– This paper seeks to focus on identifying the need for education to enhance awareness of the e‐mail phishing threat as the most effective way to reduce the risk of e‐mail phishing in one of the fastest growing economies in the world, the State of Qatar., – A survey comprising a questionnaire and interviews was used to investigate the awareness of phishing among Qatari citizens, their susceptibility to phishing and their views on the best method of defence against this attack, and this was compared to other developed nations, the UK in particular., – The paper concludes that phishing is becoming common and very successful because of people's susceptibility to such attack, largely due to insufficient awareness of the threat. Comparing Qatar with the UK, there were significant differences between responses in each country in most questionnaire variables, especially those identifying the vulnerability to phishing which was found to be very high in Qatar., – The paper shows that there is a particular need for education on phishing in this fast developing country., – There is a growing threat in the use of phishing by hackers and some businesses to obtain information on individual users on the internet through e‐mail or the web. In some cases this has led to identity thefts and related illogical operations online both within and across countries. This paper has compared level of awareness of phishing in two countries and has the potential to shed light on attitudes and present status of e‐mail phishing with a view to developing ways of dealing with it and improving cyber security and international operations., – The paper adopts an innovative approach to study e‐mail phishing and compares results from two diverse countries. New ideas are advanced from the findings which are useful for understanding some operations in cyber space.
[1]
Peter Pecho,et al.
Social Networks Security
,
2009,
2009 Third International Conference on Emerging Security Information, Systems and Technologies.
[2]
Dario Forte.
Phishing Attacks: Phishing in depth
,
2009
.
[3]
Amir Herzberg,et al.
Security and identification indicators for browsers against spoofing and phishing attacks
,
2008,
TOIT.
[4]
Rika Butler,et al.
A framework of anti-phishing measures aimed at protecting the online consumer's identity
,
2007,
Electron. Libr..
[5]
Lorrie Faith Cranor,et al.
Behavioral response to phishing risk
,
2007,
eCrime '07.
[6]
Lorrie Faith Cranor,et al.
Anti-Phishing Phil: the design and evaluation of a game that teaches people not to fall for phish
,
2007,
SOUPS '07.
[7]
Ronald C. Dodge,et al.
Phishing for user security awareness
,
2007,
Comput. Secur..
[8]
Min Wu,et al.
Do security toolbars actually prevent phishing attacks?
,
2006,
CHI.
[9]
Marti A. Hearst,et al.
Why phishing works
,
2006,
CHI.
[10]
Rika Butler.
Investigation of phishing to develop guidelines to protect the Internet consumer's identity against attacks by phishers
,
2005
.
[11]
J. Doug Tygar,et al.
The battle against phishing: Dynamic Security Skins
,
2005,
SOUPS '05.
[12]
Amir Herzberg,et al.
Protecting (even) Naïve Web Users, or: Preventing Spoofing and Establishing Credentials of Web Sites
,
2004
.
[13]
R. D. Veaux,et al.
Stats: Modeling the World
,
2003
.
[14]
K. Punch.
Survey Research: The Basics
,
2003
.
[15]
Sean W. Smith,et al.
Web Spoofing Revisited: SSL and Beyond
,
2002
.