References
- Aaron , G. 2010 . The state of phishing . Computer Fraud & Security , 2010 ( 6 ) : 5 – 8 .
- Aburrous , M. 2010 . Intelligent phishing detection system for e-banking using fuzzy data mining . Expert systems with applications , 37 ( 12 ) : 7913
- Dodge , J. , Carver , C. and Ferguson , A. J. 2007 . Phishing for user security awareness . Computers & Security , 26 ( 1 ) : 73 – 80 .
- Ferguson , A. J. 2005 . Fostering e-mail security awareness: The West Point Carronade . EDUCAUSE Quarterly , 28 ( 1 ) : 54 – 57 .
- Gordon , J. A. and Pawlowski , J. 2002 . Education on-demand: the development of a simulator-based medical education service . Academic Medicine, , 77 ( 7 ) Available from: http://journals.lww.com/academicmedicine/Fulltext/2002/07000/Education_On_demand__The_Development_of_a.42.aspx [Accessed 4 November 2011]
- Hasle , H. Measuring resistance to social engineering . Information security practice and experience: first international conference, ISPEC 2005 . April 11–14 2005 , Singapore. pp. 132 – 143 . Berlin : Springer-Verlag .
- Jagatic , T. N. 2007 . Social phishing . Communications of the ACM , 50 : 94 – 100 .
- Jakobsson , M. , Finn , P. and Johnson , N. 2008 . Why and how to perform fraud experiments . Security & Privacy, IEEE , 6 ( 2 ) : 66 – 68 .
- Jakobsson , M. and Ratkiewicz , J. Designing ethical phishing experiments: a study of (ROT13) rOnl query features . Proceedings of the 15th international conference on world wide web . May 23–26 2006 , Edinburgh , Scotland. pp. 513 – 522 . New York : ACM Press .
- Jansson , K. and von Solms , R. Social engineering: towards a holistic solution . Proceedings of the South African information security multi-conference (SAISMC 2010). South African Information Security Multi- Conference . May 17–18 2010 . Plymouth : Plymouth University . Port Elizabeth
- Kumaraguru , P. School of phish: a real-world evaluation of anti-phishing training . Proceedings of the 5th symposium on usable privacy and security SOUPS '09. pp. 3:1 – 3:12 . New York : ACM .
- Kumaraguru , P. 2010 . Teaching Johnny not to fall for phish . ACM Transactions on Internet Technology (TOIT) , 10 ( 2 ) : 7
- Mann , I. 2008 . Hacking the human: social engineering techniques and security countermeasures , Aldershot , , UK : Gower Publishing, Ltd .
- Oxford English Dictionary . 2009 . Oxford English dictionary [online]. Available from:http://dictionary.oed.com/cgi/entry/00323586/00323586se1?single=1&query_type=word&queryword=Neurolinguistic+programming&first=1&max_to_show=10&hilite=00323586se1 [Accessed 1 November 2011]
- Shahriar , H. and Zulkernine , M. in press . Trustworthiness testing of phishing websites: a behavior model-based approach . Future Generation Computer Systems , Available from: http://www.sciencedirect.com/science/article/B6V06-5265S47-1/2/71cf3b73da4bff9605cf1733114e0bb6 [Accessed 4 November 2011]
- Sheng , S. Anti-phishing phil: the design and evaluation of a game that teaches people not to fall for phish . Proceedings of the 3rd symposium on usable privacy and security . July 18–20 2007 , Pittsburgh . pp. 88 – 99 .
- Srikwan , S. and Jakobsson , M. 2008 . Using cartoons to teach internet security . Cryptologia , 32 ( 2 ) : 137 – 154 .
- Steyn , T. , Kruger , H. and Drevin , L. 2007 . “ Identity theft– empirical evidence from a phishing exercise ” . In In: New approaches for security, privacy and trust in complex environments , Edited by: Venter , H. , Eloff , M. , Labuschagne , L. , Eloff , J. and Von Solms , R. 193 – 203 . Boston : Springer . IFIP International Federation for Information Processing
- Symantec . 2010a . Symantec intelligence quarterly: global report (July–September 2010) [online]. Symantec Corporation. Available from:http://www.symantec.com/content/en/us/enterprise/white_papers/b-symc_intelligence_qtrly_july_to_sept_WP_21157366.en-us.pdf [Accessed 16 February 2011]
- Symantec . 2010b . Symantec report shows no slowdown in cyber attacks Symantec [online]. Available from:http://www.symantec.com/business/resources/articles/article.jsp?aid=20100527_report_shows_no_slowdown_in_cyber_attacks [Accessed 31 August 2010]
- Twitchell , D. 2009 . “ Social engineering and its countermeasures ” . In Handbook of research on social and organizational liabilities in information security , Edited by: Gupta , M. and Sharman , R. 228 – 242 . Hershey , PA : IGI Global .
- Wash , R. 2010 . “ Folk models of home computer security ” . In Symposium on usable privacy and security (SOUPS) , New York : ACM, 16 .