메뉴 건너뛰기




Volumn 32, Issue 6, 2013, Pages 584-593

Phishing for phishing awareness

Author keywords

information security; phishing; social engineering

Indexed keywords

CYBERSPACES; ORGANISATIONAL; PHISHING; PHISHING ATTACKS; SOCIAL ENGINEERING; SOUTH AFRICA;

EID: 84879341574     PISSN: 0144929X     EISSN: 13623001     Source Type: Journal    
DOI: 10.1080/0144929X.2011.632650     Document Type: Article
Times cited : (116)

References (21)
  • 2
    • 77957844743 scopus 로고    scopus 로고
    • Intelligent phishing detection system for e-banking using fuzzy data mining
    • Aburrous, M., et al., 2010 Intelligent phishing detection system for e-banking using fuzzy data mining. Expert systems with applications, 37 (12), 7913
    • (2010) Expert Systems with Applications , vol.37 , Issue.12 , pp. 7913
    • Aburrous, M.1
  • 4
    • 35348822468 scopus 로고    scopus 로고
    • Fostering e-mail security awareness: The West Point Carronade
    • Ferguson, A.J., 2005 Fostering e-mail security awareness: The West Point Carronade. EDUCAUSE Quarterly, 28 (1), 54-57
    • (2005) EDUCAUSE Quarterly , vol.28 , Issue.1 , pp. 54-57
    • Ferguson, A.J.1
  • 5
    • 0036631839 scopus 로고    scopus 로고
    • Education ondemand: The development of a simulator-based medical education service
    • [Accessed 4 November 2011]
    • Gordon, J.A and Pawlowski, J., 2002. Education ondemand: the development of a simulator-based medical education service. Academic Medicine, 77 (7). Available from: http://journals.lww.com/academicmedicine/Fulltext/2002/07000/ Education-On-demand-The-Development-of-a.42.aspx [Accessed 4 November 2011]
    • (2002) Academic Medicine , vol.77 , pp. 7
    • Gordon, J.A.1    Pawlowski, J.2
  • 6
    • 24644444290 scopus 로고    scopus 로고
    • Information security practice and experience: first international conference, ISPEC 2005, 11-14 April 2005, Singapore Berlin: Springer-Verlag
    • Hasle, H., et al., 2005. Measuring resistance to social engineering. In: Information security practice and experience: first international conference, ISPEC 2005, 11-14 April 2005, Singapore Berlin: Springer-Verlag, 132-143
    • (2005) Measuring Resistance to Social Engineering , pp. 132-143
    • Hasle, H.1
  • 8
  • 10
    • 84926177314 scopus 로고    scopus 로고
    • Social engineering: Towards a holistic solution
    • South African Information Security Multi-Conference 17-18 May 2010, Port Elizabeth Plymouth: Plymouth University
    • Jansson, K. and von Solms, R., 2010. Social engineering: towards a holistic solution. In: Proceedings of the South African information security multi-conference (SAISMC 2010). South African Information Security Multi-Conference, 17-18 May 2010, Port Elizabeth Plymouth: Plymouth University
    • (2010) Proceedings of the South African Information Security Multi-conference (SAISMC 2010)
    • Jansson, K.1    Von Solms, R.2
  • 13
    • 84856394640 scopus 로고    scopus 로고
    • Aldershot, UK: Gower Publishing, Ltd. Oxford English Dictionary 2009. Oxford English dictionary, [Accessed 1 November 2011]
    • Mann, I., 2008. Hacking the human: social engineering techniques and security countermeasures. Aldershot, UK: Gower Publishing, Ltd. Oxford English Dictionary, 2009. Oxford English dictionary [online]. Available from: http://dictionary.oed.com/cgi/entry/00323586/00323586se1?single-1&query- type-word &queryword-Neurolinguisticprogramming&first-1& max-to-show-10&hilite-00323586se1 [Accessed 1 November 2011]
    • (2008) Hacking the Human: Social Engineering Techniques and Security Countermeasures
    • Mann, I.1
  • 15
    • 36849073159 scopus 로고    scopus 로고
    • Anti-phishing phil: The design and evaluation of a game that teaches people not to fall for phish
    • 18-20 July 2007 Pittsburgh
    • Sheng, S., et al., 2007. Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish. In: Proceedings of the 3rd symposium on usable privacy and security, 18-20 July 2007, Pittsburgh. 88-99
    • (2007) Proceedings of the 3rd Symposium on Usable Privacy and Security , pp. 88-99
    • Sheng, S.1
  • 16
    • 41949111662 scopus 로고    scopus 로고
    • Using cartoons to teach internet security
    • Srikwan, S. and Jakobsson, M., 2008. Using cartoons to teach internet security. Cryptologia, 32 (2), 137-154
    • (2008) Cryptologia , vol.32 , Issue.2 , pp. 137-154
    • Srikwan, S.1    Jakobsson, M.2
  • 17
    • 36349023276 scopus 로고    scopus 로고
    • H Venter M. Eloff, L. Labuschagne, J. Eloff, and R. Von Solms, eds. New approaches for security, privacy and trust in complex environments. IFIP International Federation for Information Processing. Boston: Springer
    • Steyn, T., Kruger, H., and Drevin, L., 2007. Identity theft-empirical evidence from a phishing exercise In: H. Venter, M. Eloff, L. Labuschagne, J. Eloff, and R. Von Solms, eds. New approaches for security, privacy and trust in complex environments. IFIP International Federation for Information Processing. Boston: Springer, 193-203
    • (2007) Identity Theft-empirical Evidence from A Phishing Exercise , pp. 193-203
    • Steyn, T.1    Kruger, H.2    Drevin, L.3
  • 18
    • 84879339199 scopus 로고    scopus 로고
    • (July-September 2010) [online] Symantec Corporation, pdf [Accessed 16 February 2011]
    • Symantec, 2010a. Symantec intelligence quarterly: global report (July-September 2010) [online] Symantec Corporation. Available from: http://www.symantec.com/content/en/us/enterprise/white-papers/ b-symc-intelligence-qtrly-july-to-sept-WP-21157366.en-us.pdf [Accessed 16 February 2011]
    • Symantec 2010a. Symantec Intelligence Quarterly: Global Report
  • 20
    • 84856381706 scopus 로고    scopus 로고
    • M. Gupta and R. Sharman, eds. Handbook of research on social and organizational liabilities in information security. Hershey, PA: IGI Global
    • Twitchell, D., 2009. Social engineering and its countermeasures. In: M. Gupta and R. Sharman, eds. Handbook of research on social and organizational liabilities in information security. Hershey, PA: IGI Global, 228-242
    • (2009) Social Engineering and Its Countermeasures , pp. 228-242
    • Twitchell, D.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.