2021
DOI: 10.14569/ijacsa.2021.0121004
|View full text |Cite
|
Sign up to set email alerts
|

Taxonomy of Cybersecurity Awareness Delivery Methods: A Countermeasure for Phishing Threats

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
6
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 7 publications
(6 citation statements)
references
References 25 publications
0
6
0
Order By: Relevance
“…Similarly, Paula et al [23] contend that, even though technical defense in malware attacks and social engineering is a requirement, the overreliance on only technical techniques to the neglect of non-technical controls leads to compromise of security. A position supported by Alhashmi et al [7] and Musah et al [24]. They then advocated for the conduct of regular, routine, and wellorganized user awareness, training, and education to build user resistance and immunity to malware attacks.…”
Section: Workmentioning
confidence: 99%
See 4 more Smart Citations
“…Similarly, Paula et al [23] contend that, even though technical defense in malware attacks and social engineering is a requirement, the overreliance on only technical techniques to the neglect of non-technical controls leads to compromise of security. A position supported by Alhashmi et al [7] and Musah et al [24]. They then advocated for the conduct of regular, routine, and wellorganized user awareness, training, and education to build user resistance and immunity to malware attacks.…”
Section: Workmentioning
confidence: 99%
“…Globally, malware attacks and exposures continue to attract all relevant stakeholders in the cybersecurity valuechain as more and more exposures occur [7]. Malicious Software (Malware) are software with malicious intent.…”
Section: A Malware and Malware Trendsmentioning
confidence: 99%
See 3 more Smart Citations