Skip to main content

Awareness of Scam E-Mails: An Exploratory Research Study – Part 2

  • 1194 Accesses

Part of the Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering book series (LNICST,volume 157)

Abstract

This paper is the second part of an entire study conducted regarding general awareness of email scams. The goal of this particular part of research was to check the awareness level and knowledge gap among email users with respect to the actions that need to be taken in case of scam email victimization, and awareness regarding common practices that are used in identifying scam email and types of online scam media. Most common actions mentioned by respondents in case of financial scams and clicking on a malicious link were to contact their banks to close their accounts and cancel their credit cards (41.17 %) and running an anti-virus scan (20.83 %) respectively. The most frequently mentioned online scam media other than email was online ads with pop-ups, while the most common practice employed to identify email scam was to check for emails asking for or giving away money. A definite lack of awareness was found among the users with respect to the actions that need to be taken in case of financial scam victimization. In conclusion, the researchers suggest a need for formal education regarding email scam awareness and best email usage practices.

Keywords

  • Email scam
  • Financial scam
  • Scam victimization
  • Email scam awareness

This is a preview of subscription content, access via your institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • DOI: 10.1007/978-3-319-25512-5_9
  • Chapter length: 11 pages
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
eBook
USD   54.99
Price excludes VAT (USA)
  • ISBN: 978-3-319-25512-5
  • Instant PDF download
  • Readable on all devices
  • Own it forever
  • Exclusive offer for individuals only
  • Tax calculation will be finalised during checkout
Softcover Book
USD   72.00
Price excludes VAT (USA)

Notes

  1. 1.

    Bracketed numbers indicate frequency.

References

  1. Sophos: the security threat report 2014 (2014). http://www.sophos.com/en-us/medialibrary/PDFs/other/sophos-security-threat-report-2014.pdf

  2. Securelist: spam report: January 2014 (2014). https://www.securelist.com/en/analysis/204792327/Spam_report_January_2014

  3. Securelist: spam report: February 2014 (2014). https://www.securelist.com/en/analysis/204792328/Spam_report_February_2014#09

  4. Office: identify fraudulent email and phishing schemes (n.d.). http://office.microsoft.com/en-us/outlook-help/identify-fraudulent-e-mail-and-phishing-schemes-HA001140002.aspx

  5. Apple: identifying fraudulent “phishing” email (n.d.). http://support.apple.com/kb/ht4933

  6. OnGuardOnline: identity theft. (n.d.) http://www.onguardonline.gov/articles/0005-identity-theft

  7. OnGuardOnline: phishing (n.d.). http://www.onguardonline.gov/phishing#action%20steps

  8. Michgan State Police: victim action steps (n.d.). http://www.michigan.gov/msp/0,4643,7-123-1589_35832_38137---,00.html

  9. Microsoft: email and web scams: how to help protect yourself (n.d.). http://www.microsoft.com/en-GB/security/online-privacy/phishing-scams.aspx

  10. Federal Bureau of Investigation: new e-scams and warnings (n.d.). http://www.fbi.gov/scams-safety/e-scams

  11. Acohido: USA Today, 3 must-do steps to recover from a phishing scam (17 May 2013). http://www.usatoday.com/story/cybertruth/2013/05/17/phishing-scams-steps-to-recover-privacy/2193105/

  12. Computer world: don’t click that link, but if you do… (11 April 2014). http://blogs.computerworld.com/15907/dont_click_that_link_but_if_you_do

  13. Fortinet: you clicked on that (malicious) link: from panic to peace of mind (20 April 2012). https://blog.fortinet.com/you-clicked-on-that-malicious-link-from-panic-to-peace-of-mind/

  14. Gudkova, D: Kaspersky Security Bulletin. Spam evolution 2013 (2014). http://securelist.com/analysis/kaspersky-security-bulletin/58274/kaspersky-security-bulletin-spam-evolution-2013/

  15. Internet crime complaint center: internet crime schemes (n.d.). http://www.ic3.gov/crimeschemes.aspx#item-17

  16. Internet crime complaint center: scam alerts (March 2014). http://www.ic3.gov/media/2014/140321.aspx

  17. Norton: your security resource (n.d.). http://us.norton.com/yoursecurityresource/detail.jsp?aid=social_media_scams

  18. Norton: social networking scam (n.d.). http://us.norton.com/social-networking-scams/article

  19. OnGuardOnline: common online scams (n.d.). https://www.onguardonline.gov/articles/0002-common-online-scams

  20. Jakobsson, M., Tsow, A., Shah, A., Blevis, E., Lim, Y.-k.: What Instills trust? A qualitative study of phishing. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 356–361. Springer, Heidelberg (2007)

    CrossRef  Google Scholar 

  21. Shannon, L., Bennett, J.: A case study: applying critical thinking skills to computer science and technology. In: Information Systems Educators Conference, vol. 28 (2011)

    Google Scholar 

  22. Wang, J., Herath, T., Chen, R., Vishwanath, A., Rao, H.R.: Phishing susceptibility: an investigation into the processing of a targeted spear phishing email. IEEE Trans. Prof. Commun. 99 (2012). doi:10.1109/TPC.2012.2208392

  23. Freiermuth, M.: Text, lies and electronic bait: An analysis of email fraud and the decisions of the unsuspecting. Discourse Commun. 5, 123–125 (2011). doi:10.1177/1750481310395448

    CrossRef  Google Scholar 

  24. Ragucci, J., Robila, S.: Societal aspects of phishing. IEEE, pp. 1–5 (2006). doi:10.1109/ISTAS.2006.4375893

  25. Datar, T.D., Cole, K.A., Rogers, M.K.: Awareness of scam e-mails: an exploratory research study. In: Proceedings of the Conference on Digital Forensics, Security and Law, pp. 11–34 (May 2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tejashree D. Datar .

Editor information

Editors and Affiliations

Appendix: Tables

Appendix: Tables

See Tables 5, 6, 7, 8.

Table 5. Demographics of the respondents
Table 6. Frequency of receipt of scam email, and email scam victimization
Table 7. Frequency of actions taken after receiving a scam email
Table 8. Frequency of awareness of other scam media

Rights and permissions

Reprints and Permissions

Copyright information

© 2015 Institute for Computer Sciences, Social informatics and Telecommunication Engineering

About this paper

Cite this paper

Cole, K.A., Datar, T.D., Rogers, M.K. (2015). Awareness of Scam E-Mails: An Exploratory Research Study – Part 2. In: James, J., Breitinger, F. (eds) Digital Forensics and Cyber Crime. ICDF2C 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 157. Springer, Cham. https://doi.org/10.1007/978-3-319-25512-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25512-5_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25511-8

  • Online ISBN: 978-3-319-25512-5

  • eBook Packages: Computer ScienceComputer Science (R0)