Exportar Publicação

A publicação pode ser exportada nos seguintes formatos: referência da APA (American Psychological Association), referência do IEEE (Institute of Electrical and Electronics Engineers), BibTeX e RIS.

Exportar Referência (APA)
Gomes, V., Reis, J. & Alturas, B. (2020). Social engineering and the dangers of phishing. In Álvaro Rocha, Bernabé Escobar Peréz, Francisco Garcia Peñalvo, Maria del Mar Miras, Ramiro Gonçalves (Ed.), 2020 15th Iberian Conference on Information Systems and Technologies (CISTI). Sevilla: IEEE.
Exportar Referência (IEEE)
V. Gomes et al.,  "Social engineering and the dangers of phishing", in 2020 15th Iberian Conf. on Information Systems and Technologies (CISTI), Álvaro Rocha, Bernabé Escobar Peréz, Francisco Garcia Peñalvo, Maria del Mar Miras, Ramiro Gonçalves, Ed., Sevilla, IEEE, 2020
Exportar BibTeX
@inproceedings{gomes2020_1714651111142,
	author = "Gomes, V. and Reis, J. and Alturas, B.",
	title = "Social engineering and the dangers of phishing",
	booktitle = "2020 15th Iberian Conference on Information Systems and Technologies (CISTI)",
	year = "2020",
	editor = "Álvaro Rocha, Bernabé Escobar Peréz, Francisco Garcia Peñalvo, Maria del Mar Miras, Ramiro Gonçalves",
	volume = "",
	number = "",
	series = "",
	doi = "10.23919/CISTI49556.2020.9140445",
	publisher = "IEEE",
	address = "Sevilla",
	organization = "AISTI",
	url = "https://ieeexplore.ieee.org/xpl/conhome/9137058/proceeding"
}
Exportar RIS
TY  - CPAPER
TI  - Social engineering and the dangers of phishing
T2  - 2020 15th Iberian Conference on Information Systems and Technologies (CISTI)
AU  - Gomes, V.
AU  - Reis, J.
AU  - Alturas, B.
PY  - 2020
SN  - 2166-0727
DO  - 10.23919/CISTI49556.2020.9140445
CY  - Sevilla
UR  - https://ieeexplore.ieee.org/xpl/conhome/9137058/proceeding
AB  - Social Engineering and phishing technique are subjects that have been evolving as the years pass, mainly through email, which is one of the most used communication tools in the world. Phishing emails are usually related to Social Engineering and may be proposed through links and / or attachments in this type of email, both of which are malicious propagation, and may be hacked into personal / confidential information or even complete control of the computer / email without the users noticing. Several studies have already been carried out showing that there have been more and more attacks of this type and increasingly impacting the population. The research described in this article aims to review prevention methods for this type of computer crime. The research included an exploratory study with a qualitative methodology, through interviews with professionals in the area of Computer Security and later a study with a quantitative methodology, through an online questionnaire.
ER  -