-The prevalence and effectiveness of phishing attacks, despite the presence of a vast array of technical defences, are due largely to the fact that attackers are ruthlessly targeting what is often referred to as the weakest link in the system -the human. This paper reports the results of an investigation into how end users behave when faced with phishing websites and how this behaviour exposes them to attack. Specifically, the paper presents a proof of concept computer model for simulating human behaviour with respect to phishing website detection based on the ACT-R cognitive architecture, and draws conclusions as to the applicability of this architecture to human behaviour modelling within a phishing detection scenario.Following the development of a high-level conceptual model of the phishing website detection process, the study draws upon ACT-R to model and simulate the cognitive processes involved in judging the validity of a representative webpage based primarily around the characteristics of the HTTPS padlock security indicator. The study concludes that despite the low-level nature of the architecture and its very basic user interface support, ACT-R possesses strong capabilities which map well onto the phishing use case, and that further work to more fully represent the range of human security knowledge and behaviours in an ACT-R model could lead to improved insights into how best to combine technical and human defences to reduce the risk to end users from phishing attacks.
SummaryMedullary carcinoma ofthe thyroid commonly spreads to the lymphatics and later on in the disease process, to distant sites such as lung, liver and bone. Spread to the breast is rare (only two previous reported cases) and presents a major diagnostic dilemma. We report a case of metastatic medullary carcinoma of the thyroid which presented as a primary breast nodule with ipsilateral axillary lymphadenopathy. Clearly it was important to distinguish this tumour from a breast primary as each are managed differently. Both cytological and radiological investigations were inconclusive but excision biopsy was diagnostic.
Attempts to protect and preserve New Zealand's wild and scenic rivers received statutory support in 1981 through amendments to the Water and Soil Conservation Act 1967. These legislative provisions, Water Conservation Orders, were retained in the Resource Management Act 1991, although there was a broadening of the type of waters and range of values that could be protected. An analysis of the 15 water conservation orders granted enabled the identification of a typology that reveals some distinctive geographic and temporal patterns.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.