To see the other types of publications on this topic, follow the link: Phishing attack.

Dissertations / Theses on the topic 'Phishing attack'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 38 dissertations / theses for your research on the topic 'Phishing attack.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Bian, Kaigui. "New Approaches for Ensuring User Online Privacy." Thesis, Virginia Tech, 2007. http://hdl.handle.net/10919/35972.

Full text
Abstract:
With the increase of requesting personal information online, unauthorized disclosure of user privacy is a significant problem faced by todayâ s Internet. As a typical identity theft, phishing usually employs fraudulent emails and spoofed web sites to trick unsuspecting users into divulging their private information. Even legitimate web sites may collect private information from unsophisticated users such as children for commercial purposes without their parentsâ consent. The Childrenâ s Online Privacy Protection Act (COPPA) of 1998 was enacted in reaction to the widespread collection of in
APA, Harvard, Vancouver, ISO, and other styles
2

Loreti, Ludovico. "Pass The Hash attack. Panoramica, sperimentazione ed analisi." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2018. http://amslaurea.unibo.it/17297/.

Full text
Abstract:
La tesi è incentrata sul noto attacco informatico Pass The Hash e sul suo sviluppo all'interno di un sistema Microsoft Active Directory. Viene descritta una panoramica dell'attacco accennando la sua storia ed evoluzione fino ad oggi, alcuni dei tanti attacchi informatici ad esso propedeutici ed un background tecnico in cui vengono spiegate le sue componenti principali: il tool che viene utilizzato oggigiorno per sperimentare questa tecnica (Mimikatz), le funzioni di hash, i sistemi Single Sign-On, la suddivisione in domini, alberi e foreste di Active Directory. In seguito viene mostrato l'amb
APA, Harvard, Vancouver, ISO, and other styles
3

Ahmed, Olfet, and Nawar Saman. "Utvärdering av nätverkssäkerheten på J Bil AB." Thesis, KTH, Data- och elektroteknik, 2013. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-123403.

Full text
Abstract:
Detta examensarbete är en utvärdering av nätverkssäkerheten hos J BiL AB, både på social och teknisk nivå. Företaget är beroende av säkra Internet-anslutningar för att nå externa tjänster och interna servrar lokaliserade på olika geografiska platser. Företaget har ingen IT-ansvarig som aktivt underhåller och övervakar nätverket, utan konsulterar ett externt dataföretag. Syftet med examensarbetet är att utvärdera säkerheten, upptäcka brister, ge förbättringsförslag och till viss del implementera lösningar. För att undersöka säkerheten har observationer och intervjuer med personalen gjorts och e
APA, Harvard, Vancouver, ISO, and other styles
4

Dong, Xun. "Defending against phishing attacks." Thesis, University of York, 2009. http://etheses.whiterose.ac.uk/2215/.

Full text
Abstract:
Valuable information, such as user authentication credentials and personal sensitive information, can be obtained by exploiting vulnerabilities within the user’s understanding of a system, and particularly a lack of understanding of the user interface. As the barrier to exploiting system vulnerabilities has increased significantly with time, attacking users has rapidly become a more efficient and effective alternative. To protect users from phishing attacks system designers and security professionals need to understand how users interact with those attacks. In this thesis I present an improved u
APA, Harvard, Vancouver, ISO, and other styles
5

Persson, Anders. "Exploring Phishing Attacks and Countermeasures." Thesis, Blekinge Tekniska Högskola, Avdelningen för för interaktion och systemdesign, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-3620.

Full text
Abstract:
Online banking and e-commerce applications have good protection against attacks directed direct towards their computer systems. This, the attacker has considered and instead use “social engineering” attacks, such as phishing to gain access to the information inside [1] [15] [21]. Phishing is a growing problem that many different companies are trying to develop a working protection against. The number of new phishing-sites per month increased by 1363 % between January 2005 and October 2006, from 2560 to 37 444 attacks [3] [2]. Today there are several different antiphishing applications as well
APA, Harvard, Vancouver, ISO, and other styles
6

Nordgren, Daniella. "Phishing attacks targeting hospitals : A study over phishing knowledge at Blekingesjukhuset." Thesis, Blekinge Tekniska Högskola, Institutionen för datalogi och datorsystemteknik, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-16681.

Full text
Abstract:
Context. Phishing emails is a type of computer attack targeting users and tries to trick them into giving out personal information, follow shady links or download malicious attachments. Phishing is often closely linked to ransomware, which is a type of attack that locks a users computer and asks for a ransom in order to give access back. Ransomware viruses often contaminate a computer through a phishing email. Hospitals are a growing target for these types of attacks because of their need of being able to access their system at all times. Objectives. This study intends to research the phishing
APA, Harvard, Vancouver, ISO, and other styles
7

Henshaw, James Presley. "Phishing Warden : enhancing content-triggered trust negotiation to prevent phishing attacks /." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd840.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Le, Page Sophie. "Understanding the Phishing Ecosystem." Thesis, Université d'Ottawa / University of Ottawa, 2019. http://hdl.handle.net/10393/39385.

Full text
Abstract:
In “phishing attacks”, phishing websites mimic trustworthy websites in order to steal sensitive information from end-users. Despite research by both academia and the industry focusing on development of anti-phishing detection techniques, phishing has increasingly become an online threat. Our inability to slow down phishing attacks shows that we need to go beyond detection and focus more on understanding the phishing ecosystem. In this thesis, we contribute in three ways to understand the phishing ecosystem and to offer insight for future anti-phishing efforts. First, we provide a new and co
APA, Harvard, Vancouver, ISO, and other styles
9

Floderus, Sebastian, and Linus Rosenholm. "An educational experiment in discovering spear phishing attacks." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18446.

Full text
Abstract:
Background: Spear phishing attacks uses social engineering targeting a specific person to steal credential information or infect the users computer with malware. It is often done through emails and it can be very hard to spot the difference between a legitimate email and a scam email. Cybercrime is a growing problem and there is many ways to inform and educate individuals on the subject.Objectives: This study intends to perform an experiment to see if an educationalsupport tool can be used to better identify phishing emails. Furthermore see if there is a difference in susceptibility between st
APA, Harvard, Vancouver, ISO, and other styles
10

Kuo, Chuan-Chi. "Multi-layered regulation of phishing attacks : a Taiwan case study." Thesis, University of Warwick, 2014. http://wrap.warwick.ac.uk/67171/.

Full text
Abstract:
This research examines the regulation of phishing in Taiwan, particularly focusing on legal regulation but within a context of a multi-dimensional regulatory framework which also necessarily includes an examination of international regulation and the interaction between international and Taiwan regulatory interfaces given the transnational nature of phishing. Phishing is a malicious cyber activity which targets the acquisition of various types of confidential information by deception through the use of spoofed emails and/or websites. The increasing threat of phishing to information security ha
APA, Harvard, Vancouver, ISO, and other styles
11

Shargawi, Ayman. "Understanding the human behavioural factors behind online learners' susceptibility to phishing attacks." Thesis, Lancaster University, 2017. http://eprints.lancs.ac.uk/126296/.

Full text
Abstract:
Phishing is an act of fraudulence to lure victims to respond to an illegitimate request for the sake of a financial or informational gain (Huang, Qian, and Wang, 2012). Phishing can jeopardize the security of online learning (e-Learning) systems. Phishing cannot be prevented by depending on technical controls alone (Proctor, Schultz and Vu, 2009). Effective Information Security Awareness is key to protecting against Phishing (Chen, Shaw and Yang, 2006). However, most information security awareness programs overlook human behavioural factors as a root cause of exploitation in Phishing (Proctor
APA, Harvard, Vancouver, ISO, and other styles
12

McRae, Craig Michael. "Using Web bugs and honeytokens to investigate the source of phishing attacks." Master's thesis, Mississippi State : Mississippi State University, 2008. http://library.msstate.edu/etd/show.asp?etd=etd-04012008-220800.

Full text
APA, Harvard, Vancouver, ISO, and other styles
13

Trevino, Alberto. "Improving Filtering of Email Phishing Attacks by Using Three-Way Text Classifiers." BYU ScholarsArchive, 2012. https://scholarsarchive.byu.edu/etd/3103.

Full text
Abstract:
The Internet has been plagued with endless spam for over 15 years. However, in the last five years spam has morphed from an annoying advertising tool to a social engineering attack vector. Much of today's unwanted email tries to deceive users into replying with passwords, bank account information, or to visit malicious sites which steal login credentials and spread malware. These email-based attacks are known as phishing attacks. Much has been published about these attacks which try to appear real not only to users and subsequently, spam filters. Several sources indicate traditional content fi
APA, Harvard, Vancouver, ISO, and other styles
14

Utakrit, Nattakant. "Security awareness by online banking users in Western Australian of phishing attacks." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2012. https://ro.ecu.edu.au/theses/503.

Full text
Abstract:
Phishing involves sending e-mails pretending to be from the legitimate financial institutions to recipients and asking for personal information such as username and password. It also redirects network traffic to malicious sites, deny network traffic to web services, and modify protection mechanisms in the targeted computer systems. Consequences of successful attacks can include identity and financial losses, and unauthorised information disclosure. The purpose of this study was to investigate the experiences of Western Australian bank users in using online banking. The study considered the rel
APA, Harvard, Vancouver, ISO, and other styles
15

Palla, Srikanth. "A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails." Thesis, University of North Texas, 2006. https://digital.library.unt.edu/ark:/67531/metadc5402/.

Full text
Abstract:
The classifier discussed in this thesis considers the path traversed by an email (instead of its content) and reputation of the relays, features inaccessible to spammers. Groups of spammers and individual behaviors of a spammer in a given domain were analyzed to yield association patterns, which were then used to identify similar spammers. Unsolicited and phishing emails were successfully isolated from legitimate emails, using analysis results. Spammers and phishers are also categorized into serial spammers/phishers, recent spammers/phishers, prospective spammers/phishers, and suspects. Legiti
APA, Harvard, Vancouver, ISO, and other styles
16

Raqab, Alah. "GAINING MONITORING CAPABILITIES AND INSIGHTS INTO RESPONSES FROM PHISHING DATA." The Ohio State University, 2014. http://rave.ohiolink.edu/etdc/view?acc_num=osu1397504041.

Full text
APA, Harvard, Vancouver, ISO, and other styles
17

Jan, Steve T. K. "Robustifying Machine Learning based Security Applications." Diss., Virginia Tech, 2020. http://hdl.handle.net/10919/99862.

Full text
Abstract:
In recent years, machine learning (ML) has been explored and employed in many fields. However, there are growing concerns about the robustness of machine learning models. These concerns are further amplified in security-critical applications — attackers can manipulate the inputs (i.e., adversarial examples) to cause machine learning models to make a mistake, and it's very challenging to obtain a large amount of attackers' data. These make applying machine learning in security-critical applications difficult. In this dissertation, we present several approaches to robustifying three machine lea
APA, Harvard, Vancouver, ISO, and other styles
18

Maurer, Max-Emanuel [Verfasser], and Heinrich [Akademischer Betreuer] Hußmann. "Counteracting phishing through HCI : detecting attacks and warning users / Max-Emanuel Maurer. Betreuer: Heinrich Hußmann." München : Universitätsbibliothek der Ludwig-Maximilians-Universität, 2014. http://d-nb.info/1051777089/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Lala, Darshan Magan. "An investigation into the prevalence and growth of phishing attacks against South African financial targets." Thesis, Rhodes University, 2016. http://hdl.handle.net/10962/3157.

Full text
Abstract:
Phishing in the electronic communications medium is the act of sending unsolicited email messages with the intention of masquerading as a reputed business. The objective is to deceive the recipient into divulging personal and sensitive information such as bank account details, credit card numbers and passwords. Attacks against financial services are the most common types of targets for scammers. Phishing attacks in South Africa have cost businesses and consumers substantial amounts of financial loss. This research investigated existing literature to understand the basic concepts of email, phis
APA, Harvard, Vancouver, ISO, and other styles
20

Peng, Peng. "A Measurement Approach to Understanding the Data Flow of Phishing From Attacker and Defender Perspectives." Thesis, Virginia Tech, 2020. http://hdl.handle.net/10919/96401.

Full text
Abstract:
Phishing has been a big concern due to its active roles in recent data breaches and state- sponsored attacks. While existing works have extensively analyzed phishing websites and detection methods, there is still a limited understanding of the data flow of the phishing process. In this thesis, we perform an empirical measurement to draw a clear picture of the data flow of phishing from both attacker and defender perspectives. First, from attackers' perspective, we want to know how attackers collect the sensitive information stolen from victims throughout the end-to-end phishing attack process.
APA, Harvard, Vancouver, ISO, and other styles
21

Cerovic, Lazar. "Identifying Resilience Against Social Engineering Attacks." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-280131.

Full text
Abstract:
Social engineering (SE) attacks are one of the most common cyber attacks and frauds, which causes a large economical destruction to individuals, companies and governments alike. The attacks are hard to protect from, since SE-attacks is based on exploiting human weaknesses. The goal of this study is to identify indicators of resilience against SE-attacks from individual computer space data, such as network settings, social media profiles, web browsing behaviour and more. This study is based on qualitative methods to collect information, analyse and evaluate data. Resilience is evaluated with mo
APA, Harvard, Vancouver, ISO, and other styles
22

Carlander-Reuterfelt, Gallo Matias. "Estimating human resilience to social engineering attacks through computer configuration data : A literature study on the state of social engineering vulnerabilities." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277921.

Full text
Abstract:
Social engineering as a method of attack is increasingly becoming a problem for both corporations and individuals. From identity theft to enormous financial losses, this form of attack is notorious for affecting complex structures, yet often being very simple in its form. Whereas for other forms of cyber- attack, tools like antivirus and antimalware are now industry standard, have proven to be reliable ways to keep safe private and confidential data, there is no such equivalent for social engineering attacks. There is not, as of this day, a trustworthy and precise way of estimating resilience
APA, Harvard, Vancouver, ISO, and other styles
23

Salem, Omran S. A. "An Integrated Intelligent Approach to Enhance the Security Control of IT Systems. A Proactive Approach to Security Control Using Artificial Fuzzy Logic to Strengthen the Authentication Process and Reduce the Risk of Phishing." Thesis, University of Bradford, 2012. http://hdl.handle.net/10454/14863.

Full text
Abstract:
Hacking information systems is continuously on the increase. Social engineering attacks is performed by manipulating the weakest link in the security chain; people. Consequently, this type of attack has gained a higher rate of success than a technical attack. Based in Expert Systems, this study proposes a proactive and integrated Intelligent Social Engineering Security Model to mitigate the human risk and reduce the impact of social engineering attacks. Many computer users do not have enough security knowledge to be able to select a strong password for their authentication. The author has atte
APA, Harvard, Vancouver, ISO, and other styles
24

Rocha, Flores Waldo. "Shaping information security behaviors related to social engineering attacks." Doctoral thesis, KTH, Elkraftteknik, 2016. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-186113.

Full text
Abstract:
Today, few companies would manage to continuously stay competitive without the proper utilization of information technology (IT). This has increased companies’ dependency of IT and created new threats that need to be addressed to mitigate risks to daily business operations. A large extent of these IT-related threats includes hackers attempting to gain unauthorized access to internal computer networks by exploiting vulnerabilities in the behaviors of employees. A common way to exploit human vulnerabilities is to deceive and manipulate employees through the use of social engineering. Although re
APA, Harvard, Vancouver, ISO, and other styles
25

Tout, Hicham Refaat. "Measuring the Impact of email Headers on the Predictive Accuracy of Machine Learning Techniques." NSUWorks, 2013. http://nsuworks.nova.edu/gscis_etd/325.

Full text
Abstract:
The majority of documented phishing attacks have been carried by email, yet few studies have measured the impact of email headers on the predictive accuracy of machine learning techniques in detecting email phishing attacks. Research has shown that the inclusion of a limited subset of email headers as features in training machine learning algorithms to detect phishing attack did increase the predictive accuracy of these learning algorithms. The same research also recommended further investigation of the impact of including an expanded set of email headers on the predictive accuracy of machine
APA, Harvard, Vancouver, ISO, and other styles
26

Likarish, Peter F. "Early detection of malicious web content with applied machine learning." Diss., University of Iowa, 2011. https://ir.uiowa.edu/etd/4871.

Full text
Abstract:
This thesis explores the use of applied machine learning techniques to augment traditional methods of identifying and preventing web-based attacks. Several factors complicate the identification of web-based attacks. The first is the scale of the web. The amount of data on the web and the heterogeneous nature of this data complicate efforts to distinguish between benign sites and attack sites. Second, an attacker may duplicate their attack at multiple, unexpected locations (multiple URLs spread across different domains) wit
APA, Harvard, Vancouver, ISO, and other styles
27

Leithead, Travis S. "Challenging Policies That Do Not Play Fair: A Credential Relevancy Framework Using Trust Negotiation Ontologies." Diss., CLICK HERE for online access, 2005. http://contentdm.lib.byu.edu/ETD/image/etd1007.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Stalmans, Etienne Raymond. "DNS traffic based classifiers for the automatic classification of botnet domains." Thesis, Rhodes University, 2014. http://hdl.handle.net/10962/d1007739.

Full text
Abstract:
Networks of maliciously compromised computers, known as botnets, consisting of thousands of hosts have emerged as a serious threat to Internet security in recent years. These compromised systems, under the control of an operator are used to steal data, distribute malware and spam, launch phishing attacks and in Distributed Denial-of-Service (DDoS) attacks. The operators of these botnets use Command and Control (C2) servers to communicate with the members of the botnet and send commands. The communications channels between the C2 nodes and endpoints have employed numerous detection avoidance me
APA, Harvard, Vancouver, ISO, and other styles
29

Chen, Yu-Hung, and 陳昱宏. "Intelligent Hybrid Learning Architecture for Cyber-Phishing Attack." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/6w29rj.

Full text
Abstract:
碩士<br>國立臺灣科技大學<br>電機工程系<br>106<br>People have become increasingly dependent on information technology since the emergence of the Internet. Consequently, hackers engage in financial crimes and computer attacks through the Internet. Nowadays, cyber-attacks may involve Trojans, botnets, social engineering, spam, and other means. Phishing websites normally have short lifetime, and involve a more complex form of attack. They have therefore attracted increasing attention in the area of information security. The prevention of phishing has various elements. In recent years, related research has focuse
APA, Harvard, Vancouver, ISO, and other styles
30

Wang, Wei-Ching, and 王崴擎. "WebView Phishing based on Android InputConnection: Attack and Countermeasure." Thesis, 2018. http://ndltd.ncl.edu.tw/handle/h3p7at.

Full text
APA, Harvard, Vancouver, ISO, and other styles
31

徐宇松. "A Client-side Oriented Whitelist Policy Against Cross-site Scripting Attack and Phishing Attack." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/53757864958987393859.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Дикунський, Назар Григорович, та Nazar Hryhorovych Dykunskyi. "Розробка програмного забезпечення для виявлення фішингових вебсайтів". Bachelor's thesis, 2021. http://elartu.tntu.edu.ua/handle/lib/35533.

Full text
Abstract:
Кваліфікаційна робота присвячена розробці програмного забезпечення для виявлення фішингових вебсайтів та дослідженню впливу параметрів класифікаційної моделі на її точність. В роботі проведений порівняльний аналіз існуючих класифікаторів для виявлення підроблених сайтів та обрано для дослідження метод опорних векторів. Розроблено програмне забезпечення, в якому імплементовано класифікацію веб-сайтів з метою виявлення фішингових сайтів з допомогою відкритих даних. В роботі також проведено дослідження точності моделі опорних векторів в залежності від налаштувань і параметрів. Встановлено, що зм
APA, Harvard, Vancouver, ISO, and other styles
33

Lu, Zebin. "SECURE WEB APPLICATIONS AGAINST OFF-LINE PASSWORD GUESSING ATTACK: A TWO WAY PASSWORD PROTOCOL WITH CHALLENGE RESPONSE USING ARBITRARY IMAGES." 2013. http://hdl.handle.net/1805/3425.

Full text
Abstract:
Indiana University-Purdue University Indianapolis (IUPUI)<br>The web applications are now being used in many security oriented areas, including online shopping, e-commerce, which require the users to transmit sensitive information on the Internet. Therefore, to successfully authenticate each party of web applications is very important. A popular deployed technique for web authentication is the Hypertext Transfer Protocol Secure (HTTPS) protocol. However the protocol does not protect the careless users who connect to fraudulent websites from being trapped into tricks. For example, in a ph
APA, Harvard, Vancouver, ISO, and other styles
34

Lin, Ting-Ching, and 林廷璟. "A Method of Detecting Phishing Attacks for Auction Sites." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/23h859.

Full text
Abstract:
碩士<br>國立中興大學<br>資訊科學與工程學系所<br>101<br>Phishing attacks attract users to visit fake website to steal their personal information. Most phishing detection approaches adopt Uniform Resource Locator (URL) blacklists or phishing website features as a detection character to cope with phishing attacks. The existing approaches of using URL blacklists cannot detect the new phishing attacks because they are not existed in the blacklists. Similarly, the existing feature-based methods suffer high false positive rates and this leads to an inadequacy in the online transactions. To solve these problems, we use
APA, Harvard, Vancouver, ISO, and other styles
35

Lee, Hsin-Hsiung, and 李新雄. "Exploring the Intention of Electronic Commerce Activity consider with Phishing Attacks by Theory of Planned Behavior View." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/51156789026615775962.

Full text
Abstract:
碩士<br>華梵大學<br>資訊管理學系碩士班<br>94<br>The Internet becomes more popular to promote the higher rapidly development of the new online business model, E-commerce. The E-commerce has brought the more benefits and convenience on the personal consumption, the regional economy, the global logistics as well as the online e-services. However, the online theft and attacks through the Internet tend to be on the rise progressively to gain illegal blood money. The Phishing attack is one of the major fraud crimes, which may inhibit consumers to use the e-commerce. Hence, we proposed a research model to explore t
APA, Harvard, Vancouver, ISO, and other styles
36

(9187496), Priyanka Tiwari. "EXPLORING PHISHING SUSCEPTIBILITY ATTRIBUTABLE TO AUTHORITY, URGENCY, RISK PERCEPTION AND HUMAN FACTORS." Thesis, 2020.

Find full text
Abstract:
<p>Security breaches nowadays are not limited to technological orientation. Research in the information security domain is gradually shifting towards human behavioral orientation toward breaches that target weaknesses arising from human behaviors (Workman et al., 2007). Currently, social engineering breaches are more effective than many technical attacks. In fact, the majority of cyber assaults have a social engineering component. Social Engineering is the art of manipulating human flaws towards a malicious objective (Breda et al., 2017). In the likely future, social engineering will be the mo
APA, Harvard, Vancouver, ISO, and other styles
37

Njotini, Mzukisi Niven. "E-crimes and e-authentication - a legal perspective." Thesis, 2016. http://hdl.handle.net/10500/21720.

Full text
Abstract:
E-crimes continue to generate grave challenges to the ICT regulatory agenda. Because e-crimes involve a wrongful appropriation of information online, it is enquired whether information is property which is capable of being stolen. This then requires an investigation to be made of the law of property. The basis for this scrutiny is to establish if information is property for purposes of the law. Following a study of the Roman-Dutch law approach to property, it is argued that the emergence of an information society makes real rights in information possible. This is the position because informati
APA, Harvard, Vancouver, ISO, and other styles
38

Van, Rensburg Kim Shandre Jansen. "The human element in information security : an analysis of social engineering attacks in the greater Tshwane area of Gauteng, South Africa." Thesis, 2017. http://hdl.handle.net/10500/22681.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!