|
|
|
Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email attacks ...
ver más
|
|
|
|
|
|
|
Shouq Alrobaian, Saif Alshahrani and Abdulaziz Almaleh
People are the weakest link in the cybersecurity chain when viewed in the context of technological advancement. People become vulnerable to trickery through contemporary technical developments such as social media platforms. Information accessibility and...
ver más
|
|
|
|
|
|
|
Joakim Kävrestad, Allex Hagberg, Marcus Nohlberg, Jana Rambusch, Robert Roos and Steven Furnell
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical...
ver más
|
|
|
|
|
|
|
Andrei Butnaru, Alexios Mylonas and Nikolaos Pitropakis
Nowadays, the majority of everyday computing devices, irrespective of their size and operating system, allow access to information and online services through web browsers. However, the pervasiveness of web browsing in our daily life does not come withou...
ver más
|
|
|
|
|
|
|
Majid H. Alsulami, Fawaz D. Alharbi, Hamdan M. Almutairi, Bandar S. Almutairi, Mohammed M. Alotaibi, Majdi E. Alanzi, Khaled G. Alotaibi and Sultan S. Alharthi
Social engineering is one of the most inventive methods of gaining unauthorized access to information systems and obtaining sensitive information. This type of cybersecurity threat requires minimal technical knowledge because it relies on the organizatio...
ver más
|
|
|
|
|
|
|
Talal Alharbi and Asifa Tassaddiq
Information exchange has become increasingly faster and efficient through the use of recent technological advances, such as instant messaging and social media platforms. Consequently, access to information has become easier. However, new types of cyberse...
ver más
|
|
|
|
|
|
|
Rachel Barker
AbstractPurpose: This study sets out to address the lack of studies to educate clients and create awareness on fraud prevention in this sector, specifically on e-banking fraud that falls into two main categories: phishing/vishing/Smishing and malware pra...
ver más
|
|
|
|
|
|
|
Guma Ali, Mussa Ally Dida and Anael Elikana Sam
Smartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the ...
ver más
|
|
|
|