Fighting against phishing attacks: state of the art and future challenges

BB Gupta, A Tewari, AK Jain, DP Agrawal - Neural Computing and …, 2017 - Springer
In the last few years, phishing scams have rapidly grown posing huge threat to global
Internet security. Today, phishing attack is one of the most common and serious threats over …

A survey of phishing email filtering techniques

A Almomani, BB Gupta, S Atawneh… - … surveys & tutorials, 2013 - ieeexplore.ieee.org
Phishing email is one of the major problems of today's Internet, resulting in financial losses
for organizations and annoying individual users. Numerous approaches have been …

Cyber security awareness, knowledge and behavior: A comparative study

M Zwilling, G Klien, D Lesjak, Ł Wiechetek… - Journal of Computer …, 2022 - Taylor & Francis
Cyber-attacks represent a potential threat to information security. As rates of data usage and
internet consumption continue to increase, cyber awareness turned to be increasingly …

An exploratory study of cyber hygiene behaviors and knowledge

AA Cain, ME Edwards, JD Still - Journal of information security and …, 2018 - Elsevier
End users' cyber hygiene often plays a large role in cybersecurity breaches. Therefore, we
need a deeper understanding of the user differences that are associated with either good or …

The Art of Cybersecurity: Defense in Depth Strategy for Robust Protection

AA Mughal - International Journal of Intelligent Automation …, 2018 - research.tensorgate.org
In an ever-evolving cyber threat landscape, implementing a defense in depth strategy is
essential for organizations to protect their assets, information, and operations. This …

Assessment of cybersecurity awareness among students of Majmaah University

T Alharbi, A Tassaddiq - Big Data and Cognitive Computing, 2021 - mdpi.com
Information exchange has become increasingly faster and efficient through the use of recent
technological advances, such as instant messaging and social media platforms …

Human factor security: evaluating the cybersecurity capacity of the industrial workforce

UD Ani, H He, A Tiwari - Journal of Systems and Information …, 2019 - emerald.com
Purpose As cyber-attacks continue to grow, organisations adopting the internet-of-things
(IoT) have continued to react to security concerns that threaten their businesses within the …

Cybersecurity awareness framework for academia

M Khader, M Karam, H Fares - Information, 2021 - mdpi.com
Cybersecurity is a multifaceted global phenomenon representing complex socio-technical
challenges for governments and private sectors. With technology constantly evolving, the …

A general cyber hygiene approach for financial analytical environment

WM Ead, MM Abbassy - Financial Data Analytics: Theory and Application, 2022 - Springer
Ideally, users must have a good level of cyber hygiene. Many people have bad cyber
hygiene. They openly exchange passwords and share private information on social …

Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general

M Martens, R De Wolf, L De Marez - Computers in Human Behavior, 2019 - Elsevier
It is a popular belief that humans are the weakest link in cyber-security. However, there has
been little research devoted to why people do (or do not) protect themselves and what …