Publication Phishing: A Growing Challenge for Researchers & Scientific Societies
by Shahryar Sorooshian
Current Science, 10 March 2016, 110(5): 766-767.
Abstract: Publication phishing has the potential to develop further into a serious gainful enterprise if effective security measures are not in place. Be that as it may, there is growing concern over the erosion of users' trust towards journals, conferences and other channels of publication stemming from the rise in scam cases involving users' money, research articles and personal identifications. Phishing is becoming a major issue for users and will be making an ever greater and prominent issue for good scientific societies who need to devise anti-journal hijacking measures to mitigate the impacts of phishing to their operations. Researchers and scientific societies need to design adequate technical security systems to mitigate phishing threat to users. This note highlights some issues and basic steps to anti-phishing educators and scientific societies to ensure the viability of anti-phishing initiatives.
Download Full-text PDF
by Shahryar Sorooshian
Current Science, 10 March 2016, 110(5): 766-767.
Abstract: Publication phishing has the potential to develop further into a serious gainful enterprise if effective security measures are not in place. Be that as it may, there is growing concern over the erosion of users' trust towards journals, conferences and other channels of publication stemming from the rise in scam cases involving users' money, research articles and personal identifications. Phishing is becoming a major issue for users and will be making an ever greater and prominent issue for good scientific societies who need to devise anti-journal hijacking measures to mitigate the impacts of phishing to their operations. Researchers and scientific societies need to design adequate technical security systems to mitigate phishing threat to users. This note highlights some issues and basic steps to anti-phishing educators and scientific societies to ensure the viability of anti-phishing initiatives.
Download Full-text PDF
No comments:
Post a Comment