Nurse, 2015 - Google Patents
Exploring the risks to identity security and privacy in cyberspaceNurse, 2015
View PDF- Document ID
- 9025455616513169264
- Author
- Nurse J
- Publication year
- Publication venue
- XRDS: Crossroads, The ACM Magazine for Students
External Links
Snippet
Exploring the Risks to Identity Security and Privacy in Cyberspace Page 1 XRDS • SPRING
2015 • VOL.21 • NO.3 42 feature Im a g eb y M a x U s e r / S h u tte rs to c k .c o m Exploring
the Risks to Identity Security and Privacy in Cyberspace Cyberspace, a world of great promise …
- 244000062645 predators 0 abstract description 3
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Krombholz et al. | Social engineering attacks on the knowledge worker | |
Zeebaree et al. | Social media networks security threats, risks and recommendation: A case study in the kurdistan region | |
Bhardwaj et al. | Why is phishing still successful? | |
Krombholz et al. | Advanced social engineering attacks | |
Fire et al. | Online social networks: threats and solutions | |
Kumar et al. | Social networking sites and their security issues | |
Gharibi et al. | Cyber threats in social networking websites | |
Joe et al. | A survey of various security issues in online social networks | |
Hu | Taxonomy of the snowden disclosures | |
Williams et al. | Social networking privacy behaviors and risks | |
Praveena et al. | Prevention of inference attacks for private information in social networking sites | |
Umair et al. | Online social network information forensics: A survey on use of various tools and determining how cautious facebook users are? | |
Nurse | Exploring the risks to identity security and privacy in cyberspace | |
Nurse et al. | Investigating the leakage of sensitive personal and organisational information in email headers | |
Romansky | Internet of Things and user privacy protection | |
Salama et al. | Computational social networks: security and privacy | |
Agarwal et al. | Security and Privacy in Social Network | |
Popescul et al. | Social networks security in universities: Challenges and solutions | |
Malagi et al. | A survey on security issues and concerns to social networks | |
Chieng et al. | Multi-Facet Trust Model for Online Social Network Environment | |
Sharevski et al. | Manipulation of perceived politeness in a web-based email discourse through a malicious browser extension | |
Sattikar et al. | A review of security and privacy issues in social networking | |
Hudaib | Comprehensive social media security analysis & xkeyscore espionage technology | |
Ahmadzadegan et al. | Security-Centric Investigation of Social Networks and Preventative Behavioral Analysis of Online Activity by the Kuleshov effect | |
Revathi et al. | An intelligent and novel algorithm for securing vulnerable users of online social network |