Design and preliminary evaluation of a cyber Security Requirements Education Game (SREG)

A Yasin, L Liu, T Li, J Wang, D Zowghi - Information and Software …, 2018 - Elsevier
Context: Security, in digitally connected organizational environments of today, involves
many different perspectives, including social, physical, and technical factors. In order to …

Developing and evaluating a five minute phishing awareness video

M Volkamer, K Renaud, B Reinheimer, P Rack… - Trust, Privacy and …, 2018 - Springer
Confidence tricksters have always defrauded the unwary. The computer era has merely
extended their range and made it possible for them to target anyone in the world who has an …

Social Media Identity Manipulation: A Review in the Context of Industry 4.0 and Society 5.0

E Gideon, ARMJ Rinjes, NFM Noor… - Sains …, 2024 - sainshumanika.utm.my
Abstract Industry 4.0 shaped Society 5.0 which focused heavily on people and gave equal
merit to economic development and the resolution of public issues through the utilization of …

Multi-layer defense model for securing online financial transactions

J Gualdoni, A Kurtz, I Myzyri… - … on Software Security …, 2017 - ieeexplore.ieee.org
Purchasing items on the Internet with credit cards is risky-due to the ease of gaining the
information without having the physical card. The ease of phishing, spoofing, or other ways …

Defining Legal Contours of Digital Identity Theft

T Tantimin, E Febriyani, A Agustianto, RH Hutauruk - JURNAL AKTA - jurnal.unissula.ac.id

Comparing Social Engineering Training in the Context of Healthcare

G Ordonez - 2022 - search.proquest.com
Social Engineering attacks have been a rising issue in recent years, affecting a multitude of
industries. One industry that has been of great interest to hackers is the Healthcare industry …

Proposal of data-driven processor architecture Qv-K1

T Kamigata, K Murakami, M Iwata… - … Ninth Great Lakes …, 1999 - ieeexplore.ieee.org
This paper presents an extended SIMD form data operation for multi-media signal
processing and a performance evaluation of data-driven processor Qv-K1. By appending …