Fighting against phishing attacks: state of the art and future challenges
BB Gupta, A Tewari, AK Jain, DP Agrawal - Neural Computing and …, 2017 - Springer
In the last few years, phishing scams have rapidly grown posing huge threat to global
Internet security. Today, phishing attack is one of the most common and serious threats over …
Internet security. Today, phishing attack is one of the most common and serious threats over …
A survey of phishing email filtering techniques
Phishing email is one of the major problems of today's Internet, resulting in financial losses
for organizations and annoying individual users. Numerous approaches have been …
for organizations and annoying individual users. Numerous approaches have been …
Cyber security awareness, knowledge and behavior: A comparative study
Cyber-attacks represent a potential threat to information security. As rates of data usage and
internet consumption continue to increase, cyber awareness turned to be increasingly …
internet consumption continue to increase, cyber awareness turned to be increasingly …
An exploratory study of cyber hygiene behaviors and knowledge
AA Cain, ME Edwards, JD Still - Journal of information security and …, 2018 - Elsevier
End users' cyber hygiene often plays a large role in cybersecurity breaches. Therefore, we
need a deeper understanding of the user differences that are associated with either good or …
need a deeper understanding of the user differences that are associated with either good or …
The Art of Cybersecurity: Defense in Depth Strategy for Robust Protection
AA Mughal - International Journal of Intelligent Automation …, 2018 - research.tensorgate.org
In an ever-evolving cyber threat landscape, implementing a defense in depth strategy is
essential for organizations to protect their assets, information, and operations. This …
essential for organizations to protect their assets, information, and operations. This …
Assessment of cybersecurity awareness among students of Majmaah University
Information exchange has become increasingly faster and efficient through the use of recent
technological advances, such as instant messaging and social media platforms …
technological advances, such as instant messaging and social media platforms …
Human factor security: evaluating the cybersecurity capacity of the industrial workforce
Purpose As cyber-attacks continue to grow, organisations adopting the internet-of-things
(IoT) have continued to react to security concerns that threaten their businesses within the …
(IoT) have continued to react to security concerns that threaten their businesses within the …
Cybersecurity awareness framework for academia
M Khader, M Karam, H Fares - Information, 2021 - mdpi.com
Cybersecurity is a multifaceted global phenomenon representing complex socio-technical
challenges for governments and private sectors. With technology constantly evolving, the …
challenges for governments and private sectors. With technology constantly evolving, the …
A general cyber hygiene approach for financial analytical environment
Ideally, users must have a good level of cyber hygiene. Many people have bad cyber
hygiene. They openly exchange passwords and share private information on social …
hygiene. They openly exchange passwords and share private information on social …
Investigating and comparing the predictors of the intention towards taking security measures against malware, scams and cybercrime in general
It is a popular belief that humans are the weakest link in cyber-security. However, there has
been little research devoted to why people do (or do not) protect themselves and what …
been little research devoted to why people do (or do not) protect themselves and what …