Reference Hub3
Time Up for Phishing with Effective Anti-Phishing Research Strategies

Time Up for Phishing with Effective Anti-Phishing Research Strategies

Sunil Chaudhary, Eleni Berki, Linfeng Li, Juri Valtanen
Copyright: © 2015 |Volume: 6 |Issue: 2 |Pages: 16
ISSN: 1947-3478|EISSN: 1947-3486|EISBN13: 9781466678408|DOI: 10.4018/IJHCITP.2015040104
Cite Article Cite Article

MLA

Chaudhary, Sunil, et al. "Time Up for Phishing with Effective Anti-Phishing Research Strategies." IJHCITP vol.6, no.2 2015: pp.49-64. http://doi.org/10.4018/IJHCITP.2015040104

APA

Chaudhary, S., Berki, E., Li, L., & Valtanen, J. (2015). Time Up for Phishing with Effective Anti-Phishing Research Strategies. International Journal of Human Capital and Information Technology Professionals (IJHCITP), 6(2), 49-64. http://doi.org/10.4018/IJHCITP.2015040104

Chicago

Chaudhary, Sunil, et al. "Time Up for Phishing with Effective Anti-Phishing Research Strategies," International Journal of Human Capital and Information Technology Professionals (IJHCITP) 6, no.2: 49-64. http://doi.org/10.4018/IJHCITP.2015040104

Export Reference

Mendeley
Favorite Full-Issue Download

Abstract

Public awareness is a significant factor in the battle against online identity theft (phishing). Advancing public readiness can be a strategic protection mechanism for citizens' vulnerability and privacy. Further, an effective research strategy against phishing is the combination of increased social awareness with software quality and social computing. The latter will decrease phishing victims and will improve information systems quality. First, the authors discuss recent research results on software quality criteria used for the design of anti-phishing technologies. Second, it is argued that the dynamics of social surroundings affect citizens' trust and can compromise social security. Third, the authors outline basic research needs and strategic steps to be taken for timely citizens' protection. Last, the authors propose strategic research directions for improving information systems total quality management through international collaborative research and by focusing on: i) increasing social awareness; ii) predicting information phishing attempts; iii) adopting social computing approaches.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.