Improving Protection and Security Awareness Amongst Home User

Publications

Share / Export Citation / Email / Print / Text size:

International Journal of Advanced Network, Monitoring and Controls

Xi'an Technological University

Subject: Computer Science , Software Engineering

GET ALERTS

eISSN: 2470-8038

DESCRIPTION

12
Reader(s)
54
Visit(s)
0
Comment(s)
0
Share(s)

SEARCH WITHIN CONTENT

FIND ARTICLE

Volume / Issue / page

Related articles

VOLUME 1 , ISSUE 1 (June 2016) > List of articles

Improving Protection and Security Awareness Amongst Home User

Muhammad Farhan / Muhammed Fazil Ali / Sajid Ahmed Khan / Syed Shaji Ul hassan

Keywords : Internet Security, Security Awareness

Citation Information : International Journal of Advanced Network, Monitoring and Controls. Volume 1, Issue 1, Pages 0-0, DOI: https://doi.org/10.21307/ijanmc-2016-001

License : (CC-BY-NC-ND-4.0)

Published Online: 01-April-2018

ARTICLE

ABSTRACT

The growth of the Internet brings threats to the end user, which affects the home users more severely. The result from the different surveys shows that these vulnerabilities affect home user very badly. As strong security, controls have been implemented in businesses to minimize losses, hackers and fraudsters have moved their attention towards end users, which are normally easier prey. The increase in the need of security amongst end users is an important task of the today. A small security survey has been conducted to get an overview of the user’s perception about Internet security and their knowledge. Some suggestions are also given which would help to create awareness about Internet security in home users.

Content not available Share

FIGURES & TABLES

REFERENCES

Andy Phippen, Steve Furnell 2007 “Taking responsibility for online protection – why citizens have their part to play” Computer Fraud & Security, Volume 2007, Issue 11, November 2007, Pages 8-13

 

AOL/NCSA 2005, America Online and the National Cyber Security Alliance, http://www.staysafeonline.info/pdf/ safety_study_2005.pdf Accessed on [June 2008]

Australian home user computer security survey 2008. Survey report issued by AUS cert based at university of queen’s land, Available at http://www.auscert.org.au/images/AusCERT_Home_Users_Security_Survey_2008.pdf,

 

APACS 2008. “Fraud and the Facts” APACS (the UK payment associations)”, http://www.apacs.org.uk/resources_ publications/documents/FraudtheFacts2008.pdf Accessed [July 2008]

 

Bryant. P, “Improving Protection and Security Awareness amongst Home Users”, 2006. University of Plymouth, Accessed [July 2008]

 

British computer society security 2008. “Britain surfs safely” Available at http://www.bcs.org/server.php?show= conWebDoc.6307, Accessed [July 2008]

 

Barclays 2008, “Barclays Online banking” http://www.barclays.co.uk/pinsentry/ Accessed [July 2008]

 

CSI 2008. “Computer crime and security survey”, http://www.gocsi.com/forms/csi_survey_thanks.jhtml?_ DARGS =/forms/csi_survey.jhtml.2, Accessed [July 2008]

 

Cheryl Vroom and Rossouw von Solms 2004. “Towards information security behavioral compliance” Computers & Security, Volume 23, Issue 3, May 2004, Pages 191-198.

 

Deloitte 2007. “Global Security Survey”, http://www.ey.com/global/content.nsf/International/AABS_-_TSRS_ GISS_2007_Download Accessed [July 2008]

 

DTI 2008. “Information security breaches surveys” http://www.pwc.co.uk/pdf/ BERR_ISBS_2008(sml).pdf. Accessed [July 2008]

 

Esther E. Klein, Thomas Tellefsen and Paul J. Herskovitz 2007, “The use of group support systems in focus groups: Information technology meets qualitative research” Computers in Human Behavior, Volume 23, Issue 5, Pages 2113-2132.[July 2008]

 

Furnell, S. 2008. End-user security culture: A lesson that will never be learnt? Computer Fraud & Security, 6-9.

 

Federal Trade Commission 2006. “Consumer Fraud and identity theft complaint data Jan-Dec 2005”, http://www. consumer. gov/sentinel/pubs/Top10Fraud2006.pdf Accessed [18 August 2008]

 

Fraud email 2008. secretary@jazz.netsync.net, 2008 [Email] message to S. M. Kamran, ( Kamraniffy@gmail.com) available at: http://mail.google.com/mail/?shva=1#spam/11c1355a6238 f6e3 Accessed [July 2008]

 

GetSafeOnline 2006. “The Get safe online report”, http://www.getsafeonline.org/media/GSO_Cyber_Report_ 2006. pdf Accessed [July 2008]

 

Get safe online 2007 “Social networkers and wireless networks users provide: rich pickings for criminals” http://www.getsafeonline.org/nqcontent.cfm?a_id=1469 Accessed [July 2008]

 

Get safe online 2007” Online fraudsters ‘sting’ users for £875” http://www.getsafeonline.org/nqcontent. cfm? a_id=1449 Accessed [July 2008]

 

Gerald Post and Albert Kagan 1998. “The use and effectiveness of anti-virus software”, Computers & Security, Volume 17, Issue 7, Pages 589-599

 

Julie J.C.H. Ryan, Daniel J. Ryan 2006 “Expected benefits of information security investments’’ Computers & Security, Volume 25, Issue 8, Pages 579-588

 

Message labs 2008. “Google Sites Becomes Newest Addition to Spammers”, http://www.messagelabs.co.uk/ intelligence.aspx Accessed [July 2008]

 

NCSA 2007. “McAfee/NCSA Cyber security Survey report”, http://download.mcafee.com/products/manuals/en-us/McAfeeNCSA_Analysis09-25-07.pdf Accessed [July 2008]

 

National Statistics 2007. “National statistics survey report 2007”, http://www.statistics.gov.uk/cci/nugget.asp?id=8 Accessed [July 2008]

 

Oxis 2008, “Perceptions of Security and Risks on the InternetExperience and learned levels of trust” available at : http://www.oii.ox.ac.uk/microsites/oxis/events/?id=5 Accessed on [June 2008]

 

P. S. Dowland, S. M. F., H. M. Illingworth, P. L. Reynolds 1999. Computer crime and abuse:A survey of public attitudes and awareness. Computers & Security, 18, 715-726.

 

PC World 2008. PC World http://support.pcworld.co.uk/Layout.aspx?CatID={45712ef7-9ce7-49f4-aa10-afb4bffc 8174} &ID={e4b8726e-f726-44c2-a7f2-4331312ee1be} Accessed on [July,2008]

 

Ronald C. Dodge Jr., Curtis Carver, Aaron J. Ferguson 2007. “Phishing for user security awareness’’Computers & Security, Volume 26, Issue 1, February 2007, Pages 73-80

 

Symantec 2008. “Symantec Internet Security Threat Report”http://eval.symantec.com/mktginfo/enterprise /white _papers/bwhitepaperinternet_security_threat_report_xiii_04-2008.en-us.pdf, Accessed on [June 2008]

 

EXTRA FILES

COMMENTS