199
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Social Engineering Preparedness of Online Banks: An Asia-Pacific Perspective

Pages 21-46 | Published online: 07 Jul 2014

References

  • Abraham, S., and Chengalur-Smith, I. “An overview of social engineering malware: Trends, tactics, and implications,” Technology in Society (32:3) 2010, pp 183–196.
  • Adams, J. “Industry Picks Apart Online Banking Security Guidance,” American Banker (176:109) 2011, p 11.
  • Al-Somali, S. A., Gholami, R., and Clegg, B. “An investigation into the acceptance of online banking in Saudi Arabia,” Technovation (29:2) 2009, pp 130–141.
  • Alavi, M., and Weiss, I. R. “Managing the Risks Associated with End-User Computing,” Journal of Management Information Systems (2:3) 1985, pp 5–20.
  • Albrechtsen, E. “A qualitative study of users' view on information security,” Computers & Security (26:4) 2007, pp 276–289.
  • Arvind Subramanian, Nimisha Jain, Shweta Bajpai, and Patodia, S. “Capitalizing on India's “Digitally Influenced” Consumers: From Buzz to Bucks,” The Boston Consulting Group Barber, R. “Social engineering: A People Problem?,” Network Security (2001:7) 2001, pp 9–11.
  • Barrett, N. “Penetration testing and social engineering: Hacking the weakest link,” Information Security Technical Report (8:4) 2003, pp 56–64.
  • Bluecoat “Blue Coat Systems 2012 Web Security Report,” 2012.
  • Bose, I., and Leung, A. C. M. “Assessing anti-phishing preparedness: A study of online banks in Hong Kong,” Decision Support Systems (45:4) 2008, pp 897–912.
  • Bulgurcu, B., Cavusoglu, H., and Benbasat, I. “Information security policy compliance: an empirical study of rationality-based beliefs and information security awareness,” MIS Quarterly (34:3) 2010, pp 523–548.
  • Cheng, T. C. E., Lam, D. Y. C., and Yeung, A. C. L. “Adoption of internet banking: An empirical study in Hong Kong,” Decision Support Systems (42:3) 2006, pp 1558–1572.
  • Comscore “Google Annual Search Statistics,” http://www.statisticbrain.com/google-searches/, 2013.
  • D'Arcy, J., Hovav, A., and Galletta, D. “User awareness of security countermeasures and its impact on information systems misuse: a deterrence approach,” Information Systems Research (20:1) 2009, pp 79–98.
  • Dodge Jr, R. C., Carver, C., and Ferguson, A. J. “Phishing for user security awareness,” Computers & Security (26:1) 2007, pp 73–80.
  • Falliere, N., and Chien, E. “Zeus: King of the Bots,” in: Symantec, 2010.
  • Fossl, M. “Symantec Global Internet Security Threat Report trends for 2009.”.
  • French, A. M. “A Case Study on E-Banking Security—When Security Becomes Too Sophisticated for the User to Access Their Information,” Journal of Internet Banking and Commerce (17:2) 2012.
  • Gartner “Protect Against Social Engineering Attacks,” in: Gartner's Information Security Strategies Research, Gartner, 2002.
  • Grazioli, S., and Jarvenpaa, S. L. “Perils of Internet fraud: an empirical investigation of deception and trust with experienced Internet consumers,” Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on (30:4) 2000, pp 395–410.
  • Irani, D., Balduzzi, M., Balzarotti, D., Kirda, E., and Pu, C. “Reverse social engineering attacks in online social networks,” in: Detection of Intrusions and Malware, and Vulnerability Assessment, Springer, 2011, pp. 55–74.
  • ISI “ISI Developing Countries (in 2012),” 2012.
  • Ivaturi, K., and Janczewski, L. “A Taxonomy for Social Engineering Attacks,” Proceedings of International Conference on Information Resource Management, ISBN 978–0–473–18895–5, Seoul, South Korea 2011, p. 16.
  • Kankanhalli, A., Teo, H.-H., Tan, B. C. Y., and Wei, K.-K. “An integrative study of information systems security effectiveness,” International Journal of Information Management (23:2) 2003, pp 139–154.
  • Kim, K. K., and Prabhakar, B. “Initial trust and the adoption of B2C e-commerce: The case of internet banking,” SIGMIS Database (35:2) 2004, pp 50–64.
  • Krippendorff, K. Content analysis: An introduction to its methodology Sage Publications, Incorporated, 2012.
  • Kritzinger, E., and von Solms, S. H. “Cyber security for home users: A new way of protection through awareness enforcement,” Computers & Security (29:8) 2010, pp 840–847.
  • Kuzel, A. J. “Sampling in qualitative inquiry,” in: Doing qualitative research. Research methods for primary care, Sage Publications, 1992, pp. 31–44.
  • Laribee, L. “Development of Methodical Social Engineering Taxonomy Project,” http://handle.dtic.mi1/100.2/ADA457544, 2006.
  • Lichtenstein, S., and Williamson, K. “Understanding Consumer Adoption of Internet Banking: An Interpretive Study in the Australian Banking Context,” Journal of Electronic Commerce Research (7:2) 2006, pp 50–66.
  • Lim, N., Paul H. P. Yeow, and Yee Yen Yuen “An online banking security framework and a cross- cultural comparison,” Journal of Global Information Technology Management (13:3) 2010.
  • Luo, X., Brody, R., Seazzu, A., and Burd, S. “Social engineering: the neglected human factor for information security management,” Information Resources Management Journal (IRMJ) (24:3) 2011, pp 1–8.
  • Mannan, M., and Oorschot, P. C. v. “Security and usability: the gap in real-world online banking,” in: Proceedings of the 2007 Workshop on New Security Paradigms, ACM, New Hampshire, 2008, pp. 1–14.
  • Merritt, M. “Norton's Cybercrime Report: The Human Impact,” 2010.
  • Mitnick, K. D., and Simon, W. L. “The Art of Deception: Controlling the Human Element of Security,” in: John Wiley & Sons, 2003.
  • Mostyn, B. “The Content Analysis of Qualitative Research Data: A Dynamic Approach,” in: The research interview: Uses and approaches, London: Academic Press, London, 1985.
  • Mukherjee, A., and Nath, P. “A model of trust in online relationship banking,” International Journal of Bank Marketing (21:1) 2003, pp 5–15.
  • Nielsen “STATE OF THE MEDIA:THE SOCIAL MEDIA REPORT,” 2012.
  • PandaSecurity “The Cyber Crime Black Market:Uncovered” in: Panda Security Report 2011.
  • Polasik, M., and Wisniewski, T. P. “Empirical analysis of internet banking adoption in Poland,” International Journal of Bank Marketing (27:1) 2009, pp 32–52.
  • Post, G. V., and Kagan, A. “Evaluating information security tradeoffs: Restricting access can interfere with user tasks,” Computers & Security (26:3) 2007, pp 229–237.
  • Sathye, M. “Adoption of Internet banking by Australian consumers: an empirical investigation,” International Journal of Bank Marketing (17:7) 1999, pp 324–334.
  • Schneier, B. “The psychology of security,” in: Proceedings of the Cryptology in Africa 1st international conference on Progress in cryptology, Springer-Verlag, Casablanca, Morocco, 2008, pp. 50–79.
  • Sheldon, J. “State of the Art: Attackers and Targets in Cyberspace,” Journal of Military and Strategic Studies (14:2) 2012.
  • Sherman, L. W., Gartin, P. R., and Buerger, M. E. “HOT SPOTS OF PREDATORY CRIME: ROUTINE ACTIVITIES AND THE CRIMINOLOGY OF PLACE*,” Criminology (27:1) 1989, pp 27–56.
  • Siponen, M. “Five dimensions of information security awareness,” SIGCAS Comput. Soc. (31:2) 2001, pp 24–29.
  • Siponen, M. T. “A conceptual foundation for organizational information security awareness,” Information Management & Computer Security (8:1) 2000, pp 31–41.
  • Sophos “Security Threat Report: 2011,” 2011.
  • Steinkamp, K., and Fox, S. “Botnet Trends 2011,” C. labs (ed.), 2011.
  • Straub, D. W., and Welke, R. J. “Coping with Systems Risk: Security Planning Models for Management Decision Making,” MIS Quarterly (22:4) 1998, pp 441–469.
  • Suh, B., and Han, I. “The Impact of Customer Trust and Perception of Security Control on the Acceptance of Electronic Commerce,” Int. J. Electron. Commerce (7:3) 2003, pp 135–161.
  • Tan, M., and Teo, T. S. H. “Factors influencing the adoption of Internet banking,” J. AIS (1:1) 2000, p 5.
  • Thomson, M., and von Solms, R. “Information security awareness: educating your users effectively,” Information Management & Computer Security (6:4) 1998, pp 167–173.
  • Townsend, K. “The art of social engineering,” Infosecurity (7:4) 2010, pp 32–35.
  • Twitchell, D. “Social engineering and its countermeasures,” in: Handbook of research on social and organizational liabilities in information security, 2009, pp. 228–242.
  • Warkentin, M., Johnston, A. C., and Shropshire, J. “The influence of the informal social learning environment on information privacy policy compliance efficacy and intention,” European Journal of Information Systems (20:3) 2011, pp 267–284.
  • Wilson, M., and Hash, J. “Building an Information Technology Security Awareness and Training Program,” in: NIST Special Publication 800–50, Gaithersburg, MD, 2003.
  • Wilson, M., Stine, K., and Bowen, P. “Information Security Training Requirements: A Role- and Performance-Based Model,” in: NIST Special Publication 800–16, 2009.
  • Workman, M. “Wisecrackers: A theory-grounded investigation of phishing and pretext social engineering threats to information security,” Journal of the American Society for Information Science and Technology (59:4) 2008, pp 662–674.
  • Zhao, A. L., Hanmer-Lloyd, S., Ward, P., and Goode, M. M. H. “Perceived risk and Chinese consumers' internet banking services adoption,” International Journal of Bank Marketing (26:7) 2008, pp 505–525.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.