-
121
Securing EHRs With a Novel Token-Based and PPoS Blockchain Methodology
Published 2024-01-01“…Its features, such as confidentiality, decentralization, security and privacy, address challenges traditional healthcare systems face, such as phishing, denial of service and identity theft attacks. In this regard, our research paper presents a security solution specifically tailored for healthcare applications. …”
Get full text
Article -
122
Tecnologie dell’informazione e nuovi processi di vittimizzazione / Nouvelles technologies et processus de victimisation / Information technologies and new processes of victimisatio...
Published 2012-08-01“…New technologies, on the one hand, have produced undeniable positive effects, from the acceleration of cultural diffusion to the communication between "worlds" previously unknown; on the other hand, they have become now an instrument to commit new crimes and deviants acts.In the article we will discuss the processes of victimization related to specific offenses (digital identity theft, online paedopornography, cyberstalking) and to new forms of addiction due to the new media. …”
Get full text
Article -
123
MODERN BUSINESS CYBERSECURITY CHALLENGES AND THE ROLE OF ARTIFICIAL INTELLIGENCE IN COUNTERING THREATS
Published 2024-10-01“…This study provides detailed information on the implementing of cyber threat protection systems to help companies minimize the risks of cyberattacks, identity theft and other online fraud. The research findings show that artificial intelligence is able not only to automatically identify anomalies in the behavior of users and systems, but also to provide a timely response to threats. …”
Get full text
Article -
124
Analisis Bibliometrik Publikasi Isu Kebocoran Data Menggunakan VOSviewer
Published 2023-09-01“… Data leakage can harm individuals who experience it, such as identity theft, financial fraud, or even physical security threats. …”
Get full text
Article -
125
Trusted Computing Strengthens Cloud Authentication
Published 2014-01-01“…This paper proposes the use of trusted computing, Federated Identity Management, and OpenID Web SSO to solve identity theft in the cloud. Besides, this proposed model has been simulated in .Net environment. …”
Get full text
Article -
126
STATUS OF WOMEN IN THE IT BETWEEN 2000-2014
Published 2014-11-01“…As a result, cyber bullying stands for a main concern nowadays, with women often being bullied over the Internet, or easily becoming victims of identity theft. Women also face an unequal position to men in the IT industry across the studied regions.…”
Get full text
Article -
127
CONFRONTING CHALLENGES IN IMPLEMENTING E-PORTFOLIO VIA FACEBOOK IN A PHILIPPINE UNIVERSITY
Published 2015-01-01“…The results showed three major issues classified as: (1) strong apprehension of students to publish their writing outputs on-line; (2) resistance of teachers towards FB as an educational tool; and, (3) concerns of institution as regards academic honesty and identity theft on-line. To confront these challenges and ensure effective implementation and sustainability of evFb at DEAL, improving participatory mechanisms was suggested and discussed. …”
Get full text
Article -
128
A wormhole attack detection method for tactical wireless sensor networks
Published 2023-08-01“…WSNs are commonly affected by various attacks, such as identity theft, black holes, wormholes, protocol spoofing, etc. …”
Get full text
Article -
129
Detecting A Botnet By Reverse Engineering
Published 2013-06-01“…Keywords— Malware, Bot, Botnet, Botmaster, Agobot, Spam, Distributed Denial of Services, Identity Theft, Computer Security, Reverse Engineering, Debug, Windows Service, the Registry.…”
Get full text
Article -
130
Data protection for android based wireless mobile devices
Published 2014“…Once infected these mobile devices may be involved in many kinds of online criminal activity, including identity theft, unsolicited commercial SMS messages, scams and massive coordinated attacks. …”
Get full text
Final Year Project (FYP) -
131
Intelligent Data Security Solutions for e-Health Applications /
Published 2020“…Currently, medical-related identity theft costs billions of dollars each year and altered medical information can put a person’s health at risk through misdiagnosis, delayed treatment or incorrect prescriptions. …”
Get full text
software, multimedia -
132
Threats and Challenges for Security Measures on the Internet of Things
Published 2022-05-01“…Due to the billions of connected devices, there is a potential risk of data loss, identity theft, device manipulation, trust issues, falsification of data, network/server manipulation, and various impacts in the application of IoT platforms. …”
Get full text
Article -
133
Internet fraud and transnational organized crime
Published 2020-03-01“…The main task of this article is to determine the most common forms of online financial crimes, such as “Hacking” or electronic transmission unintended for the interceptor, such as passwords, credit card information, or other types of identity theft. The article discusses the features of legal regulation and the activities of the Ukraine to protect citizens form Internet frauds and to avoid Internet scams, phishing and other cybercrimes in Internet. …”
Get full text
Article -
134
Privacy Threat MOdeling Language
Published 2023-01-01“…Users of OSNs become victims of identity theft, cyberstalking, and information leakage, which are real threats to privacy. …”
Get full text
Article -
135
EEG-based identification system using deep neural networks with frequency features
Published 2024-02-01“…Among various methods, electroencephalography-based (EEG-based) identification is a dependable way to prevent identity theft and impersonation. Due to the distractions present in the identification environment, such as lack of focus, mental engagement, small body movements, blinking, and other noises, it is essential to analyze data that reflects these conditions. …”
Get full text
Article -
136
Phishing Attacks: A Recent Comprehensive Study and a New Anatomy
Published 2021-03-01“…Phishing attacks can lead to severe losses for their victims including sensitive information, identity theft, companies, and government secrets. This article aims to evaluate these attacks by identifying the current state of phishing and reviewing existing phishing techniques. …”
Get full text
Article -
137
Email and Website-Based Phishing Attack: Examining Online Users Security Behavior in Cyberspace Environment
Published 2023-01-01“…As a result, phishing, an identity theft cyber-attack that targets humans rather than computers, was born to harvest internet users' confidential information by taking advantage of human behavior and hurting an organization's continuity, reputation, and credibility. …”
Get full text
Article -
138
Securing Health Sensing Using Integrated Circuit Metric
Published 2015-10-01“…An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. …”
Get full text
Article -
139
Life-long phishing attack detection using continual learning
Published 2023-07-01“…Abstract Phishing is an identity theft that employs social engineering methods to get confidential data from unwary users. …”
Get full text
Article -
140
Confusion, control and comfort: premediating identity management in film and television
Published 2013“…Our analysis suggests that a whole range of future IM (knowledge- and token-based, as well as biometric/implant) technologies is imagined here, with biometric and implant technologies most likely to be taken to (dystopian) extremes. Stories of identity theft and confusion, surveillance and control, comfort and corruption construct them as potentially problematic and always under threat, as well as calling up existential concerns about what it means to be human. …”
Journal article