2023
DOI: 10.11591/ijece.v13i2.pp1943-1953
|View full text |Cite
|
Sign up to set email alerts
|

Evidence of personality traits on phishing attack menace among selected university undergraduates in Nigerian

Abstract: Access ease, mobility, portability, and improved speed have continued to ease the adoption of computing devices; while, consequently proliferating phishing attacks. These, in turn, have created mixed feelings in increased adoption and nosedived users’ trust level of devices. The study recruited 480-students, who were exposed to socially-engineered attack directives. Attacks were designed to retrieve personal data and entice participants to access compromised links. We sought to determine the risks of cybercrim… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
7

Relationship

0
7

Authors

Journals

citations
Cited by 17 publications
(18 citation statements)
references
References 28 publications
0
6
0
Order By: Relevance
“…It uses known SMS corpus of spam and genuine messages/texts. A collection of tokens appearing in each corpus and their total occurrences (scores) are maintained in the database -so that based on their occurrences, each set of spam and genuine data is assigned a criterion or probability score for its capacity of determining a text or message to either be a spam or genuine text (Yoro, Aghware, Akazue, et al, 2023;Yoro, Aghware, Malasowe, et al, 2023;Yoro & Ojugo, 2019a, 2019b.…”
Section: The Experimental Frameworkmentioning
confidence: 99%
“…It uses known SMS corpus of spam and genuine messages/texts. A collection of tokens appearing in each corpus and their total occurrences (scores) are maintained in the database -so that based on their occurrences, each set of spam and genuine data is assigned a criterion or probability score for its capacity of determining a text or message to either be a spam or genuine text (Yoro, Aghware, Akazue, et al, 2023;Yoro, Aghware, Malasowe, et al, 2023;Yoro & Ojugo, 2019a, 2019b.…”
Section: The Experimental Frameworkmentioning
confidence: 99%
“…With this, is constantly on the risethe financial services industry must employ systems that implement innovative fraud mitigation and prevention modes. Many methods for detecting abuse of a technical system [24], [25], are required. Fraud detection seeks to detect cases of fraud from logged data and user behavior [26].…”
Section: A Credit-card Fraud Detection: Review Of Literaturementioning
confidence: 99%
“…These also yield a range of threats and complications to the normal operations of systems deployed to ease living at every frontier [7]. With the advances in Internet penetration, businesses constantly decentralize [8], as means to reshape/refocus her processes via data warehousing, to ease transaction accessibility and availability [9]. Business owners have become aware of their responsibilities to consumers [10], and the management of business transactions that now heavily rely [11] on their capacities to adequately manage transactions of all forms with its allied processes [12].…”
Section: Introductionmentioning
confidence: 99%