victimizing researchers by phishing

نویسندگان

mehdi dadkhah information science scientist, isfahan, ir iran; information science scientist, isfahan, ir iran

glenn borchardt progressive science institute, berkeley, california, usa

چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Detecting Phishing E-mails by Heterogeneous Classification

This paper presents a system for classifying e-mails into two categories, legitimate and fraudulent. This classifier system is based on the serial application of three filters: a Bayesian filter that classifies the textual content of e-mails, a rulebased filter that classifies the non grammatical content of e-mails and, finally, a filter based on an emulator of fictitious accesses which classif...

متن کامل

Victimized by Phishing: A Heuristic-Systematic Perspective

Phishing has become an ever-present, ever-increasing threat to information security, yet theory-based, systematic research on the behavioral aspect of this phenomenon is rather limited. In this paper, we propose the Heuristic-Systematic Model (HSM) as an overarching theory to solidify the theory base for this line of research. We note the theoretical synergy between HSM and other theories used ...

متن کامل

Misconduct by researchers and authors.

Most scientific research is conducted properly and reported honestly but a few authors invent or manipulate data to reach fraudulent conclusions. Other types of misconduct include deliberately providing incomplete or improperly processed data, failure to follow ethical procedures, failure to obtain informed consent, breach of patient confidentiality, improper award or denial of authorship, fail...

متن کامل

Peer Reviewers’ Comments on Research Articles Submitted by Iranian Researchers

The invisible hands of peer reviewers play a determining role in the eventual fate of submissions to international English-medium journals. This study builds on the assumption that non-native researchers and prospective academic authors may find the whole strive for publication, and more specifically, the tough review process, less threatening if they are aware of journal reviewers’ expectation...

متن کامل

Social Phishing

Email spam: unsolicited emails for the purpose of advertisement or committing fraud. Phishing: electronic fraud based on social engineering. Phisher: fraudsters who commit phishing crimes. Phishing site: web sites created by phishers to steal sensitive information from users. Anti-phishing: efforts taken from multiple perspectives to combat phishing crimes. Machine learning: the design and deve...

متن کامل

An interdiscplinary study of phishing and spear-phishing attacks

In a world where spear-phishing is one of the most common attacks used to steal confidential data, it is necessary to instruct technical and non-technical users about new mechanisms attackers can use to generate these attacks. We want to focus on phishing attacks, where a social engineer communicates a deceitful message to their victims in order to obtain some confidential information, because ...

متن کامل

منابع من

با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید


عنوان ژورنال:
razavi international journal of medicine

جلد ۴، شماره ۳، صفحات ۰-۰

کلمات کلیدی

میزبانی شده توسط پلتفرم ابری doprax.com

copyright © 2015-2023