Addressing the spectre of phishing: are adequate measures in place to protect victims of phishing?

被引:0
|
作者
Cassim, Fawzia [1 ]
机构
[1] Univ South Africa, Sch Law, Pretoria, South Africa
关键词
D O I
暂无
中图分类号
D9 [法律]; DF [法律];
学科分类号
0301 ;
摘要
The Internet has introduced cheap, interactive and instant global communications. However, it has also resulted in new forms of criminal behaviour. The technique whereby scammers trick bank customers into entering their usernames and passwords is called 'phishing'. Therefore, phishing scams are used to coerce unsuspecting users to disclose personal and banking information about them. Scammers obtain private information about consumers by posing as legitimate businesses and they play on the combination of trust and fear of fraud. Phishing attacks exploit vulnerabilities in computer networks, cause financial loss to victims and banking institutions and undermine consumer confidence in e-commercial transactions.
引用
收藏
页码:401 / 428
页数:28
相关论文
共 39 条
  • [1] Individual processing of phishing emails How attention and elaboration protect against phishing
    Harrison, Brynne
    Svetieva, Elena
    Vishwanath, Arun
    ONLINE INFORMATION REVIEW, 2016, 40 (02) : 265 - 281
  • [2] Towards Understanding Phishing Victims' Profile
    Darwish, Ali
    El Zarka, Ahmed
    Aloul, Fadi
    2012 INTERNATIONAL CONFERENCE ON COMPUTER SYSTEMS AND INDUSTRIAL INFORMATICS (ICCSII), 2012,
  • [3] Phishing Sites and Prevention Measures
    Zhou Fu-An
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (01): : 1 - 10
  • [4] VOAuth: A solution to protect OAuth against phishing
    Xie, Min
    Huang, Wei
    Yang, Li
    Yang, Yixian
    COMPUTERS IN INDUSTRY, 2016, 82 : 151 - 159
  • [5] Protect Sensitive Sites from Phishing Attacks Using Features Extractable from Inaccessible Phishing URLs
    Chu, Weibo
    Zhu, Bin B.
    Xue, Feng
    Guan, Xiaohong
    Cai, Zhongmin
    2013 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC), 2013,
  • [6] Heuristic Systematic model based guidelines for phishing victims
    Shan, Ting Li
    Samy, Ganthan Narayana
    Shanmugam, Bharanidharan
    Azam, Sami
    Yeo, Kheng Cher
    Kannoorpatti, Krishnan
    2016 IEEE ANNUAL INDIA CONFERENCE (INDICON), 2016,
  • [7] From Victims to Defenders: An Exploration of the Phishing Attack Reporting Ecosystem
    Sun, Zhibo
    Kokulu, Faris Bugra
    Zhang, Penghui
    Oest, Adam
    Stringhini, Gianluca
    Bao, Tiffany
    Wang, Ruoyu
    Shoshitaishvili, Yan
    Doupe, Adam
    Ahn, Gail-Joon
    PROCEEDINGS OF 27TH INTERNATIONAL SYMPOSIUM ON RESEARCH IN ATTACKS, INTRUSIONS AND DEFENSES, RAID 2024, 2024, : 49 - 64
  • [8] Phishing attacks: An analysis of the victims' characteristics based on administrative data
    Fedele, Alessandro
    Tonin, Mirco
    Valerio, Matteo
    ECONOMICS LETTERS, 2024, 237
  • [9] Not All Victims Are Created Equal: Investigating Differential Phishing Susceptibility
    Canham, Matthew
    Dawkins, Shanee
    Jacobs, Jody
    AUGMENTED COGNITION, PT I, AC 2024, 2024, 14694 : 3 - 21