Results 61 to 70 of about 9,881 (133)
A Systematic Literature Review of Information Security Practices in Higher Education Contexts
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino +4 more
wiley +1 more source
IntroductionPhishing is a type of cybercrime used by hackers to steal sensitive user information, making it essential to detect phishing attacks on websites.
Mahmoud Murhej, G. Nallasivan
doaj +1 more source
Phishing Website Detection Based on Multidimensional Features Driven by Deep Learning
As a crime of employing technical means to steal sensitive information of users, phishing is currently a critical threat facing the Internet, and losses due to phishing are growing steadily.
Peng Yang, Guangzhen Zhao, Peng Zeng
doaj +1 more source
Life-long phishing attack detection using continual learning
Phishing is an identity theft that employs social engineering methods to get confidential data from unwary users. A phisher frequently attempts to trick the victim into clicking a URL that leads to a malicious website.
Asif Ejaz +2 more
doaj +1 more source
Opportunities or Threats: Impact of Digital Engagement on Marginalized Women Entrepreneurs
ABSTRACT The paper explores the experiences of social marginalization and discrimination faced by women entrepreneurs, as well as their adoption of digital resources to address these disadvantages. This study employs an interpretive approach; semi‐structured interviews were conducted with 20 women entrepreneurs in Nigeria.
Imaobong James +2 more
wiley +1 more source
Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection
Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling.
Shakeel Ahmad +6 more
doaj +1 more source
A Deep Learning-Based Framework for Phishing Website Detection
Phishing attackers spread phishing links through e-mail, text messages, and social media platforms. They use social engineering skills to trick users into visiting phishing websites and entering crucial personal information.
Lizhen Tang, Qusay H. Mahmoud
doaj +1 more source
Predicting Phishing Websites using Neural Network trained with Back-Propagation [PDF]
Phishing is increasing dramatically with the development of modern technologies and the global worldwide computer networks. This results in the loss of customer’s confidence in e-commerce and online banking, financial damages, and identity theft ...
McCluskey, T.L. +2 more
core
bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection
Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained
Aggarwal, Anupama +2 more
core +1 more source
Purpose This study examines the mediating and moderating roles of information security in information systems, focusing on the integration of the Technology Acceptance Model (TAM), Interpretive Structural Model (ISM), and the Health Belief Model (HBM).
Md. Mominul Islam +5 more
wiley +1 more source

