18 min

12: الاصطياد الالكترون‪ي‬ تمعّن

    • Science

الكثير منا تعرض للاصطياد الالكتروني. ما هو معناه و لماذا من المهم الحذر منه؟المصادر:[1] S. Das, A. Kim, Z. Tingle, and C. Nippert-Eng, "All about phishing: Exploring user research through a systematic literature review," arXiv preprint arXiv:1908.05897, 2019.[2] D. Jampen, G. Gür, T. Sutter, and B. Tellenbach, "Don’t click: towards an effective anti-phishing training. A comparative literature review," Human-centric Computing and Information Sciences, vol. 10, no. 1, pp. 1-41, 2020.[3] M. Dadkhah, T. Sutikno, M. D. Jazi, and D. Stiawan, "An introduction to journal phishings and their detection approach," Telkomnika, vol. 13, no. 2, p. 373, 2015.[4] A. Ferreira and S. Teles, "Persuasion: How phishing emails can influence users and bypass security measures," International Journal of Human-Computer Studies, vol. 125, pp. 19-31, 2019.[5] P. Rajivan and C. Gonzalez, "Creative persuasion: A study on adversarial behaviors and strategies in phishing attacks," Frontiers in psychology, vol. 9, p. 135, 2018.[6] S. Purkait, "Phishing counter measures and their effectiveness–literature review," Information Management & Computer Security, 2012.[7] T. Lin et al., "Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content," ACM Transactions on Computer-Human Interaction (TOCHI), vol. 26, no. 5, pp. 1-28, 2019.[8] R. Fatima, A. Yasin, L. Liu, and J. Wang, "How persuasive is a phishing email? A phishing game for phishing awareness," Journal of Computer Security, vol. 27, no. 6, pp. 581-612, 2019.

الكثير منا تعرض للاصطياد الالكتروني. ما هو معناه و لماذا من المهم الحذر منه؟المصادر:[1] S. Das, A. Kim, Z. Tingle, and C. Nippert-Eng, "All about phishing: Exploring user research through a systematic literature review," arXiv preprint arXiv:1908.05897, 2019.[2] D. Jampen, G. Gür, T. Sutter, and B. Tellenbach, "Don’t click: towards an effective anti-phishing training. A comparative literature review," Human-centric Computing and Information Sciences, vol. 10, no. 1, pp. 1-41, 2020.[3] M. Dadkhah, T. Sutikno, M. D. Jazi, and D. Stiawan, "An introduction to journal phishings and their detection approach," Telkomnika, vol. 13, no. 2, p. 373, 2015.[4] A. Ferreira and S. Teles, "Persuasion: How phishing emails can influence users and bypass security measures," International Journal of Human-Computer Studies, vol. 125, pp. 19-31, 2019.[5] P. Rajivan and C. Gonzalez, "Creative persuasion: A study on adversarial behaviors and strategies in phishing attacks," Frontiers in psychology, vol. 9, p. 135, 2018.[6] S. Purkait, "Phishing counter measures and their effectiveness–literature review," Information Management & Computer Security, 2012.[7] T. Lin et al., "Susceptibility to Spear-Phishing Emails: Effects of Internet User Demographics and Email Content," ACM Transactions on Computer-Human Interaction (TOCHI), vol. 26, no. 5, pp. 1-28, 2019.[8] R. Fatima, A. Yasin, L. Liu, and J. Wang, "How persuasive is a phishing email? A phishing game for phishing awareness," Journal of Computer Security, vol. 27, no. 6, pp. 581-612, 2019.

18 min

Top Podcasts In Science

The Infinite Monkey Cage
BBC Radio 4
Ologies with Alie Ward
Alie Ward
The Curious Cases of Rutherford & Fry
BBC Radio 4
Hidden Brain
Hidden Brain, Shankar Vedantam
Science Weekly
The Guardian
Making Sense with Sam Harris
Sam Harris