publication . Preprint . Article . 2011

Phishing - A Growing Threat to E-Commerce

M. Tariq Banday; Qadri, Jameel A.;
Open Access English
  • Published: 24 Dec 2011
Abstract
Comment: 8 Pages
Subjects
ACM Computing Classification System: ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMSComputingMilieux_COMPUTERSANDSOCIETY
free text keywords: Computer Science - Cryptography and Security, K.4.4, K.6.5, D.4.6, K.4.2

1. Michael Totty (2002), “E-Commerce (A Special Report)”, The Wall Street Journal, July, 2002.

2. S. D. Vashistha (2005), “Ecommerce in Indian Perspective”, The Business Review. March, 2005.

3. Holz, Thurston (2005), “On the Economics of Botnets” available online at http://honeyblog.org/archives/54-On-theEconomics-of-Botnets-Part-2.html

4. Biever, Celeste, (2004), “How Zombie Networks Fuel Cybercrime” New Scientist, November available at http://www.newscientist.com/article.ns?id= dn6616.

5. Trend Micro, (2006), “Botnet threats and solutions”, November, 2006 available online at http://www.trendmicro.com.

6. Microsoft, (2005), “Spear Phishing: Highly Targeted Scams”, Microsoft, Corporation December, 2005.

7. Lazarus, David, (2006). “Phishing expedition at heart of AT&T hacking”, San Francisco Chronicle, September, 2006.availiable at www.sfgate.com.

8. FCAC, (2006), “FCAC Cautions Consumers About New Vishing Scam”, Financial Consumer Agency of Canada, July, 2006.

9. Schulman, Jay (2006). “Voice-over-IP Scams Set to Grow”, VoIP News, July, 2006.

10. KrCERT/CC, (2006) “Korea Phishing Activity Trends Report”, Korean Internet Security Center available at http://www.antiphishing.org/reports/200612 KoreaPhishingActivityReport_Dec2006.pdf.

11. Dan Ferguson (2006), “Phishing warning Beware e-mails asking for personal info, Peace Arch News”, Black Press, November, 2006, available at http://www.peacearchnews.com/portalscode/list.cgi?paper=44&cat=23&id=746625 &more=.

12. Stevenson, Robert Louis B (2005), “Plugging the Phishing Hole: Legislation Versus Technology”, Duke Law and Technology Review 0006, 2005.

13. Symantec Corporation, Internet Security Threat Report (2006), available at http://www.symantec.com/specprog/threatreport /entwhitepaper_symantec_internet_security_threat_ report_x_09_2006.en-us.pdf.

Powered by OpenAIRE Open Research Graph
Any information missing or wrong?Report an Issue
publication . Preprint . Article . 2011

Phishing - A Growing Threat to E-Commerce

M. Tariq Banday; Qadri, Jameel A.;