Comparing Victims of Phishing and Malware Attacks: Unraveling Risk Factors and Possibilities for Situational Crime Prevention
نویسنده
چکیده
This paper compares the risk factors for becoming a victim of two types of phishing: high-tech phishing (using malicious software) and low-tech phishing (using e-mails and telephone calls). These risk factors are linked to possibilities for situational crime prevention. Data from a cybercrime victim survey in the Netherlands (n=10,316) is used. Based on routine activity theory, the multivariate analyses include thirty variables. There are many similarities between the two types of attacks. Both have almost the same crime script, for example. Furthermore, analyses show that both criminal groups are happy with almost any victim they can get and do not discriminate between the rich and poor. There are also differences between highand low-tech victimization. First, almost none of the online visibility variables had any effect on the risk of becoming victim to low-tech attacks. Victims of high-tech attacks tell a different story. There is a clear connection between victimization and spending time in the online world. The second difference can be found within online accessibility. Again, none of the variables mattered when it came to the low-tech attacks. The malware analysis, however, shows that the victims’ technical infrastructure does affect the risk of victimization. The findings show situational crime prevention has to be aimed at groups other than just the users themselves. Criminals are primarily interested in popular online places and the onus is on the owners of these virtual places to protect their visitors from getting infected. Keywords—malware; phishing; cybercrime; situational crime prevention
منابع مشابه
Browsers Defenses against Phishing, Spoofing and Malware 1 Ssl-based Logon
Web users are increasingly victims of phishing, spoofing and malware attacks. In this article, we discuss existing and proposed defense mechanisms. We highlight the vulnerabilities of current defenses, and the challenges of validating and adopting new defenses.
متن کاملThe Relationship between Social Support and Attitude towards the Police on Street Children
The study of criminal phenomenon in criminology also occurs with a greater focus on the individual offender. Measures and activities governing the abused children among the victims who are particularly vulnerable ,Before victimization, by eliminating factors influencing victimization of children - including individual factors( biological, psychological factors), general factors ( economic, soci...
متن کاملMacroeconomic Analysis of Malware
Malware harms infected individuals by stealing computational resources and possibly authenticating information. Malware also creates negative externalities for all users by enabling the creation of botnets for criminal enterprise, e.g. DDoS or phishing. Why is there such a variance in the percentage of malware infections across nations? While there may be idiosyncratic or ad-hoc explanations fo...
متن کاملIntegrating self-efficacy into a gamified approach to thwart phishing attacks
Security exploits can include cyber threats such as computer programs that can disturb the normal behavior of computer systems (viruses), unsolicited e-mail (spam), malicious software (malware), monitoring software (spyware), attempting to make computer resources unavailable to their intended users (Distributed Denial-of-Service or DDoS attack), the social engineering, and online identity theft...
متن کاملEvolutions of Crime Prevention Strategy in Democratic Model of Criminal Policy
In the light of Discontinuing Strategy, new crime prevention approaches has directed by the democratic model of criminal policy to limit the requirements of security – oriented paradigm. The fact that has preferred situational crime prevention on social crime prevention referring to the confrontation of democratic countries with terrorist crimes, crime rhizomatic, domination of new powers and b...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- CoRR
دوره abs/1506.00769 شماره
صفحات -
تاریخ انتشار 2015