In this observational quasi-experimental study, we recruited 200 participants during the Federal University of Petroleum Resources Effurun’s (FUPRE) orientation, who were exposed to socially engineered (phishing) attacks over nine months. Attacks sought to extract participants’ data and/or entice them to click (compromised) links. The study aims to determine phishing exposure and risks among undergraduates in FUPRE (Nigeria) by observing their responses to socially-engineered attacks and exploring their attitudes to cybercrime risks before and after phishing attacks. The study primed all students in place of cybercrime awareness to remain vigilant to scams and explored the various scam types with their influence on gender, age, status, and ...
Phishing emails cause enormous losses to both users and organisations. The goal of this study is to ...
The use of the Internet and networking technologies continues to rise. Alongside the benefits that a...
The use of email has been exploited by cybercriminals, as a means of carrying out their cybersecurit...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engine...
In an exploratory quasi-experimental study, 138 students recruited during a university orientation w...
In an exploratory quasi-experimental observational study, 138 participants recruited during a univer...
Phishing continues to be a prevalent social engineering attack. Attacks are relatively easy to setup...
Phishing is one of the oldest and most flexible types of social engineering attacks and could be use...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
The effectiveness of phishing attacks is being analyzed by many researchers. At the same time, resea...
The worldwide popularity of social networking sites (SNSs) and the technical features they offer use...
A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception...
In the past 25 years, the internet has grown and evolved from a niche networking technology, used al...
Phishing emails cause enormous losses to both users and organisations. The goal of this study is to ...
The use of the Internet and networking technologies continues to rise. Alongside the benefits that a...
The use of email has been exploited by cybercriminals, as a means of carrying out their cybersecurit...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engine...
In an exploratory quasi-experimental study, 138 students recruited during a university orientation w...
In an exploratory quasi-experimental observational study, 138 participants recruited during a univer...
Phishing continues to be a prevalent social engineering attack. Attacks are relatively easy to setup...
Phishing is one of the oldest and most flexible types of social engineering attacks and could be use...
Despite Emails and websites being widely used for communication, collaboration, and day-to-day activ...
The effectiveness of phishing attacks is being analyzed by many researchers. At the same time, resea...
The worldwide popularity of social networking sites (SNSs) and the technical features they offer use...
A leading cause of security breaches is a basic human vulnerability: our susceptibility to deception...
In the past 25 years, the internet has grown and evolved from a niche networking technology, used al...
Phishing emails cause enormous losses to both users and organisations. The goal of this study is to ...
The use of the Internet and networking technologies continues to rise. Alongside the benefits that a...
The use of email has been exploited by cybercriminals, as a means of carrying out their cybersecurit...