Search results for "phishing"
showing 7 items of 7 documents
Verkkohuijausten tyypit sosiaalisessa mediassa
2017
Types of online scams in social media. In this thesis, types of online scams in social media are examined first by defining online scams and then applying the principles of them to social media setting. The thesis is a literature review in which it was found that in social media there are similar types of scams than outside of it. These types of scams were phishing scams, scams related to social engineering malware attacks and 419 -scams. There were a couple of scam scenarios that were not detected outside of social media context due to social networking site required as a platform for the scams. These were scams involving impersonation of celebrities or friends, services offering followers…
Low-cost active cyber defence
2014
The authors of this paper investigated relatively simple active strategies against selected popular cyber threat vectors. When cyber attacks are analysed for their severity and occurrence, many incidents are usually classifi ed as minor, e.g. spam or phishing. We are interested in the various types of low-end cyber incidents (as opposed to high-end state- sponsored incidents and advanced persistent threats) for two reasons: • being the least complicated incidents, we expect to fi nd simple active response The authors analysed the proposed strategies from the security economics point of view to determine why and how these strategies might be effective. We also discuss the legal aspects of th…
Assisted labeling for spam account detection on twitter
2019
Online Social Networks (OSNs) have become increasingly popular both because of their ease of use and their availability through almost any smart device. Unfortunately, these characteristics make OSNs also target of users interested in performing malicious activities, such as spreading malware and performing phishing attacks. In this paper we address the problem of spam detection on Twitter providing a novel method to support the creation of large-scale annotated datasets. More specifically, URL inspection and tweet clustering are performed in order to detect some common behaviors of spammers and legitimate users. Finally, the manual annotation effort is further reduced by grouping similar u…
Time Up for Phishing with Effective Anti-Phishing Research Strategies
2015
Public awareness is a significant factor in the battle against online identity theft (phishing). Advancing public readiness can be a strategic protection mechanism for citizens' vulnerability and privacy. Further, an effective research strategy against phishing is the combination of increased social awareness with software quality and social computing. The latter will decrease phishing victims and will improve information systems quality. First, the authors discuss recent research results on software quality criteria used for the design of anti-phishing technologies. Second, it is argued that the dynamics of social surroundings affect citizens' trust and can compromise social security. Thir…
Using stage theorizing to make anti-phishing recommendations more effective
2018
Purpose This paper aims to review the behavioral phishing literature to understand why anti-phishing recommendations are not very effective and to propose ways of making the recommendations more effective. The paper also examines how the concept of stages from health communication and psychology can be used to make recommendations against phishing more effective. Design/methodology/approach This literature review study focused on the behavioral phishing literature that has relied on human subjects. Studies were excluded for reasons that included lacking practical recommendations and human subjects. Findings The study finds that phishing research does not consider where victims are residing…
Kohdistettu huijaussähköposti organisaatioiden tietoturvauhkana
2017
Tässä pro-gradu tutkielmassa käsitellään kohdistettua huijaussähköpos-tia organisaation tietoturvauhkana käyttäjien toiminnan näkökulmasta. Tutkielmassa kartoitettiin, mitkä tekijät ovat yhteydessä kohdistetulla huijaussähköpostilla huijatuksi tulemiseen. Tarkastelun kohteina olivat paitsi viestin ominaisuudet myös erilaiset yksilön ominaisuudet, kuten käyttäjän tietoisuus tietoturvariskeistä. Tutkielman aihe on tärkeä, koska organisaatiot ovat yhä riippuvaisempia tietojärjestelmien toiminnasta ja niissä olevista tiedoista. Kohdistetuista huijaussähköposteista voi aiheutua merkittäviä vahinkoja organisaatioille, ja mahdollisuus vahingoille on kasvanut viime vuosien aikana, kun teknologia ja…
Explaining two forms of Internet crime from two perspectives : toward stage theories for phishing and Internet scamming
2017
The two studies in this dissertation examine two pervasive and common forms of Internet crimes from two different perspectives: (1) phishing from the victims’ perspective and (2) Internet scamming from the offenders’ perspective. For the former, previous phishing research is based on models that assume that fixed or static factors explain or predict people’s reasons for complying with phishing emails. These models assume that the reasons for complying with phishing emails are the same across individuals and across time. However, we argue that, whereas the act of clicking on a phishing email is the same across time for phishing victims, the reasons for complying are not the same. We address …