DOI QR코드

DOI QR Code

How Do Children Interact with Phishing Attacks?

  • Alwanain, Mohammed I (Department of Computer Science, College of Science and Humanities in Alghat)
  • 투고 : 2021.03.05
  • 발행 : 2021.03.30

초록

Today, phishing attacks represent one of the biggest security threats targeting users of the digital world. They consist of an attempt to steal sensitive information, such as a user's identity or credit and debit card details, using various methods that include fake emails, fake websites, and fake social media messages. Protecting the user's security and privacy therefore becomes complex, especially when those users are children. Currently, children are participating in Internet activity more frequently than ever before. This activity includes, for example, online gaming, communication, and schoolwork. However, children tend to have a less well-developed knowledge of privacy and security concepts, compared to adults. Consequently, they often become victims of cybercrime. In this paper, the effects of security awareness on users who are children are investigated, looking at their ability to detect phishing attacks in social media. In this approach, two Experiments were conducted to evaluate the effects of security awareness on WhatsApp application users in their daily communication. The results of the Experiments revealed that phishing awareness training has a significant positive effect on the ability of children using WhatsApp to identify phishing messages and thereby avoid attacks.

키워드

참고문헌

  1. A. K. Jain and B. B. Gupta, "Phishing detection: analysis of visual similarity based approaches," Secur. Commun. Networks, vol. 2017, no. 5421046, 2017.
  2. FBI, "INTERNET CRIME REPORT," 2019. [Online]. Available: https://www.fbi.gov/news/stories/2019-internet-crime-report-released-021120. [Accessed: 01-Oct-2020].
  3. P. Kumar, S. M. Naik, U. R. Devkar, M. Chetty, T. L. Clegg, and J. Vitak, "No Telling Passcodes Out Because They're Private' Understanding Children's Mental Models of Privacy and Security Online," Proc. ACM Human-Computer Interact., vol. 1, pp. 1-21, 2017.
  4. D. Holloway, L. Green, and S. Livingstone, "Zero to eight: Young children and their internet use," London, 2013.
  5. V. Rideout and M. Robb, "The Common Sense census: Media use by kids age zero to eight," San Fr. CA Common Sense Media, 2020.
  6. K. Grant, "Child identity theft is a growing and expensive problem," CNBC, 2018. [Online]. Available: https://www.cnbc.com/2018/04/24/child-identity-theft-is-a-growing-and-expensive-problem.html. [Accessed: 29-Dec-2020].
  7. U. Hasebrink, S. Livingstone, L. Haddon, and K. Olafsson, "Comparing children's online opportunities and risks across Europe: Cross-national comparisons for EU Kids Online," EU Kids Online, 2008.
  8. R. Dhamija and J. D. Tygar, "The battle against phishing: Dynamic security skins," in ACM Symposium on Usable Security and Privacy (SOUPS 2005), 2005, pp. 77-88.
  9. "Core Street, Spoofstick, 'Browser freely but carry a Spoofstick,'" 2005. [Online]. Available: http://www.spoofstick.com. [Accessed: 10-Dec-2020].
  10. L. Netcraft, "Netcraft anti-phishing toolbar," 2008. [Online]. Available: https://www.netcraft.com/. [Accessed: 15-Dec-2020].
  11. M. Wu, R. C. Miller, and G. Little, "Web wallet: preventing phishing attacks by revealing user intentions," in Proceedings of the second symposium on Usable privacy and security, 2006, pp. 102-113.
  12. E. Lastdrager, I. C. Gallardo, P. Hartel, and M. Junger, "How effective is anti-phishing training for children?," in Thirteenth Symposium on Usable Privacy and Security (SOUPS 2017), 2017, pp. 229-239.
  13. J. Nicholson, Y. Javed, M. Dixon, L. Coventry, O. D. Ajayi, and P. Anderson, "Investigating Teenagers' Ability to Detect Phishing Messages," in IEEE European Symposium on Security and Privacy Workshops, 2020, pp. 140-149.
  14. A. A. Al Shamsi, "Effectiveness of Cyber Security Awareness Program for young children: A Case Study in UAE," Int. J. Inf. Technol. Lang. Stud., vol. 3, no. 2, pp. 8-29, 2019.
  15. S. Maqsood, R. Biddle, S. Maqsood, and S. Chiasson, "An exploratory study of children's online password behaviours," in Proceedings of the 17th ACM Conference on Interaction Design and Children, 2018, pp. 539-544.
  16. H. Zaikina-Montgomery and N. C. Silver, "An examination of icons, signal words, color, and messages in warnings for children on the Internet," in Proceedings of the Human Factors and Ergonomics Society Annual Meeting, 2018, vol. 62, no. 1, pp. 251-255.
  17. Y. Zhang, S. Egelman, L. Cranor, and J. Hong, "Phinding phish: Evaluating anti-phishing tools," in In Proceedings of The 14th Annual Network and Distributed System Security Symposium (NDSS '07), 2007.
  18. L. A. T. Nguyen, B. L. To, H. K. Nguyen, and M. H. Nguyen, "A novel approach for phishing detection using URL-based heuristic," in International Conference on Computing, Management and Telecommunications (ComManTel), 2014, pp. 298-303.
  19. M. Alwanain, "Phishing Awareness and Elderly Users in Social Media," Int. J. Comput. Sci. Netw. Secur., vol. 20, no. 9, pp. 114-119, 2020. https://doi.org/10.22937/IJCSNS.2020.20.09.14
  20. S. Hashmi, "WhatsApp Facts and Stats that You Must Know in 2020," Connectiva Systems, 2020. [Online]. Available:https://www.connectivasystems.com/whatsapp-facts-stats-2020/#WhatsApp_Facts_and_Stats_about_Usage_in_2020.
  21. "WhatsApp website," 2020. [Online]. Available: https://www.whatsapp.com/about/. [Accessed: 10-Nov-2020].
  22. M. Boston, "Q4 Phishers' Favorites report," Vade Secure, 2020. [Online]. Available: https://www.vadesecure.com/en/blog/phishers-favorites-q4-2019. [Accessed: 12-Sep-2020].
  23. "American Community Survey (ACS)," 2018. [Online]. Available: https://www.census.gov/programs-surveys/acs/. [Accessed: 11-Jan-2021].
  24. "Bitly." [Online]. Available: https://bitly.com/. [Accessed: 22-Oct-2020].