Access the full text.
Sign up today, get DeepDyve free for 14 days.
Min Wu, Rob Miller, S. Garfinkel (2006)
Do security toolbars actually prevent phishing attacks?Proceedings of the SIGCHI Conference on Human Factors in Computing Systems
Rachna Dhamija, J. Tygar, Marti Hearst (2006)
Why phishing worksProceedings of the SIGCHI Conference on Human Factors in Computing Systems
R. Dodge, C. Carver, A. Ferguson (2007)
Phishing for user security awarenessComput. Secur., 26
J. Downs, Mandy Holbrook, L. Cranor (2007)
Behavioral response to phishing risk
R. Butler (2005)
Investigation of phishing to develop guidelines to protect the Internet consumer's identity against attacks by phishersSA Journal of Information Management, 7
J. Nagy, Peter Pecho (2009)
Social Networks Security2009 Third International Conference on Emerging Security Information, Systems and Technologies
K. Punch (2003)
Survey Research: The Basics
D. Bock, P. Velleman, R. Veaux (2003)
Stats: Modeling the World
Steve Sheng, Bryant Magnien, P. Kumaraguru, A. Acquisti, L. Cranor, Jason Hong, Elizabeth Ferrall-Nunge (2007)
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish
A. Herzberg, Ahmad Gbara (2004)
Protecting (even) Naïve Web Users, or: Preventing Spoofing and Establishing Credentials of Web Sites
E. Ye, Yougu Yuan, Sean Smith (2002)
Web Spoofing Revisited: SSL and Beyond
Rachna Dhamija, J. Tygar (2005)
The battle against phishing: Dynamic Security Skins
Dario Forte (2009)
Phishing Attacks: Phishing in depthNetwork Security archive, 2009
R. Butler (2007)
A framework of anti-phishing measures aimed at protecting the online consumer's identityElectron. Libr., 25
A. Herzberg, Ahmad Jbara (2008)
Security and identification indicators for browsers against spoofing and phishing attacksACM Trans. Internet Techn., 8
Purpose – This paper seeks to focus on identifying the need for education to enhance awareness of the e‐mail phishing threat as the most effective way to reduce the risk of e‐mail phishing in one of the fastest growing economies in the world, the State of Qatar. Design/methodology/approach – A survey comprising a questionnaire and interviews was used to investigate the awareness of phishing among Qatari citizens, their susceptibility to phishing and their views on the best method of defence against this attack, and this was compared to other developed nations, the UK in particular. Findings – The paper concludes that phishing is becoming common and very successful because of people's susceptibility to such attack, largely due to insufficient awareness of the threat. Comparing Qatar with the UK, there were significant differences between responses in each country in most questionnaire variables, especially those identifying the vulnerability to phishing which was found to be very high in Qatar. Research limitations/implications – The paper shows that there is a particular need for education on phishing in this fast developing country. Practical implications – There is a growing threat in the use of phishing by hackers and some businesses to obtain information on individual users on the internet through e‐mail or the web. In some cases this has led to identity thefts and related illogical operations online both within and across countries. This paper has compared level of awareness of phishing in two countries and has the potential to shed light on attitudes and present status of e‐mail phishing with a view to developing ways of dealing with it and improving cyber security and international operations. Originality/value – The paper adopts an innovative approach to study e‐mail phishing and compares results from two diverse countries. New ideas are advanced from the findings which are useful for understanding some operations in cyber space.
Campus-Wide Information Systems – Emerald Publishing
Published: Nov 8, 2011
Keywords: E‐mail phishing; Cyber security; Education and awareness; Threats; Economies; Development; Qatar; United Kingdom; Online operations; Computer crime
Read and print from thousands of top scholarly journals.
Already have an account? Log in
Bookmark this article. You can see your Bookmarks on your DeepDyve Library.
To save an article, log in first, or sign up for a DeepDyve account if you don’t already have one.
Copy and paste the desired citation format or use the link below to download a file formatted for EndNote
Access the full text.
Sign up today, get DeepDyve free for 14 days.
All DeepDyve websites use cookies to improve your online experience. They were placed on your computer when you launched this website. You can change your cookie settings through your browser.