1,027
Views
19
CrossRef citations to date
0
Altmetric
Articles

Capable Guardians in the Digital Environment: The Role of Digital Literacy in Reducing Phishing Victimization

ORCID Icon &
Pages 1371-1382 | Received 29 Jun 2016, Accepted 30 Aug 2016, Published online: 22 Nov 2016

References

  • Anti-Phishing Working Group. 2015. “Phishing Activity Trends Report 4th Quarter 2014.” Retrieved January 8, 2016 (https://docs.apwg.org/reports/apwg_trends_report_q4_2014.pdf).
  • Baym, Nancy K. 2015. Personal Connections in the Digital Age. Malden, MA: Polity Press.
  • Benkler, Yochai. 2007. The Wealth of Networks: How Social Production Transforms Markets and Freedom. New Haven, CT: Yale University Press.
  • Bossler, Adam and Thomas Holt. 2010. “The Effect of Self-Control on Victimization in the Cyberworld.” Journal of Criminal Justice 38(3):227–236.
  • Brooke, Tom Vanden and Michael Winter. 2015. “Hackers Penetrated Pentagon Email.” USA Today. Retrieved January 18, 2016 (http://www.usatoday.com/story/news/nation/2015/08/06/russia-reportedly-hacks-pentagon-email-system/31228625/).
  • Cohen, Lawrence and Marcus Felson. 1979. “Social Change and Crime Rate Trends: A Routine Activity Approach.” American Sociological Review 44:588–608.
  • Felson, Marcus. 1994. Crime and Everyday Life: Insights and Implications for Society. Thousand Oaks, CA: Pine Forge Press.
  • ———. 2006. Crime and Nature. Thousand Oaks, CA: Sage.
  • Ferrari, Anusca. 2013. DIGCOMP: A Framework for Developing and Understanding Digital Competence in Europe, edited by Yves Punie and Barbara N. Brečko. Seville: JRC-IPTS. Retrieved January 18, 2016 (http://ftp.jrc.es/EURdoc/JRC83167.pdf).
  • Finkle, Jim and Deepa Seetharaman. 2014. “Cyber Thieves Took Data On 145 Million eBay Customers By Hacking 3 Corporate Employees.” Business Insider. Retrieved January 18, 2016 (http://www.businessinsider.com/cyber-thieves-took-data-on-145-million-ebay-customers-by-hacking-3-corporate-employees-2014-5).
  • Furnell, Steven, Valleria Tsaganidi, and Andy Phippen. 2008. “Security Beliefs and Barriers for Novice Internet Users.” Computers and Security 27(7–8):235–240.
  • Geng, Guang-Gang, Xiao-Dong Lee, and Yan-Ming Zhang. 2014. “Combating Phishing Attacks via Brand Identity and Authorization Features.” Security and Communication Networks 8(6):888–898.
  • Gottfredson, Michael and Travis Hirschi. 1990. A General Theory of Crime. Stanford, CA: Stanford University Press.
  • Graham, Roderick. 2014. The Digital Practices of African Americans: An Approach to Studying Cultural Change in the Information Society. New York: Peter Lang Publishing.
  • Herzberg, Amir. 2009. “Why Johnny Can’t Surf (Safely)? Attacks and Defenses for Web Users?” Computers and Security 28(1–2):63–71.
  • Higgins, George. 2005. “Can Low Self-Control Help with the Understanding of the Software Piracy Problem?” Deviant Behavior 26(1):1–24.
  • Holt, Thomas and Adam Bossler. 2009. “Examining the Applicability of Lifestyle-Routine Activities Theory for Cybercrime Victimization.” Deviant Behavior 30:1–25.
  • Holt, Thomas and Heith Copes. 2010. “Transferring Subcultural Knowledge On-Line: Practices and Beliefs of Persistent Digital Pirates.” Deviant Behavior 31(7):625–654.
  • Hsin-yi Sandy Tsai, Mengtian Jiang, Saleem Alhabash, Robert LaRose, Nora J. Rifon, and Shelia R. Cotten. 2016. “Understanding Online Safety Behaviors: A Protection Motivation Theory Perspective.” Computers & Security doi:10.1016/j.cose.2016.02.009
  • Internet Crime Complaint Center. 2014. “2014 IC3 Annual Report.” Retrieved January 15, 2016 (http://www.ic3.gov/media/annualreport/2014_IC3Report.pdf).
  • Leukfeldt, Rutger E. 2014. “Phishing for Suitable Targets in the Netherlands: Routine Activity Theory and Phishing Victimization.” Cyberpsychology, Behavior and Social Networking 17(8):551–555.
  • Muscanell, Nicole L., Rosanna E. Guadagno, and Shannon Murphy. 2014. “Weapons of Influence Misused: A Social Influence Analysis of Why People Fall Prey to Internet Scams.” Social and Personality Psychology Compass 8(7):388–396.
  • Newman, Graeme R. and Ronald V. Clarke. 2003. Superhighway Robbery: Preventing E- Commerce Crime. Devon, UK: Willan Publishing.
  • Ngo, F. T. and Raymond Paternoster. 2011. “Cybercrime Victimization: An Examination of Individual and Situational Level Factors.” International Journal of Cyber Criminology 5: 773–793.
  • Parsons, Kathryn, Agata McCormac, Malcolm Pattinson, Marcus Butavicius, and Cate Jerram. 2015. “The Design of Phishing Studies: Challenges for Researchers.” Computers & Security doi:10.1016/j.cose.2015.02.008
  • Pratt, Travis, Kristy Holtfreter, and Michael Reiseg. 2010. “Routine Online Activity and Internet Fraud Targeting: Extending the Generality of Routine Activity Theory.” Journal of Research in Crime and Delinquency 47(3):267–296.
  • Reynald, Danielle. 2009. “Guardianship in Action: Developing a New Tool for Measurement.” Crime Prevention and Community Safety 11(1):1–20.
  • ———. 2010. “Guardians on Guardianship: Factors affecting the Willingness to Monitor, the Ability to Detect Potential Offenders and the Willingness to Intervene.” Journal of Research in Crime and Delinquency 47(3):358–390.
  • ———. 2011. Guarding against Crime: Measuring Guardianship within Routine Activity Theory. Farnham, UK: Ashgate.
  • Shirky, Clay. 2008. Here Comes Everybody: The Power of Organizing without Organizations. New York: Penguin.
  • Vakhitova, Zarina and Danielle M. Reynald. 2014. “Australian Internet Users and Guardianship against Cyber Abuse: An Empirical Analysis.” International Journal of Cyber Criminology 8(2):156–171.
  • Verizon. 2015. “ 2015 Data Breach Investigations Report.” Retrieved January 8, 2016 (http://www.verizonenterprise.com/DBIR/2015/).
  • Wall, David S. 2001. “Cybercrimes and the Internet.” Pp. 1–17 in Crime and the Internet, edited by D. S. Wall. New York: Routledge.
  • Workman, Michael. 2008. “Wisecrackers: A Theory-Grounded Investigation of Phishing and Pretext Social Engineering Threats to Information Security.” Journal of the American Society for Information Science and Technology 59(4):662–674.
  • Yar, Majid. 2013. Cybercrime and Society. 2nd ed. Thousand Oaks, CA: Sage.
  • Zhang, Yanping, Yang Xiao, Kaveh Ghaboosi, Jingyuan Zhang, and Hongmei Deng. 2011. “A Survey of Cyber Crimes.” Security and Communication Networks 5(4):422–437.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.