Results 61 to 70 of about 9,881 (133)

A Systematic Literature Review of Information Security Practices in Higher Education Contexts

open access: yesIET Information Security, Volume 2026, Issue 1, 2026.
Information security in institutions of higher learning is a persistent challenge that requires immediate attention. The plethora of reported information security breaches in higher education institutions (HEIs) corroborates this. This study reviews 358 articles from reputable journals and databases, synthesized following the preferred reporting items ...
Keefa Bwiino   +4 more
wiley   +1 more source

Component features based enhanced phishing website detection system using EfficientNet, FH-BERT, and SELU-CRNN methods

open access: yesFrontiers in Computer Science
IntroductionPhishing is a type of cybercrime used by hackers to steal sensitive user information, making it essential to detect phishing attacks on websites.
Mahmoud Murhej, G. Nallasivan
doaj   +1 more source

Phishing Website Detection Based on Multidimensional Features Driven by Deep Learning

open access: yesIEEE Access, 2019
As a crime of employing technical means to steal sensitive information of users, phishing is currently a critical threat facing the Internet, and losses due to phishing are growing steadily.
Peng Yang, Guangzhen Zhao, Peng Zeng
doaj   +1 more source

Life-long phishing attack detection using continual learning

open access: yesScientific Reports, 2023
Phishing is an identity theft that employs social engineering methods to get confidential data from unwary users. A phisher frequently attempts to trick the victim into clicking a URL that leads to a malicious website.
Asif Ejaz   +2 more
doaj   +1 more source

Opportunities or Threats: Impact of Digital Engagement on Marginalized Women Entrepreneurs

open access: yesGender, Work &Organization, Volume 33, Issue 1, Page 164-180, January 2026.
ABSTRACT The paper explores the experiences of social marginalization and discrimination faced by women entrepreneurs, as well as their adoption of digital resources to address these disadvantages. This study employs an interpretive approach; semi‐structured interviews were conducted with 20 women entrepreneurs in Nigeria.
Imaobong James   +2 more
wiley   +1 more source

Across the Spectrum In-Depth Review AI-Based Models for Phishing Detection

open access: yesIEEE Open Journal of the Communications Society
Advancement of the Internet has increased security risks associated with data protection and online shopping. Several techniques compromise Internet security, including hacking, SQL injection, phishing attacks, and DNS tunneling.
Shakeel Ahmad   +6 more
doaj   +1 more source

A Deep Learning-Based Framework for Phishing Website Detection

open access: yesIEEE Access, 2022
Phishing attackers spread phishing links through e-mail, text messages, and social media platforms. They use social engineering skills to trick users into visiting phishing websites and entering crucial personal information.
Lizhen Tang, Qusay H. Mahmoud
doaj   +1 more source

Predicting Phishing Websites using Neural Network trained with Back-Propagation [PDF]

open access: yes, 2013
Phishing is increasing dramatically with the development of modern technologies and the global worldwide computer networks. This results in the loss of customer’s confidence in e-commerce and online banking, financial damages, and identity theft ...
McCluskey, T.L.   +2 more
core  

bit.ly/malicious: Deep Dive into Short URL based e-Crime Detection

open access: yes, 2014
Existence of spam URLs over emails and Online Social Media (OSM) has become a massive e-crime. To counter the dissemination of long complex URLs in emails and character limit imposed on various OSM (like Twitter), the concept of URL shortening has gained
Aggarwal, Anupama   +2 more
core   +1 more source

Unlocking the Mediating and Moderating Role of Information Security in Information Systems: A Combined TAM, ISM, and HBM Model

open access: yesHuman Behavior and Emerging Technologies, Volume 2026, Issue 1, 2026.
Purpose This study examines the mediating and moderating roles of information security in information systems, focusing on the integration of the Technology Acceptance Model (TAM), Interpretive Structural Model (ISM), and the Health Belief Model (HBM).
Md. Mominul Islam   +5 more
wiley   +1 more source

Home - About - Disclaimer - Privacy