This study examines the rising incidence of phishing and its impact on the survival of corporate organisations in Cross River State, Nigeria. A cross-sectional survey research design which allows the triangulation of quantitative and qualitative methods is applied. Questionnaires were distributed to 1074 respondents purposively selected from 18 financial institutions, 4 telecommunication network providers and 2 manufacturing companies, while in-depth interviews were conducted on 13 participants across the selected corporate organisations. The presentation of data is done using frequency distribution tables and chart while the qualitative data were content analysized. The study concludes that phishing is on the increase and corporate organis...
The advancement of information and communication technology (ICT) has resulted in dynamic changes in...
Cyber-attack is an attempt by hackers to damage or destroy a computer network or system for purposes...
E-Commerce has been plagued with problems since its inception and this study examines one of these p...
Recent cybersecurity reports suggest that cyber-attacks are on the increase, especially as they are ...
This paper unveils the role of security intelligence in facilitating the war against cybercrime in o...
Security tips are now used as a method of priming online users from falling prey for fraudulent scam...
Phishing is one of the oldest and most flexible types of social engineering attacks and could be use...
This study examined three fundamental threats to the security of digital business transactions in Ni...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engine...
The paper is on the effects of e-mail scams on e-business growth in particular interest to Globalcom...
To shield users from phishing scams, various online brands send security tips as email, SMS and onli...
The positive usage of Internet Technology advantage had inspired the banking sector in Nigeria to in...
Advancement in information and communication technology (ICT) has created room for the emergence of ...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
The advancement of information and communication technology (ICT) has resulted in dynamic changes in...
Cyber-attack is an attempt by hackers to damage or destroy a computer network or system for purposes...
E-Commerce has been plagued with problems since its inception and this study examines one of these p...
Recent cybersecurity reports suggest that cyber-attacks are on the increase, especially as they are ...
This paper unveils the role of security intelligence in facilitating the war against cybercrime in o...
Security tips are now used as a method of priming online users from falling prey for fraudulent scam...
Phishing is one of the oldest and most flexible types of social engineering attacks and could be use...
This study examined three fundamental threats to the security of digital business transactions in Ni...
In this observational quasi-experimental study, we recruited 200 participants during the Federal Uni...
In our exploratory quasi-experimental study, 480-student were recruited and exposed to social engine...
The paper is on the effects of e-mail scams on e-business growth in particular interest to Globalcom...
To shield users from phishing scams, various online brands send security tips as email, SMS and onli...
The positive usage of Internet Technology advantage had inspired the banking sector in Nigeria to in...
Advancement in information and communication technology (ICT) has created room for the emergence of ...
Access ease, mobility, portability, and improved speed have continued to ease the adoption of comput...
The advancement of information and communication technology (ICT) has resulted in dynamic changes in...
Cyber-attack is an attempt by hackers to damage or destroy a computer network or system for purposes...
E-Commerce has been plagued with problems since its inception and this study examines one of these p...