skip to main content
research-article
Free Access

Technical opinion

What drives the adoption of antiphishing measures by Hong Kong banks?

Published:01 August 2009Publication History
Skip Abstract Section

Abstract

Introduction

Phishing mongers and posers have taken the world by a storm and it is estimated that the annual financial loss due to phishing scams is at least US $320 million. Hong Kong has been a hotspot of phishing attacks and since majority of phishing incidences occurring in the world are related to the financial services industry, banks in Hong Kong have been frequent targets. We conducted a study of Hong Kong banks in 2005 and 2007 to assess their phishing readiness and to understand the driving forces that shaped their adoption of anti-phishing measures (AM) over time. We searched the security related information available on the Web sites of the Hong Kong banks to determine AM adopted by them. We scored the banks based on the adoption of AM and related it to characteristics of banks and other plausible external factors.

References

  1. Berghel, H. Phishing mongers and posers. Comm. ACM 49, 4 (Apr. 2006), 21--25. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Bose, I. and Leung, ACM. Unveiling the mask of phishing: Threats, preventive measures, and responsibilities. Comm. AIS 19, 24 (Apr. 2007), 544--566.Google ScholarGoogle Scholar
  3. Chan, I. Better authentication allays online banking fears. ZDNet Asia (2007); www.zdnetasia.com/insight/specialreports/0,39044853,62020506,00.htm.Google ScholarGoogle Scholar
  4. Financial Services Technology Consortium. Understanding and countering the phishing threat: A financial services industry perspective (2005); www.fstc.org/projects/docs/FSTC_Counter_Phishing_Project_Whitepaper.pdf.Google ScholarGoogle Scholar
  5. Hong Kong Monetary Authority. Fraudulent bank websites and e-mails (2004); www.info.gov.hk/hkma/eng/press/2004/20041007e4.htm.Google ScholarGoogle Scholar
  6. Liu, P., Seyyed, F.J. and Smith, S.D. The independent impact of credit rating changes - The case of Moody's rating refinement on yield premiums. Journal of Business Finance&Accounting 26, 3-4 (1999), 337--363.Google ScholarGoogle Scholar
  7. Moore, T. and Clayton, R. Examining the impact of website take-down on phishing. In Proceedings of the Anti-phishing Working Groups 2nd Annual eCrime Researchers Summit (Pittsburgh, PA, 2007), ACM Press, 1--13. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Technical opinion

    What drives the adoption of antiphishing measures by Hong Kong banks?

              Recommendations

              Comments

              Login options

              Check if you have access through your login credentials or your institution to get full access on this article.

              Sign in

              Full Access

              • Published in

                cover image Communications of the ACM
                Communications of the ACM  Volume 52, Issue 8
                A Blind Person's Interaction with Technology
                August 2009
                132 pages
                ISSN:0001-0782
                EISSN:1557-7317
                DOI:10.1145/1536616
                Issue’s Table of Contents

                Copyright © 2009 ACM

                Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

                Publisher

                Association for Computing Machinery

                New York, NY, United States

                Publication History

                • Published: 1 August 2009

                Permissions

                Request permissions about this article.

                Request Permissions

                Check for updates

                Qualifiers

                • research-article
                • Popular
                • Refereed

              PDF Format

              View or Download as a PDF file.

              PDF

              eReader

              View online with eReader.

              eReader

              HTML Format

              View this article in HTML Format .

              View HTML Format