Search results

1 – 7 of 7
Article
Publication date: 12 November 2018

Rika Butler and Martin Butler

Phishing attacks exploit social vulnerabilities and remain a global concern. Financial institutions often use their websites as part of their online awareness and education…

Abstract

Purpose

Phishing attacks exploit social vulnerabilities and remain a global concern. Financial institutions often use their websites as part of their online awareness and education efforts. This paper aims to explore the effectiveness of phishing-related information made available by financial institutions to raise awareness and educate customers.

Design/methodology/approach

In this mixed methods research, a survey of online consumers was first performed and analysed. Second, the information available on the websites of major financial institutions was analysed. Using the construct of information quality (IQ), content analysis was performed to determine whether the phishing-related information meets the IQ criteria.

Findings

The survey confirmed that consumers are indeed targeted by phishers. It established that they turn to their financial institutions, more often than any other source, for anti-phishing information. When analysing the IQ of phishing-related information, significant deficiencies as well as different levels of performance between the financial institutions, emerged. In general, the worst performing IQ criteria was information being current and fit for purpose.

Research limitations/implications

As the research is conducted within South Africa, the results cannot be generalised. The ethical clearance did not allow for identification of the different financial institutions and thus comparing consumers’ perceptions with the observed IQ from the content analysis to determine correlation.

Practical implications

Protecting consumers against phishing attacks remains critical, and this paper confirms that users turn to their financial institutions for information. Yet, the phishing-related information made available on the websites of financial institutions has severe deficiencies. Practitioners should use IQ to determine the appropriateness of phishing-related information and focus on improving customer awareness and education.

Originality/value

Researchers often highlight the importance of awareness and education programmes in protecting consumers, but rarely investigate if consumers access publicly available information and express an opinion on the quality of this information. Although the results should not generalised, the recommendations, if necessary through similar analysis, has an impact beyond the geographical constraints of the study.

Details

Information & Computer Security, vol. 26 no. 5
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 2 June 2020

Rika Butler

There is a need for behavioural research within the smartphone context to better understand users’ behaviour, as it is one of the reasons for the proliferation of mobile threats…

Abstract

Purpose

There is a need for behavioural research within the smartphone context to better understand users’ behaviour, as it is one of the reasons for the proliferation of mobile threats. This study aims to identify the human factors that affect smartphone users’ threat avoidance behaviour.

Design/methodology/approach

A structured literature review (SLR) was applied to answer the research question. A total of 27 sources were analysed, from which 16 codes emerged. After synthesis, six themes transpired.

Findings

Six factors were identified as drivers and/or challenges of smartphone users’ threat avoidance behaviour, namely, knowledge and awareness, misconceptions and trust, cost and benefit considerations, carelessness, perceived measure effectiveness and the user’s perceived skills and efficacy.

Research limitations/implications

The results can encourage and provide a starting point for further research on human behaviour to improve smartphone user behaviour.

Practical implications

The mobile industry should focus on eradicating common misconceptions and undue trust in mobile security that is prevalent among smartphone users and make cost effective and usable interventions available. Training and awareness programs should be updated to include the factors that were identified in this study to affect smartphone users’ threat avoidance behaviour. In addition to improving users’ declarative knowledge concerning available smartphone measures and tools, procedural knowledge should also be improved to ensure proper use of available protective measures. Users should realise the importance of staying updated with evolving smartphone technology and associated threats.

Originality/value

This study acknowledges and supports the notion that addressing human behaviour is crucial in the fight against mobile threats. It addresses the need for behavioural research to analyse the factors that drive smartphone user behaviour. Furthermore, it uses and documents the use of a SLR, a research technique often unfamiliar among information security researchers.

Details

Information & Computer Security, vol. 28 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 October 2015

Martin Butler and Rika Butler

The purpose of this paper was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk…

1350

Abstract

Purpose

The purpose of this paper was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk profile. Online security remains a challenge to ensure safe transacting on the Internet. User authentication, a human-centric process, is regarded as the basis of computer security and hence secure access to online banking services. The increased use of technology to enforce additional actions has the ability to improve the quality of authentication and hence online security, but often at the expense of usability. The objective of this study was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk profile.

Design/methodology/approach

A web-based survey was designed to determine online consumers’ competence resecure online behaviour, and this was used to quantify the online behaviour as more or less secure. The browsers used by consumers as well as their demographical data were correlated with the security profile of respondents to test for any significant variance in practice that could inform differentiated authentication.

Findings

A statistical difference between behaviours based on some of the dependant variables was evident from the analysis. Based on the results, a case could be made to have different authentication methods for online banking customers based on both their browser selected (before individual identification) as well as demographical data (after identification) to ensure a safer online environment.

Originality/value

The research can be used by the financial services sector to improve online security, where required, without necessarily reducing usability for more “security inclined” customers.

Details

Information & Computer Security, vol. 23 no. 4
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 9 October 2007

Rika Butler

The purpose of this paper is to aim to educate the internet consumer, who may be a potential phishing victim, and to suggest a framework of anti‐phishing measures, following the…

3821

Abstract

Purpose

The purpose of this paper is to aim to educate the internet consumer, who may be a potential phishing victim, and to suggest a framework of anti‐phishing measures, following the staggering increase in the number of recent phishing attacks. Phishing describes a method of online identity theft, in which phishers typically pose as legitimate organisations when sending deceptive e‐mail messages to internet users. When they respond to such e‐mails, victims are lured to malicious web sites, where they are duped into disclosing their personal details. In this way, phishers are able to commit identity theft, with possibly devastating consequences for the victim.

Design/methodology/approach

After a literature review of the available sources, the phishing threat is investigated by analysing the modus operandi of phishers and the basic components of a typical phishing scheme. A possible solution for the phishing problem is examined.

Findings

Phishers continually target the weakest link in the security chain, namely consumers, in their attacks. Educating the online consumer about phishing, as well as the implementation and proper application of anti‐phishing measures, are critical steps in protecting the identities of online consumers against e‐mail phishing attacks.

Originality/value

This article proposes measures that internet consumers can take to ward off phishing attacks, as well as remedial actions that they can take after falling victim to such an attack. By implementing these measures online, consumers can minimise the risk of becoming victims of successful phishing attacks, as well as remedy the negative effects of any past disclosure of information to phishers.

Details

The Electronic Library, vol. 25 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Content available
Article
Publication date: 13 November 2009

922

Abstract

Details

The Electronic Library, vol. 27 no. 6
Type: Research Article
ISSN: 0264-0473

Content available
Article
Publication date: 3 October 2008

545

Abstract

Details

The Electronic Library, vol. 26 no. 5
Type: Research Article
ISSN: 0264-0473

Keywords

Article
Publication date: 1 June 2020

Mohammadreza Akbari and Robert McClelland

The purpose of this research is to provide a systematic insight into corporate social responsibility (CSR) and corporate citizenship (CC) in supply chain development, by analyzing…

2949

Abstract

Purpose

The purpose of this research is to provide a systematic insight into corporate social responsibility (CSR) and corporate citizenship (CC) in supply chain development, by analyzing the current literature, contemporary concepts, data and gaps for future discipline research.

Design/methodology/approach

This research identifies information from existing academic journals and investigates research designs and methods, data analysis techniques, industry involvement and geographic locations. Information regarding university affiliation, publishers, authors, year of publication is also documented. A collection of online databases from 2001 to 2018 were explored, using the keywords “corporate social responsibility”, “corporate citizenship” and “supply chain” in their title and abstract, to deliver an inclusive listing of journal articles in this discipline area. Based on this approach, a total of 164 articles were found, and information on a chain of variables was collected.

Findings

There has been visible growth in published articles over the last 18 years regarding supply chain sustainability, CSR and CC. Analysis of the data collected shows that only five literature reviews have been published in this area. Further, key findings include 41% of publications were narrowly focused on four sectors of industry, leaving gaps in the research. 85% centered on the survey and conceptual model, leaving an additional gap for future research. Finally, developing and developed nation status should be delineated, researched and analyzed based on further segmentation of the industry by region.

Research limitations/implications

This research is limited to reviewing only academic and professional articles available from Emerald, Elsevier, Wiley, Sage, Taylor and Francis, Springer, Scopus, JSTOR and EBSCO containing the words “corporate social responsibility”, “corporate citizenship” and “supply chain” in the title and abstract.

Originality/value

This assessment provides an enhanced appreciation of the current practices of current research and offers further directions within the CSR and CC in supply chain sustainable development.

Details

Benchmarking: An International Journal, vol. 27 no. 6
Type: Research Article
ISSN: 1463-5771

Keywords

1 – 7 of 7