In this observational quasi-experimental study, we recruited 200 participants during the Federal University of Petroleum Resources Effurun’s (FUPRE) orientation, who were exposed to socially engineered (phishing) attacks over nine months. Attacks sought to extract participants’ data and/or entice them to click (compromised) links. The study aims to determine phishing exposure and risks among undergraduates in FUPRE (Nigeria) by observing their responses to socially-engineered attacks and exploring their attitudes to cybercrime risks before and after phishing attacks. The study primed all students in place of cybercrime awareness to remain vigilant to scams and explored the various scam types with their influence on gender, age, status, and their perceived safety on susceptibility to scams. Results show that contrary to public beliefs, these factors have all been found to be associated with scam susceptibility and vulnerability of the participants.
Evidence of personality traits on phishing attack menace among selected unive...IJECEIAES
Access ease, mobility, portability, and improved speed have continued to ease the adoption of computing devices; while, consequently proliferating phishing attacks. These, in turn, have created mixed feelings in increased adoption and nosedived users’ trust level of devices. The study recruited 480-students, who were exposed to socially-engineered attack directives. Attacks were designed to retrieve personal data and entice participants to access compromised links. We sought to determine the risks of cybercrimes among the undergraduates in selected Nigerian universities, observe students’ responses and explore their attitudes before/after each attack. Participants were primed to remain vigilant to all forms of scams as we sought to investigate attacks’ influence on gender, students’ status, and age to perceived safety on susceptibility to phishing. Results show that contrary to public beliefs, age, status, and gender were not among the factors associated with scam susceptibility and vulnerability rates of the participants. However, the study reports decreased user trust levels in the adoption of these new, mobile computing devices.
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...IJNSA Journal
Emails are used every day for communication, and many countries and organisations mostly use email for official communications. It is highly valued and recognised for confidential conversations and transactions in day-to-day business. The Often use of this channel and the quality of information it carries attracted cyber attackers to it. There are many existing techniques to mitigate attacks on email, however, the systems are more focused on email content and behaviour and not securing entrances to email boxes, composition, and settings. This work intends to protect users' email composition and settings to prevent attackers from using an account when it gets hacked or hijacked and stop them from setting forwarding on the victim's email account to a different account which automatically stops the user from receiving emails. A secure code is applied to the composition send button to curtail insider impersonation attack. Also, to secure open applications on public and private devices.
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by
the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce,
education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks,
which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of
the Internet as a medium of operations. The paper highlights the increase of cyber related attacks in the
past ten years due to lack of transatlantic international corporation between participating countries,
coherent information security policies, data aggregation and sound international laws to facilitate
prosecution of perpetrators. The cyber space coupled with availability of free hacking tools has contributed
to resurgence in syndicated identity theft, corporate espionage and identity theft by organized crime
elements taking advantage of the Internet as a medium of operations. This paper presents conclusive
solution that users, organizations and consumers can enact to protect themselves from the threat of cyber
attacks culminating into identity theft, financial loss or both.
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ransomware Attacks Perspective (pp. 79-82)
Sulaiman Al Amro, Computer Science Department, Computer College, Qassim University, Qassim, Saudi Arabia.
Vol. 18 No. 6 JUNE 2020 International Journal of Computer Science and Information Security
https://sites.google.com/site/ijcsis/vol-18-no-6-jun-2020
A COMPREHENSIVE SURVEY OF PHISHING ATTACKS AND DEFENCES: HUMAN FACTORS, TRAIN...IJNSA Journal
This document provides a comprehensive literature review on phishing attacks and defenses with a focus on the human and emotional factors that contribute to phishing victimization. It defines phishing and provides an overview of common phishing types identified by researchers and security organizations. It also compares different training approaches and recommendations from studies and organizations for avoiding phishing attacks, highlighting the importance of education, awareness training, and developing strategies to promote mindfulness when evaluating online messages and links.
Cyber attack awareness and prevention in network securityIJICTJOURNAL
This article aims to provide an overview of cyber attack awareness and prevention in network security. This article discussed the different types of cyber attacks, current trends of cyber attacks, how to prevent cyber attacks and uum students' awareness of cyber attacks. First, we will go over the different types of cyber attack, current trend, impact of cyber attack and the prevention. The approach entailed comparing and observing the outcomes of 13 different papers. The survey's findings would demonstrate the results obtained after analyzing the data collection which are the questionnaire filled out by respondents after watching the cyber attack awareness video to improve awareness of students through the cyber attack. Depending on the outcome of this survey, we will have a better understanding of current students' knowledge and awareness of cyber attacks, allowing us to improve students' understanding of cyber threats and the necessity of cyber security.
Social media websites are becoming more prevalent on the Internet. Sites, such as Twitter, Facebook, and Instagram, spend significantly more of their time on users online. People in social media share thoughts, views, and facts and create new acquaintances. Social media sites supply users with a great deal of useful information. This enormous quantity of social media information invites hackers to abuse data. These hackers establish fraudulent profiles for actual people and distribute useless material. The material on spam might include commercials and harmful URLs that disrupt natural users. This spam content is a massive problem in social networks. Spam identification is a vital procedure on social media networking platforms. In this paper, we have proposed a spam detection artificial intelligence technique for Twitter social networks. In this approach, we employed a vector support machine, a neural artificial network, and a random forest technique to build a model. The results indicate that, compared with RF and ANN algorithms, the suggested support vector machine algorithm has the greatest precision, recall, and Fmeasure. The findings of this paper would be useful in monitoring and tracking social media shared photos for the identification of inappropriate content and forged images and to safeguard social media from digital threats and attacks.
1. The document discusses various types of cyber crimes and frauds, providing definitions and examples. It covers topics like social engineering, phishing, cyber stalking, ransomware attacks, and viruses.
2. Types of fraud discussed include COVID-19 related scams, synthetic identity theft, and cyber warfare. Social engineering, phishing emails, SMS phishing ("smishing"), and phone phishing ("vishing") are described as common techniques used.
3. Details are given on how different cyber crimes are carried out, including stages of cyber attacks, how synthetic identities are created, and how viruses and trojans can infiltrate systems covertly. A wide range of attacks targeting individuals and organizations are outlined
Evidence of personality traits on phishing attack menace among selected unive...IJECEIAES
Access ease, mobility, portability, and improved speed have continued to ease the adoption of computing devices; while, consequently proliferating phishing attacks. These, in turn, have created mixed feelings in increased adoption and nosedived users’ trust level of devices. The study recruited 480-students, who were exposed to socially-engineered attack directives. Attacks were designed to retrieve personal data and entice participants to access compromised links. We sought to determine the risks of cybercrimes among the undergraduates in selected Nigerian universities, observe students’ responses and explore their attitudes before/after each attack. Participants were primed to remain vigilant to all forms of scams as we sought to investigate attacks’ influence on gender, students’ status, and age to perceived safety on susceptibility to phishing. Results show that contrary to public beliefs, age, status, and gender were not among the factors associated with scam susceptibility and vulnerability rates of the participants. However, the study reports decreased user trust levels in the adoption of these new, mobile computing devices.
A FRAMEWORK FOR SECURING EMAIL ENTRANCES AND MITIGATING PHISHING IMPERSONATIO...IJNSA Journal
Emails are used every day for communication, and many countries and organisations mostly use email for official communications. It is highly valued and recognised for confidential conversations and transactions in day-to-day business. The Often use of this channel and the quality of information it carries attracted cyber attackers to it. There are many existing techniques to mitigate attacks on email, however, the systems are more focused on email content and behaviour and not securing entrances to email boxes, composition, and settings. This work intends to protect users' email composition and settings to prevent attackers from using an account when it gets hacked or hijacked and stop them from setting forwarding on the victim's email account to a different account which automatically stops the user from receiving emails. A secure code is applied to the composition send button to curtail insider impersonation attack. Also, to secure open applications on public and private devices.
Corporate role in protecting consumers from the risk of identity theftIJCNCJournal
The Internet has made it possible for users to be robbed of their reputation, money and credit worthiness by
the click of a mouse. The impact of identity theft severely limits victims’ ability to participate in commerce,
education and normal societal functions. This paper evaluates resurgence in syndicated cyber attacks,
which includes but not limited to identity theft, corporate espionage and cyber warfare taking advantage of
the Internet as a medium of operations. The paper highlights the increase of cyber related attacks in the
past ten years due to lack of transatlantic international corporation between participating countries,
coherent information security policies, data aggregation and sound international laws to facilitate
prosecution of perpetrators. The cyber space coupled with availability of free hacking tools has contributed
to resurgence in syndicated identity theft, corporate espionage and identity theft by organized crime
elements taking advantage of the Internet as a medium of operations. This paper presents conclusive
solution that users, organizations and consumers can enact to protect themselves from the threat of cyber
attacks culminating into identity theft, financial loss or both.
How Safe is Governmental Infrastructure: A Cyber Extortion and Increasing Ransomware Attacks Perspective (pp. 79-82)
Sulaiman Al Amro, Computer Science Department, Computer College, Qassim University, Qassim, Saudi Arabia.
Vol. 18 No. 6 JUNE 2020 International Journal of Computer Science and Information Security
https://sites.google.com/site/ijcsis/vol-18-no-6-jun-2020
A COMPREHENSIVE SURVEY OF PHISHING ATTACKS AND DEFENCES: HUMAN FACTORS, TRAIN...IJNSA Journal
This document provides a comprehensive literature review on phishing attacks and defenses with a focus on the human and emotional factors that contribute to phishing victimization. It defines phishing and provides an overview of common phishing types identified by researchers and security organizations. It also compares different training approaches and recommendations from studies and organizations for avoiding phishing attacks, highlighting the importance of education, awareness training, and developing strategies to promote mindfulness when evaluating online messages and links.
Cyber attack awareness and prevention in network securityIJICTJOURNAL
This article aims to provide an overview of cyber attack awareness and prevention in network security. This article discussed the different types of cyber attacks, current trends of cyber attacks, how to prevent cyber attacks and uum students' awareness of cyber attacks. First, we will go over the different types of cyber attack, current trend, impact of cyber attack and the prevention. The approach entailed comparing and observing the outcomes of 13 different papers. The survey's findings would demonstrate the results obtained after analyzing the data collection which are the questionnaire filled out by respondents after watching the cyber attack awareness video to improve awareness of students through the cyber attack. Depending on the outcome of this survey, we will have a better understanding of current students' knowledge and awareness of cyber attacks, allowing us to improve students' understanding of cyber threats and the necessity of cyber security.
Social media websites are becoming more prevalent on the Internet. Sites, such as Twitter, Facebook, and Instagram, spend significantly more of their time on users online. People in social media share thoughts, views, and facts and create new acquaintances. Social media sites supply users with a great deal of useful information. This enormous quantity of social media information invites hackers to abuse data. These hackers establish fraudulent profiles for actual people and distribute useless material. The material on spam might include commercials and harmful URLs that disrupt natural users. This spam content is a massive problem in social networks. Spam identification is a vital procedure on social media networking platforms. In this paper, we have proposed a spam detection artificial intelligence technique for Twitter social networks. In this approach, we employed a vector support machine, a neural artificial network, and a random forest technique to build a model. The results indicate that, compared with RF and ANN algorithms, the suggested support vector machine algorithm has the greatest precision, recall, and Fmeasure. The findings of this paper would be useful in monitoring and tracking social media shared photos for the identification of inappropriate content and forged images and to safeguard social media from digital threats and attacks.
1. The document discusses various types of cyber crimes and frauds, providing definitions and examples. It covers topics like social engineering, phishing, cyber stalking, ransomware attacks, and viruses.
2. Types of fraud discussed include COVID-19 related scams, synthetic identity theft, and cyber warfare. Social engineering, phishing emails, SMS phishing ("smishing"), and phone phishing ("vishing") are described as common techniques used.
3. Details are given on how different cyber crimes are carried out, including stages of cyber attacks, how synthetic identities are created, and how viruses and trojans can infiltrate systems covertly. A wide range of attacks targeting individuals and organizations are outlined
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
1. This document provides an overview of cyber crimes and fraud, defining key terms like fraud, cyber crimes, and social engineering.
2. It describes common types of cyber crimes such as phishing, smishing, vishing, and synthetic identity theft. Cyber stalking, hacking, viruses, and ransomware attacks are also outlined.
3. Safety tips are provided to help prevent people from becoming victims of cyber crimes, including using strong passwords, avoiding public WiFi for financial transactions, and reporting any suspected criminal activity to the police.
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...ijsc
As the financial sectors in the United States deal with expanding cyberthreats and a rising danger of
financial crime, cybersecurity has become a top priority. This paper examines the crucial cybersecurity
techniques used by financial institutions to protect client information and counter the growing risk of
financial fraud. It proves that understanding common fraud tactics used to defraud financial institutions
and customers, putting fraud detection and prevention techniques like anomaly detection and machine
learning into practice, and using transaction monitoring and anti-money laundering tactics to spot and
stop fraudulent activity are all necessary for preventing financial fraud. The paper begins by reviewing the
common cyber dangers affecting the financial industry and the strategies used by cybercriminals to
circumvent security precautions and take advantage of weaknesses. After looking at potential risks, the
paper highlights the importance of proactive cybersecurity measures and risk mitigation techniques. It
highlights crucial components of cybersecurity frameworks, including strong data encryption, multifactor
authentication, intrusion detection systems, and ongoing security monitoring. This paper also emphasizes
the value of educating and training financial institution staff members to increase cybersecurity resilience.
It underlines the significance of building a strong security culture, educating personnel about potential
dangers, and encouraging responsible management of client data. The study also explores the advantages
of financial organizations working together and exchanging threat knowledge. It examines industry
alliances, information-sharing platforms, and public-private partnerships as crucial methods for group
protection against cyber threats. This paper highlighted the significance of artificial intelligence and
machine learning in cybersecurity domain. It demonstrates how these technologies improve cybersecurity
systems' capabilities by spotting irregularities and potential attacks. It emphasizes the significance of
taking a proactive and dynamic strategy to securing client information and maintaining faith in the United
States’ financial sectors. Overall, this paper provides a thorough overview of cybersecurity tactics crucial
for protecting consumer data and avoiding financial fraud in the financial sectors across the United States.
By taking a vigilant, team-based, and technology-driven strategy, financial institutions may strengthen
their cyber defenses, protect the data of their clients, and defend the integrity of the financial system.
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...ijsc
As the financial sectors in the United States deal with expanding cyberthreats and a rising danger of financial crime, cybersecurity has become a top priority. This paper examines the crucial cybersecurity techniques used by financial institutions to protect client information and counter the growing risk of financial fraud. It proves that understanding common fraud tactics used to defraud financial institutions and customers, putting fraud detection and prevention techniques like anomaly detection and machine learning into practice, and using transaction monitoring and anti-money laundering tactics to spot and stop fraudulent activity are all necessary for preventing financial fraud. The paper begins by reviewing the common cyber dangers affecting the financial industry and the strategies used by cybercriminals to circumvent security precautions and take advantage of weaknesses. After looking at potential risks, the paper highlights the importance of proactive cybersecurity measures and risk mitigation techniques. It highlights crucial components of cybersecurity frameworks, including strong data encryption, multifactor authentication, intrusion detection systems, and ongoing security monitoring. This paper also emphasizes the value of educating and training financial institution staff members to increase cybersecurity resilience. It underlines the significance of building a strong security culture, educating personnel about potential dangers, and encouraging responsible management of client data. The study also explores the advantages of financial organizations working together and exchanging threat knowledge. It examines industry alliances, information-sharing platforms, and public-private partnerships as crucial methods for group protection against cyber threats. This paper highlighted the significance of artificial intelligence and machine learning in cybersecurity domain. It demonstrates how these technologies improve cybersecurity systems' capabilities by spotting irregularities and potential attacks. It emphasizes the significance of taking a proactive and dynamic strategy to securing client information and maintaining faith in the United States’ financial sectors. Overall, this paper provides a thorough overview of cybersecurity tactics crucial for protecting consumer data and avoiding financial fraud in the financial sectors across the United States. By taking a vigilant, team-based, and technology-driven strategy, financial institutions may strengthen their cyber defenses, protect the data of their clients, and defend the integrity of the financial system.
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
The study is focused on identity theft and cybersecurity in United States. Hence, the study is aimed at examining the impact of cybersecurity on identity theft in United States using a time series data which covers the period between 2001 and 2021. Trend analysis of complaints of identity theft and cybersecurity over the years was conducted; also, the nature of relationship between the two variables was established. Chi-Square analysis was used to examine the impact of cybersecurity on identity theft in United States. Line graphs were used to analyze the trend in the variable. Time series data was used in the study and the data was obtained from secondary sources; Statista.com, US Federal Trade Commission, Insurance Information Institute and Identitytheft.org. Result from the study revealed that consumers’ complaints on identity theft were on the increase every year. Total spending of the economy (both private and public
sector) on cybersecurity was on continuous increase over the years. More than 100% of spending in 2010 as incurred in 2018. The Chi-Square analysis revealed that cybersecurity does not have significant impact on identity theft. The study recommended that the government increase the level of public awareness to ensure that members of the public protect their personal and other information to ensure that they are not compromised for fraud or identity theft. Organizations also need to invest more in the security system and develop policies that will support the security system. At the country level, international treaties and collaboration should be encouraged to prosecute the fraudsters hiding behind national borders.
Credential Harvesting Using Man in the Middle Attack via Social Engineeringijtsrd
With growing internet users threat landscape is also increasing widely. Even following standard security policies and using multiple security layers will not keep users safe unless they are well aware of the emerging cyber threats and the risks involved. Humans are the weakest link in the security system as they possess emotions that can be exploited with minimum reconnaissance. social engineering is a type of cyber attack where it exploits human behavior or emotions to collect sensitive information such as username, password, personal details, etc. This paper proposes a system that helps end users to understand that even using security mechanisms such as two factor authentication can be useless when the user is not aware of basic security elements and make internet users aware of cyber threats and the risk involved. Sudhakar P | Dr. Uma Rani Chellapandy "Credential Harvesting Using Man in the Middle Attack via Social Engineering" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49629.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/49629/credential-harvesting-using-man-in-the-middle-attack-via-social-engineering/sudhakar-p
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
This document discusses an automated model for detecting fake profiles and botnets in online social networks. It begins with background on the prevalence of fake accounts, which can compromise user privacy and security. Next, it reviews related work on using data hiding techniques like steganography and watermarking to embed information in profile pictures in order to identify suspicious accounts. The proposed model aims to automatically detect fake profiles and botnets to replace current manual methods that are costly and labor-intensive.
1) The document proposes an automated model to detect fake profiles and botnets on online social networks using steganography and watermarking techniques.
2) It describes embedding unique information like a user's email or username into profile pictures during upload using watermarking. This allows detecting stolen pictures used for fake profiles.
3) The model is extended to also search uploaded pictures against billions of online images to detect multiple uses of the same picture for different profiles, as watermarking alone may fail if the picture is edited. Detected users must then prove ownership rights to the picture.
A Survey On Cyber Crime Information SecurityMichele Thomas
This document provides an overview of cybercrime and information security. It discusses how cybercrime has increased with greater internet usage and defines cybercrime as illegal acts conducted through computers. The document then examines common forms of cybercrime like malware, spam, phishing, hacking, cyber stalking, and fraud. It explores the causes of cybercrime and how crimes are executed through methods like infecting devices with malware, sending spam emails, engaging in phishing scams, hacking via code, and cyber stalking victims online and offline. The goal of information security is also discussed as protecting computer data and systems from unauthorized access.
This document discusses the motivations behind cybercrimes and categorizes cyber attackers. It identifies the main categories of cyber attackers as insiders and outsiders, with insiders further divided into disgruntled employees, financially motivated insiders, and unintentional insiders. Outsiders include organized attackers such as terrorists, hacktivists, nation states, and criminal organizations, as well as hackers and amateurs. The motivations for cyber attacks are identified as political, economic, and social motivations. The risks from cyber attacks arise from inadvertent actions, deliberate harmful actions, and inaction. Understanding the motivations and categories of cyber attackers can help address the operational cybersecurity risks they pose.
Email phishing: Text classification using natural language processingCSITiaesprime
Phishing is networked theft in which the main motive of phishers is to steal any person’s private information, its financial details like account number, credit card details, login information, payment mode information by creating and developing a fake page or a fake web site, which look completely authentic and genuine. Nowadays email phishing has become a big threat to all, and is increasing day by day. Moreover, detection of phishing emails has been considered an important research issue as phishing emails have been increasing day by day. Various techniques have been introduced and applied to deal with such a big issue. The major objective of this research paper is giving a detailed description on the classification of phishing emails using the natural language processing concepts. Natural language processing (NLP) concepts have been applied for the classification of emails; along with that accuracy rate of various classifiers have been calculated. The paper is presented in four sections. An introduction about phishing its types, its history, statistics, life cycle, motivation for phishers and working of email phishing have been discussed in the first section. The second section covers various technologies of phishing- email phishing and also description of evaluation metrics. An overview of the various proposed solutions and work done by researchers in this field in form of literature review has been presented in the third section. The solution approach and the obtained results have been defined in the fourth section giving a detailed description about NLP concepts and working procedure.
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can spend endless hours on internet activities. In particular, youth engage in more online activities than any other age group. Excessive internet usage is an emerging threat that has negative impacts on these youth; hence it is vital to investigate youths' online behavior. This work studies tertiary students’ risk awareness, and provides some findings that allow us to understand their knowledge on risks and their behavior towards online activities. It reveals several important online issues amongst tertiary students; Firstly, the lack of online security awareness; second, a lack of awareness and information about the dangers of rootkits, internet cookies and spyware; thirdly, female students are more unflinching than male students when commenting on social networking sites; fourthly, students are cautious only when obvious security warnings are present; and finally, their usage of internet hotspots is common without fully understanding its associated danger. These findings enable us to recommend types of internet security habits and safety practices that students should adopt in future when they are exposed to online activities. A more holistic approach was considered which aims to minimize any future risks and dangers with online activities involving students.
White Paper: Social Engineering and Cyber Attacks: The Psychology of DeceptionEMC
Social engineering relies on manipulating human psychology rather than technology. It works by exploiting human trust and emotions like fear, curiosity, and greed. Cybercriminals use social engineering tactics like phishing emails that appear to come from trusted sources to trick victims into revealing passwords and other sensitive information or downloading malware. While technology security measures are important, social engineering targets the human link. Education and awareness training to help users identify social engineering scams can help reduce the success of these attacks.
This document provides a review of cybercrime. It begins with definitions of crime and cybercrime. It then discusses several common types of cybercrimes like financial crimes, cyber pornography, drug trafficking, and cyber terrorism. It also examines cybercriminals and categorizes them from teenagers to professional hackers. The document analyzes data on the countries most affected by cybercrime. It concludes that cybercrime causes significant financial losses globally and emphasizes the importance of awareness and cybersecurity laws.
This document discusses cybercrime and various types of cybercrimes such as computer fraud, cyber extortion, cyberwarfare, crimes targeting individuals, and crimes targeting computer networks. It provides examples of different cybercrimes and highlights the importance of protecting personal information and computer security. The key challenges are that individuals and organizations of all sizes are vulnerable to cyber attacks, and that attitudes need to change to prioritize cyber security and incident detection.
This document is a project report on cybercrime in the banking sector submitted by Praveen Singh Pokharia to the University of Lucknow. It contains an introduction that defines cybercrime and notes that cybercrime in banking involves crimes like ATM fraud, money laundering, and credit card fraud. It also provides an index of topics to be covered in the report such as the reasons for cybercrime, cybercriminals, cybercrime in the banking sector, case studies, and recent cases. The report aims to analyze cybercrime affecting the banking sector in India.
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...CSCJournals
This document presents a theoretical model for evaluating phishing attacks based on the indistinguishability of natural and phishing message distributions. The model views a phishing attack as an attempt to generate messages that are indistinguishable from normal messages. It captures a phishing attack in terms of the statistical distance between the natural and phishing message probability distributions. The model also proposes metrics to analyze the success probability of phishing attacks and distinguisher algorithms. Finally, it discusses a new class of collaborative spear phishing attacks enabled by data breaches at large companies.
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...CSCJournals
Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. While there are a number of research articles that study the tactics, techniques and procedures employed by phishers in the literature, in this paper, we present a theoretical yet practical model to study this menacing threat in a formal manner. While it is common folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected messages by the intended victim, this concept has not been formalized. Our model attempts to capture a phishing attack in terms of this indistinguishability between the natural and phishing message probability distributions. We view the actions performed by a phisher as an attempt to create messages that are indistinguishable to the victim from that of “normal” messages. To the best of our knowledge, this is the first study that places phishing on a concrete theoretical framework and offers a new perspective to analyze this threat. We propose metrics to analyze the success probability of a phishing attack taking into account the input used by a phisher and the work involved in creating deceptive email messages. Finally, we study and apply our model to a new class of phishing attacks called collaborative spear phishing that is gaining momentum. Recent examples include Operation Woolen-Goldfish in 2015, Rocket Kitten in 2014 and Epsilon email breach in 2011. We point out fundamental flaws in the current email-based marketing business model which enables such targeted spear phishing collaborative attacks. In this sense, our study is very timely and presents new and emerging trends in phishing.
Exploring machine learning techniques for fake profile detection in online so...IJECEIAES
The online social network is the largest network, more than 4 billion users use social media and with its rapid growth, the risk of maintaining the integrity of data has tremendously increased. There are several kinds of security challenges in online social networks (OSNs). Many abominable behaviors try to hack social sites and misuse the data available on these sites. Therefore, protection against such behaviors has become an essential requirement. Though there are many types of security threats in online social networks but, one of the significant threats is the fake profile. Fake profiles are created intentionally with certain motives, and such profiles may be targeted to steal or acquire sensitive information and/or spread rumors on online social networks with specific motives. Fake profiles are primarily used to steal or extract information by means of friendly interaction online and/or misusing online data available on social sites. Thus, fake profile detection in social media networks is attracting the attention of researchers. This paper aims to discuss various machine learning (ML) methods used by researchers for fake profile detection to explore the further possibility of improvising the machine learning models for speedy results.
This document discusses the growing issue of cybercrime in Bangladesh, particularly among youth. As internet and technology usage increases, so do various forms of cybercrime like hacking, phishing, cyberbullying, and the spreading of misinformation. Many youth are victimized on social media and fall prey to financial crimes. While laws and enforcement agencies have been established to address cybercrime, challenges remain like a lack of skills and resources within law enforcement. The document calls for greater public awareness, strengthened laws and policies, and international cooperation to curb cybercrime and protect Bangladesh's digital progress and national security.
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
More Related Content
Similar to Assessing contributor features to phishing susceptibility amongst students of petroleum resources varsity in Nigeria
Lesson iv on fraud awareness (cyber frauds)Kolluru N Rao
1. This document provides an overview of cyber crimes and fraud, defining key terms like fraud, cyber crimes, and social engineering.
2. It describes common types of cyber crimes such as phishing, smishing, vishing, and synthetic identity theft. Cyber stalking, hacking, viruses, and ransomware attacks are also outlined.
3. Safety tips are provided to help prevent people from becoming victims of cyber crimes, including using strong passwords, avoiding public WiFi for financial transactions, and reporting any suspected criminal activity to the police.
CYBERSECURITY STRATEGIES FOR SAFEGUARDING CUSTOMER’S DATA AND PREVENTING FINA...ijsc
As the financial sectors in the United States deal with expanding cyberthreats and a rising danger of
financial crime, cybersecurity has become a top priority. This paper examines the crucial cybersecurity
techniques used by financial institutions to protect client information and counter the growing risk of
financial fraud. It proves that understanding common fraud tactics used to defraud financial institutions
and customers, putting fraud detection and prevention techniques like anomaly detection and machine
learning into practice, and using transaction monitoring and anti-money laundering tactics to spot and
stop fraudulent activity are all necessary for preventing financial fraud. The paper begins by reviewing the
common cyber dangers affecting the financial industry and the strategies used by cybercriminals to
circumvent security precautions and take advantage of weaknesses. After looking at potential risks, the
paper highlights the importance of proactive cybersecurity measures and risk mitigation techniques. It
highlights crucial components of cybersecurity frameworks, including strong data encryption, multifactor
authentication, intrusion detection systems, and ongoing security monitoring. This paper also emphasizes
the value of educating and training financial institution staff members to increase cybersecurity resilience.
It underlines the significance of building a strong security culture, educating personnel about potential
dangers, and encouraging responsible management of client data. The study also explores the advantages
of financial organizations working together and exchanging threat knowledge. It examines industry
alliances, information-sharing platforms, and public-private partnerships as crucial methods for group
protection against cyber threats. This paper highlighted the significance of artificial intelligence and
machine learning in cybersecurity domain. It demonstrates how these technologies improve cybersecurity
systems' capabilities by spotting irregularities and potential attacks. It emphasizes the significance of
taking a proactive and dynamic strategy to securing client information and maintaining faith in the United
States’ financial sectors. Overall, this paper provides a thorough overview of cybersecurity tactics crucial
for protecting consumer data and avoiding financial fraud in the financial sectors across the United States.
By taking a vigilant, team-based, and technology-driven strategy, financial institutions may strengthen
their cyber defenses, protect the data of their clients, and defend the integrity of the financial system.
Cybersecurity Strategies for Safeguarding Customer’s Data and Preventing Fina...ijsc
As the financial sectors in the United States deal with expanding cyberthreats and a rising danger of financial crime, cybersecurity has become a top priority. This paper examines the crucial cybersecurity techniques used by financial institutions to protect client information and counter the growing risk of financial fraud. It proves that understanding common fraud tactics used to defraud financial institutions and customers, putting fraud detection and prevention techniques like anomaly detection and machine learning into practice, and using transaction monitoring and anti-money laundering tactics to spot and stop fraudulent activity are all necessary for preventing financial fraud. The paper begins by reviewing the common cyber dangers affecting the financial industry and the strategies used by cybercriminals to circumvent security precautions and take advantage of weaknesses. After looking at potential risks, the paper highlights the importance of proactive cybersecurity measures and risk mitigation techniques. It highlights crucial components of cybersecurity frameworks, including strong data encryption, multifactor authentication, intrusion detection systems, and ongoing security monitoring. This paper also emphasizes the value of educating and training financial institution staff members to increase cybersecurity resilience. It underlines the significance of building a strong security culture, educating personnel about potential dangers, and encouraging responsible management of client data. The study also explores the advantages of financial organizations working together and exchanging threat knowledge. It examines industry alliances, information-sharing platforms, and public-private partnerships as crucial methods for group protection against cyber threats. This paper highlighted the significance of artificial intelligence and machine learning in cybersecurity domain. It demonstrates how these technologies improve cybersecurity systems' capabilities by spotting irregularities and potential attacks. It emphasizes the significance of taking a proactive and dynamic strategy to securing client information and maintaining faith in the United States’ financial sectors. Overall, this paper provides a thorough overview of cybersecurity tactics crucial for protecting consumer data and avoiding financial fraud in the financial sectors across the United States. By taking a vigilant, team-based, and technology-driven strategy, financial institutions may strengthen their cyber defenses, protect the data of their clients, and defend the integrity of the financial system.
A REVIEW OF CYBERSECURITY AS AN EFFECTIVE TOOL FOR FIGHTING IDENTITY THEFT AC...IJCI JOURNAL
The study is focused on identity theft and cybersecurity in United States. Hence, the study is aimed at examining the impact of cybersecurity on identity theft in United States using a time series data which covers the period between 2001 and 2021. Trend analysis of complaints of identity theft and cybersecurity over the years was conducted; also, the nature of relationship between the two variables was established. Chi-Square analysis was used to examine the impact of cybersecurity on identity theft in United States. Line graphs were used to analyze the trend in the variable. Time series data was used in the study and the data was obtained from secondary sources; Statista.com, US Federal Trade Commission, Insurance Information Institute and Identitytheft.org. Result from the study revealed that consumers’ complaints on identity theft were on the increase every year. Total spending of the economy (both private and public
sector) on cybersecurity was on continuous increase over the years. More than 100% of spending in 2010 as incurred in 2018. The Chi-Square analysis revealed that cybersecurity does not have significant impact on identity theft. The study recommended that the government increase the level of public awareness to ensure that members of the public protect their personal and other information to ensure that they are not compromised for fraud or identity theft. Organizations also need to invest more in the security system and develop policies that will support the security system. At the country level, international treaties and collaboration should be encouraged to prosecute the fraudsters hiding behind national borders.
Credential Harvesting Using Man in the Middle Attack via Social Engineeringijtsrd
With growing internet users threat landscape is also increasing widely. Even following standard security policies and using multiple security layers will not keep users safe unless they are well aware of the emerging cyber threats and the risks involved. Humans are the weakest link in the security system as they possess emotions that can be exploited with minimum reconnaissance. social engineering is a type of cyber attack where it exploits human behavior or emotions to collect sensitive information such as username, password, personal details, etc. This paper proposes a system that helps end users to understand that even using security mechanisms such as two factor authentication can be useless when the user is not aware of basic security elements and make internet users aware of cyber threats and the risk involved. Sudhakar P | Dr. Uma Rani Chellapandy "Credential Harvesting Using Man in the Middle Attack via Social Engineering" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-6 | Issue-3 , April 2022, URL: https://www.ijtsrd.com/papers/ijtsrd49629.pdf Paper URL: https://www.ijtsrd.com/computer-science/computer-security/49629/credential-harvesting-using-man-in-the-middle-attack-via-social-engineering/sudhakar-p
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
This document discusses an automated model for detecting fake profiles and botnets in online social networks. It begins with background on the prevalence of fake accounts, which can compromise user privacy and security. Next, it reviews related work on using data hiding techniques like steganography and watermarking to embed information in profile pictures in order to identify suspicious accounts. The proposed model aims to automatically detect fake profiles and botnets to replace current manual methods that are costly and labor-intensive.
1) The document proposes an automated model to detect fake profiles and botnets on online social networks using steganography and watermarking techniques.
2) It describes embedding unique information like a user's email or username into profile pictures during upload using watermarking. This allows detecting stolen pictures used for fake profiles.
3) The model is extended to also search uploaded pictures against billions of online images to detect multiple uses of the same picture for different profiles, as watermarking alone may fail if the picture is edited. Detected users must then prove ownership rights to the picture.
A Survey On Cyber Crime Information SecurityMichele Thomas
This document provides an overview of cybercrime and information security. It discusses how cybercrime has increased with greater internet usage and defines cybercrime as illegal acts conducted through computers. The document then examines common forms of cybercrime like malware, spam, phishing, hacking, cyber stalking, and fraud. It explores the causes of cybercrime and how crimes are executed through methods like infecting devices with malware, sending spam emails, engaging in phishing scams, hacking via code, and cyber stalking victims online and offline. The goal of information security is also discussed as protecting computer data and systems from unauthorized access.
This document discusses the motivations behind cybercrimes and categorizes cyber attackers. It identifies the main categories of cyber attackers as insiders and outsiders, with insiders further divided into disgruntled employees, financially motivated insiders, and unintentional insiders. Outsiders include organized attackers such as terrorists, hacktivists, nation states, and criminal organizations, as well as hackers and amateurs. The motivations for cyber attacks are identified as political, economic, and social motivations. The risks from cyber attacks arise from inadvertent actions, deliberate harmful actions, and inaction. Understanding the motivations and categories of cyber attackers can help address the operational cybersecurity risks they pose.
Email phishing: Text classification using natural language processingCSITiaesprime
Phishing is networked theft in which the main motive of phishers is to steal any person’s private information, its financial details like account number, credit card details, login information, payment mode information by creating and developing a fake page or a fake web site, which look completely authentic and genuine. Nowadays email phishing has become a big threat to all, and is increasing day by day. Moreover, detection of phishing emails has been considered an important research issue as phishing emails have been increasing day by day. Various techniques have been introduced and applied to deal with such a big issue. The major objective of this research paper is giving a detailed description on the classification of phishing emails using the natural language processing concepts. Natural language processing (NLP) concepts have been applied for the classification of emails; along with that accuracy rate of various classifiers have been calculated. The paper is presented in four sections. An introduction about phishing its types, its history, statistics, life cycle, motivation for phishers and working of email phishing have been discussed in the first section. The second section covers various technologies of phishing- email phishing and also description of evaluation metrics. An overview of the various proposed solutions and work done by researchers in this field in form of literature review has been presented in the third section. The solution approach and the obtained results have been defined in the fourth section giving a detailed description about NLP concepts and working procedure.
Investigating Tertiary Students’ Perceptions on Internet SecurityITIIIndustries
Internet security threats have grown from just simple viruses to various forms of computer hacking, scams, impersonation, cyber bullying, and spyware. The Internet has great influence on most people. It has profound influence and one can spend endless hours on internet activities. In particular, youth engage in more online activities than any other age group. Excessive internet usage is an emerging threat that has negative impacts on these youth; hence it is vital to investigate youths' online behavior. This work studies tertiary students’ risk awareness, and provides some findings that allow us to understand their knowledge on risks and their behavior towards online activities. It reveals several important online issues amongst tertiary students; Firstly, the lack of online security awareness; second, a lack of awareness and information about the dangers of rootkits, internet cookies and spyware; thirdly, female students are more unflinching than male students when commenting on social networking sites; fourthly, students are cautious only when obvious security warnings are present; and finally, their usage of internet hotspots is common without fully understanding its associated danger. These findings enable us to recommend types of internet security habits and safety practices that students should adopt in future when they are exposed to online activities. A more holistic approach was considered which aims to minimize any future risks and dangers with online activities involving students.
White Paper: Social Engineering and Cyber Attacks: The Psychology of DeceptionEMC
Social engineering relies on manipulating human psychology rather than technology. It works by exploiting human trust and emotions like fear, curiosity, and greed. Cybercriminals use social engineering tactics like phishing emails that appear to come from trusted sources to trick victims into revealing passwords and other sensitive information or downloading malware. While technology security measures are important, social engineering targets the human link. Education and awareness training to help users identify social engineering scams can help reduce the success of these attacks.
This document provides a review of cybercrime. It begins with definitions of crime and cybercrime. It then discusses several common types of cybercrimes like financial crimes, cyber pornography, drug trafficking, and cyber terrorism. It also examines cybercriminals and categorizes them from teenagers to professional hackers. The document analyzes data on the countries most affected by cybercrime. It concludes that cybercrime causes significant financial losses globally and emphasizes the importance of awareness and cybersecurity laws.
This document discusses cybercrime and various types of cybercrimes such as computer fraud, cyber extortion, cyberwarfare, crimes targeting individuals, and crimes targeting computer networks. It provides examples of different cybercrimes and highlights the importance of protecting personal information and computer security. The key challenges are that individuals and organizations of all sizes are vulnerable to cyber attacks, and that attitudes need to change to prioritize cyber security and incident detection.
This document is a project report on cybercrime in the banking sector submitted by Praveen Singh Pokharia to the University of Lucknow. It contains an introduction that defines cybercrime and notes that cybercrime in banking involves crimes like ATM fraud, money laundering, and credit card fraud. It also provides an index of topics to be covered in the report such as the reasons for cybercrime, cybercriminals, cybercrime in the banking sector, case studies, and recent cases. The report aims to analyze cybercrime affecting the banking sector in India.
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...CSCJournals
This document presents a theoretical model for evaluating phishing attacks based on the indistinguishability of natural and phishing message distributions. The model views a phishing attack as an attempt to generate messages that are indistinguishable from normal messages. It captures a phishing attack in terms of the statistical distance between the natural and phishing message probability distributions. The model also proposes metrics to analyze the success probability of phishing attacks and distinguisher algorithms. Finally, it discusses a new class of collaborative spear phishing attacks enabled by data breaches at large companies.
An Indistinguishability Model for Evaluating Diverse Classes of Phishing Atta...CSCJournals
Phishing is a growing threat to Internet users and causes billions of dollars in damage every year. While there are a number of research articles that study the tactics, techniques and procedures employed by phishers in the literature, in this paper, we present a theoretical yet practical model to study this menacing threat in a formal manner. While it is common folklore knowledge that a successful phishing attack entails creating messages that are indistinguishable from the natural, expected messages by the intended victim, this concept has not been formalized. Our model attempts to capture a phishing attack in terms of this indistinguishability between the natural and phishing message probability distributions. We view the actions performed by a phisher as an attempt to create messages that are indistinguishable to the victim from that of “normal” messages. To the best of our knowledge, this is the first study that places phishing on a concrete theoretical framework and offers a new perspective to analyze this threat. We propose metrics to analyze the success probability of a phishing attack taking into account the input used by a phisher and the work involved in creating deceptive email messages. Finally, we study and apply our model to a new class of phishing attacks called collaborative spear phishing that is gaining momentum. Recent examples include Operation Woolen-Goldfish in 2015, Rocket Kitten in 2014 and Epsilon email breach in 2011. We point out fundamental flaws in the current email-based marketing business model which enables such targeted spear phishing collaborative attacks. In this sense, our study is very timely and presents new and emerging trends in phishing.
Exploring machine learning techniques for fake profile detection in online so...IJECEIAES
The online social network is the largest network, more than 4 billion users use social media and with its rapid growth, the risk of maintaining the integrity of data has tremendously increased. There are several kinds of security challenges in online social networks (OSNs). Many abominable behaviors try to hack social sites and misuse the data available on these sites. Therefore, protection against such behaviors has become an essential requirement. Though there are many types of security threats in online social networks but, one of the significant threats is the fake profile. Fake profiles are created intentionally with certain motives, and such profiles may be targeted to steal or acquire sensitive information and/or spread rumors on online social networks with specific motives. Fake profiles are primarily used to steal or extract information by means of friendly interaction online and/or misusing online data available on social sites. Thus, fake profile detection in social media networks is attracting the attention of researchers. This paper aims to discuss various machine learning (ML) methods used by researchers for fake profile detection to explore the further possibility of improvising the machine learning models for speedy results.
This document discusses the growing issue of cybercrime in Bangladesh, particularly among youth. As internet and technology usage increases, so do various forms of cybercrime like hacking, phishing, cyberbullying, and the spreading of misinformation. Many youth are victimized on social media and fall prey to financial crimes. While laws and enforcement agencies have been established to address cybercrime, challenges remain like a lack of skills and resources within law enforcement. The document calls for greater public awareness, strengthened laws and policies, and international cooperation to curb cybercrime and protect Bangladesh's digital progress and national security.
Similar to Assessing contributor features to phishing susceptibility amongst students of petroleum resources varsity in Nigeria (20)
Redefining brain tumor segmentation: a cutting-edge convolutional neural netw...IJECEIAES
Medical image analysis has witnessed significant advancements with deep learning techniques. In the domain of brain tumor segmentation, the ability to
precisely delineate tumor boundaries from magnetic resonance imaging (MRI)
scans holds profound implications for diagnosis. This study presents an ensemble convolutional neural network (CNN) with transfer learning, integrating
the state-of-the-art Deeplabv3+ architecture with the ResNet18 backbone. The
model is rigorously trained and evaluated, exhibiting remarkable performance
metrics, including an impressive global accuracy of 99.286%, a high-class accuracy of 82.191%, a mean intersection over union (IoU) of 79.900%, a weighted
IoU of 98.620%, and a Boundary F1 (BF) score of 83.303%. Notably, a detailed comparative analysis with existing methods showcases the superiority of
our proposed model. These findings underscore the model’s competence in precise brain tumor localization, underscoring its potential to revolutionize medical
image analysis and enhance healthcare outcomes. This research paves the way
for future exploration and optimization of advanced CNN models in medical
imaging, emphasizing addressing false positives and resource efficiency.
Embedded machine learning-based road conditions and driving behavior monitoringIJECEIAES
Car accident rates have increased in recent years, resulting in losses in human lives, properties, and other financial costs. An embedded machine learning-based system is developed to address this critical issue. The system can monitor road conditions, detect driving patterns, and identify aggressive driving behaviors. The system is based on neural networks trained on a comprehensive dataset of driving events, driving styles, and road conditions. The system effectively detects potential risks and helps mitigate the frequency and impact of accidents. The primary goal is to ensure the safety of drivers and vehicles. Collecting data involved gathering information on three key road events: normal street and normal drive, speed bumps, circular yellow speed bumps, and three aggressive driving actions: sudden start, sudden stop, and sudden entry. The gathered data is processed and analyzed using a machine learning system designed for limited power and memory devices. The developed system resulted in 91.9% accuracy, 93.6% precision, and 92% recall. The achieved inference time on an Arduino Nano 33 BLE Sense with a 32-bit CPU running at 64 MHz is 34 ms and requires 2.6 kB peak RAM and 139.9 kB program flash memory, making it suitable for resource-constrained embedded systems.
Advanced control scheme of doubly fed induction generator for wind turbine us...IJECEIAES
This paper describes a speed control device for generating electrical energy on an electricity network based on the doubly fed induction generator (DFIG) used for wind power conversion systems. At first, a double-fed induction generator model was constructed. A control law is formulated to govern the flow of energy between the stator of a DFIG and the energy network using three types of controllers: proportional integral (PI), sliding mode controller (SMC) and second order sliding mode controller (SOSMC). Their different results in terms of power reference tracking, reaction to unexpected speed fluctuations, sensitivity to perturbations, and resilience against machine parameter alterations are compared. MATLAB/Simulink was used to conduct the simulations for the preceding study. Multiple simulations have shown very satisfying results, and the investigations demonstrate the efficacy and power-enhancing capabilities of the suggested control system.
Neural network optimizer of proportional-integral-differential controller par...IJECEIAES
Wide application of proportional-integral-differential (PID)-regulator in industry requires constant improvement of methods of its parameters adjustment. The paper deals with the issues of optimization of PID-regulator parameters with the use of neural network technology methods. A methodology for choosing the architecture (structure) of neural network optimizer is proposed, which consists in determining the number of layers, the number of neurons in each layer, as well as the form and type of activation function. Algorithms of neural network training based on the application of the method of minimizing the mismatch between the regulated value and the target value are developed. The method of back propagation of gradients is proposed to select the optimal training rate of neurons of the neural network. The neural network optimizer, which is a superstructure of the linear PID controller, allows increasing the regulation accuracy from 0.23 to 0.09, thus reducing the power consumption from 65% to 53%. The results of the conducted experiments allow us to conclude that the created neural superstructure may well become a prototype of an automatic voltage regulator (AVR)-type industrial controller for tuning the parameters of the PID controller.
An improved modulation technique suitable for a three level flying capacitor ...IJECEIAES
This research paper introduces an innovative modulation technique for controlling a 3-level flying capacitor multilevel inverter (FCMLI), aiming to streamline the modulation process in contrast to conventional methods. The proposed
simplified modulation technique paves the way for more straightforward and
efficient control of multilevel inverters, enabling their widespread adoption and
integration into modern power electronic systems. Through the amalgamation of
sinusoidal pulse width modulation (SPWM) with a high-frequency square wave
pulse, this controlling technique attains energy equilibrium across the coupling
capacitor. The modulation scheme incorporates a simplified switching pattern
and a decreased count of voltage references, thereby simplifying the control
algorithm.
A review on features and methods of potential fishing zoneIJECEIAES
This review focuses on the importance of identifying potential fishing zones in seawater for sustainable fishing practices. It explores features like sea surface temperature (SST) and sea surface height (SSH), along with classification methods such as classifiers. The features like SST, SSH, and different classifiers used to classify the data, have been figured out in this review study. This study underscores the importance of examining potential fishing zones using advanced analytical techniques. It thoroughly explores the methodologies employed by researchers, covering both past and current approaches. The examination centers on data characteristics and the application of classification algorithms for classification of potential fishing zones. Furthermore, the prediction of potential fishing zones relies significantly on the effectiveness of classification algorithms. Previous research has assessed the performance of models like support vector machines, naïve Bayes, and artificial neural networks (ANN). In the previous result, the results of support vector machine (SVM) were 97.6% more accurate than naive Bayes's 94.2% to classify test data for fisheries classification. By considering the recent works in this area, several recommendations for future works are presented to further improve the performance of the potential fishing zone models, which is important to the fisheries community.
Electrical signal interference minimization using appropriate core material f...IJECEIAES
As demand for smaller, quicker, and more powerful devices rises, Moore's law is strictly followed. The industry has worked hard to make little devices that boost productivity. The goal is to optimize device density. Scientists are reducing connection delays to improve circuit performance. This helped them understand three-dimensional integrated circuit (3D IC) concepts, which stack active devices and create vertical connections to diminish latency and lower interconnects. Electrical involvement is a big worry with 3D integrates circuits. Researchers have developed and tested through silicon via (TSV) and substrates to decrease electrical wave involvement. This study illustrates a novel noise coupling reduction method using several electrical involvement models. A 22% drop in electrical involvement from wave-carrying to victim TSVs introduces this new paradigm and improves system performance even at higher THz frequencies.
Electric vehicle and photovoltaic advanced roles in enhancing the financial p...IJECEIAES
Climate change's impact on the planet forced the United Nations and governments to promote green energies and electric transportation. The deployments of photovoltaic (PV) and electric vehicle (EV) systems gained stronger momentum due to their numerous advantages over fossil fuel types. The advantages go beyond sustainability to reach financial support and stability. The work in this paper introduces the hybrid system between PV and EV to support industrial and commercial plants. This paper covers the theoretical framework of the proposed hybrid system including the required equation to complete the cost analysis when PV and EV are present. In addition, the proposed design diagram which sets the priorities and requirements of the system is presented. The proposed approach allows setup to advance their power stability, especially during power outages. The presented information supports researchers and plant owners to complete the necessary analysis while promoting the deployment of clean energy. The result of a case study that represents a dairy milk farmer supports the theoretical works and highlights its advanced benefits to existing plants. The short return on investment of the proposed approach supports the paper's novelty approach for the sustainable electrical system. In addition, the proposed system allows for an isolated power setup without the need for a transmission line which enhances the safety of the electrical network
Bibliometric analysis highlighting the role of women in addressing climate ch...IJECEIAES
Fossil fuel consumption increased quickly, contributing to climate change
that is evident in unusual flooding and draughts, and global warming. Over
the past ten years, women's involvement in society has grown dramatically,
and they succeeded in playing a noticeable role in reducing climate change.
A bibliometric analysis of data from the last ten years has been carried out to
examine the role of women in addressing the climate change. The analysis's
findings discussed the relevant to the sustainable development goals (SDGs),
particularly SDG 7 and SDG 13. The results considered contributions made
by women in the various sectors while taking geographic dispersion into
account. The bibliometric analysis delves into topics including women's
leadership in environmental groups, their involvement in policymaking, their
contributions to sustainable development projects, and the influence of
gender diversity on attempts to mitigate climate change. This study's results
highlight how women have influenced policies and actions related to climate
change, point out areas of research deficiency and recommendations on how
to increase role of the women in addressing the climate change and
achieving sustainability. To achieve more successful results, this initiative
aims to highlight the significance of gender equality and encourage
inclusivity in climate change decision-making processes.
Voltage and frequency control of microgrid in presence of micro-turbine inter...IJECEIAES
The active and reactive load changes have a significant impact on voltage
and frequency. In this paper, in order to stabilize the microgrid (MG) against
load variations in islanding mode, the active and reactive power of all
distributed generators (DGs), including energy storage (battery), diesel
generator, and micro-turbine, are controlled. The micro-turbine generator is
connected to MG through a three-phase to three-phase matrix converter, and
the droop control method is applied for controlling the voltage and
frequency of MG. In addition, a method is introduced for voltage and
frequency control of micro-turbines in the transition state from gridconnected mode to islanding mode. A novel switching strategy of the matrix
converter is used for converting the high-frequency output voltage of the
micro-turbine to the grid-side frequency of the utility system. Moreover,
using the switching strategy, the low-order harmonics in the output current
and voltage are not produced, and consequently, the size of the output filter
would be reduced. In fact, the suggested control strategy is load-independent
and has no frequency conversion restrictions. The proposed approach for
voltage and frequency regulation demonstrates exceptional performance and
favorable response across various load alteration scenarios. The suggested
strategy is examined in several scenarios in the MG test systems, and the
simulation results are addressed.
Enhancing battery system identification: nonlinear autoregressive modeling fo...IJECEIAES
Precisely characterizing Li-ion batteries is essential for optimizing their
performance, enhancing safety, and prolonging their lifespan across various
applications, such as electric vehicles and renewable energy systems. This
article introduces an innovative nonlinear methodology for system
identification of a Li-ion battery, employing a nonlinear autoregressive with
exogenous inputs (NARX) model. The proposed approach integrates the
benefits of nonlinear modeling with the adaptability of the NARX structure,
facilitating a more comprehensive representation of the intricate
electrochemical processes within the battery. Experimental data collected
from a Li-ion battery operating under diverse scenarios are employed to
validate the effectiveness of the proposed methodology. The identified
NARX model exhibits superior accuracy in predicting the battery's behavior
compared to traditional linear models. This study underscores the
importance of accounting for nonlinearities in battery modeling, providing
insights into the intricate relationships between state-of-charge, voltage, and
current under dynamic conditions.
Smart grid deployment: from a bibliometric analysis to a surveyIJECEIAES
Smart grids are one of the last decades' innovations in electrical energy.
They bring relevant advantages compared to the traditional grid and
significant interest from the research community. Assessing the field's
evolution is essential to propose guidelines for facing new and future smart
grid challenges. In addition, knowing the main technologies involved in the
deployment of smart grids (SGs) is important to highlight possible
shortcomings that can be mitigated by developing new tools. This paper
contributes to the research trends mentioned above by focusing on two
objectives. First, a bibliometric analysis is presented to give an overview of
the current research level about smart grid deployment. Second, a survey of
the main technological approaches used for smart grid implementation and
their contributions are highlighted. To that effect, we searched the Web of
Science (WoS), and the Scopus databases. We obtained 5,663 documents
from WoS and 7,215 from Scopus on smart grid implementation or
deployment. With the extraction limitation in the Scopus database, 5,872 of
the 7,215 documents were extracted using a multi-step process. These two
datasets have been analyzed using a bibliometric tool called bibliometrix.
The main outputs are presented with some recommendations for future
research.
Use of analytical hierarchy process for selecting and prioritizing islanding ...IJECEIAES
One of the problems that are associated to power systems is islanding
condition, which must be rapidly and properly detected to prevent any
negative consequences on the system's protection, stability, and security.
This paper offers a thorough overview of several islanding detection
strategies, which are divided into two categories: classic approaches,
including local and remote approaches, and modern techniques, including
techniques based on signal processing and computational intelligence.
Additionally, each approach is compared and assessed based on several
factors, including implementation costs, non-detected zones, declining
power quality, and response times using the analytical hierarchy process
(AHP). The multi-criteria decision-making analysis shows that the overall
weight of passive methods (24.7%), active methods (7.8%), hybrid methods
(5.6%), remote methods (14.5%), signal processing-based methods (26.6%),
and computational intelligent-based methods (20.8%) based on the
comparison of all criteria together. Thus, it can be seen from the total weight
that hybrid approaches are the least suitable to be chosen, while signal
processing-based methods are the most appropriate islanding detection
method to be selected and implemented in power system with respect to the
aforementioned factors. Using Expert Choice software, the proposed
hierarchy model is studied and examined.
Enhancing of single-stage grid-connected photovoltaic system using fuzzy logi...IJECEIAES
The power generated by photovoltaic (PV) systems is influenced by
environmental factors. This variability hampers the control and utilization of
solar cells' peak output. In this study, a single-stage grid-connected PV
system is designed to enhance power quality. Our approach employs fuzzy
logic in the direct power control (DPC) of a three-phase voltage source
inverter (VSI), enabling seamless integration of the PV connected to the
grid. Additionally, a fuzzy logic-based maximum power point tracking
(MPPT) controller is adopted, which outperforms traditional methods like
incremental conductance (INC) in enhancing solar cell efficiency and
minimizing the response time. Moreover, the inverter's real-time active and
reactive power is directly managed to achieve a unity power factor (UPF).
The system's performance is assessed through MATLAB/Simulink
implementation, showing marked improvement over conventional methods,
particularly in steady-state and varying weather conditions. For solar
irradiances of 500 and 1,000 W/m2
, the results show that the proposed
method reduces the total harmonic distortion (THD) of the injected current
to the grid by approximately 46% and 38% compared to conventional
methods, respectively. Furthermore, we compare the simulation results with
IEEE standards to evaluate the system's grid compatibility.
Enhancing photovoltaic system maximum power point tracking with fuzzy logic-b...IJECEIAES
Photovoltaic systems have emerged as a promising energy resource that
caters to the future needs of society, owing to their renewable, inexhaustible,
and cost-free nature. The power output of these systems relies on solar cell
radiation and temperature. In order to mitigate the dependence on
atmospheric conditions and enhance power tracking, a conventional
approach has been improved by integrating various methods. To optimize
the generation of electricity from solar systems, the maximum power point
tracking (MPPT) technique is employed. To overcome limitations such as
steady-state voltage oscillations and improve transient response, two
traditional MPPT methods, namely fuzzy logic controller (FLC) and perturb
and observe (P&O), have been modified. This research paper aims to
simulate and validate the step size of the proposed modified P&O and FLC
techniques within the MPPT algorithm using MATLAB/Simulink for
efficient power tracking in photovoltaic systems.
Adaptive synchronous sliding control for a robot manipulator based on neural ...IJECEIAES
Robot manipulators have become important equipment in production lines, medical fields, and transportation. Improving the quality of trajectory tracking for
robot hands is always an attractive topic in the research community. This is a
challenging problem because robot manipulators are complex nonlinear systems
and are often subject to fluctuations in loads and external disturbances. This
article proposes an adaptive synchronous sliding control scheme to improve trajectory tracking performance for a robot manipulator. The proposed controller
ensures that the positions of the joints track the desired trajectory, synchronize
the errors, and significantly reduces chattering. First, the synchronous tracking
errors and synchronous sliding surfaces are presented. Second, the synchronous
tracking error dynamics are determined. Third, a robust adaptive control law is
designed,the unknown components of the model are estimated online by the neural network, and the parameters of the switching elements are selected by fuzzy
logic. The built algorithm ensures that the tracking and approximation errors
are ultimately uniformly bounded (UUB). Finally, the effectiveness of the constructed algorithm is demonstrated through simulation and experimental results.
Simulation and experimental results show that the proposed controller is effective with small synchronous tracking errors, and the chattering phenomenon is
significantly reduced.
Remote field-programmable gate array laboratory for signal acquisition and de...IJECEIAES
A remote laboratory utilizing field-programmable gate array (FPGA) technologies enhances students’ learning experience anywhere and anytime in embedded system design. Existing remote laboratories prioritize hardware access and visual feedback for observing board behavior after programming, neglecting comprehensive debugging tools to resolve errors that require internal signal acquisition. This paper proposes a novel remote embeddedsystem design approach targeting FPGA technologies that are fully interactive via a web-based platform. Our solution provides FPGA board access and debugging capabilities beyond the visual feedback provided by existing remote laboratories. We implemented a lab module that allows users to seamlessly incorporate into their FPGA design. The module minimizes hardware resource utilization while enabling the acquisition of a large number of data samples from the signal during the experiments by adaptively compressing the signal prior to data transmission. The results demonstrate an average compression ratio of 2.90 across three benchmark signals, indicating efficient signal acquisition and effective debugging and analysis. This method allows users to acquire more data samples than conventional methods. The proposed lab allows students to remotely test and debug their designs, bridging the gap between theory and practice in embedded system design.
Detecting and resolving feature envy through automated machine learning and m...IJECEIAES
Efficiently identifying and resolving code smells enhances software project quality. This paper presents a novel solution, utilizing automated machine learning (AutoML) techniques, to detect code smells and apply move method refactoring. By evaluating code metrics before and after refactoring, we assessed its impact on coupling, complexity, and cohesion. Key contributions of this research include a unique dataset for code smell classification and the development of models using AutoGluon for optimal performance. Furthermore, the study identifies the top 20 influential features in classifying feature envy, a well-known code smell, stemming from excessive reliance on external classes. We also explored how move method refactoring addresses feature envy, revealing reduced coupling and complexity, and improved cohesion, ultimately enhancing code quality. In summary, this research offers an empirical, data-driven approach, integrating AutoML and move method refactoring to optimize software project quality. Insights gained shed light on the benefits of refactoring on code quality and the significance of specific features in detecting feature envy. Future research can expand to explore additional refactoring techniques and a broader range of code metrics, advancing software engineering practices and standards.
Smart monitoring technique for solar cell systems using internet of things ba...IJECEIAES
Rapidly and remotely monitoring and receiving the solar cell systems status parameters, solar irradiance, temperature, and humidity, are critical issues in enhancement their efficiency. Hence, in the present article an improved smart prototype of internet of things (IoT) technique based on embedded system through NodeMCU ESP8266 (ESP-12E) was carried out experimentally. Three different regions at Egypt; Luxor, Cairo, and El-Beheira cities were chosen to study their solar irradiance profile, temperature, and humidity by the proposed IoT system. The monitoring data of solar irradiance, temperature, and humidity were live visualized directly by Ubidots through hypertext transfer protocol (HTTP) protocol. The measured solar power radiation in Luxor, Cairo, and El-Beheira ranged between 216-1000, 245-958, and 187-692 W/m 2 respectively during the solar day. The accuracy and rapidity of obtaining monitoring results using the proposed IoT system made it a strong candidate for application in monitoring solar cell systems. On the other hand, the obtained solar power radiation results of the three considered regions strongly candidate Luxor and Cairo as suitable places to build up a solar cells system station rather than El-Beheira.
An efficient security framework for intrusion detection and prevention in int...IJECEIAES
Over the past few years, the internet of things (IoT) has advanced to connect billions of smart devices to improve quality of life. However, anomalies or malicious intrusions pose several security loopholes, leading to performance degradation and threat to data security in IoT operations. Thereby, IoT security systems must keep an eye on and restrict unwanted events from occurring in the IoT network. Recently, various technical solutions based on machine learning (ML) models have been derived towards identifying and restricting unwanted events in IoT. However, most ML-based approaches are prone to miss-classification due to inappropriate feature selection. Additionally, most ML approaches applied to intrusion detection and prevention consider supervised learning, which requires a large amount of labeled data to be trained. Consequently, such complex datasets are impossible to source in a large network like IoT. To address this problem, this proposed study introduces an efficient learning mechanism to strengthen the IoT security aspects. The proposed algorithm incorporates supervised and unsupervised approaches to improve the learning models for intrusion detection and mitigation. Compared with the related works, the experimental outcome shows that the model performs well in a benchmark dataset. It accomplishes an improved detection accuracy of approximately 99.21%.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
International Conference on NLP, Artificial Intelligence, Machine Learning an...gerogepatton
International Conference on NLP, Artificial Intelligence, Machine Learning and Applications (NLAIM 2024) offers a premier global platform for exchanging insights and findings in the theory, methodology, and applications of NLP, Artificial Intelligence, Machine Learning, and their applications. The conference seeks substantial contributions across all key domains of NLP, Artificial Intelligence, Machine Learning, and their practical applications, aiming to foster both theoretical advancements and real-world implementations. With a focus on facilitating collaboration between researchers and practitioners from academia and industry, the conference serves as a nexus for sharing the latest developments in the field.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
CHINA’S GEO-ECONOMIC OUTREACH IN CENTRAL ASIAN COUNTRIES AND FUTURE PROSPECTjpsjournal1
The rivalry between prominent international actors for dominance over Central Asia's hydrocarbon
reserves and the ancient silk trade route, along with China's diplomatic endeavours in the area, has been
referred to as the "New Great Game." This research centres on the power struggle, considering
geopolitical, geostrategic, and geoeconomic variables. Topics including trade, political hegemony, oil
politics, and conventional and nontraditional security are all explored and explained by the researcher.
Using Mackinder's Heartland, Spykman Rimland, and Hegemonic Stability theories, examines China's role
in Central Asia. This study adheres to the empirical epistemological method and has taken care of
objectivity. This study analyze primary and secondary research documents critically to elaborate role of
china’s geo economic outreach in central Asian countries and its future prospect. China is thriving in trade,
pipeline politics, and winning states, according to this study, thanks to important instruments like the
Shanghai Cooperation Organisation and the Belt and Road Economic Initiative. According to this study,
China is seeing significant success in commerce, pipeline politics, and gaining influence on other
governments. This success may be attributed to the effective utilisation of key tools such as the Shanghai
Cooperation Organisation and the Belt and Road Economic Initiative.
Low power architecture of logic gates using adiabatic techniquesnooriasukmaningtyas
The growing significance of portable systems to limit power consumption in ultra-large-scale-integration chips of very high density, has recently led to rapid and inventive progresses in low-power design. The most effective technique is adiabatic logic circuit design in energy-efficient hardware. This paper presents two adiabatic approaches for the design of low power circuits, modified positive feedback adiabatic logic (modified PFAL) and the other is direct current diode based positive feedback adiabatic logic (DC-DB PFAL). Logic gates are the preliminary components in any digital circuit design. By improving the performance of basic gates, one can improvise the whole system performance. In this paper proposed circuit design of the low power architecture of OR/NOR, AND/NAND, and XOR/XNOR gates are presented using the said approaches and their results are analyzed for powerdissipation, delay, power-delay-product and rise time and compared with the other adiabatic techniques along with the conventional complementary metal oxide semiconductor (CMOS) designs reported in the literature. It has been found that the designs with DC-DB PFAL technique outperform with the percentage improvement of 65% for NOR gate and 7% for NAND gate and 34% for XNOR gate over the modified PFAL techniques at 10 MHz respectively.
Literature Review Basics and Understanding Reference Management.pptxDr Ramhari Poudyal
Three-day training on academic research focuses on analytical tools at United Technical College, supported by the University Grant Commission, Nepal. 24-26 May 2024
ACEP Magazine edition 4th launched on 05.06.2024Rahul
This document provides information about the third edition of the magazine "Sthapatya" published by the Association of Civil Engineers (Practicing) Aurangabad. It includes messages from current and past presidents of ACEP, memories and photos from past ACEP events, information on life time achievement awards given by ACEP, and a technical article on concrete maintenance, repairs and strengthening. The document highlights activities of ACEP and provides a technical educational article for members.
Assessing contributor features to phishing susceptibility amongst students of petroleum resources varsity in Nigeria
1. International Journal of Electrical and Computer Engineering (IJECE)
Vol. 13, No. 2, April 2023, pp. 1922~1931
ISSN: 2088-8708, DOI: 10.11591/ijece.v13i2.pp1922-1931 1922
Journal homepage: http://ijece.iaescore.com
Assessing contributor features to phishing susceptibility
amongst students of petroleum resources varsity in Nigeria
Rume Elizabeth Yoro1
, Fidelis Obukohwo Aghware2
, Bridget Ogheneovo Malasowe2
,
Obinna Nwankwo3
, Arnold Adimabua Ojugo4
1
Department of Computer Science, Dennis Osadebey University Asaba, Asaba, Nigeria
2
Department of Computer Science, University of Delta, Agbor, Nigeria
4
Department of Computer Science, Novena University Ogume, Delta State, Nigeria
5
Department of Computer Science, Federal University of Petroleum Resources Effurun, Effurun, Nigeria
Article Info ABSTRACT
Article history:
Received Jul 13, 2021
Revised Oct 7, 2022
Accepted Nov 1, 2022
In this observational quasi-experimental study, we recruited 200 participants
during the Federal University of Petroleum Resources Effurun’s (FUPRE)
orientation, who were exposed to socially engineered (phishing) attacks over
nine months. Attacks sought to extract participants’ data and/or entice them
to click (compromised) links. The study aims to determine phishing
exposure and risks among undergraduates in FUPRE (Nigeria) by observing
their responses to socially-engineered attacks and exploring their attitudes to
cybercrime risks before and after phishing attacks. The study primed all
students in place of cybercrime awareness to remain vigilant to scams and
explored the various scam types with their influence on gender, age, status,
and their perceived safety on susceptibility to scams. Results show that
contrary to public beliefs, these factors have all been found to be associated
with scam susceptibility and vulnerability of the participants.
Keywords:
Federal University of
Petroleum Resources Effurun’s
Online presence
Personality traits
Phishing vulnerability
Social media contents
Socially-engineered attacks
This is an open access article under the CC BY-SA license.
Corresponding Author:
Arnold Adimabua Ojugo
Department of Computer Science, Federal University of Petroleum Resources Effurun
Delta State, Nigeria
Email: ojugo.arnold@fupre.edu.ng
1. INTRODUCTION
The internet’s birth also witnessed the ever-increasing need for its users to stay connected via
enabling support devices. However, such a need to stay connected and share data with other users within and
outside of the user’s locality has continued to open up many such users on a larger scale, to avenues of
exploitation that can be harnessed by adversaries via threats and cyber attacks [1], [2]. This consequently has
birthed the social media websites that have today, continued to gain great and significant popularity over the
years, with over a 3.484 billion users worldwide reported in 2019 [3]. As users connect and perform many
other feats over such media, they become more prone to threats and attacks of various forms. These attacks
(many of which, socially-engineered today) reveal how vulnerable and susceptible a connected user is over
the network-as the attacks are designed to exploit system errors and behavioral traits resulting from relations
and operations between users. An adversary seeks to exploit an unsuspecting user as its victim and weakest
link within the network. These amongst others are the reason(s) for which socially engineered attacks will
continue to rise [4], [5].
Adversaries seek to compromise a potential victim and often succeed based on the target’s (potential
victim’s) judgment rather than considering the security measure in place on the victim’s network [4], [6]. The
first quarter of 2018 witnessed a launch of fake Facebook pages with 60% of phishing attacks on social
media networks and later on, in 2019, phishing on both Instagram and Facebook among others saw a 74.7%
2. Int J Elec & Comp Eng ISSN: 2088-8708
Assessing contributor features to phishing susceptibility amongst students of … (Rume Elizabeth Yoro)
1923
increase [7]. These statistics highlight that the threat of phishing shows no sign of retreating. The gain therein
a system to be exploited provides an adversary with an attractive entry point to a potentially compromised
network as well as provides a pilot/pivot point for attack propagation [8].
The traditional platform for conducting attacks via spam has evolved to include network messages,
e-mails, and short messages (SMS). These attacks have experienced now over 30% increase as they have
now migrated and ported on social media platforms. Spams often involve harmless advertising and are laced
with malware designed to exploit its recipients [9], [10]. Spams are deployed as attacks to target
high-volume, low-value victims because they are relatively easy to distribute and do not require advanced
expertise [11]. Spams are misunderstood as insignificant-even when they have shown an estimated daily
volume of over 422 billion in January 2018 [12] and about 612 billion in January 2021 [8]. This constitutes
over 85% of daily global data traffic a distribution eased by spammers who are capable of sending tons of
messages via botnets in seconds to recipient’s databank that are potentially vulnerable due to ineffective anti-
virus and other countermeasures [11].
2. MATERIALS/METHODS
2.1. Phishing susceptibility: a review of related literature
Life’s daily activities are rippled with risks and challenges and result in choices made from
decisions cum conclusions reached as we traverse it. These risks are often associated with decisions and
choices that we assumed are purely logical implying them to be rationale based on objective features.
However, Kahneman and Tversky [13] note that many decisions are biased due to certain explicable factors.
And as thus, a scam is a disguise, used by an adversary in an attempt to extract valuable data for monetary
gain from an unsuspecting victim. Thus, a response to a scam becomes a decision error, if a user does not
correctly estimate the risks due to certain biases. These and other reasons are why scams will continue to
flourish as people tend to fall for them. Scams provide an attacker with the requisite chance to steal a victim’s
data or get money directly from the scam victims [14]. All scams are socially-engineered to appeal to
different human vulnerabilities. They include (and are not limited to) desire for immediate gain, to help
people, and to be liked by scam initiators. It suggests certain persons have ‘victim traits’ that make them
more vulnerable/susceptible to scams [15], [16]. A victim may fall repeatedly into a scam. A factor that
makes a person more likely to become a victim is the lack of emotional control. A University of Exeter study
[17] reported that victims are incapable to resist response to persuasion and offers they responded to. Thus,
the study concludes that often about 10-20% of a population are vulnerable to scams. Some people become
serial scam victims and experience scams repeatedly.
Phishing is an identity theft targeted at compromising sensitive unsuspecting victim’s data often for
personal gains [18]. Phishing can involve the creation of compromised websites, the acquisition of email lists
and botnets, and spoofing of mails, SMS designed to deceive an unsuspecting victim into downloading the
malicious contents therein as originating from a legitimate and trustworthy source(s) [5], [8]. A phishing
attack has three (3) elements: a lure, hook and catch. A lure message is received by a potential victim as
originating from a legitimate source and its reliability is strengthened via exploiting the potential victim’s
desire for: i) curiosity as the message consists of compromised links; ii) fear as the message urges the
potential victim to validate their data as a result of an account breach; and iii) empathy as the message seeks
to impersonate a close associate in need of financial aid or personal data [19], [20].
De Kimpe et al. [18] known feats of phishing attacks include spelling errors, and monetary offers. If
a user is convinced the message is genuine-the vulnerable victim is then convinced to divulge sensitive data.
Phishers employ several social manipulators such as a trusted email source, implicating reciprocity (i.e.,
return of favors), social proof that allows others to participate in the scheme, creating a sense of scarcity via
authorized source all of which aids the success of the deception. Phishers often employ a 3 parts scheme
called the hook, catch and lure. A hook message includes a compromised attached link. While catch obtains
and uses extracted data. This technique may appear simple but, it constantly evolves to reflect new trends
[12] or use new methods of bypassing security measures to evade detection [11]. These attacks vary in
frequency and diversity increasing their chances and likelihood of success [21].
Phishing has become more effective via social engineering techniques, to persuade potential victims
to act [22]. The techniques are poised to appeal to a victim’s emotions creating trust between a phisher and
the unsuspecting victim via personalized emails. To ensure a high success rate, an attack is enacted in
2-stages namely: i) firstly, the phisher initiates contact with a potential victim and is able to assess the
victim’s friends and personal details and ii) next, the phisher contacts the victim requesting personal data via
social media platform [23]. Request for personal data can also be via the provided data on a victim’s page
such as photos, a news feed, and other likely posts. Often, the messages include links/attachments that are
laced with malware to impact the potential victim’s device. With success now attained, the data retrieved is
3. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1922-1931
1924
often used for further attacks on potential victims connected to the first victim as they now view the phisher
as a mutual friend and believe him/her to genuine and/or legitimate [24].
2.2. Phishing and the Nigerian University Frontiers
Nigerian undergraduates have become phishing targets as well as perpetrators of phishing attacks.
Crave for quick means to wealth has bedeviled Nigeria with myriads of fraudulent acts that robs her youth of
the needed opportunities and progress [25], [26]. With ICT potentials and growth for users worldwide, a
sine-qua-non effect is its plethora of attacks that seeks to exploit various associated compromises of the techs
and mislead unsuspecting victims under guise of benefits; But, aimed at defrauding potential victims
[27], [28].
Chanvarasuth [29] studied and compared the effectiveness of phishing versus vishing techniques for
smartphone users-sampling 772 Thai undergraduates between the ages of 18-23 years. Result noted that
phishing had a higher rate of success in comparison to vishing-as many of these factors such as age, gender,
online habits, and personality traits had their varied impact on the rate of success for each of the technique.
Ojugo and Yoro [30] implemented a smartphone model to provide a dependable, e-banking app that
ensure transaction authenticity, and message authorization to detect threats to account holders. They
examined threats, focusing on the effectiveness of phishing-sampling 600 participants in Southern Nigeria.
Their result indicates and supports Chanvarasuth [29] phishing yields more risk with higher rate of success,
than vishing.
2.3. Study objectives
Previous studies observe that some users have an almost addictive habit to remain online with great
time over social media sites. This allows them to participate in repeated behaviors, forming habit patterns that
may involve page likes, message posts and comment on images. To address the inability to adequately
process info contents, we posit a framework using the heuristic systematic model. It notes that participants
can engage 2-modes to assess received messages [31], [32]. This is because Enos et al. [33] note that users
with high score on neuroticism can barely detect lies as they become more upset when lied to and will rather
believe people are truthful so as to avoid emotional drama/pain. Also, Parsons et al. [34] and Mayhorn et al.
[35] stressed that premeditation allows users to highly detect lies. On personality traits thus, some studies
believe that agreeable people are better equipped to detect lies [33]; while, other studies disagree with the
case [34]–[36]. Thus, the objective of the study is to help identify and ascertain why some people are more
susceptible and vulnerable to phishing over social media, and also therein identify factors that contribute
greatly to such victim susceptibility and increased vulnerability to user trust-level and attacks.
2.4. Survey research
Research has begun to investigate how various aspects of psychology vis-à-vis personality traits
seek to compromise potential victims as they traverse the internet via social media networking websites. One
such concern is that the internet may soon replace normal social activities as individuals now preoccupy
themselves with social media as they seek to compensate for loneliness and social seclusion. Previous studies
successfully tagged the contributor features of phishing attacks as thus:
2.4.1. Personality traits/framework
Personality is a consistent pattern of how people respond to stimuli in their environment and their
attitude towards different events. McCrea and John [37] used a 5 factor model to measure personality. And as
extended by Helavi et al. [38] it leverages a theoretical conceptualization using the following: i) neuroticism
is the tendency to experience negative feelings such as guilt, anger, fear, and sadness. Studies showed that
high neuroticism yields increased susceptibility to irrational thoughts, is less able to control impulses, and
may not handle stress well; ii) conscientiousness is the tendency to show high self-control and strong-willed;
iii) openness indicates the willingness to try new experiences, become more imaginative and intellectually
curious; iv) agreeable is a person’s willingness to help others and believe in reciprocity; v) extroverted
persons are more friendly and interact more. It samples 60 questions to capture the most common elements of
personality traits with a precise structure description. It is considered superior and robust for understanding
the relations between personality and various academic behaviors. This study seeks to examine if this relation
extends to network security, traits, and privacy behavior [38] as shown in Figure 1.
2.4.2. Demographics
It has been observed that another feature that influences susceptibility to phish attacks is gender, age
as well as online presence pattern. Users between the ages of 18 and 29 were identified as being the most
susceptible to phishing attacks on both email and social media platforms [8], [39]; while females between the
4. Int J Elec & Comp Eng ISSN: 2088-8708
Assessing contributor features to phishing susceptibility amongst students of … (Rume Elizabeth Yoro)
1925
ages of 24 to 42 were identified as being the most vulnerable to phishing attacks. This can be attributed to the
fact that these young adults and females are constantly engaged to boycott social seclusion-leading to
addiction [40]. Excessive social media use and dependence create opportunities for such potential victims to
targets of phishers, which will in turn expose their close associates [41]. Other studies have also linked age to
risky behavior that increases their chances of being phished and younger adults have less education and
caution for financial risk; And thus, less exposure to phishing training [25]. Also, women have been
identified as most susceptible to phishing and social engineering [4], [39], and has been postulated that
women are easier to entice to open phishing emails, but are equally as capable and proficient as men in
detecting a deceptive message [2]. The complete demography of the participants is as in Table 1.
Figure 1. Personality traits factors that influence phishing susceptibility
Table 1. Demographic characteristics of samples
S/N Characteristics Dependent Variables All Participants
1 Gender Male 50.9
Female 49.1
2 Age Under 21 21.5
21-25 34.5
26 and above 44.0
3 Student Status Domestic 89.1
International 11.9
4 Faculty Science-Technology 40.1
Environmental 15.2
Medicine 12.0
Others 32.7
5 Year of Study 1-Year 36.0
2-Years 19.8
3-Years 19.5
4-Years and above 25.7
2.4.3. Online presence
The presence of a potential victim as he/she surfs the internet can evolve into habits, which have
also been found to influence phishing susceptibility. Highly active users on social media are more susceptible
to social engineering attacks than those who participate less often [3]. Thus, a person’s online habits
influence the way they process misleading attack techniques on these sites [22]. Poor online habits increase
susceptibility as these persons automatically click on links and respond to messages without engaging
sufficient cognitive resources or paying enough attention to their online behavior [22], [23]. These can
further cause a potential victim to be lured, hooked, and captured with little cognitive engagement using such
social sites. This increases the probability that these users will thoughtlessly click on malicious links and/or
accept a friend request from a fake profile without thinking about the impact of such actions [42]. Behaviors
such as click on links, and share-like-scroll through posts regularly result in the user not paying attention to
suspicious information on social media [43]. These in turn further impact negatively the user’s trust and risk
perception [44]. This is as shown in Figure 2, which details survey of online presence by users.
2.4.4. Media data content processing
Data processing involves two (2) modes namely: i) heuristic processing, and ii) systematic model
[23], [45] allows an individual perceives if the available data is sufficient for him or her to determine the
Openness
20%
Neuroticism
18%
Extroversion
28%
Agreebleness
19%
Conscentiousness
15%
5. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1922-1931
1926
choice to be undertaken. Thus, the individual utilizes both heuristic processing (by taking cues that impact
the limited cognitive resources to make judgments and decisions) and systematic processing (which involves
the careful examination of the data to reach a decision [24]. The risk of info overload on social media sites
and technology affordances encourages individuals to process content heuristically; and thus, leads to quick
and effortless judgments [46]. Though heuristic processing is far more efficient, it significantly increases an
individual’s susceptibility to phishing attacks [47]. The reason is that with heuristic processing, individuals
often overlook data cues that suggest the message is malicious and might pose a threat. Heuristic processing
relies on judging the credibility of superficial cues-leading users to trust phishing messages [22].
Figure 2. Online presence factors that influence phishing susceptibility
2.5. Technical details for phishing
Each participant’s personal data extracted from their profiles was used to create content for the
tailored emails, containing compromised links that required immediate response cum action. Thus, students
(participant) who clicked the links and/or login here to enter their details, were phished. We tracked all
phished participants. Sample emails for the tailored and spear-phished mails as in [48]. Mail sought to lure
potential victims namely: i) mail seem sent from a trusted source, ii) requested immediate response to reduce
the need for a thorough check, iii) likely increased their impulsive response, and iv) triggered visual
processing to ensure they were expectant of their results in next screen. Sample email created for this (and
other) participant(s) as in Figure 3. This email attempts to entice the participant to click on the link, which is
a real scam situation have been compromised. The content of all other spear-phishing emails was similar and
varied based on the type of personal information available on the internet. Due to the lack of social media
presence, and restrictive privacy settings, personal data for all participants could not be acquired.
Figure 3. Sample tailored email
Internet Experience
32%
Phishing Education
31%
Secutiy
Awareness
37%
6. Int J Elec & Comp Eng ISSN: 2088-8708
Assessing contributor features to phishing susceptibility amongst students of … (Rume Elizabeth Yoro)
1927
3. RESULTS AND DISCUSSION
3.1. Experiment’s procedure
The study is divided into parts with link(s) to an online questionnaire to be filled out by students.
The questionnaire consists of 3-parts: i) demographics part that included student’s age, academics, and
background data, ii) online activity part where students were assessed via a 5 point Likert scale of their
online activity, and iii) privacy settings. To correlate the SN activity with the personality traits, the test
participants were asked what kind of data they put on Facebook and Instagram, the frequency of postings, the
number of images they post, and their privacy settings. The survey uses self-reported data and is back-
checked for the accuracy of the values. We extracted personal data from participants. Value ‘1’ is assigned to
each element posted and all the variables were added together to create one ‘social-network data’. Log-value
for both the number of weekly posts and the overall number of images participants were collated with their
Facebook/Instagram page as separate values (accounts). We compute updated variables via (1).
𝑆𝑁𝑝𝑜𝑠𝑡𝑠 = 𝑙𝑜𝑔10(𝑇𝑜𝑡𝑎𝑙𝐸𝑛𝑡𝑟𝑦 + 0.001) (1)
The same calculation was computed for the total number of photos. To evaluate privacy settings,
participants were asked questions on 6 different privacy settings options namely: posting to SN wall, profile
lookup, friends request, messaging, navigating their wall and that of others, and sharing and/or importing
personal information into friends’ page. Each entry therein was assigned a value between ‘0’ (for nobody)
and ‘3’ (to make the item visible to everybody) to each privacy setting element. These values were then
added to create a combined value for the Facebook privacy settings.
3.2. Findings
We selected a total of four hundred and eighty (480) participants from the Federal University of
Petroleum Resources Effurun as in Table 1 and Figures 4 and 5. We observed that an overall 47% of the
participants were phished; while an approximately 53% of the participants were not phished. Of 480 students
that were sent the phishing email, about 72% (346 students) opened it. We observed actions of these
participants that just opened it and noticed that of the 72% of students, that about 80% were in arts,
humanities, and social sciences; while, about 20% are in engineering, natural and physical sciences.
Furthermore, of the 346 participants that opened it, we observed that about 47% phished participants (i.e.,
students that proceeded to further click the compromised links as provided in the emails sent to these
students) were found to be in the arts, humanities, and social sciences.
Of the 480 students that received the phishing email, approximately 72% (346 students) opened the
mail. We further observed the actions of these participants that just simply opened the mail, we noticed that
of the 72% of students who opened the email we observed that 80% of them were in the arts, humanities, and
social sciences majors; while 20% were found to be in engineering, natural and physical sciences. In
furtherance to the 346 participants that opened the email, the study observed that a majority of the 47%
phished participants (i.e., students that proceeded to further click the compromised links as provided in the
emails sent to these students) were found to be in the arts, humanities, and social sciences.
Figure 4. Demographics factor impacts on phishing susceptibility by percentage
Male Female
Under
25
25-to-30 > 30 Year-1 Year-2 Year-3
Year-4
& Above
Not Clicked 41 31.5 21.8 41.6 65.7 17.1 21.8 31.5 78.7
Clicked 59 68.5 79.2 58.4 34.3 82.9 79.2 68.5 21.3
59 68.5
79.2
58.4
34.3
82.9 79.2
68.5
21.3
41 31.5
21.8
41.6
65.7
17.1 21.8
31.5
78.7
0
20
40
60
80
100
120
COUNT
GENDER
DEMOGRAPHICS
7. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1922-1931
1928
Figure 5. The big-5 framework for phished/not phished participants
3.3. Discussion of findings
Results have shown that phishing campaigns and awareness among students on campus, hours spent
on the internet-enabled devices such as smartphones and computer systems, cyber training, academic year,
age, gender, and affiliation are all significant variables and factors that impact participants’ susceptibility.
The aggregated college affiliation on demographics data for students in science, technology, engineering, and
mathematics (STEM) with info and communication technology majors in particular were seen to have lower
phishing susceptibility rates (i.e., opened emails received as well as clicking on the compromised links). The
increasing academic year progression also saw a decrease in phished participants and click rates to open the
email. We observed that increased time on the computer and cyber-awareness correlated with lower click
rates. Contrary to our expectations, students who were unaware of phishing attacks performed better than
students who were primed and aware of phishing attacks, or students who understood what phishing attacks
agreed with [49]–[55].
4. CONCLUSION
As a conclusion, we believe that the success rate of a fake scam (phishing scheme) is richly
attributed to a combination of personal relevance (featuring as traits), emotional gaps/strength, and the fear
factor. It is thus, important to educate users on the need to provide control measures over their social media
pages so as to prevent socially-engineered attacks. As an example, Facebook has launched phish@fb.com, a
dedicated email address to support users wishing to report scam/phishing attempts so that Facebook can
investigate, blacklist, and hold phishers accountable. They also provide info equipping users of the steps to
follow (if and when phished) and/or attacked by malware. This ever-increasing magnitude and impact of
phishing have necessitated studies on minimizing attacks among students and the broader public. Also,
understanding factors that influence susceptibility will help users to protect themselves against phishing and
other forms of cybercrime. Together both the user and the social media platform are responsible for
preventing, reporting, dissolving, and remaining aware of phishing attacks. The social media platform is
responsible for educating users and providing controls to reduce phishing attacks. On the other hand, users
bear the responsibility of staying informed regarding prevention techniques and using the controls put in
place to reduce these incidents. Thus, broadly, this indicates that individuals in the real world may be more
susceptible to scams that tap into salient life circumstances and instill a sense of fear and urgency. Also,
tackling the many complex events linked to ‘cybercrime’ requires effective training and campaign among
undergraduates and the general public as well as require methods of attaining knowledge via processes that
sought to explore ways to observe victimization in a real-world setting.
REFERENCES
[1] A. A. Ojugo and A. O. Eboka, “Empirical Bayesian network to improve service delivery and performance dependability on a
campus network,” IAES International Journal of Artificial Intelligence (IJ-AI), vol. 10, no. 3, pp. 623–635, Sep. 2021, doi:
10.11591/ijai.v10.i3.pp623-635.
[2] C. Iuga, J. R. C. Nurse, and A. Erola, “Baiting the hook: factors impacting susceptibility to phishing attacks,” Human-centric
0 20 40 60 80 100
Male
Female
Male
Female
Male
Female
Male
Female
Male
Female
Neoroti
cism
Openne
ss
Extrover
sion
Agreeab
leness
Cons
centi
ousn
ess
Frequency/Count
Dimensions
5-D Dimension Framework
Not Phished Phished
8. Int J Elec & Comp Eng ISSN: 2088-8708
Assessing contributor features to phishing susceptibility amongst students of … (Rume Elizabeth Yoro)
1929
Computing and Information Sciences, vol. 6, no. 1, Dec. 2016, doi: 10.1186/s13673-016-0065-2.
[3] S. Kemp, “Digital trends 2019: every single stat you need to know about the internet,” thenextweb. 2019, Accessed: Sep. 16,
2019. [Online]. Available: https://thenextweb.com/news/digital-trends-2019-every-single-stat-you-need-to-know-about-the-
internet.
[4] S. Goel, K. Williams, and E. Dincelli, “Got phished? internet security and human vulnerability,” Journal of the Association for
Information Systems, vol. 18, no. 1, pp. 22–44, Jan. 2017, doi: 10.17705/1jais.00447.
[5] A. A. Ojugo and R. E. Yoro, “Forging a deep learning neural network intrusion detection framework to curb the distributed denial
of service attack,” International Journal of Electrical and Computer Engineering (IJECE), vol. 11, no. 2, pp. 1498–1509, Apr.
2021, doi: 10.11591/ijece.v11i2.pp1498-1509.
[6] M. Gratian, S. Bandi, M. Cukier, J. Dykstra, and A. Ginther, “Correlating human traits and cyber security behavior intentions,”
Computers and Security, vol. 73, pp. 345–358, 2018.
[7] I. Barker, “Social media phishing attacks up more than 70 percent,” betanews. 2019, [Online]. Available:
https://betanews.com/2019/05/02/social-media-phishing/.
[8] A. A. Ojugo and A. O. Eboka, “Empirical evidence of socially-engineered attack menace among undergraduate smartphone users
in selected universities in Nigeria,” International Journal of Advanced Trends in Computer Science and Engineering, vol. 10, no.
3, pp. 2103–2108, Jun. 2021, doi: 10.30534/ijatcse/2021/861032021.
[9] A. A. Ojugo and D. A. Oyemade, “Boyer Moore string-match framework for a hybrid short message service spam filtering
technique,” IAES International Journal of Artificial Intelligence (IJ-AI), vol. 10, no. 3, pp. 519–527, Sep. 2021, doi:
10.11591/ijai.v10.i3.pp519-527.
[10] A. Ojugo and A. O. Eboka, “Signature-based malware detection using approximate boyer moore string matching algorithm,”
International Journal of Mathematical Sciences and Computing, vol. 5, no. 3, pp. 49–62, Jul. 2019, doi:
10.5815/ijmsc.2019.03.05.
[11] M. Alazab and R. Broadhurst, “Spam and criminal activity,” Trends and issues in crime and criminal justice, no. 526, pp. 1–20,
2016.
[12] D. Gudkova, M. Vergelis, T. Shcherbakova, and N. Demidova, “Spam and phishing in Q3 2017,” Securelist. 2017, Accessed: Jan.
25, 2018. [Online]. Available: https://securelist.com/spam-and-phishing-in-q3-2017/82901/.
[13] D. Kahneman and A. Tversky, “Prospect theory: an analysis of decision under risk,” in Handbook of the fundamentals of financial
decision making: Part I, World Scientific, 2013, pp. 99–127.
[14] H. Kornør and H. Nordvik, “Five-factor model personality traits in opioid dependence,” BMC Psychiatry, vol. 7, no. 1, Dec. 2007,
doi: 10.1186/1471-244X-7-37.
[15] P. Kumaraguru, S. Sheng, A. Acquisti, L. F. Cranor, and J. Hong, “Teaching Johnny not to fall for phish,” ACM Transactions on
Internet Technology, vol. 10, no. 2, pp. 1–31, May 2010, doi: 10.1145/1754393.1754396.
[16] D. Modic and S. E. Lea, “How neurotic are scam victims, really? The big five and Internet scams,” The Big Five and Internet
Scams (September 10, 2012), 2012.
[17] S. E. G. Lea, P. Fischer, and K. M. Evans, “The psychology of scams: provoking and committing errors of judgement.” Office of
Fair Trading, 2009.
[18] L. De Kimpe, M. Walrave, W. Hardyns, L. Pauwels, and K. Ponnet, “You’ve got mail! Explaining individual differences in
becoming a phishing target,” Telematics and Informatics, vol. 35, no. 5, pp. 1277–1287, Aug. 2018, doi:
10.1016/j.tele.2018.02.009.
[19] J. A. Chaudhry, S. A. Chaudhry, and R. G. Rittenhouse, “Phishing attacks and defenses,” International Journal of Security and Its
Applications, vol. 10, no. 1, pp. 247–256, Jan. 2016, doi: 10.14257/ijsia.2016.10.1.23.
[20] D. Harley and A. Lee, “Phish phodder: is user education helping or hindering?,” in Virus Bulletin Conference Proceedings, 2007,
pp. 1–7.
[21] W. Rocha Flores, H. Holm, M. Nohlberg, and M. Ekstedt, “Investigating personal determinants of phishing and the effect of
national culture,” Information and Computer Security, vol. 23, no. 2, pp. 178–199, Jun. 2015, doi: 10.1108/ICS-05-2014-0029.
[22] E. D. Frauenstein and S. V Flowerday, “Social network phishing: becoming habituated to clicks and ignorant to threats?,” in 2016
Information Security for South Africa (ISSA), Aug. 2016, pp. 98–105, doi: 10.1109/ISSA.2016.7802935.
[23] A. Vishwanath, “Habitual Facebook use and its impact on getting deceived on social media,” Journal of Computer-Mediated
Communication, vol. 20, no. 1, pp. 83–98, Jan. 2015, doi: 10.1111/jcc4.12100.
[24] A. Vishwanath, B. Harrison, and Y. J. Ng, “Suspicion, cognition, and automaticity model of phishing susceptibility,”
Communication Research, vol. 45, no. 8, pp. 1146–1166, Dec. 2018, doi: 10.1177/0093650215627483.
[25] S. Sheng, M. Holbrook, P. Kumaraguru, L. F. Cranor, and J. Downs, “Who falls for phish? A demographic analysis of phishing
susceptibility and effectiveness of interventions,” in Proceedings of the SIGCHI conference on human factors in computing
systems, 2010, pp. 373–382.
[26] J. Wang, R. Chen, T. Herath, and H. R. Rao, “An empirical exploration of the design pattern of phishing attacks,” Annals of
emerging research in information assurance, security and privacy services. Bingley, England: Emerald Publishers, 2009.
[27] E. O. Yeboah-Boateng and P. M. Amanor, “Phishing, SMiShing and vishing: an assessment of threats against mobile devices,”
Journal of Emerging Trends in Computing and Information Sciences, vol. 5, no. 4, pp. 297–307, 2014.
[28] A. A. Ojugo, C. O. Obruche, and A. O. Eboka, “Quest for convergence solution using hybrid genetic algorithm trained neural
network model for metamorphic malware detection,” ARRUS Journal of Engineering and Technology, vol. 2, no. 1, pp. 12–23,
Nov. 2021, doi: 10.35877/jetech613.
[29] P. Chanvarasuth, “Knowledge on phishing and vishing: an empirical study on Thai students,” International Journal of Humanities
and Applied Sciences, vol. 2, no. 3, pp. 58–62, 2013.
[30] A. Adimabua Ojugo and R. Elizabeth Yoro, “Extending the three-tier constructivist learning model for alternative delivery: ahead
the COVID-19 pandemic in Nigeria,” Indonesian Journal of Electrical Engineering and Computer Science (IJEECS), vol. 21, no.
3, pp. 1673–1682, Mar. 2021, doi: 10.11591/ijeecs.v21.i3.pp1673-1682.
[31] J. Wang, T. Herath, R. Chen, A. Vishwanath, and H. R. Rao, “Research article phishing susceptibility: An investigation into the
processing of a targeted spear phishing email,” IEEE transactions on professional communication, vol. 55, no. 4, pp. 345–362,
2012.
[32] A. Abbasi, F. M. Zahedi, and Y. Chen, “Phishing susceptibility: the good, the bad, and the ugly,” in 2016 IEEE Conference on
Intelligence and Security Informatics (ISI), Sep. 2016, pp. 169–174, doi: 10.1109/ISI.2016.7745462.
[33] F. Enos, S. Benus, R. L. Cautin, M. Graciarena, J. Hirschberg, and E. Shriberg, “Personality factors in human deception detection:
comparing human to machine performance,” Sep. 2006, doi: 10.21437/Interspeech.2006-278.
[34] K. Parsons, A. McCormac, M. Pattinson, M. Butavicius, and C. Jerram, “The design of phishing studies: Challenges for
researchers,” Computers and Security, vol. 52, pp. 194–206, Jul. 2015, doi: 10.1016/j.cose.2015.02.008.
9. ISSN: 2088-8708
Int J Elec & Comp Eng, Vol. 13, No. 2, April 2023: 1922-1931
1930
[35] C. B. Mayhorn, A. K. Welk, O. A. Zielinska, and E. Murphy-Hill, “Assessing individual differences in a phishing detection task,”
2015.
[36] J. C.-Y. Sun, S.-J. Yu, S. S. J. Lin, and S.-S. Tseng, “The mediating effect of anti-phishing self-efficacy between college students’
internet self-efficacy and anti-phishing behavior and gender difference,” Computers in Human Behavior, vol. 59, pp. 249–257,
Jun. 2016, doi: 10.1016/j.chb.2016.02.004.
[37] R. R. McCrae and O. P. John, “An introduction to the five-factor model and its applications,” Journal of Personality, vol. 60, no.
2, pp. 175–215, Jun. 1992, doi: 10.1111/j.1467-6494.1992.tb00970.x.
[38] T. Halevi, J. Lewis, and N. Memon, “A pilot study of cyber security and privacy related behavior and personality traits,” in
Proceedings of the 22nd International Conference on World Wide Web, May 2013, pp. 737–744, doi: 10.1145/2487788.2488034.
[39] A. A. Algarni, Y. Xu, and T. Chan, “Susceptibility to social engineering in social networking sites: The case of Facebook,” 2015.
[40] M. N. Banu and S. M. Banu, “A comprehensive study of phishing attacks,” International Journal of Computer Science and
Information Technologies, vol. 4, no. 6, pp. 768–783, 2013.
[41] D. Brecht, “Phishing attacks targeting young adults,” Infosec. 2017, Accessed: Mar. 10, 2020. [Online]. Available:
https://resources.infosecinstitute.com/topic/phishing-attacks-targeting-young-adults/#gref.
[42] A. A. Ojugo and A. O. Eboka, “Mitigating technical challenges via redesigning campus network for greater efficiency, scalability
and robustness: a logical view,” International Journal of Modern Education and Computer Science, vol. 12, no. 6, pp. 29–45,
Dec. 2020, doi: 10.5815/ijmecs.2020.06.03.
[43] D. Irani, S. Webb, J. Giffin, and C. Pu, “Evolutionary study of phishing,” in 2008 eCrime Researchers Summit, Oct. 2008, pp. 1–
10, doi: 10.1109/ECRIME.2008.4696967.
[44] S. M. Albladi and G. R. S. Weir, “User characteristics that influence judgment of social engineering attacks in social networks,”
Human-centric Computing and Information Sciences, vol. 8, no. 1, Dec. 2018, doi: 10.1186/s13673-018-0128-7.
[45] R. Manning, “Phishing activity trends report: 2nd Quarter/2010,” APWG, 2010.
[46] X. Lin, P. R. Spence, and K. A. Lachlan, “Social media and credibility indicators: The effect of influence cues,” Computers in
Human Behavior, vol. 63, pp. 264–271, Oct. 2016, doi: 10.1016/j.chb.2016.05.002.
[47] D. Liu and W. K. Campbell, “The Big Five personality traits, Big Two metatraits and social media: A meta-analysis,” Journal of
Research in Personality, vol. 70, pp. 229–240, Oct. 2017, doi: 10.1016/j.jrp.2017.08.004.
[48] Y. Zhang, S. Egelman, L. Cranor, and J. Hong, “Phinding phish: evaluating anti-phishing tools,” Carnegie Mellon University,
2007.
[49] A. A. Ojugo and E. Ekurume, “Deep learning network anomaly-based intrusion detection ensemble for predictive intelligence to
curb malicious connections: an empirical evidence,” International Journal of Advanced Trends in Computer Science and
Engineering, vol. 10, no. 3, pp. 2090–2102, Jun. 2021, doi: 10.30534/ijatcse/2021/851032021.
[50] A. A. Ojugo and A. O. Eboka, “Memetic algorithm for short messaging service spam filter using text normalization and semantic
approach,” International Journal of Informatics and Communication Technology (IJ-ICT), vol. 9, no. 1, Apr. 2020, doi:
10.11591/ijict.v9i1.pp9-18.
[51] R. Broadhurst, K. Skinner, N. Sifniotis, and B. Matamoros-Macias, “Cybercrime risks in a University Student Community,” SSRN
Electronic Journal, 2018, doi: 10.2139/ssrn.3176319.
[52] V. V Busato, F. J. Prins, J. J. Elshout, and C. Hamaker, “The relation between learning styles, the big five personality traits and
achievement motivation in higher education,” Personality and Individual Differences, vol. 26, no. 1, pp. 129–140, Jan. 1998, doi:
10.1016/S0191-8869(98)00112-3.
[53] S. Rothmann and E. P. Coetzer, “The big five personality dimensions and job performance,” SA Journal of Industrial Psychology,
vol. 29, no. 1, Oct. 2003, doi: 10.4102/sajip.v29i1.88.
[54] A. A. Ojugo and O. Otakore, “Mitigating social engineering menace in Nigerian Universities,” Journal of Computer Sciences and
Applications, vol. 6, no. 2, pp. 64–68, Aug. 2018, doi: 10.12691/jcsa-6-2-2.
[55] “What can I do about malicious software on Facebook?,” Facebook. 2020, Accessed: Mar. 11, 2020. [Online]. Available:
https://www.facebook.com/help/389666567759871.
BIOGRAPHIES OF AUTHORS
Rume Elizabeth Yoro received B.Sc in Computer Science from the University of
Benin Edo State in 2000, M.Sc in Computer Science from both Benson Idahosa University and
the University of Benin respectively in 2009 and 2013. She currently a Senior Lecturer with
the Department of Cyber Security, Faculty of Information Technology at the Dennis Osadebey
University Asaba. Her research interests include: Network Management, Cyber Security and
Machine Learning. She is a member of: Computer Professionals of Nigeria, Nigerian
Computer Society, Computer Forensics Institute of Nigeria and Nigeria Women in Information
Technolgy the International Association of Engineers. She is married to Fred Yoro with five
children. She can be contacted at email: rumerisky5@gmail.com.
Fidelis Obukohwo Aghware received his B.Sc in Computer Science from The
University of Benin, Benin City in 1998; M.Sc in Computer Science in 2005 from the Nnamdi
Azikiwe University Awka, and received his Ph.D. Computer Science in 2015 from The Ebonyi
State University, Abakiliki. He is a Senior Lecturer with the Department of Computer Science,
Uniiversity of Delta, Agbor in Delta State of Nigeria. His research interest are in Cyber
Security, Data Science and Information Technology. He is a member of Nigerian Computer
Society of Nigeria and the Council for Registration of Computer Professionals of Nigeria, and
the International Association of Engineers. He can be contacted at: email:
fidelis.aghware@unidel.edu.ng.
10. Int J Elec & Comp Eng ISSN: 2088-8708
Assessing contributor features to phishing susceptibility amongst students of … (Rume Elizabeth Yoro)
1931
Bridget Ogheneovo Malasowe received her B.Sc in Computer Science from The
University of Benin, Benin City in 1998. She obtained her M.Sc and Ph.D. in 2012 and 2017
respectively both in Computer Science from The Babcock University, Ilisan Remo in Ogun
State. She is currently, a Senior Lecturer with the Department of Computer Science,
Uniiversity of Delta, Agbor in Delta State of Nigeria. Her research interest are in Green
Information Technology, Data Science with Machine Learning Approaches, Cyber Security,
and Bioinformatics. She is a member of Nigerian Computer Society of Nigeria and Computer
Professionals of Nigeria. She can be contacted at email: bridget.malasowe@unidel.edu.ng.
Obinna Nwankwo received his B.Sc in Computer Science from The Cross River
University of Technology Calabar (CRUTECH) in Cross River State in 2008, M.Sc also in
Computer Science from The University of Lagos, Akoka in 2011 and currently, undergoing his
Doctoral Studies at the University of Benin. He currently lectures with the Department of
Computer Science at the Novena University Ogume, Delta State. His research interests:
Software Engineering, Artificial Intelligence, Genetic Algorithms and Machine Learning. He
is a member of: The Nigerian Computer Society. He is married to Jennifer Nwankwo, and they
both have two daughters. He can be contacted at email: tuk2obinna@gmail.com.
Arnold Adimabua Ojugo received his B.Sc, M.Sc and Ph.D. in Computer
Science from Imo State University Owerri, Nnamdi Azikiwe University Awka, and Ebonyi
State University Abakiliki in 2000, 2005 and 2013 respectively. He is a Professor with the
Department of Computer Science at Federal University of Petroleum Resources Effurun with
research interest(s) in: Intelligent Systems, Data Science, Cyber Security, and Graph
Applications. He has a great many scholarly publications and with footprints of Author IDs.
He is a member of various Editorial Boards and Reviewer (to include and not limited to): The
International Journal of Modern Education in Computer Science IJMECS, Frontiers In Big
Data, and Progress for Intelligent Computation and Application, and many others. He is a
member of the Nigerian Computer Society, Council Registration of Computer Professionals of
Nigeria, and International Association of Engineers. He can be contacted at email:
ojugo.arnold@fupre.edu.ng.