References
- Abraham, S., and Chengalur-Smith, I. “An overview of social engineering malware: Trends, tactics, and implications,” Technology in Society (32:3) 2010, pp 183–196.
- Adams, J. “Industry Picks Apart Online Banking Security Guidance,” American Banker (176:109) 2011, p 11.
- Al-Somali, S. A., Gholami, R., and Clegg, B. “An investigation into the acceptance of online banking in Saudi Arabia,” Technovation (29:2) 2009, pp 130–141.
- Alavi, M., and Weiss, I. R. “Managing the Risks Associated with End-User Computing,” Journal of Management Information Systems (2:3) 1985, pp 5–20.
- Albrechtsen, E. “A qualitative study of users' view on information security,” Computers & Security (26:4) 2007, pp 276–289.
- Arvind Subramanian, Nimisha Jain, Shweta Bajpai, and Patodia, S. “Capitalizing on India's “Digitally Influenced” Consumers: From Buzz to Bucks,” The Boston Consulting Group Barber, R. “Social engineering: A People Problem?,” Network Security (2001:7) 2001, pp 9–11.
- Barrett, N. “Penetration testing and social engineering: Hacking the weakest link,” Information Security Technical Report (8:4) 2003, pp 56–64.
- Bluecoat “Blue Coat Systems 2012 Web Security Report,” 2012.
- Bose, I., and Leung, A. C. M. “Assessing anti-phishing preparedness: A study of online banks in Hong Kong,” Decision Support Systems (45:4) 2008, pp 897–912.
- Bulgurcu, B., Cavusoglu, H., and Benbasat, I. “Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness,” MIS Quarterly (34:3) 2010, pp 523–548.
- Cheng, T. C. E., Lam, D. Y. C., and Yeung, A. C. L. “Adoption of internet banking: An empirical study in Hong Kong,” Decision Support Systems (42:3) 2006, pp 1558–1572.
- Comscore “Google Annual Search Statistics,” http://www.statisticbrain.com/google-searches/, 2013.
- D'Arcy, J., Hovav, A., and Galletta, D. “User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach,” Information Systems Research (20:1) 2009, pp 79–98.
- Dodge Jr, R. C., Carver, C., and Ferguson, A. J. “Phishing for user security awareness,” Computers & Security (26:1) 2007, pp 73–80.
- Falliere, N., and Chien, E. “Zeus: King of the Bots,” in: Symantec, 2010.
- Fossl, M. “Symantec Global Internet Security Threat Report trends for 2009.”.
- French, A. M. “A Case Study on E-Banking Security—When Security Becomes Too Sophisticated for the User to Access Their Information,” Journal of Internet Banking and Commerce (17:2) 2012.
- Gartner “Protect Against Social Engineering Attacks,” in: Gartner's Information Security Strategies Research, Gartner, 2002.
- Grazioli, S., and Jarvenpaa, S. L. “Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers,” Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on (30:4) 2000, pp 395–410.
- Irani, D., Balduzzi, M., Balzarotti, D., Kirda, E., and Pu, C. “Reverse social engineering attacks in online social networks,” in: Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, 2011, pp. 55–74.
- ISI “ISI Developing Countries (in 2012),” 2012.
- Ivaturi, K., and Janczewski, L. “A Taxonomy for Social Engineering Attacks,” Proceedings of International Conference on Information Resource Management, ISBN 978–0–473–18895–5, Seoul, South Korea 2011, p. 16.
- Kankanhalli, A., Teo, H.-H., Tan, B. C. Y., and Wei, K.-K. “An integrative study of information systems security effectiveness,” International Journal of Information Management (23:2) 2003, pp 139–154.
- Kim, K. K., and Prabhakar, B. “Initial trust and the adoption of B2C e-commerce: The case of internet banking,” SIGMIS Database (35:2) 2004, pp 50–64.
- Krippendorff, K. Content analysis: An introduction to its methodology Sage Publications, Incorporated, 2012.
- Kritzinger, E., and von Solms, S. H. “Cyber security for home users: A new way of protection through awareness enforcement,” Computers & Security (29:8) 2010, pp 840–847.
- Kuzel, A. J. “Sampling in qualitative inquiry,” in: Doing qualitative research. Research methods for primary care, Sage Publications, 1992, pp. 31–44.
- Laribee, L. “Development of Methodical Social Engineering Taxonomy Project,” http://handle.dtic.mi1/100.2/ADA457544, 2006.
- Lichtenstein, S., and Williamson, K. “Understanding Consumer Adoption of Internet Banking: An Interpretive Study in the Australian Banking Context,” Journal of Electronic Commerce Research (7:2) 2006, pp 50–66.
- Lim, N., Paul H. P. Yeow, and Yee Yen Yuen “An online banking security framework and a cross- cultural comparison,” Journal of Global Information Technology Management (13:3) 2010.
- Luo, X., Brody, R., Seazzu, A., and Burd, S. “Social engineering: the neglected human factor for information security management,” Information Resources Management Journal (IRMJ) (24:3) 2011, pp 1–8.
- Mannan, M., and Oorschot, P. C. v. “Security and usability: the gap in real-world online banking,” in: Proceedings of the 2007 Workshop on New Security Paradigms, ACM, New Hampshire, 2008, pp. 1–14.
- Merritt, M. “Norton's Cybercrime Report: The Human Impact,” 2010.
- Mitnick, K. D., and Simon, W. L. “The Art of Deception: Controlling the Human Element of Security,” in: John Wiley & Sons, 2003.
- Mostyn, B. “The Content Analysis of Qualitative Research Data: A Dynamic Approach,” in: The research interview: Uses and approaches, London: Academic Press, London, 1985.
- Mukherjee, A., and Nath, P. “A model of trust in online relationship banking,” International Journal of Bank Marketing (21:1) 2003, pp 5–15.
- Nielsen “STATE OF THE MEDIA:THE SOCIAL MEDIA REPORT,” 2012.
- PandaSecurity “The Cyber Crime Black Market:Uncovered” in: Panda Security Report 2011.
- Polasik, M., and Wisniewski, T. P. “Empirical analysis of internet banking adoption in Poland,” International Journal of Bank Marketing (27:1) 2009, pp 32–52.
- Post, G. V., and Kagan, A. “Evaluating information security tradeoffs: Restricting access can interfere with user tasks,” Computers & Security (26:3) 2007, pp 229–237.
- Sathye, M. “Adoption of Internet banking by Australian consumers: an empirical investigation,” International Journal of Bank Marketing (17:7) 1999, pp 324–334.
- Schneier, B. “The psychology of security,” in: Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology, Springer-Verlag, Casablanca, Morocco, 2008, pp. 50–79.
- Sheldon, J. “State of the Art: Attackers and Targets in Cyberspace,” Journal of Military and Strategic Studies (14:2) 2012.
- Sherman, L. W., Gartin, P. R., and Buerger, M. E. “HOT SPOTS OF PREDATORY CRIME: ROUTINE ACTIVITIES AND THE CRIMINOLOGY OF PLACE*,” Criminology (27:1) 1989, pp 27–56.
- Siponen, M. “Five dimensions of information security awareness,” SIGCAS Comput. Soc. (31:2) 2001, pp 24–29.
- Siponen, M. T. “A conceptual foundation for organizational information security awareness,” Information Management & Computer Security (8:1) 2000, pp 31–41.
- Sophos “Security Threat Report: 2011,” 2011.
- Steinkamp, K., and Fox, S. “Botnet Trends 2011,” C. labs (ed.), 2011.
- Straub, D. W., and Welke, R. J. “Coping with Systems Risk: Security Planning Models for Management Decision Making,” MIS Quarterly (22:4) 1998, pp 441–469.
- Suh, B., and Han, I. “The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce,” Int. J. Electron. Commerce (7:3) 2003, pp 135–161.
- Tan, M., and Teo, T. S. H. “Factors influencing the adoption of Internet banking,” J. AIS (1:1) 2000, p 5.
- Thomson, M., and von Solms, R. “Information security awareness: educating your users effectively,” Information Management & Computer Security (6:4) 1998, pp 167–173.
- Townsend, K. “The art of social engineering,” Infosecurity (7:4) 2010, pp 32–35.
- Twitchell, D. “Social engineering and its countermeasures,” in: Handbook of research on social and organizational liabilities in information security, 2009, pp. 228–242.
- Warkentin, M., Johnston, A. C., and Shropshire, J. “The influence of the informal social learning environment on information privacy policy compliance efficacy and intention,” European Journal of Information Systems (20:3) 2011, pp 267–284.
- Wilson, M., and Hash, J. “Building an Information Technology Security Awareness and Training Program,” in: NIST Special Publication 800–50, Gaithersburg, MD, 2003.
- Wilson, M., Stine, K., and Bowen, P. “Information Security Training Requirements: A Role- and Performance-Based Model,” in: NIST Special Publication 800–16, 2009.
- Workman, M. “Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security,” Journal of the American Society for Information Science and Technology (59:4) 2008, pp 662–674.
- Zhao, A. L., Hanmer-Lloyd, S., Ward, P., and Goode, M. M. H. “Perceived risk and Chinese consumers' internet banking services adoption,” International Journal of Bank Marketing (26:7) 2008, pp 505–525.