Asian Journal of Information Technology

Year: 2013
Volume: 12
Issue: 3
Page No. 91 - 98

Social Engineering in Phishing Attacks in the Eastern Province of Saudi Arabia

Authors : Jaafar M. Alghazo and Zafar Kazimi

References

APWG, 2012. Phishing activity trends report: 1st quarter 2012. Anti-Phishing Working Group (APWG). http://docs.apwg.org/reports/apwg_trends_report_q1_2012.pdf.

Dhamija, R., J.D. Tygar and M. Hearst, 2006. Why phishing works. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 22-27, 2006, Montreal, Quebec, Canada, pp: 581-590.

Dong, X., J.A. Clark and J.L. Jacob, 2008. User behaviour based phishing websites detection. Proceedings of the International Multi Conference on Computer Science and Information Technology, October 20-22, 2008, Wisla, Poland, pp: 783-790.

Downs, J.S., M.B. Holbrook and L.F. Cranor, 2006. Decision strategies and susceptibility to phishing. Proceedings of the 2nd Symposium on Usable Privacy and Security, July 12-14, 2006, Pittsburgh, PA., USA., pp: 79-90.

Downs, J.S., M.B. Holbrook and L.F. Cranor, 2007. Behavioral response to phishing risk. Proceedings of the Anti-Phishing Working Groups 2nd Annual eCrime Researchers Summit, October 4-5, 2007, Pittsburgh, PA., USA., pp: 37-44.

FWI, 2012. Phishing email method. Fraud Watch International. http://www.fraudwatchinternational.com/phishing-fraud/phishing-email-methods/.

Jakobsson, M., 2005. Modeling and preventing phishing attacks. Proceedings of the 9th International Conference on Financial Cryptography and Data Security, February 28-March 3, 2005, Roseau, Dominica, pp: 89-.

James, L., 2005. Phishing Exposed. Syngress Publishing, Rockland, MA., USA., ISBN-13: 9780080489537, Pages: 450.

Kirda, E., C. Kruegel, G. Vigna and N. Jovanovic, 2006. Noxes: A client-side solution for mitigating cross-site scripting attacks. Proceedings of the ACM Symposium on Applied Computing, April 23-27, 2006, Dijon, France, pp: 330-337.

Milletary, J., 2005. Technical trends in phishing attacks. http://www.us-cert.gov/sites/default/files/publications/phishing_trends0511.pdf.

Ollmann, G., 2004. The phishing guide: Understanding and preventing phishing attack. IBM Internet Security Systems, pp: 3-23. http://www-935.ibm.com/services/us/iss/pdf/phishing-guide-wp.pdf.

Schechter, S.E., R. Dhamija, A. Ozment and I. Fischer, 2007. The emperor's new security indicators. Proceedings of the IEEE Symposium on Security and Privacy, May 20-23, 2007, Berkeley, CA., pp: 51-65.

Sheng, S., M. Holbrook, P. Kumaraguru, L. Cranor and J. Downs, 2010. Who falls for phish: A demographic analysis of phishing susceptibility and effectiveness of interventions. Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 10-15, 2010, Atlanta Georgia, USA., pp: 373-382.

Wu, M., R.C. Miller and S.L. Garfinkel, 2006. Do security toolbars actually prevent phishing attacks? Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, April 22-27, 2006, Montreal, Quebec, Canada, pp: 601-610.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved