Search results for "phishing"

showing 7 items of 7 documents

Verkkohuijausten tyypit sosiaalisessa mediassa

2017

Types of online scams in social media. In this thesis, types of online scams in social media are examined first by defining online scams and then applying the principles of them to social media setting. The thesis is a literature review in which it was found that in social media there are similar types of scams than outside of it. These types of scams were phishing scams, scams related to social engineering malware attacks and 419 -scams. There were a couple of scam scenarios that were not detected outside of social media context due to social networking site required as a platform for the scams. These were scams involving impersonation of celebrities or friends, services offering followers…

haittaohjelmatkirjallisuuskatsausidentiteettivarkausmalwaresocial mediasosiaalinen mediaonline scamphishingverkkourkintasocial networking site
researchProduct

Low-cost active cyber defence

2014

The authors of this paper investigated relatively simple active strategies against selected popular cyber threat vectors. When cyber attacks are analysed for their severity and occurrence, many incidents are usually classifi ed as minor, e.g. spam or phishing. We are interested in the various types of low-end cyber incidents (as opposed to high-end state- sponsored incidents and advanced persistent threats) for two reasons: • being the least complicated incidents, we expect to fi nd simple active response The authors analysed the proposed strategies from the security economics point of view to determine why and how these strategies might be effective. We also discuss the legal aspects of th…

Computer sciencebusiness.industryInternet privacybusinessComputer securitycomputer.software_genrePhishingcomputerCyber threats2014 6th International Conference On Cyber Conflict (CyCon 2014)
researchProduct

Assisted labeling for spam account detection on twitter

2019

Online Social Networks (OSNs) have become increasingly popular both because of their ease of use and their availability through almost any smart device. Unfortunately, these characteristics make OSNs also target of users interested in performing malicious activities, such as spreading malware and performing phishing attacks. In this paper we address the problem of spam detection on Twitter providing a novel method to support the creation of large-scale annotated datasets. More specifically, URL inspection and tweet clustering are performed in order to detect some common behaviors of spammers and legitimate users. Finally, the manual annotation effort is further reduced by grouping similar u…

Social network021110 strategic defence & security studiesInformation retrievalSocial networkbusiness.industryComputer scienceSpam detectionSmart device0211 other engineering and technologies020206 networking & telecommunicationsUsability02 engineering and technologycomputer.software_genrePhishinglaw.inventionManual annotationlawComputer security0202 electrical engineering electronic engineering information engineeringBlacklistingMalwarebusinessCluster analysiscomputer
researchProduct

Time Up for Phishing with Effective Anti-Phishing Research Strategies

2015

Public awareness is a significant factor in the battle against online identity theft (phishing). Advancing public readiness can be a strategic protection mechanism for citizens' vulnerability and privacy. Further, an effective research strategy against phishing is the combination of increased social awareness with software quality and social computing. The latter will decrease phishing victims and will improve information systems quality. First, the authors discuss recent research results on software quality criteria used for the design of anti-phishing technologies. Second, it is argued that the dynamics of social surroundings affect citizens' trust and can compromise social security. Thir…

Social computingbusiness.industryManagement of Technology and InnovationComputer Science (miscellaneous)Information systemSocial consciousnessOnline identityBusinessPublic relationsPhishingSoftware qualityVulnerability (computing)Protection mechanismInternational Journal of Human Capital and Information Technology Professionals
researchProduct

Using stage theorizing to make anti-phishing recommendations more effective

2018

Purpose This paper aims to review the behavioral phishing literature to understand why anti-phishing recommendations are not very effective and to propose ways of making the recommendations more effective. The paper also examines how the concept of stages from health communication and psychology can be used to make recommendations against phishing more effective. Design/methodology/approach This literature review study focused on the behavioral phishing literature that has relied on human subjects. Studies were excluded for reasons that included lacking practical recommendations and human subjects. Findings The study finds that phishing research does not consider where victims are residing…

Information Systems and ManagementInterviewComputer Networks and CommunicationsComputer sciencemedia_common.quotation_subjectInternet privacystage theories02 engineering and technologyvaiheteoriatuhritManagement Information SystemsOriginality020204 information systemsManagement of Technology and Innovation0502 economics and business0202 electrical engineering electronic engineering information engineeringEmpirical evidenceverkkourkintaHealth communicationmedia_commonbusiness.industry05 social sciencesPhishingStage theoryHealth psychologykohdeviestintäCategorizationbusiness050203 business & managementSoftwareInformation Systems
researchProduct

Kohdistettu huijaussähköposti organisaatioiden tietoturvauhkana

2017

Tässä pro-gradu tutkielmassa käsitellään kohdistettua huijaussähköpos-tia organisaation tietoturvauhkana käyttäjien toiminnan näkökulmasta. Tutkielmassa kartoitettiin, mitkä tekijät ovat yhteydessä kohdistetulla huijaussähköpostilla huijatuksi tulemiseen. Tarkastelun kohteina olivat paitsi viestin ominaisuudet myös erilaiset yksilön ominaisuudet, kuten käyttäjän tietoisuus tietoturvariskeistä. Tutkielman aihe on tärkeä, koska organisaatiot ovat yhä riippuvaisempia tietojärjestelmien toiminnasta ja niissä olevista tiedoista. Kohdistetuista huijaussähköposteista voi aiheutua merkittäviä vahinkoja organisaatioille, ja mahdollisuus vahingoille on kasvanut viime vuosien aikana, kun teknologia ja…

kohdistettu huijaussähköpostihuijaussähköpostispear phishingorganisaatiottietoturvaverkkourkintaorganisaation tietoturva
researchProduct

Explaining two forms of Internet crime from two perspectives : toward stage theories for phishing and Internet scamming

2017

The two studies in this dissertation examine two pervasive and common forms of Internet crimes from two different perspectives: (1) phishing from the victims’ perspective and (2) Internet scamming from the offenders’ perspective. For the former, previous phishing research is based on models that assume that fixed or static factors explain or predict people’s reasons for complying with phishing emails. These models assume that the reasons for complying with phishing emails are the same across individuals and across time. However, we argue that, whereas the act of clicking on a phishing email is the same across time for phishing victims, the reasons for complying are not the same. We address …

scammingtietoverkkorikoksetsituational crime theorieskriminologiahuijaritphishingvaiheteoriatuhritdispositional crime theorieshuijausstage theorizingInternet crimesinterpretive researchverkkourkintarikolliset
researchProduct