loading
Papers Papers/2022 Papers Papers/2022

Research.Publish.Connect.

Paper

Paper Unlock

Authors: Christine Drake ; Andrew Klein and Jonathan Oliver

Affiliation: MailFrontier, Inc., United States

Abstract: With the growth of email, it was only a matter of time before social engineering efforts used to defraud people moved online. Fraudulent phishing emails are specifically designed to imitate legitimate correspondence from reputable companies but fraudulently ask recipients for personal or corporate information. Recent consumer phishing attempts include spoofs of eBay, Pay-Pal and financial institutions. Phishing emails can lead to identity theft, security breaches, and financial loss and liability. Phishing also damages e-commerce because some people avoid Internet transactions for fear they will become victims of fraud. In a recent survey, both fraudulent and legitimate emails were misidentified 28 percent of the time and 90 percent of respondents misidentified at least one email. Based on these results, we cannot expect consumers alone to be able to recognize phishing emails. Instead, we must combine multiple solutions to combat phishing, including technical, legal, best business pr actices, and consumer education. (More)

CC BY-NC-ND 4.0

Sign In Guest: Register as new SciTePress user now for free.

Sign In SciTePress user: please login.

PDF ImageMy Papers

You are not signed in, therefore limits apply to your IP address 18.223.32.230

In the current month:
Recent papers: 100 available of 100 total
2+ years older papers: 200 available of 200 total

Paper citation in several formats:
Drake, C.; Klein, A. and Oliver, J. (2005). Analysis of the Phishing Email Problem and Discussion of Possible Solutions. In Proceedings of the 3rd International Workshop on Security in Information Systems (ICEIS 2005) - WOSIS; ISBN 972-8865-25-2, SciTePress, pages 309-318. DOI: 10.5220/0002564803090318

@conference{wosis05,
author={Christine Drake. and Andrew Klein. and Jonathan Oliver.},
title={Analysis of the Phishing Email Problem and Discussion of Possible Solutions},
booktitle={Proceedings of the 3rd International Workshop on Security in Information Systems (ICEIS 2005) - WOSIS},
year={2005},
pages={309-318},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0002564803090318},
isbn={972-8865-25-2},
}

TY - CONF

JO - Proceedings of the 3rd International Workshop on Security in Information Systems (ICEIS 2005) - WOSIS
TI - Analysis of the Phishing Email Problem and Discussion of Possible Solutions
SN - 972-8865-25-2
AU - Drake, C.
AU - Klein, A.
AU - Oliver, J.
PY - 2005
SP - 309
EP - 318
DO - 10.5220/0002564803090318
PB - SciTePress