|
|
|
Peter K. K. Loh, Aloysius Z. Y. Lee and Vivek Balachandran
The rise in generative Artificial Intelligence (AI) has led to the development of more sophisticated phishing email attacks, as well as an increase in research on using AI to aid the detection of these advanced attacks. Successful phishing email attacks ...
ver más
|
|
|
|
|
|
|
Elham Al Qahtani, Yousra Javed, Sarah Tabassum, Lipsarani Sahoo and Mohamed Shehab
User adoption and usage of end-to-end encryption tools is an ongoing research topic. A subset of such tools allows users to encrypt confidential emails, as well as manage their access control using features such as the expiration time, disabling forwardi...
ver más
|
|
|
|
|
|
|
Mohammad Tubishat, Feras Al-Obeidat, Ali Safaa Sadiq and Seyedali Mirjalili
Spam emails have become a pervasive issue in recent years, as internet users receive increasing amounts of unwanted or fake emails. To combat this issue, automatic spam detection methods have been proposed, which aim to classify emails into spam and non-...
ver más
|
|
|
|
|
|
|
Brent Pethers and Abubakar Bello
Cyber sextortion attacks are security and privacy threats delivered to victims online, to distribute sexual material in order to force the victim to act against their will. This continues to be an under-addressed concern in society. This study investigat...
ver más
|
|
|
|
|
|
|
Temidayo Oluwatosin Omotehinwa and David Opeoluwa Oyewola
Unsolicited emails, popularly referred to as spam, have remained one of the biggest threats to cybersecurity globally. More than half of the emails sent in 2021 were spam, resulting in huge financial losses. The tenacity and perpetual presence of the adv...
ver más
|
|
|
|
|
|
|
Jun Jian, Jinhai Chen and Peter J. Webster
Ship pilots and maritime safety administration have an urgent need for more accurate and earlier warnings for strong wind gusts. This study firstly investigated the ?Oriental Star? cruise ship capsizing event in 2015, one of the deadliest shipwreck event...
ver más
|
|
|
|
|
|
|
Erkin Altuntas, Peter A. Gloor and Pascal Budner
Do employees with high ethical and moral values perform better? Comparing personality characteristics, moral values, and risk-taking behavior with individual and team performance has long been researched. Until now, these determinants of individual perso...
ver más
|
|
|
|
|
|
|
Manfred Schneps-Schneppe
Pág. 77 - 108
The confrontation between two telecommunications technologies ? packet switching and circuit switching ? has a long history and, it seems, will not stop in the foreseeable future. This problem is discussed using examples from two socially significant are...
ver más
|
|
|
|
|
|
|
Michael Petrolini, Stefano Cagnoni and Monica Mordonini
The General Data Protection Regulation (GDPR) has allowed EU citizens and residents to have more control over their personal data, simplifying the regulatory environment affecting international business and unifying and homogenising privacy legislation w...
ver más
|
|
|
|
|
|
|
Amzul Rifin, Dahlia Nauly
Pág. 32 - 42
In the globalization era, ICT has important role in firm?s ability to export their products. Theobjective of this research is to analyze the impact of ICT on the ability of Indonesia?s firm to exporttheir product. Two ICT methods are analyzed, email and ...
ver más
|
|
|
|