Phishing attacks exploit social vulnerabilities and remain a global concern. Financial institutions often use their websites as part of their online awareness and education…
Abstract
Purpose
Phishing attacks exploit social vulnerabilities and remain a global concern. Financial institutions often use their websites as part of their online awareness and education efforts. This paper aims to explore the effectiveness of phishing-related information made available by financial institutions to raise awareness and educate customers.
Design/methodology/approach
In this mixed methods research, a survey of online consumers was first performed and analysed. Second, the information available on the websites of major financial institutions was analysed. Using the construct of information quality (IQ), content analysis was performed to determine whether the phishing-related information meets the IQ criteria.
Findings
The survey confirmed that consumers are indeed targeted by phishers. It established that they turn to their financial institutions, more often than any other source, for anti-phishing information. When analysing the IQ of phishing-related information, significant deficiencies as well as different levels of performance between the financial institutions, emerged. In general, the worst performing IQ criteria was information being current and fit for purpose.
Research limitations/implications
As the research is conducted within South Africa, the results cannot be generalised. The ethical clearance did not allow for identification of the different financial institutions and thus comparing consumers’ perceptions with the observed IQ from the content analysis to determine correlation.
Practical implications
Protecting consumers against phishing attacks remains critical, and this paper confirms that users turn to their financial institutions for information. Yet, the phishing-related information made available on the websites of financial institutions has severe deficiencies. Practitioners should use IQ to determine the appropriateness of phishing-related information and focus on improving customer awareness and education.
Originality/value
Researchers often highlight the importance of awareness and education programmes in protecting consumers, but rarely investigate if consumers access publicly available information and express an opinion on the quality of this information. Although the results should not generalised, the recommendations, if necessary through similar analysis, has an impact beyond the geographical constraints of the study.
Details
Keywords
There is a need for behavioural research within the smartphone context to better understand users’ behaviour, as it is one of the reasons for the proliferation of mobile threats…
Abstract
Purpose
There is a need for behavioural research within the smartphone context to better understand users’ behaviour, as it is one of the reasons for the proliferation of mobile threats. This study aims to identify the human factors that affect smartphone users’ threat avoidance behaviour.
Design/methodology/approach
A structured literature review (SLR) was applied to answer the research question. A total of 27 sources were analysed, from which 16 codes emerged. After synthesis, six themes transpired.
Findings
Six factors were identified as drivers and/or challenges of smartphone users’ threat avoidance behaviour, namely, knowledge and awareness, misconceptions and trust, cost and benefit considerations, carelessness, perceived measure effectiveness and the user’s perceived skills and efficacy.
Research limitations/implications
The results can encourage and provide a starting point for further research on human behaviour to improve smartphone user behaviour.
Practical implications
The mobile industry should focus on eradicating common misconceptions and undue trust in mobile security that is prevalent among smartphone users and make cost effective and usable interventions available. Training and awareness programs should be updated to include the factors that were identified in this study to affect smartphone users’ threat avoidance behaviour. In addition to improving users’ declarative knowledge concerning available smartphone measures and tools, procedural knowledge should also be improved to ensure proper use of available protective measures. Users should realise the importance of staying updated with evolving smartphone technology and associated threats.
Originality/value
This study acknowledges and supports the notion that addressing human behaviour is crucial in the fight against mobile threats. It addresses the need for behavioural research to analyse the factors that drive smartphone user behaviour. Furthermore, it uses and documents the use of a SLR, a research technique often unfamiliar among information security researchers.
Details
Keywords
The purpose of this paper was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk…
Abstract
Purpose
The purpose of this paper was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk profile. Online security remains a challenge to ensure safe transacting on the Internet. User authentication, a human-centric process, is regarded as the basis of computer security and hence secure access to online banking services. The increased use of technology to enforce additional actions has the ability to improve the quality of authentication and hence online security, but often at the expense of usability. The objective of this study was to determine factors that could be used to create different authentication requirements for diverse online banking customers based on their risk profile.
Design/methodology/approach
A web-based survey was designed to determine online consumers’ competence resecure online behaviour, and this was used to quantify the online behaviour as more or less secure. The browsers used by consumers as well as their demographical data were correlated with the security profile of respondents to test for any significant variance in practice that could inform differentiated authentication.
Findings
A statistical difference between behaviours based on some of the dependant variables was evident from the analysis. Based on the results, a case could be made to have different authentication methods for online banking customers based on both their browser selected (before individual identification) as well as demographical data (after identification) to ensure a safer online environment.
Originality/value
The research can be used by the financial services sector to improve online security, where required, without necessarily reducing usability for more “security inclined” customers.
Details
Keywords
The purpose of this paper is to aim to educate the internet consumer, who may be a potential phishing victim, and to suggest a framework of anti‐phishing measures, following the…
Abstract
Purpose
The purpose of this paper is to aim to educate the internet consumer, who may be a potential phishing victim, and to suggest a framework of anti‐phishing measures, following the staggering increase in the number of recent phishing attacks. Phishing describes a method of online identity theft, in which phishers typically pose as legitimate organisations when sending deceptive e‐mail messages to internet users. When they respond to such e‐mails, victims are lured to malicious web sites, where they are duped into disclosing their personal details. In this way, phishers are able to commit identity theft, with possibly devastating consequences for the victim.
Design/methodology/approach
After a literature review of the available sources, the phishing threat is investigated by analysing the modus operandi of phishers and the basic components of a typical phishing scheme. A possible solution for the phishing problem is examined.
Findings
Phishers continually target the weakest link in the security chain, namely consumers, in their attacks. Educating the online consumer about phishing, as well as the implementation and proper application of anti‐phishing measures, are critical steps in protecting the identities of online consumers against e‐mail phishing attacks.
Originality/value
This article proposes measures that internet consumers can take to ward off phishing attacks, as well as remedial actions that they can take after falling victim to such an attack. By implementing these measures online, consumers can minimise the risk of becoming victims of successful phishing attacks, as well as remedy the negative effects of any past disclosure of information to phishers.
Details
Keywords
Abstract
Details
Keywords
Mohammadreza Akbari and Robert McClelland
The purpose of this research is to provide a systematic insight into corporate social responsibility (CSR) and corporate citizenship (CC) in supply chain development, by analyzing…
Abstract
Purpose
The purpose of this research is to provide a systematic insight into corporate social responsibility (CSR) and corporate citizenship (CC) in supply chain development, by analyzing the current literature, contemporary concepts, data and gaps for future discipline research.
Design/methodology/approach
This research identifies information from existing academic journals and investigates research designs and methods, data analysis techniques, industry involvement and geographic locations. Information regarding university affiliation, publishers, authors, year of publication is also documented. A collection of online databases from 2001 to 2018 were explored, using the keywords “corporate social responsibility”, “corporate citizenship” and “supply chain” in their title and abstract, to deliver an inclusive listing of journal articles in this discipline area. Based on this approach, a total of 164 articles were found, and information on a chain of variables was collected.
Findings
There has been visible growth in published articles over the last 18 years regarding supply chain sustainability, CSR and CC. Analysis of the data collected shows that only five literature reviews have been published in this area. Further, key findings include 41% of publications were narrowly focused on four sectors of industry, leaving gaps in the research. 85% centered on the survey and conceptual model, leaving an additional gap for future research. Finally, developing and developed nation status should be delineated, researched and analyzed based on further segmentation of the industry by region.
Research limitations/implications
This research is limited to reviewing only academic and professional articles available from Emerald, Elsevier, Wiley, Sage, Taylor and Francis, Springer, Scopus, JSTOR and EBSCO containing the words “corporate social responsibility”, “corporate citizenship” and “supply chain” in the title and abstract.
Originality/value
This assessment provides an enhanced appreciation of the current practices of current research and offers further directions within the CSR and CC in supply chain sustainable development.