Results 71 to 80 of about 9,881 (133)
Phishing, a continuously growing cyber threat, aims to obtain innocent users' credentials by deceiving them via presenting fake web pages which mimic their legitimate targets.
Aydos, Murat +2 more
core +1 more source
Antecedents of bullying victimisation in adolescents: a fresh look at Aotearoa New Zealand
ABSTRACT Research has consistently demonstrated that the prevalence of school bullying in Aotearoa New Zealand exceeds those observed in other developed countries. Despite the need to understand the risk and protective factors for bullying victimisation, there remains a paucity of research in the New Zealand context.
Michael Birchall +2 more
wiley +1 more source
On IoT‐enabled risk prevention and insurance: A systematic literature review
Abstract The insurance market is increasingly adopting connected insurance offerings, such as telematics, wearables, and parametric products, enabled by Internet of Things (IoT) technologies. These innovations generate granular, observable risk data and support the delivery of preventive services. While connected insurance has gained research attention,
Ion Cimbru +2 more
wiley +1 more source
PHISHSIM: Phishing Website Detection
In this paper, we introduce a powerful new approach for detecting phishing websites that is entirely feature-free. Our method, called PhishSim, uses the Normalized Compression Distance (NCD), a technique that requires no specialized parameters. NCD works by measuring the similarity of two websites through compression, eliminating the time and effort ...
null Nivyashree R +4 more
openaire +1 more source
CyberESP: An Integrated Cybersecurity Framework for SMEs
ABSTRACT Cybersecurity is a critical global concern, particularly for small‐ and medium‐sized enterprises (SMEs) with limited resources and expertise. The authors are developing CyberESP, a tailored cybersecurity framework supported by a semi‐automated tool to ensure Spanish SMEs' cybersecurity management.
Jose A. Calvo‐Manzano +5 more
wiley +1 more source
Life has become more comfortable in the era of advanced technology in this cutthroat competitive world. However, there are also emerging harmful technologies that pose a threat.
Ramprasath Jayaprakash +8 more
doaj +1 more source
A mobile sensing method to counteract social media website impersonation
Phishing is a serious threat to online users, especially since attackers have tremendously improved their techniques in impersonating important websites. With websites looking visually the same, users are fooled more easily.
Mohamed Y ELMassry, Ahmad S AlMogren
doaj +1 more source
Organizational altercasting: Developing impression management and cyber‐risk disclosures
Abstract The study develops theorizing of external organizational communications that entail impression management. This includes developing linkages to Goffman's work and a Goffmanian research tradition. Our approach innovatively articulates dimensions of impression management entailing the presentation of others and nuanced practices of what we term ...
Monika Łada +4 more
wiley +1 more source
REVIEW OF MODELLING APPROACHES FOR WEBSITE-RELATED PREDICTIONS
This paper researches various modelling approaches for website-related predictions, offering an overview of the field. With the ever-expanding landscape of the World Wide Web, there is an increasing need for automated methods to categorize websites ...
Patryk Mauer
doaj +1 more source
Integrity and Misconduct, Where Does Artificial Intelligence Lead?
ABSTRACT This paper, part of the third stage of the Harbingers project studying early career researchers (ECRs), focuses on the impact of artificial intelligence (AI) on scholarly communications. It concentrates on research integrity and misconduct, a ‘hot’ topic among the publishing community, in no small part due to the rise of AI.
David Nicholas +8 more
wiley +1 more source

