TITLE

CYBER SECURITY: A LONGITUDINAL EXAMINATION OF UNDERGRADUATE BEHAVIOR AND PERCEPTIONS

AUTHOR(S)
Case, Carl J.; King, Darwin L.
PUB. DATE
June 2013
SOURCE
ASBBS eJournal;Summer2013, Vol. 9 Issue 1, p21
SOURCE TYPE
Academic Journal
DOC. TYPE
Article
ABSTRACT
Internet fraud continues to be a challenge in the business world. This study was undertaken to expand upon a previous study and determine if undergraduate students are at a similar cyber security risk. Findings suggest that spam and phishing are becoming less problematic for the undergraduate population. During the five-year study period, spam decreased by 38%, the volume of phishing attacks decreased by 36%, and by 2012, only 4% of students reported receiving phishing attacks. It could be surmised that improved spam filters, proactive education, and responsible student behavior may be driving this positive trend.
ACCESSION #
90139091

 

Related Articles

  • 5 THINGS… THAT CAN HELP YOU SPOT A PHISHING E-MAIL SCAM. Tynan, Dan // Popular Science;Mar2006, Vol. 268 Issue 3, p72 

    This article offers advice for avoiding phishing e-mail scams. Always type Web addresses in the browser rather than clicking links in e-mail, and call the bank if you think a message might be legitimate. Watch out for misspellings since majority of phisher e-mails are written by non-native...

  • Get-rich-quick offers make Net a money pit. Goldsborough, Reid // New Orleans CityBusiness (1994 to 2008);03/26/2001, Vol. 21 Issue 40, p25 

    Focuses on the use of unsolicited e-mails by Internet scam artists. Examples of fraudulent e-mail solicitations; Difference from e-mails from bona fide businesses; Pyramid schemes promoted by scam artists on the Internet.

  • Protecting e-mail. Radcliff, Deb // Network World;1/23/2006, Vol. 23 Issue 3, p29 

    The article reports on the adoption of advanced security methods in protecting electronic mails (e-mail) among various information technology industry in the U.S. Among these methods includes e-mail authentication which is capable of stopping spam and phishing, Sender Policy Framework (SPF) and...

  • New Threat: Undetectable Facebook Scams. Larkin, Erik // PCWorld;Jun2010, Vol. 28 Issue 6, p40 

    The article discusses scams on the social networking site Facebook, made up of malicious applications for everything from phishing to spam to a first step toward installing more dangerous malware onto one's personal computer (PC). The author suggests for Facebook to test programs before allowing...

  • Stupidity wanted, enquire within. Dingle, Simon // Finweek;7/4/2013, p19 

    The article discusses issues when it comes to the increasing cybercrime or spam incidents in South Africa. A survey conducted by information technology (IT) security company Kaspersky Labs depicts that the problem of phishing crime in the region is getting worse than ever, noting that the number...

  • Finra Warns of ARS-Related Phishing.  // American Banker;10/6/2009, Vol. 174 Issue 184, p9 

    The article reports that the Financial Industry Regulatory Authority (Finra) has warned investors of phishing computer crime related to the agency's attempts to settle claims related to so-called auction-rate securities. Finra stated that investors are receiving electronic mail messages made to...

  • Spam that delivers a pink slip. Garretson, Cara // Network World;11/6/2006, Vol. 23 Issue 43, p10 

    The article reports on the spam or spear phishing scam in Dekalb Medical Center in Decatur, Georgia. The spam was in the form of an e-mail, which was sent to employees of the medical center stating that they were being laid-off. In addition, the e-mail contained a link to a Web site that claimed...

  • Teaching smart social Networking. Gilmore, Agatha // Certification Magazine;Jan2009, Vol. 11 Issue 1, p14 

    The article reports on the ban of the use of Facebook on all on-campus terminals including desktop computers of the Concordia University in Montreal. The ban, which was enforced on September 2008, was implemented after Concordia officials noticed an increase in spam and phishing attacks that...

  • On The Menu Today Is Phish And Spam.  // Software World;Nov2006, Vol. 37 Issue 6, p26 

    The article reports on the phishing and spam activities in the Internet. According to a survey conducted by Gartner, phishers have specific targets, usually going after high earners and those who have the tendency to transact over the Internet. Phishers and spammers have been working together....

Share

Read the Article

Courtesy of THE LIBRARY OF VIRGINIA

Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics