2012
DOI: 10.1108/09685221211286548
|View full text |Cite
|
Sign up to set email alerts
|

Phishing counter measures and their effectiveness – literature review

Abstract: PurposePhishing is essentially a social engineering crime on the Web, whose rampant occurrences and technique advancements are posing big challenges for researchers in both academia and the industry. The purpose of this study is to examine the available phishing literatures and phishing countermeasures, to determine how research has evolved and advanced in terms of quantity, content and publication outlets. In addition to that, this paper aims to identify the important trends in phishing and its countermeasure… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

2
87
0
2

Year Published

2015
2015
2024
2024

Publication Types

Select...
5
3

Relationship

0
8

Authors

Journals

citations
Cited by 103 publications
(97 citation statements)
references
References 150 publications
2
87
0
2
Order By: Relevance
“…Multi-channel authentication approach is focused on the prime motivation of phishers which is to obtain sensitive credentials of online users (Purkait, 2012). With such information leaked to phishers, online users can suffer damages ranging from financial losses to unhealthy disclosure of their secrets.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Multi-channel authentication approach is focused on the prime motivation of phishers which is to obtain sensitive credentials of online users (Purkait, 2012). With such information leaked to phishers, online users can suffer damages ranging from financial losses to unhealthy disclosure of their secrets.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, we also present a brief overview of the other fields to provide background to our research. In [1], Purkait provided a comprehensive phishing detection literature which introduced a complete review about the phishing detection techniques. www.ijacsa.thesai.org Google Safe Browsing [10] utilizes a blacklist phishing detection approach.…”
Section: Related Workmentioning
confidence: 99%
“…Phishing is a sort of semantic attack and attacks are targeting social or financial achievements [1]. In phishing attack, attackers attempt to trick and take money from the users of the internet by sending them e-mails instead of using malware software.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Many efforts have been made to overcome the phishing attacks through numerous phishing detecting approaches. Nevertheless, phishing has caused enormous money loss in the cyberspace over the past years, which has motivated researchers to seek effective phishing detection techniques that protect users' digital identity [1][2][3]. In general, phishing detection techniques fall into several categories due to the deployed scenarios of detection.…”
Section: Introductionmentioning
confidence: 99%