10   Artículos

 
en línea
Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran    
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email attacks ... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Shouq Alrobaian, Saif Alshahrani and Abdulaziz Almaleh    
People are the weakest link in the cybersecurity chain when viewed in the context of technological advancement. People become vulnerable to trickery through contemporary technical developments such as social media platforms. Information accessibility and... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Joakim Kävrestad, Allex Hagberg, Marcus Nohlberg, Jana Rambusch, Robert Roos and Steven Furnell    
Cybersecurity is a pressing matter, and a lot of the responsibility for cybersecurity is put on the individual user. The individual user is expected to engage in secure behavior by selecting good passwords, identifying malicious emails, and more. Typical... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Andrei Butnaru, Alexios Mylonas and Nikolaos Pitropakis    
Nowadays, the majority of everyday computing devices, irrespective of their size and operating system, allow access to information and online services through web browsers. However, the pervasiveness of web browsing in our daily life does not come withou... ver más
Revista: Future Internet    Formato: Electrónico

 
en línea
Majid H. Alsulami, Fawaz D. Alharbi, Hamdan M. Almutairi, Bandar S. Almutairi, Mohammed M. Alotaibi, Majdi E. Alanzi, Khaled G. Alotaibi and Sultan S. Alharthi    
Social engineering is one of the most inventive methods of gaining unauthorized access to information systems and obtaining sensitive information. This type of cybersecurity threat requires minimal technical knowledge because it relies on the organizatio... ver más
Revista: Information    Formato: Electrónico

 
en línea
Talal Alharbi and Asifa Tassaddiq    
Information exchange has become increasingly faster and efficient through the use of recent technological advances, such as instant messaging and social media platforms. Consequently, access to information has become easier. However, new types of cyberse... ver más
Revista: Big Data and Cognitive Computing    Formato: Electrónico

 
en línea
Rachel Barker    
AbstractPurpose: This study sets out to address the lack of studies to educate clients and create awareness on fraud prevention in this sector, specifically on e-banking fraud that falls into two main categories: phishing/vishing/Smishing and malware pra... ver más
Revista: South African Journal of Business Management    Formato: Electrónico

 
en línea
Guma Ali, Mussa Ally Dida and Anael Elikana Sam    
Smartphone technology has improved access to mobile money services (MMS) and successful mobile money deployment has brought massive benefits to the unbanked population in both rural and urban areas of Uganda. Despite its enormous benefits, embracing the ... ver más
Revista: Information    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »