A review of organization-oriented phishing research.

PeerJ Comput Sci

Department of Computer Science, Taif University, Taif, Saudi Arabia.

Published: November 2024

The increased sophistication and frequency of phishing attacks that target organizations necessitate a comprehensive cyber security strategy to handle phishing attacks from several perspectives, such as the detection of phishing and testing of users' awareness. Through a systematic review of 163 research articles, we analyzed the organization-oriented phishing research to categorize current research and identify future opportunities. We find that a notable number of studies concentrate on phishing detection and awareness while other layers of protection are overlooked, such as the mitigation of phishing. In addition, we draw attention to shortcomings and challenges. We believe that this article will provide opportunities for future research on phishing in organizations.

Download full-text PDF

Source
http://www.ncbi.nlm.nih.gov/pmc/articles/PMC11623132PMC
http://dx.doi.org/10.7717/peerj-cs.2487DOI Listing

Publication Analysis

Top Keywords

phishing
8
organization-oriented phishing
8
phishing attacks
8
review organization-oriented
4
phishing increased
4
increased sophistication
4
sophistication frequency
4
frequency phishing
4
attacks target
4
target organizations
4

Similar Publications

A review of organization-oriented phishing research.

PeerJ Comput Sci

November 2024

Department of Computer Science, Taif University, Taif, Saudi Arabia.

The increased sophistication and frequency of phishing attacks that target organizations necessitate a comprehensive cyber security strategy to handle phishing attacks from several perspectives, such as the detection of phishing and testing of users' awareness. Through a systematic review of 163 research articles, we analyzed the organization-oriented phishing research to categorize current research and identify future opportunities. We find that a notable number of studies concentrate on phishing detection and awareness while other layers of protection are overlooked, such as the mitigation of phishing.

View Article and Find Full Text PDF

Illegitimate Publishers in 1 Physiology: Attracting Citations and Infiltration into Legitimate Databases.

Adv Physiol Educ

November 2024

Department of Clinical & Biomedical Science, University of Exeter Medical School, Faculty of Health & Life Sciences, University of Exeter, Exeter, United Kingdom.

An increase in scholarly publishing has been accompanied by a proliferation of potentially illegitimate publishers (PIP), commonly known as "predatory publishers". These PIP often engage in fraudulent practices and publish articles that are not subject to the same scrutiny as those published in journals from legitimate publishers (LP). This places academics at risk, in particular students who utilize journal articles for learning and assignments.

View Article and Find Full Text PDF

Life has become more comfortable in the era of advanced technology in this cutthroat competitive world. However, there are also emerging harmful technologies that pose a threat. Without a doubt, phishing is one of the rising concerns that leads to stealing vital information such as passwords, security codes, and personal data from any target node through communication hijacking techniques.

View Article and Find Full Text PDF

Cybercriminals create phishing websites that mimic legitimate websites to get sensitive information from companies, individuals, or governments. Therefore, using state-of-the-art artificial intelligence and machine learning technologies to correctly classify phishing and legitimate URLs is imperative. We report the results of applying deterministic and probabilistic neural network models to URL classification.

View Article and Find Full Text PDF

Cyberattacks pose a significant business risk to organizations. Although there is ample literature focusing on why people pose a major risk to organizational cybersecurity and how to deal with it, there is surprisingly little we know about cyber and information security decision-makers who are essentially the people in charge of setting up and maintaining organizational cybersecurity. In this paper, we study cybersecurity awareness of cyber and information security decision-makers, and investigate factors associated with it.

View Article and Find Full Text PDF

Want AI Summaries of new PubMed Abstracts delivered to your In-box?

Enter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!