While security vendors have documented trends in phishing attacks across numerous industries, there remains a gap in available data for phishing attacks against higher education institutions.  This researcher studied phishing attacks delivered over the course of one year against the University of North Carolina at Charlotte. Research questions include: What were the component characteristics of phishing attacks against the university?  Which phishing attacks were successful? What possible countermeasures can be implemented to prevent such attacks? A Phishing Susceptibility Framework is proposed; the framework has two main sections – the Attacker Gambit that exhibits motivation and methodology, and the Victim Profile that reveals victi...
The emergence of the deadly global respiratory coronavirus disease (COVID-19) in 2019 claimed many l...
Phishing, or the attempt of criminals to obtain sensitive information through a variety of technique...
Phishing is a widespread threat that has attracted a lot of attention from the security community. A...
While security vendors have documented trends in phishing attacks across numerous industries, there ...
While security vendors have documented trends in phishing attacks across numerous industries, there ...
The effectiveness of phishing attacks is being analyzed by many researchers. At the same time, resea...
Problem: How can the effectiveness of a phishing attack be quantified and/or measured? Applications:...
Phishing attacks were responsible for $3.2 billion dollars in losses during 2007 and the number of a...
Phishing attacks have increased rapidly and caused many drastic damages and losses for internet user...
Effective security awareness programs are desired at colleges to modify the behavior of employees an...
Email is of critical importance as a communication channel for both business and personal matters. U...
The purpose of this study is to identify and examine the factors that may affect phishing susceptibi...
Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. ...
Online banking and e-commerce applications have good protection against attacks directed direct towa...
Phishing, or the attempt of criminals to obtain sensitive information through a variety of technique...
The emergence of the deadly global respiratory coronavirus disease (COVID-19) in 2019 claimed many l...
Phishing, or the attempt of criminals to obtain sensitive information through a variety of technique...
Phishing is a widespread threat that has attracted a lot of attention from the security community. A...
While security vendors have documented trends in phishing attacks across numerous industries, there ...
While security vendors have documented trends in phishing attacks across numerous industries, there ...
The effectiveness of phishing attacks is being analyzed by many researchers. At the same time, resea...
Problem: How can the effectiveness of a phishing attack be quantified and/or measured? Applications:...
Phishing attacks were responsible for $3.2 billion dollars in losses during 2007 and the number of a...
Phishing attacks have increased rapidly and caused many drastic damages and losses for internet user...
Effective security awareness programs are desired at colleges to modify the behavior of employees an...
Email is of critical importance as a communication channel for both business and personal matters. U...
The purpose of this study is to identify and examine the factors that may affect phishing susceptibi...
Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. ...
Online banking and e-commerce applications have good protection against attacks directed direct towa...
Phishing, or the attempt of criminals to obtain sensitive information through a variety of technique...
The emergence of the deadly global respiratory coronavirus disease (COVID-19) in 2019 claimed many l...
Phishing, or the attempt of criminals to obtain sensitive information through a variety of technique...
Phishing is a widespread threat that has attracted a lot of attention from the security community. A...