Ashraf et al., 2023 - Google Patents
" Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in PakistanAshraf et al., 2023
View PDF- Document ID
- 13277214672752641131
- Author
- Ashraf A
- König C
- Javed M
- Mustafa M
- et al.
- Publication year
- Publication venue
- Nineteenth Symposium on Usable Privacy and Security (SOUPS 2023)
External Links
Snippet
We explore the experiences, understandings, and perceptions of cyber-threats and crimes amongst young adults in Pakistan, focusing on their mechanisms for protecting themselves, for reporting cyber threats and for managing their digital identities. Relying on data from a …
- 230000007246 mechanism 0 abstract description 20
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Nurse | Cybercrime and you: How criminals attack and the human factors that they seek to exploit | |
Goel et al. | Got phished? Internet security and human vulnerability | |
Hutchings et al. | Exploring the provision of online booter services | |
Graham et al. | Capable guardians in the digital environment: The role of digital literacy in reducing phishing victimization | |
Holt et al. | Examining the applicability of lifestyle-routine activities theory for cybercrime victimization | |
Chen et al. | Exploring internet security perceptions and practices in urban ghana | |
Ashraf et al. | " Stalking is immoral but not illegal": Understanding Security, Cyber Crimes and Threats in Pakistan | |
Ray et al. | “Warn them” or “just block them”?: investigating privacy concerns among older and working age adults | |
Marcum et al. | Social networking as a criminal enterprise | |
Marangione | Millennials: Truthtellers or threats? | |
Nyasvisvo et al. | Phishing attacks: a security challenge for university students studying remotely | |
Al-Daraiseh et al. | Social networks’ benefits, privacy, and identity theft: KSA case study | |
Herrera et al. | Bridging the Protection Gap: Innovative Approaches to Shield Older Adults from AI-Enhanced Scams | |
Jansen | Do you bend or break?: Preventing online banking fraud victimization through online resilience | |
ISER et al. | Role of awareness to prevent personal disasters: reducing the risks of falling for phishing by strengthening user awareness | |
Fink | In defense of snooping employers | |
Frauenstein | An investigation into students responses to various phishing emails and other phishing-related behaviours | |
Norden | How the internet has changed the face of crime | |
Boothroyd | Older Adults' Perceptions of Online Risk | |
Chitare et al. | “It may take ages”: Understanding Human-Centred Lateral Phishing Attack Detection in Organisations | |
Steinmetz et al. | Social engineering | |
Ozkaya | Cyber Security Challenges in Social Media | |
Maseko | Remedies to reduce user susceptibility to phishing attacks | |
Tasnim et al. | Determining cybersecurity awareness and human-cyber behaviour in Bangladeshi women: Addressing factors, risks and overcoming knowledge disparities | |
Mokhtar et al. | A preliminary investigation on user factors of phishing E-mail |