The goal of this research was to find the factors that influence a user’s ability to identify e-mail scams. It also aimed to understand user’s awareness regarding e-mail scams and actions that need to be taken if and when victimized. This study was conducted on a university campus with 163 participants. This study presented the participants with two scam e-mails and two legitimate e-mails and asked the participants to correctly identify these e-mails as scam or legitimate. The study focused on the ability of people to differentiate between scam and legitimate e-mails. The study attempted to determine factors that influence a user’s ability to successfully identify e-mail scams. The results indicated that frequency of e-mail usage was the on...
The internet provides an ever-expanding, valuable resource for entertainment, communication, and com...
Phishing requires humans to fall for impersonated sources. Sender authenticity can often be inferre...
Abstract:- phishers have made uses of an increase email of delivery systems handing over confidentia...
Background. E-mail phishing is a type of social engineering where the threat actor sends e-mails wit...
In an exploratory quasi-experimental study, 138 students recruited during a university orientation w...
Phishing, or the attempt of criminals to obtain sensitive information through a variety of technique...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
In order to communicate the risk of fraudulent e-mails to users properly, it is important to know wh...
In an exploratory quasi-experimental observational study, 138 participants recruited during a univer...
Although phishing is a form of cybercrime that internet users get confronted with rather frequently,...
This research was conducted with the intention of testing whether there exist a link between ones th...
[[abstract]]Spam mail has been a growing problem on the Internet. It causes work inefficiency and da...
Phishing is a scam that has been around for a long time and has only grown in popularity. In this st...
Due to the rapid development in the technologies related to the Internet, users have changed their p...
We cannot imagine a day without a computer especially without Internet. E-Mail plays a vital role in...
The internet provides an ever-expanding, valuable resource for entertainment, communication, and com...
Phishing requires humans to fall for impersonated sources. Sender authenticity can often be inferre...
Abstract:- phishers have made uses of an increase email of delivery systems handing over confidentia...
Background. E-mail phishing is a type of social engineering where the threat actor sends e-mails wit...
In an exploratory quasi-experimental study, 138 students recruited during a university orientation w...
Phishing, or the attempt of criminals to obtain sensitive information through a variety of technique...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
In order to communicate the risk of fraudulent e-mails to users properly, it is important to know wh...
In an exploratory quasi-experimental observational study, 138 participants recruited during a univer...
Although phishing is a form of cybercrime that internet users get confronted with rather frequently,...
This research was conducted with the intention of testing whether there exist a link between ones th...
[[abstract]]Spam mail has been a growing problem on the Internet. It causes work inefficiency and da...
Phishing is a scam that has been around for a long time and has only grown in popularity. In this st...
Due to the rapid development in the technologies related to the Internet, users have changed their p...
We cannot imagine a day without a computer especially without Internet. E-Mail plays a vital role in...
The internet provides an ever-expanding, valuable resource for entertainment, communication, and com...
Phishing requires humans to fall for impersonated sources. Sender authenticity can often be inferre...
Abstract:- phishers have made uses of an increase email of delivery systems handing over confidentia...