2007
DOI: 10.17705/1cais.01924
|View full text |Cite
|
Sign up to set email alerts
|

Unveiling the Mask of Phishing: Threats, Preventive Measures, and Responsibilities

Abstract: Phishing, a new-rise identity fraud of this century has already caused huge financial loss and social disorder. This paper provides an overview of the evolution and forecasted trend of phishing activities with detailed analysis on common phishing features, proliferation channels, relevant anti-phishing measures, related legislation, and an anti-phishing framework from the perspective of social responsibility. The objective of the research is to enhance public awareness of phishing and to inform end users and o… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2009
2009
2021
2021

Publication Types

Select...
8

Relationship

1
7

Authors

Journals

citations
Cited by 17 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…Existing research into phishing characteristics has provided researchers with the means of recommending counter-phishing strategies such as using the HTTPS text in the address bar as an indicator for legitimacy and to be suspicious of email asking for private information [ 41 42 ]. Within the literature, the majority of email characteristics which are highlighted by researchers as useful for phishing detection can be categorised into those that induce greater trust (e.g.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Existing research into phishing characteristics has provided researchers with the means of recommending counter-phishing strategies such as using the HTTPS text in the address bar as an indicator for legitimacy and to be suspicious of email asking for private information [ 41 42 ]. Within the literature, the majority of email characteristics which are highlighted by researchers as useful for phishing detection can be categorised into those that induce greater trust (e.g.…”
Section: Introductionmentioning
confidence: 99%
“…official domains such as edu) and those that induce greater suspicion (e.g. misspellings and grammatical errors) [ 37 ; 41 ]. However, phishing attacks can also be categorised through neutral characteristics such as the email’s intended target group [ 12 ].…”
Section: Introductionmentioning
confidence: 99%
“…Prevention-based techniques such as password management tools and 2-factor authentication focus on distorting the phishing infrastructure to protect the user's credentials (Bose and Leung, 2007). For instance, a password management tool may add IP address string to the password whenever the user creates a new account at a legitimate website.…”
Section: Prevention-based Techniquesmentioning
confidence: 99%
“…Yue and Cakanyildirim [2007] proposed an analytical model which studies the decisions involved in the intrusion prevention process. Bose and Leung [2007] provided a tutorial on phishing and offered suggestions for detecting and/or preventing it.…”
Section: Content Checkingmentioning
confidence: 99%