Phishing Awareness and Susceptibility of System Users

  • Authors

    • Dr. R. Senkathir
    • Dr. Bushan D. Sudhakar
    2018-12-13
    https://doi.org/10.14419/ijet.v7i4.39.26723
  • Information Security, Cyber Defense, Cyber Behavior, Phishing
  • The significant rise in the occurrences of phishing events or attacks is very disturbance from the society view point as it extends varied sects of people each year. With an enormous amount of money lost to online crimes, security on the web becomes increasingly important. Security experts need to understand the ways by which individual’s interaction with phishing attacks and their way of behavior. There is a need for a deeper understanding of people Attitude, Intentions, Behavior, in order to protect them from falling into the clutches of the cybercriminals. This research work has attempted in order to understand potential risks of information security posed by computer system users as they are the weakest link in the information security range of defense. The study examines the awareness of users to decrease the risk of e-mail phishing by studying the awareness of phishing among Computer System users.

  • References

    1. [1] Busch, T. (1995). Gender differences in self-efficacy and attitudes toward computers. Journal of educational computing research, 12(2), 147-158.

      [2] Colley, A., and Maltby, J. (2008). Impact of the Internet on our lives: Male and female personal perspectives. Computers in human behaviour, 24(5), 2005-2013.

      [3] Jagatic, T. N., Johnson, N. A., Jakobsson, M., and Menczer, F. (2007). Social Phishing. Communications of the ACM, 50(10), 94-100.

      [4] Kumaraguru, P., Sheng, S., Acquisti, A., Cranor, L. F., and Hong, J. (2010). Teaching Johnny not to fall for phish. ACM Transactions on Internet Technology (TOIT), 10(2), 1-31.

      [5] Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L. F., and Downs, J. (2010). Who Falls for Phish? A Demographic Analysis of Phishing Susceptibility and Effectiveness of Interventions. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, 373-382. Atlanta, Georgia, ACM.

      [6] Vishwanath, A., Herath, T., Chen, R., Wang, J., and Rao, H.R. (2011). Why Do People Get Phished? Testing Individual Differences in Phishing Vulnerability within an Integrated, Information Processing Model, Decision Support Systems, 51(3), 576- 586.

  • Downloads

  • How to Cite

    R. Senkathir, D., & Bushan D. Sudhakar, D. (2018). Phishing Awareness and Susceptibility of System Users. International Journal of Engineering & Technology, 7(4.39), 766-768. https://doi.org/10.14419/ijet.v7i4.39.26723