scholarly journals Detection of Phishing Attacks using Content Analysis in the Cloud

2020 ◽  
Vol 9 (1) ◽  
pp. 2622-2625

In the world of internet and technology, technical advancement is widely accepted by both types of users - with and without technical knowledge. Advancement in technologies also brings in different risks involved along with it. These risks involve risks of being compromised at any point of time, leading to identity theft or financial loss or loss of very confidential information. Phishing attacks are one such kind of attack which can trap anyone into it, let it be a novice user or a sophisticated user. This paper involves what phishing attacks are, how the phishers target cloud services, how they deceive users, how the phishers send phish sites to its target. It also includes the background process that happens in normal scenarios and during phishing, a proposed mechanism which can be used for detection, safety measures which if taken can reduce the chances of falling in the trap and mechanisms used by researchers in order to detect and prevent phishing sites.

Author(s):  
Muhammed Alnsour ◽  
Nadar Ismael ◽  
Zaid Nsoor ◽  
Midhat Feidi

This article studies online shopping and e‐commerce adoption in Jordan due to the significant growth of this industry in Jordan particularly and the rest of the world generally, which is receiving attention globally and has proven to largely contribute to the growth of nations' economies. This article specifically studies the risk that online users perceive from online shopping and how they affect the growth of this industry. This study adopts a quantitative research approach, with a total of 355 questionnaires distributed by the researchers, to determine whether perceived risks of online shopping have an effect on a number of user adoptions. The article studies the two main risks of online shopping, payment risk, and product risk. Payment risks are defined as the financial loss which included risks associated with using credit cards and identity theft. Product risk is described as the loss incurred when a product does not perform as expected or does not match what was shown and described online. The study concludes that perceived payment risk and product risk affect online shopping negatively and has negatively impacted the number of users adopting this phenomenon.


2019 ◽  
Vol 9 (2) ◽  
pp. 1-12 ◽  
Author(s):  
Muhammed Alnsour ◽  
Nadar Ismael ◽  
Zaid Nsoor ◽  
Midhat Feidi

This article studies online shopping and e‐commerce adoption in Jordan due to the significant growth of this industry in Jordan particularly and the rest of the world generally, which is receiving attention globally and has proven to largely contribute to the growth of nations' economies. This article specifically studies the risk that online users perceive from online shopping and how they affect the growth of this industry. This study adopts a quantitative research approach, with a total of 355 questionnaires distributed by the researchers, to determine whether perceived risks of online shopping have an effect on a number of user adoptions. The article studies the two main risks of online shopping, payment risk, and product risk. Payment risks are defined as the financial loss which included risks associated with using credit cards and identity theft. Product risk is described as the loss incurred when a product does not perform as expected or does not match what was shown and described online. The study concludes that perceived payment risk and product risk affect online shopping negatively and has negatively impacted the number of users adopting this phenomenon.


Author(s):  
John Mansfield

Advances in camera technology and digital instrument control have meant that in modern microscopy, the image that was, in the past, typically recorded on a piece of film is now recorded directly into a computer. The transfer of the analog image seen in the microscope to the digitized picture in the computer does not mean, however, that the problems associated with recording images, analyzing them, and preparing them for publication, have all miraculously been solved. The steps involved in the recording an image to film remain largely intact in the digital world. The image is recorded, prepared for measurement in some way, analyzed, and then prepared for presentation.Digital image acquisition schemes are largely the realm of the microscope manufacturers, however, there are also a multitude of “homemade” acquisition systems in microscope laboratories around the world. It is not the mission of this tutorial to deal with the various acquisition systems, but rather to introduce the novice user to rudimentary image processing and measurement.


Foods ◽  
2021 ◽  
Vol 10 (4) ◽  
pp. 862
Author(s):  
Ana Elena Ahuir-Baraja ◽  
Lola Llobat ◽  
Maria Magdalena Garijo

Anisakidosis is a parasitic zoonotic disease which can cause gastroallergic reactions in humans. In 2010, the European Food Safety Agency estimated that approximately 20,000 cases of anisakiasis had been reported across the world, with Spain having the highest number of infections in Europe. The blue whiting (Micromesistius poutassou, Risso, 1827) is one of the most widely fished species worldwide and represents around 25% of the white fish eaten in Spain. The Spanish Food Safety Authority requires obligatory evisceration of certain fish species before commercialization, but not for blue whiting. Nevertheless, some supermarkets carry this out themselves to prevent human infections and negative customer reactions deriving from the presence of ascaridoid larvae. To assess the effectiveness of eviscerations at supermarkets, a total of 320 blue whiting specimens were examined. The risk of larval migration from the visceral cavity to the musculature in gutted and ungutted fish was also assessed. Our results showed a total prevalence (25%) of ascaridoids in fish gutted at the supermarket, and a direct relationship was found between the presence of larvae in the muscle and time until evisceration. In ungutted fish, the standard length and weight were higher for infected than for non-infected fish. Also, massive infections had a higher prevalence in these larger specimens, in which the viability of larvae was also high. Larval viability was not found to be affected by a 24-h refrigeration period. Anisakis was the most prevalent genus identified in the fish examined. The results indicate that gutting at the supermarket is not an effective method for the total removal of ascaridoid larvae and that additional safety measures are advisable.


2021 ◽  
Vol ahead-of-print (ahead-of-print) ◽  
Author(s):  
Mahak Sharma ◽  
Ruchita Gupta ◽  
Padmanav Acharya ◽  
Karuna Jain

PurposeCloud computing (CC) services have given a tremendous boost to the creation of efficient and effective solutions. With developing countries at a slow pace of adoption, this research aims to identify factors and their interrelationships influencing the adoption of CC in a developing country context. The developing countries are enjoying numerous benefits from CC services; however, its low adoption is still a question in developing economies; hence, the authors have selected the context of information and communication technology (ICT) firms in India.Design/methodology/approachThe qualitative research method is used where experts from thirteen ICT firms in India are interviewed.FindingsSixteen factors, twenty-eight subfactors, and 25 interrelationships are revealed through content analysis. Further, causal loop diagrams are proposed to display the behavior of cause and effect of these factors from a system's perspective. This will help to understand the relationships among the factors in order to enhance the speed of CC adoption. Possible financial loss and resistance to change are found as the key barriers to adoption. The proposed interrelationships can guide both policymakers and service providers for designing effective CC policies.Originality/valueThis is the first scholarly work that identifies interrelationships among factors and subfactors, thereby providing a holistic picture to decision-makers while making a choice on whether to adopt cloud services or continue with on premise data centers and servers.


Author(s):  
Shailendra Singh ◽  
Sunita Gond

As this is the age of technology and every day we are receiving the news about growing popularity of internet and its applications. Cloud computing is an emerging paradigm of today that is rapidly accepted by the industry/organizations/educational institutions etc. for various applications and purpose. As computing is related to distributed and parallel computing which are from a very long time in the market, but today is the world of cloud computing that reduces the cost of computing by focusing on personal computing to data center computing. Cloud computing architecture and standard provide a unique way for delivering computation services to cloud users. It is having a simple API (Application Platform Interface) to users for accessing storage, platform and hardware by paying-as-per-use basis. Services provided by cloud computing is as same as other utility oriented services like electricity bill, water, telephone etc. over shared network. There are many cloud services providers in the market for providing services like Google, Microsoft, Manjrasoft Aneka, etc.


Author(s):  
Okhuevbie James Olu

Cybercrime and the activities of the underground cyber economy has detrimental consequences for the growth, development, and wellbeing of individuals, groups, organizations, and nations of the world. Criminal activities such as hacking, identity theft, scams, fraud, and cloning on individuals, corporate bodies, and nations are attempts by cyber criminals to illegally scoop funds out of these various treasuries for personal use, all of which have tremendous consequences for personal, corporate, national, and hence, continental development. The underground cyber economy is a key factor that has enhanced the continued perpetration of cybercrime activities. Leaning on the space transition , innovation diffusion, and the gang theories, as well as resources gathered from past studies, the current study examines the underground cyber-economy and its implications for the development of Africa.


2008 ◽  
pp. 2841-2849
Author(s):  
Joseph A. Cazier ◽  
Ryan C. LaBrie

As we have increasing privacy and risk concerns in the world today with identity theft, questionable marketing, data mining, and profiling, it is becoming increasingly important to explore how consumers feel and react to the use of their data. This study makes an important contribution to the literature by presenting common positive and negative myths surrounding these issues and exploring how ethical or unethical consumers believe these practices are by looking at the myths and their reaction to them. We focus on consumers’ perceptions because at the end of the day it is what the consumers perceive to be happing that will determine their reaction. An ethical data practice is one that is believed to increase consumer, business, or societal value, and an unethical data practice is one which causes harm to these groups.


Author(s):  
Kimaya Arun Ambekar ◽  
Kamatchi R.

Cloud computing is based on years of research on various computing paradigms. It provides elasticity, which is useful in the situations of uneven ICT resources demands. As the world is moving towards digitalization, the education sector is expected to meet the pace. Acquiring and maintaining the ICT resources also necessitates a huge amount of cost. Education sector as a community can use cloud services on various levels. Though the cloud is very successfully running technology, it also shows some flaws in the area of security, privacy and trust. The research demonstrates a model in which major security areas are covered like authorization, authentication, identity management, access control, privacy, data encryption, and network security. The total idea revolves around the community cloud as university at the center and other associated colleges accessing the resources. This study uses OpenStack environment to create a complete cloud environment. The validation of the model is performed using some cases and some tools.


Author(s):  
David Sacco ◽  
Joshua Knight

Engineers Without Borders USA has been operating and evolving since 2002. As an organization with many student and professional chapters working around the world, EWB-USA has put in place structures to review proposed community programs as well as specific engineering projects. The Application Review Committee, or ARC, considers new program proposals put forward by communities, while Technical Advisory Committees, or TACs, evaluate implementation plans for infrastructure projects. ARC and TAC members are volunteers with relevant technical knowledge and experience, many of whom are also EWB-USA chapter members. EWB-USA technical and chapter relations staff review progress at key points in the project cycle; however, this paper reviews the mainly volunteer efforts at two important moments in the project process.


Sign in / Sign up

Export Citation Format

Share Document