Enhancing the Awareness Level on Phishing Attacks Among Malaysians: Analysis and Recommendations
This paper presents an analysis of awareness level on phishing attack among Malaysians. Phishing and fraudster activities have been important issues in Malaysia. The methodology involves the questionnaires which are distributed and answers were collected and recorded as random samples. Next, statist...
| Main Authors: | Mohd Sarifuddin, Othman@Mustafa, Rahman, Md. Arafatur, M. Nomani, Kabir, Kamal Z., Zamli |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
American Scientific Publisher
2018
|
| Subjects: | |
| Online Access: | http://umpir.ump.edu.my/id/eprint/19602/ http://umpir.ump.edu.my/id/eprint/19602/6/20.%20Enhancing%20the%20awareness%20level%20on%20phishing%20attacks%20among%20Malaysians_%20Analysis%20and%20Recommendations1.pdf |
Similar Items
An enhanced model to increase awareness on phishing attacks for vocational students
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
An Enhanced Model for Increasing Awareness of Vocational Students Against Phishing Attacks
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019)
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020)
by: Siti Hawa, Apandi, et al.
Published: (2020)
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019)
by: Jupin, John Arthur
Published: (2019)
Comparative performance of machine learning methods for classification on phishing attack detection
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)
Review of the machine learning methods in the classification of phishing attack
by: Jupin, John Arthur, et al.
Published: (2019)
by: Jupin, John Arthur, et al.
Published: (2019)
A comparative analysis of metaheuristic algorithms in fuzzy modelling for phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2021)
by: Noor Syahirah, Nordin, et al.
Published: (2021)
Scalable MAC Strategy for Emergency Communication Networks
by: Abbas, Ali. M. H., et al.
Published: (2018)
by: Abbas, Ali. M. H., et al.
Published: (2018)
Smell Phishy : A 2d Platform Game For Phishing Awareness
by: Ng, Man Teng
Published: (2023)
by: Ng, Man Teng
Published: (2023)
Model for phishing websites classification using artificial neural network
by: Hassan, N. H., et al.
Published: (2021)
by: Hassan, N. H., et al.
Published: (2021)
A hybridization of butterfly optimization algorithm and harmony search for fuzzy modelling in phishing attack detection
by: Noor Syahirah, Nordin, et al.
Published: (2023)
by: Noor Syahirah, Nordin, et al.
Published: (2023)
A comparative analysis on artificial intelligence techniques for web phishing classification
by: Tengku Balqis, Tengku Abd Rashid, et al.
Published: (2020)
by: Tengku Balqis, Tengku Abd Rashid, et al.
Published: (2020)
PhishGuard: Machine learning-powered phishing URL detection
by: Murad, Saydul Akbar, et al.
Published: (2023)
by: Murad, Saydul Akbar, et al.
Published: (2023)
Fuzzy modelling using firefly algorithm for phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2019)
by: Noor Syahirah, Nordin, et al.
Published: (2019)
Website detection for phishing attack by using browser extension
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
by: Putera Nuriqmar Iskandar, Ahmad Basri
Published: (2018)
Spear-phishing attack detection using artificial intelligence
by: Rajkumaradevan, Sanglidevan
Published: (2024)
by: Rajkumaradevan, Sanglidevan
Published: (2024)
Enhancing generality of meta-heuristic algorithms through adaptive selection and hybridization
by: Kamal Z., Zamli
Published: (2018)
by: Kamal Z., Zamli
Published: (2018)
Real time detection of phishing websites
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
by: Ahmed, Abdulghani Ali, et al.
Published: (2016)
An Expanding Neighbourhood Search Technique for Avalanche Search-and-Rescue Operations using Air Ground Collaborative Wireless Networks
by: Azad, Saiful, et al.
Published: (2018)
by: Azad, Saiful, et al.
Published: (2018)
Fuzzy modelling using butterfly optimization algorithm for
phishing detection
by: Noor Syahirah, Nordin, et al.
Published: (2020)
by: Noor Syahirah, Nordin, et al.
Published: (2020)
An Efficient Image Compression Technique using Tchebichef Bit Allocation
by: Ernawan, Ferda, et al.
Published: (2017)
by: Ernawan, Ferda, et al.
Published: (2017)
Code-aware combinatorial interaction testing
by: Ahmed, Bestoun S., et al.
Published: (2019)
by: Ahmed, Bestoun S., et al.
Published: (2019)
Comparative evaluation of tabu search hyper-heuristic against its low-level meta-heuristic constituents
by: Fakhrud, Din, et al.
Published: (2019)
by: Fakhrud, Din, et al.
Published: (2019)
On mitigating hop-to-hop congestion problem in IoT enabled Intra-Vehicular communication
by: Rahman, Md. Arafatur, et al.
Published: (2015)
by: Rahman, Md. Arafatur, et al.
Published: (2015)
Phishing Website Detection using Machine Learning
by: Padmini, Y, et al.
Published: (2024)
by: Padmini, Y, et al.
Published: (2024)
A robust algorithm for solving nonlinear system of equations using trust-region and line-search techniques
by: Kabir, M. Nomani
Published: (2020)
by: Kabir, M. Nomani
Published: (2020)
A new fuzzy granular technique for the condition monitoring of electrical hotspots based on infrared thermography
by: Ahmed, M. M., et al.
Published: (2018)
by: Ahmed, M. M., et al.
Published: (2018)
Understanding the root of attack in android malware
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
by: Rahiwan Nazar, Romli, et al.
Published: (2018)
Attack Intention Recognition: A Review
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
by: Ahmed, Abdulghani Ali, et al.
Published: (2017)
An improved Watermarking Technique for Copyright Protection Based on Tchebichef Moments
by: Ernawan, Ferda, et al.
Published: (2019)
by: Ernawan, Ferda, et al.
Published: (2019)
A blind watermarking technique using redundant wavelet transform for copyright protection
by: Ernawan, F., et al.
Published: (2018)
by: Ernawan, F., et al.
Published: (2018)
A blind watermarking using redundant wavelet transform for copyright protection
by: Ernawan, Ferda, et al.
Published: (2018)
by: Ernawan, Ferda, et al.
Published: (2018)
On the development of a web extension for text authentication on google chrome
by: M. Nomani, Kabir, et al.
Published: (2019)
by: M. Nomani, Kabir, et al.
Published: (2019)
An improved method using fuzzy system based on hybrid boahs for phishing attack detection
by: Noor Syahirah, Nordin
Published: (2022)
by: Noor Syahirah, Nordin
Published: (2022)
The Design Trends of Keystream Generator for Stream Cipher for High Immunity Attacks
by: Mostafa, Saifuldun, et al.
Published: (2016)
by: Mostafa, Saifuldun, et al.
Published: (2016)
Modelling A Complex Human Centre Queuing System for Enhancing The Capability of Agent Based Simulation
by: Mazlina, Abdul Majid, et al.
Published: (2015)
by: Mazlina, Abdul Majid, et al.
Published: (2015)
Comparative analysis of machine learning classifiers for phishing detection
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
by: Mohd Faizal, Ab Razak, et al.
Published: (2022)
Analysis of web worm attack on web application
by: Mohd. Ghazzali, Amalina
Published: (2008)
by: Mohd. Ghazzali, Amalina
Published: (2008)
An adaptive flower pollination algorithm for minimizing software testing redundancy
by: M. N., Kabir, et al.
Published: (2017)
by: M. N., Kabir, et al.
Published: (2017)
IoT enable relay network for demand based light intensity controlled seamless highway lighting system
by: Rahman, Md. Arafatur, et al.
Published: (2018)
by: Rahman, Md. Arafatur, et al.
Published: (2018)
Similar Items
-
An enhanced model to increase awareness on phishing attacks for vocational students
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019) -
An Enhanced Model for Increasing Awareness of Vocational Students Against Phishing Attacks
by: Mohd Sarifuddin, Othman@Mustafa, et al.
Published: (2019) -
Types of anti-phishing solutions for phishing attack
by: Siti Hawa, Apandi, et al.
Published: (2020) -
Phishing attack detection using machine learning method
by: Jupin, John Arthur
Published: (2019) -
Comparative performance of machine learning methods for classification on phishing attack detection
by: Siti Noranisah, Wan Ahmad, et al.
Published: (2020)