Explore chapters and articles related to this topic
Computer and Internet Crime
Published in G. K. Awari, Sarvesh V. Warjurkar, Ethics in Information Technology, 2022
G. K. Awari, Sarvesh V. Warjurkar
Spam has been seen by someone who has spent more than a few seconds on the Internet. It seems to be an inextricable aspect of the Internet experience, something we take for granted. According to the answer, spam is still unrequested. It’s inconvenient, usually promotional, sent to a huge number of people, and it comes whether or not you requested it. It’s not spam if you signed up for marketing email and then grew tired of it. Spamming is the process of sending unsolicited mass communications, and a spammer is someone who engages in the practice. While spam is nearly usually commercial in nature, it isn’t necessarily damaging or false (though it can be).
The Three L’s
Published in Krzysztof W. Kolodziej, Johan Hjelm, Local Positioning Systems, 2017
Krzysztof W. Kolodziej, Johan Hjelm
Permission-based advertising is key, ruling out unsolicited advertising (i.e., spamming). Sometimes, wireless advertising is used to refer to mobile advertising. Proximity-triggered mobile advertising is a special case of location-based notification services (Munson and Gupta, 2002). Usually, notification services are user driven, e.g., getting a notification when a set of conditions is met. Advertising, on the other hand, is typically not user driven; i.e., the recipient does not request or pull the advertisements from a server, but they are pushed to her instead (Ranganathan and Campbell, 2002).
Types of Cyberattacks
Published in Kutub Thakur, Al-Sakib Khan Pathan, Cybersecurity Fundamentals, 2020
Kutub Thakur, Al-Sakib Khan Pathan
Spamming is a widespread form of malicious attacks used to send the unsolicited messages through different modes of messaging such as instant messages, emails, social network messages, ads, mobile phone messages, and social groups. All these activities are directed to get marketing gains by attacking the users incessantly through unsolicited messages.
Insider employee-led cyber fraud (IECF) in Indian banks: from identification to sustainable mitigation planning
Published in Behaviour & Information Technology, 2023
Neha Chhabra Roy, Sreeleakha Prabhakaran
Additionally, cybercriminals must be prosecuted to prevent similar incidents in the future. Under the Information Technology Act, 2000 (Section 66), the punishment for fraudsters is imprisonment of up to one year or a fine of up to INR 1 lakh. For example, banks can monitor and manage unwanted traffic. They can create a denial-of-service response plan, move to cloud computing, enable email authentication, limit routers to prevent overloads, deploy web filters to block malicious websites, and increase the bandwidth of a reactive mitigation plan. They should update their operating systems and software patches, use firewalls, and encrypt sensitive information for security reasons. Implementing these measures can reduce web jacking, malware attacks, spamming, phishing, denial of service attacks, salami attacks, and virus and worm attacks. The cybersecurity culture should be fostered through mandatory awareness and training programmes, non-disclosure agreements with employees, ethical phishing attacks to test employee vigilance, penetration testing, and audit programmes (Ben-Asher and Gonzalez 2015). By implementing these actions, employees will be in a continuous state of readiness and be aware of existing cybersecurity measures within the bank. Yazid and Suryanto (2017) suggested that auditors, board members, and other officials should be trained to maintain strong internal controls, follow regulatory procedures, and ensure corporate governance (Lacey et al. 2020).
Near real-time twitter spam detection with machine learning techniques
Published in International Journal of Computers and Applications, 2022
Nan Sun, Guanjun Lin, Junyang Qiu, Paul Rimba
During the process of spam detection, on the side of saving detection time, the models which have been trained in empirical study are used in this Twitter spam detection system. In Figure 9, it is clear that nine algorithms ( kNN, k-kNN, Naive Bayes, Boosted Logistic Regression, Deep Learning, GBM, C5.0, Random Forest, and Neural Network) as well as 3 orders of magnitude training data (1000, 10,000 and 100,000) can be chosen by users, according to users' time and requirements. In case the condition that a user has no idea on which classifiers they would like to choose, the basic introduction of the algorithms is shown using the page as described in Figure 9(c). In order to cope with the rapidly changing spamming activities, the models in this Twitter spam detection system are refreshed efficiently by utilizing parallel computing technique.
Employees’ Behavior in Phishing Attacks: What Individual, Organizational, and Technological Factors Matter?
Published in Journal of Computer Information Systems, 2021
Hamidreza Shahbaznezhad, Farzan Kolini, Mona Rashidirad
Although technical countermeasures such as anti-phishing and spamming tools (e.g., SPF, DKIM and DMARC), e-mail malware detection, and data loss prevention (DLP) are deployed to mitigate the risk of phishing attacks, using these technologies to detect phishing attacks remains a challenging problem. This is not least because they often require human intervention to analyze and distinguish between phishing and legitimate e-mails. Success in the battle against phishing attacks can be achieved while organizations invest in both technological and socio-organizational functions and capabilities.5 Since the focus of phishing attacks shifts toward individuals and organizational resources, employee’s compliance with e-mail security policies and requirements has been considered as a key socio-technical capability for organizations. Organizations often deploy phishing attack simulation exercises as a means to identify vulnerable employees and provide them with required phishing training to increase their organizational awareness against commonly used phishing tactics, techniques, and procedures (TTPs). However, employees sometimes fail to apply their knowledge and awareness on phishing adequately.6 Some organizations also develop an e-mail security policy and standard operating procedures (SOPs) to provide employees with required guidelines to ensure that e-mail security requirements are achieved while utilizing information system (IS) resources.7 Hence, understanding the socio-technical antecedents to employee’s compliance with the organization’s e-mail security policy and requirements is deterministic.