Abstract
This paper is the second part of an entire study conducted regarding general awareness of email scams. The goal of this particular part of research was to check the awareness level and knowledge gap among email users with respect to the actions that need to be taken in case of scam email victimization, and awareness regarding common practices that are used in identifying scam email and types of online scam media. Most common actions mentioned by respondents in case of financial scams and clicking on a malicious link were to contact their banks to close their accounts and cancel their credit cards (41.17 %) and running an anti-virus scan (20.83 %) respectively. The most frequently mentioned online scam media other than email was online ads with pop-ups, while the most common practice employed to identify email scam was to check for emails asking for or giving away money. A definite lack of awareness was found among the users with respect to the actions that need to be taken in case of financial scam victimization. In conclusion, the researchers suggest a need for formal education regarding email scam awareness and best email usage practices.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Bracketed numbers indicate frequency.
References
Sophos: the security threat report 2014 (2014). http://www.sophos.com/en-us/medialibrary/PDFs/other/sophos-security-threat-report-2014.pdf
Securelist: spam report: January 2014 (2014). https://www.securelist.com/en/analysis/204792327/Spam_report_January_2014
Securelist: spam report: February 2014 (2014). https://www.securelist.com/en/analysis/204792328/Spam_report_February_2014#09
Office: identify fraudulent email and phishing schemes (n.d.). http://office.microsoft.com/en-us/outlook-help/identify-fraudulent-e-mail-and-phishing-schemes-HA001140002.aspx
Apple: identifying fraudulent “phishing” email (n.d.). http://support.apple.com/kb/ht4933
OnGuardOnline: identity theft. (n.d.) http://www.onguardonline.gov/articles/0005-identity-theft
OnGuardOnline: phishing (n.d.). http://www.onguardonline.gov/phishing#action%20steps
Michgan State Police: victim action steps (n.d.). http://www.michigan.gov/msp/0,4643,7-123-1589_35832_38137---,00.html
Microsoft: email and web scams: how to help protect yourself (n.d.). http://www.microsoft.com/en-GB/security/online-privacy/phishing-scams.aspx
Federal Bureau of Investigation: new e-scams and warnings (n.d.). http://www.fbi.gov/scams-safety/e-scams
Acohido: USA Today, 3 must-do steps to recover from a phishing scam (17 May 2013). http://www.usatoday.com/story/cybertruth/2013/05/17/phishing-scams-steps-to-recover-privacy/2193105/
Computer world: don’t click that link, but if you do… (11 April 2014). http://blogs.computerworld.com/15907/dont_click_that_link_but_if_you_do
Fortinet: you clicked on that (malicious) link: from panic to peace of mind (20 April 2012). https://blog.fortinet.com/you-clicked-on-that-malicious-link-from-panic-to-peace-of-mind/
Gudkova, D: Kaspersky Security Bulletin. Spam evolution 2013 (2014). http://securelist.com/analysis/kaspersky-security-bulletin/58274/kaspersky-security-bulletin-spam-evolution-2013/
Internet crime complaint center: internet crime schemes (n.d.). http://www.ic3.gov/crimeschemes.aspx#item-17
Internet crime complaint center: scam alerts (March 2014). http://www.ic3.gov/media/2014/140321.aspx
Norton: your security resource (n.d.). http://us.norton.com/yoursecurityresource/detail.jsp?aid=social_media_scams
Norton: social networking scam (n.d.). http://us.norton.com/social-networking-scams/article
OnGuardOnline: common online scams (n.d.). https://www.onguardonline.gov/articles/0002-common-online-scams
Jakobsson, M., Tsow, A., Shah, A., Blevis, E., Lim, Y.-k.: What Instills trust? A qualitative study of phishing. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 356–361. Springer, Heidelberg (2007)
Shannon, L., Bennett, J.: A case study: applying critical thinking skills to computer science and technology. In: Information Systems Educators Conference, vol. 28 (2011)
Wang, J., Herath, T., Chen, R., Vishwanath, A., Rao, H.R.: Phishing susceptibility: an investigation into the processing of a targeted spear phishing email. IEEE Trans. Prof. Commun. 99 (2012). doi:10.1109/TPC.2012.2208392
Freiermuth, M.: Text, lies and electronic bait: An analysis of email fraud and the decisions of the unsuspecting. Discourse Commun. 5, 123–125 (2011). doi:10.1177/1750481310395448
Ragucci, J., Robila, S.: Societal aspects of phishing. IEEE, pp. 1–5 (2006). doi:10.1109/ISTAS.2006.4375893
Datar, T.D., Cole, K.A., Rogers, M.K.: Awareness of scam e-mails: an exploratory research study. In: Proceedings of the Conference on Digital Forensics, Security and Law, pp. 11–34 (May 2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Institute for Computer Sciences, Social informatics and Telecommunication Engineering
About this paper
Cite this paper
Cole, K.A., Datar, T.D., Rogers, M.K. (2015). Awareness of Scam E-Mails: An Exploratory Research Study – Part 2. In: James, J., Breitinger, F. (eds) Digital Forensics and Cyber Crime. ICDF2C 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 157. Springer, Cham. https://doi.org/10.1007/978-3-319-25512-5_9
Download citation
DOI: https://doi.org/10.1007/978-3-319-25512-5_9
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-25511-8
Online ISBN: 978-3-319-25512-5
eBook Packages: Computer ScienceComputer Science (R0)