Access ease, mobility, portability, and improved speed have continued to ease the adoption of computing devices; while, consequently proliferating phishing attacks. These, in turn, have created mixed feelings in increased adoption and nosedived users’ trust level of devices. The study recruited 480-students, who were exposed to socially-engineered attack directives. Attacks were designed to retrieve personal data and entice participants to access compromised links. We sought to determine the risks of cybercrimes among the undergraduates in selected Nigerian universities, observe students’ responses and explore their attitudes before/after each attack. Participants were primed to remain vigilant to all forms of scams as we sought to investig...
This study examined three fundamental threats to the security of digital business transactions in Ni...
In an exploratory quasi-experimental observational study, 138 participants recruited during a univer...
In the past 25 years, the internet has grown and evolved from a niche networking technology, used al...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engine...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
Security tips are now used as a method of priming online users from falling prey for fraudulent scam...
The purpose of this study is to identify and examine the factors that may affect phishing susceptibi...
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile dev...
In an exploratory quasi-experimental study, 138 students recruited during a university orientation w...
The use of the Internet and networking technologies continues to rise. Alongside the benefits that a...
The emergence of the internet and also the use of various online applications and the exposure to th...
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile dev...
The mobile device is one of the fasted growing technologies that is widely used in a diversifying se...
This study examined three fundamental threats to the security of digital business transactions in Ni...
In an exploratory quasi-experimental observational study, 138 participants recruited during a univer...
In the past 25 years, the internet has grown and evolved from a niche networking technology, used al...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engine...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
Security tips are now used as a method of priming online users from falling prey for fraudulent scam...
The purpose of this study is to identify and examine the factors that may affect phishing susceptibi...
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile dev...
In an exploratory quasi-experimental study, 138 students recruited during a university orientation w...
The use of the Internet and networking technologies continues to rise. Alongside the benefits that a...
The emergence of the internet and also the use of various online applications and the exposure to th...
This study is an exploratory assessment of Phishing, SMiShing and Vishing attacks against mobile dev...
The mobile device is one of the fasted growing technologies that is widely used in a diversifying se...
This study examined three fundamental threats to the security of digital business transactions in Ni...
In an exploratory quasi-experimental observational study, 138 participants recruited during a univer...
In the past 25 years, the internet has grown and evolved from a niche networking technology, used al...