Search Articles

View query in Help articles search

Search Results (1 to 3 of 3 Results)

Download search results: CSV END BibTex RIS


Addressing Cyberscams and Acquired Brain Injury (“I Desperately Need to Know What to Do”): Qualitative Exploration of Clinicians’ and Service Providers’ Perspectives

Addressing Cyberscams and Acquired Brain Injury (“I Desperately Need to Know What to Do”): Qualitative Exploration of Clinicians’ and Service Providers’ Perspectives

Eligibility criteria were the following: clinicians or service providers with experience in providing assessment or intervention to adults with ABI, experience in cybercrime vulnerability or supporting an adult with ABI who had been affected by a cybercrime, and working within Australia. Overall, 20 participants were recruited. There were preexisting interviewer-participant relationships (professional colleagues) among 35% (7/20) of the participants. Participant characteristics are displayed in Table 1.

Kimberly Ann Chew, Jennie Ponsford, Kate Rachel Gould

J Med Internet Res 2024;26:e51245

Big Data, Natural Language Processing, and Deep Learning to Detect and Characterize Illicit COVID-19 Product Sales: Infoveillance Study on Twitter and Instagram

Big Data, Natural Language Processing, and Deep Learning to Detect and Characterize Illicit COVID-19 Product Sales: Infoveillance Study on Twitter and Instagram

Labeled by the WHO as an “infodemic,” where there is an overabundance of information, some of which includes misinformation and enables COVID-19–related cybercrime, this parallel information epidemic is now a serious challenge to ensuring the success of public health objectives of mitigating the spread of COVID-19 [11,12].

Tim Ken Ken Mackey, Jiawei Li, Vidya Purushothaman, Matthew Nali, Neal Shah, Cortni Bardier, Mingxiang Cai, Bryan Liang

JMIR Public Health Surveill 2020;6(3):e20794

The Role of Health Concerns in Phishing Susceptibility: Survey Design Study

The Role of Health Concerns in Phishing Susceptibility: Survey Design Study

Phishing refers to an internet cybercrime where a normal computer or mobile phone user is targeted by a cybercriminal through email. This communication is mostly intended to lure the user to provide their sensitive data such as personal health care records, passwords, bank information, and passwords. In a phishing attack, the attacker sends an email that impersonates a legitimate organization or person.

Mohamed Abdelhamid

J Med Internet Res 2020;22(5):e18394