Examinations of Email Fraud Susceptibility: Perspectives from Academic Research and Industry Practice

Helen Jones (Lead / Corresponding author), John Towse

    Research output: Chapter in Book/Report/Conference proceedingChapter (peer-reviewed)peer-review

    9 Citations (Scopus)

    Abstract

    The internet provides an ever-expanding, valuable resource for entertainment, communication, and commerce. However, this comes with the simultaneous advancement and sophistication of cyber-attacks, which have serious implications on both a personal and commercial level, as well as within the criminal justice system. Psychologically, such attacks offer an intriguing, under-exploited arena for the understanding of the decision-making processes leading to online fraud victimisation. In this chapter, the authors focus on approaches taken to understand response behaviour surrounding phishing emails. The chapter outlines how approaches from industry and academic research might work together to more effectively understand and potentially tackle the persistent threat of email fraud. In doing this, the authors address: alternative methodological approaches taken to understand susceptibility; key insights drawn from each; how useful these are in working towards preventative security measures; and the usability of each approach. It is hoped that these can contribute to collaborative solutions.
    Original languageEnglish
    Title of host publicationPsychological and Behavioral Examinations in Cyber Security
    EditorsJohn McAlaney, Lara A. Frumkin, Vladlena Benson
    Place of PublicationUnited Kingdom
    PublisherIGI Global
    Chapter5
    Pages80-97
    Number of pages18
    ISBN (Electronic)9781522540540
    ISBN (Print)1522540539, 9781522540533
    DOIs
    Publication statusPublished - 2018

    ASJC Scopus subject areas

    • General Computer Science

    Fingerprint

    Dive into the research topics of 'Examinations of Email Fraud Susceptibility: Perspectives from Academic Research and Industry Practice'. Together they form a unique fingerprint.

    Cite this