurity events, assess them through the lens of routine activity theory, examine insight from three other established criminological and organizational theories, and address central ...
Laura K. Rickett, Deborah Smith
wiley +1 more source
With the fast development of the Internet of Things (IoTs), phishing attacks are transferring to this domain because of the number of IoT devices and private data they can handle.
Jawhara Aljabri +7 more
doaj +1 more source
ABSTRACT The development of autonomous electric vehicles (AEVs) represents the convergence of two simultaneous automotive revolutions: electric vehicles (EVs) and autonomous vehicles (AVs). AVs require sensors, decision‐making systems and actuation systems to achieve autonomous driving, whereas EVs require intelligent management and real‐time ...
Ohud Alsadi +5 more
wiley +1 more source
Intelligent Ensemble Learning Approach for Phishing Website Detection Based on Weighted Soft Voting
The continuous development of network technologies plays a major role in increasing the utilization of these technologies in many aspects of our lives, including e-commerce, electronic banking, social media, e-health, and e-learning.
Altyeb Taha
doaj +1 more source
Abstract We investigate how the affordances of an online context shape the processes of social learning. Using a dataset of more than 11,000 posts from the fraud subdread on the dark web forum Dread, we examine how affordances of platform governance, connectivity, anonymity, invisibility, asynchronicity, and limited oversight influence the components ...
Fangzhou Wang, Timothy Dickinson
wiley +1 more source
Abstract Artificial intelligence (AI) can enhance human communication, for example, by improving the quality of our writing, voice or appearance. However, AI mediated communication also has risks—it may increase deception, compromise authenticity or yield widespread mistrust. As a result, both policymakers and technology firms are developing approaches
Zoe A. Purcell +4 more
wiley +1 more source
Phish-IDetector: Message-Id Based Automatic Phishing Detection
Phishing attacks are a well known problem in our age of electronic communication. Sensitive information like credit card details, login credentials for account, etc. are targeted by phishers. Emails are the most common channel for launching phishing attacks.
Nirmala Rai, Rakesh M. Verma
openaire +1 more source
Compassionate Digital Innovation: A Pluralistic Perspective and Research Agenda
ABSTRACT Digital innovation offers significant societal, economic and environmental benefits but is also a source of profound harms. Prior information systems (IS) research has often overlooked the ethical tensions involved, framing harms as ‘unintended consequences’ rather than symptoms of deeper systemic problems.
Raffaele F. Ciriello +5 more
wiley +1 more source

