10   Artículos

 
en línea
Majid H. Alsulami, Fawaz D. Alharbi, Hamdan M. Almutairi, Bandar S. Almutairi, Mohammed M. Alotaibi, Majdi E. Alanzi, Khaled G. Alotaibi and Sultan S. Alharthi    
Social engineering is one of the most inventive methods of gaining unauthorized access to information systems and obtaining sensitive information. This type of cybersecurity threat requires minimal technical knowledge because it relies on the organizatio... ver más
Revista: Information    Formato: Electrónico

 
en línea
Hussain Aldawood and Geoffrey Skinner    
The idea and perception of good cyber security protection remains at the forefront of many organizations? information and communication technology strategy and investment. However, delving deeper into the details of its implementation reveals that organi... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Shagun Tripathi,Priyanka Panday    
The world economy is experiencing unpredictable economic volatility and uncertainty, with possible calamitous social, political and economic consequences. One of the greatest challenges of our times is unemployment. Job creation in the 21st century has b... ver más
Revista: Management Insight - The Journal of Incisive Analysers    Formato: Electrónico

 
en línea
Ruti Gafni, Tal Pavel, Raz Margolin, Ben Weiss     Pág. 27 - 41
Passwords are the standard means of registration and access to Websites, information systems, online services and various social networks. Databases are increasingly breached and social engineering is employed to obtain usernames and passwords for online... ver más
Revista: Online Journal of Applied Knowledge Management    Formato: Electrónico

 
en línea
Melissa Carlton, Yair Levy     Pág. 16 - 28
Cyber threats have been growing with social engineering and business e-mail compromise reported as the two most rising penetration vectors. Advanced Persistent Threats (APTs) are penetration techniques that combine several approaches to gain access to or... ver más
Revista: Online Journal of Applied Knowledge Management    Formato: Electrónico

 
en línea
Wilnelia Hernández, Yair Levy, Michelle M. Ramim     Pág. 93 - 109
Employees spend time during work hours on non-work related activities including visiting ecommerce Websites, managing personal email accounts, and engaging in e-banking. These types of actions in the workplace are known as cyberslacking. Cyberslacking af... ver más
Revista: Online Journal of Applied Knowledge Management    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »