IDEAS home Printed from https://ideas.repec.org/a/igg/jhcitp/v6y2015i2p49-64.html
   My bibliography  Save this article

Time Up for Phishing with Effective Anti-Phishing Research Strategies

Author

Listed:
  • Sunil Chaudhary

    (University of Tampere, Tampere, Finland)

  • Eleni Berki

    (University of Tampere, Tampere, Finland and University of Jyväskylä, Jyväskylä, Finland)

  • Linfeng Li

    (Beijing Institute of Petrochemical Technology, Beijing, China)

  • Juri Valtanen

    (University of Tampere, Tampere, Finland)

Abstract

Public awareness is a significant factor in the battle against online identity theft (phishing). Advancing public readiness can be a strategic protection mechanism for citizens' vulnerability and privacy. Further, an effective research strategy against phishing is the combination of increased social awareness with software quality and social computing. The latter will decrease phishing victims and will improve information systems quality. First, the authors discuss recent research results on software quality criteria used for the design of anti-phishing technologies. Second, it is argued that the dynamics of social surroundings affect citizens' trust and can compromise social security. Third, the authors outline basic research needs and strategic steps to be taken for timely citizens' protection. Last, the authors propose strategic research directions for improving information systems total quality management through international collaborative research and by focusing on: i) increasing social awareness; ii) predicting information phishing attempts; iii) adopting social computing approaches.

Suggested Citation

  • Sunil Chaudhary & Eleni Berki & Linfeng Li & Juri Valtanen, 2015. "Time Up for Phishing with Effective Anti-Phishing Research Strategies," International Journal of Human Capital and Information Technology Professionals (IJHCITP), IGI Global, vol. 6(2), pages 49-64, April.
  • Handle: RePEc:igg:jhcitp:v:6:y:2015:i:2:p:49-64
    as

    Download full text from publisher

    File URL: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/IJHCITP.2015040104
    Download Restriction: no
    ---><---

    More about this item

    Statistics

    Access and download statistics

    Corrections

    All material on this site has been provided by the respective publishers and authors. You can help correct errors and omissions. When requesting a correction, please mention this item's handle: RePEc:igg:jhcitp:v:6:y:2015:i:2:p:49-64. See general information about how to correct material in RePEc.

    If you have authored this item and are not yet registered with RePEc, we encourage you to do it here. This allows to link your profile to this item. It also allows you to accept potential citations to this item that we are uncertain about.

    We have no bibliographic references for this item. You can help adding them by using this form .

    If you know of missing items citing this one, you can help us creating those links by adding the relevant references in the same way as above, for each refering item. If you are a registered author of this item, you may also want to check the "citations" tab in your RePEc Author Service profile, as there may be some citations waiting for confirmation.

    For technical questions regarding this item, or to correct its authors, title, abstract, bibliographic or download information, contact: Journal Editor (email available below). General contact details of provider: https://www.igi-global.com .

    Please note that corrections may take a couple of weeks to filter through the various RePEc services.

    IDEAS is a RePEc service. RePEc uses bibliographic data supplied by the respective publishers.