The increased sophistication and frequency of phishing attacks that target organizations necessitate a comprehensive cyber security strategy to handle phishing attacks from several perspectives, such as the detection of phishing and testing of users' awareness. Through a systematic review of 163 research articles, we analyzed the organization-oriented phishing research to categorize current research and identify future opportunities. We find that a notable number of studies concentrate on phishing detection and awareness while other layers of protection are overlooked, such as the mitigation of phishing. In addition, we draw attention to shortcomings and challenges. We believe that this article will provide opportunities for future research on phishing in organizations.
Download full-text PDF |
Source |
---|---|
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11623132 | PMC |
http://dx.doi.org/10.7717/peerj-cs.2487 | DOI Listing |
PeerJ Comput Sci
November 2024
Department of Computer Science, Taif University, Taif, Saudi Arabia.
The increased sophistication and frequency of phishing attacks that target organizations necessitate a comprehensive cyber security strategy to handle phishing attacks from several perspectives, such as the detection of phishing and testing of users' awareness. Through a systematic review of 163 research articles, we analyzed the organization-oriented phishing research to categorize current research and identify future opportunities. We find that a notable number of studies concentrate on phishing detection and awareness while other layers of protection are overlooked, such as the mitigation of phishing.
View Article and Find Full Text PDFAdv Physiol Educ
November 2024
Department of Clinical & Biomedical Science, University of Exeter Medical School, Faculty of Health & Life Sciences, University of Exeter, Exeter, United Kingdom.
An increase in scholarly publishing has been accompanied by a proliferation of potentially illegitimate publishers (PIP), commonly known as "predatory publishers". These PIP often engage in fraudulent practices and publish articles that are not subject to the same scrutiny as those published in journals from legitimate publishers (LP). This places academics at risk, in particular students who utilize journal articles for learning and assignments.
View Article and Find Full Text PDFFront Artif Intell
October 2024
Department of Environmental Health, Harvard T H Chan School of Public Health, Boston, MA, United States.
Life has become more comfortable in the era of advanced technology in this cutthroat competitive world. However, there are also emerging harmful technologies that pose a threat. Without a doubt, phishing is one of the rising concerns that leads to stealing vital information such as passwords, security codes, and personal data from any target node through communication hijacking techniques.
View Article and Find Full Text PDFSci Rep
October 2024
EasyDMARC, Data Science, 0014, Yerevan, Armenia.
Cybercriminals create phishing websites that mimic legitimate websites to get sensitive information from companies, individuals, or governments. Therefore, using state-of-the-art artificial intelligence and machine learning technologies to correctly classify phishing and legitimate URLs is imperative. We report the results of applying deterministic and probabilistic neural network models to URL classification.
View Article and Find Full Text PDFPLoS One
October 2024
Faculty of Criminal Justice and Security, University of Maribor, Ljubljana, Slovenia.
Cyberattacks pose a significant business risk to organizations. Although there is ample literature focusing on why people pose a major risk to organizational cybersecurity and how to deal with it, there is surprisingly little we know about cyber and information security decision-makers who are essentially the people in charge of setting up and maintaining organizational cybersecurity. In this paper, we study cybersecurity awareness of cyber and information security decision-makers, and investigate factors associated with it.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!