Routine Activity Theory and Phishing Victimisation: Who Gets Caught in the ‘Net’?

نویسندگان

  • Alice Hutchings
  • Hennessey Hayes
چکیده

Phishing is the use of fraudulent emails to obtain personal financial information from victims by posing as legitimate financial institutions or commerce sites. This exploratory study involved interviewing 104 participants, 50 of whom reported having received a phishing email. The theoretical foundation for this research is Routine Activity Theory, whereby crime is considered to be the consequence of the presence of a motivated offender, the presence of a suitable target, and the absence of a capable guardian. One of the findings arising from this research indicates that potential victims who undertake high levels of routine activities relating to computer use and internet banking use are more likely to be attacked by motivated offenders. However, it is proposed that high measures in these variables also act as protective factors against subsequent victimisation. Additionally, email filters, although they may be effective in blocking a large number of spam emails, are unable to differentiate legitimate emails from some phishing attacks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Unweaving the Phisher's Net: An Exploratory Study

Over 29,000 phishing emails are reported each month on average to the AntiPhishing Working Group. If we consider that at least 5% of these emails achieve their target, at least 1,450 distinct email users a month are caught in the phisher’s net. This study attempts to understand the basic deception techniques utilized by phishers when creating the phishing emails. Exploratory content and linguis...

متن کامل

Revisiting Email Spoofing Attacks

The email system is the central battleground against phishing and social engineering attacks, and yet email providers still face key challenges to authenticate incoming emails. As a result, attackers can apply spoofing techniques to impersonate a trusted entity to conduct highly deceptive phishing attacks. In this work, we study email spoofing to answer three key questions: (1) How do email pro...

متن کامل

Mapping Activity Diagram to Petri Net: Application of Markov Theory for Analyzing Non-Functional Parameters

The quality of an architectural design of a software system has a great influence on achieving non-functional requirements of a system. A regular software development project is often influenced by non-functional factors such as the customers' expectations about the performance and reliability of the software as well as the reduction of underlying risks. The evaluation of non-functional paramet...

متن کامل

A Theoretical Framework to Study Variations in Workplace Violence Experienced by Emergency Responders Integrating Opportunity and Vulnerability Perspectives

Emergency responders are often sent to the front line and are often confronted with aggression and violence in interaction with citizens. According to previous studies, some professionals experience more workplace violence than others. In this article, the theoretical framework to study variations in workplace violence against emergency responders is described. According to criminal opportunity...

متن کامل

DRAFT ONLY: NOT TO BE CITED WITHOUT PERMISSION FROM THE AUTHORS Theories of Indigenous violence: A preliminary assessment

A number of theories have been put forward to explain the high level of violence amongst Australia’s Indigenous population. Up until 2002, lack of suitable data on the risk factors associated with Indigenous violent victimisation made it very difficult to assess the adequacy of these theories. In 2002 the Australian Bureau of Statistics conducted a national survey (the NATSISS) of Aboriginal an...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014