메뉴 건너뛰기




Volumn 1, Issue , 2006, Pages 601-610

Do security toolbars actually prevent phishing attacks?

Author keywords

E Commerce; User Interface Design; User Study; World Wide Web and Hypermedia

Indexed keywords

COMPUTER AIDED DESIGN; ELECTRONIC CRIME COUNTERMEASURES; INFORMATION RETRIEVAL; SECURITY OF DATA; SECURITY SYSTEMS; WEB BROWSERS; WEBSITES;

EID: 33745867321     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1124772.1124863     Document Type: Conference Paper
Times cited : (417)

References (24)
  • 2
    • 34548344520 scopus 로고    scopus 로고
    • March
    • Anti-Phishing Working Group. Phishing Activity Trends Report, March 2005. http://antiphishing.org/ APWG_Phishing_Activity_Report_March_2005.pdf
    • (2005) Phishing Activity Trends Report
  • 3
    • 33846786596 scopus 로고    scopus 로고
    • 'Spear phishing' tests educate people about online scams
    • August 17
    • Bank, D. 'Spear Phishing' Tests Educate People About Online Scams. The Wall Street Journal. August 17, 2005.
    • (2005) The Wall Street Journal
    • Bank, D.1
  • 4
    • 84900762271 scopus 로고    scopus 로고
    • Passwords Revealed by Sweet Deal
    • BBC News. Passwords revealed by sweet deal. http://news.bbc.co.Uk/l/hi/technology/3639679.stm
    • BBC News
  • 8
    • 33745859653 scopus 로고    scopus 로고
    • Online identity theft: Phishing technology, chokepoints and countermeasures
    • October 3
    • Emigh, A. Online Identity Theft: Phishing Technology, Chokepoints and Countermeasures. ITTC Report on Online Identity Theft Technology and Countermeasures. October 3, 2005. http://www.antiphishing.org/Phishing-dhs-report.pdf
    • (2005) ITTC Report on Online Identity Theft Technology and Countermeasures
    • Emigh, A.1
  • 10
    • 84858918667 scopus 로고    scopus 로고
    • Computer Crime Research Center. March 16
    • Fluendy, S. Phishing targeting online outlets. Computer Crime Research Center. March 16, 2005. http://www.crime-research.org/news/03.16.2005/1050/
    • (2005) Phishing Targeting Online Outlets
    • Fluendy, S.1
  • 11
    • 0035034830 scopus 로고    scopus 로고
    • What makes Web sites credible?: A report on a large quantitative study
    • Fogg, B.J, et al. What makes Web sites credible?: a report on a large quantitative study. CHI2001, pp. 61-68.
    • CHI2001 , pp. 61-68
    • Fogg, B.J.1
  • 14
    • 33745831496 scopus 로고    scopus 로고
    • School of Informatics & Dept. of Computer Science, Indiana University
    • Jagatic, T., Johnson, N., Jakobsson, M., Menczer, F. Social Phishing. School of Informatics & Dept. of Computer Science, Indiana University. 2005. http://informatics.indiana.edu/fil/Net/social_phishing.pdf
    • (2005) Social Phishing
    • Jagatic, T.1    Johnson, N.2    Jakobsson, M.3    Menczer, F.4
  • 15
    • 33745816273 scopus 로고    scopus 로고
    • US phishing losses hit 5500m
    • September 29
    • Leyden, J. US phishing losses hit 5500m. The Register. September 29, 2004.
    • (2004) The Register
    • Leyden, J.1
  • 16
    • 33745858939 scopus 로고    scopus 로고
    • Netcraft Toolbar. 2004. http://toolbar.netcraft.com/.
    • (2004) Netcraft Toolbar
  • 17
    • 84976800746 scopus 로고
    • Design rules based on analyses of human error
    • April
    • Norman, D. A. Design rules based on analyses of human error. CACM, v26 n4 (April 1983), pp. 254-258.
    • (1983) CACM , vol.26 , Issue.4 , pp. 254-258
    • Norman, D.A.1
  • 18
    • 84858907315 scopus 로고    scopus 로고
    • PassMark. 2005. http://www.passmarksecurity.com/.
    • (2005)
  • 19
    • 33745861599 scopus 로고    scopus 로고
    • September 9
    • Sharif, T. Phishing Filter in IE7, September 9, 2006. http://blogs.msdn.com/ie/archive/2005/09/09/463204.aspx
    • (2006) Phishing Filter in IE7
    • Sharif, T.1
  • 20
    • 84858919330 scopus 로고    scopus 로고
    • SpoofStick. 2004. http://www.spoofstick.com/.
    • (2004)
  • 22
    • 32244434492 scopus 로고    scopus 로고
    • Gathering evidence: Use of visual security cues in web browsing
    • Whalen, T., Inkpen, K. Gathering Evidence: Use of Visual Security Cues in Web Browsing. Graphics Interface 2005.
    • Graphics Interface 2005
    • Whalen, T.1    Inkpen, K.2
  • 23
    • 85084161247 scopus 로고    scopus 로고
    • Why Johnny can't encrypt: A usability evaluation of POP 5.0
    • Whitten, A., Tygar, J.D. Why Johnny Can't Encrypt: A Usability Evaluation of POP 5.0. 8th Usenix Security Symposium, 1999, pp. 169-184.
    • (1999) 8th Usenix Security Symposium , pp. 169-184
    • Whitten, A.1    Tygar, J.D.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.