- Title
- Phishing within e-commerce: reducing the risk, increasing the trust
- Creator
- Megaw, Gregory M
- Subject
- Phishing
- Subject
- Identity theft -- Prevention
- Subject
- Electronic commerce
- Subject
- Computer security
- Subject
- Internet -- Safety measures
- Date
- 2010
- Type
- Thesis
- Type
- Masters
- Type
- MCom (Information Systems)
- Identifier
- vital:11131
- Identifier
- http://hdl.handle.net/10353/376
- Identifier
- Phishing
- Identifier
- Identity theft -- Prevention
- Identifier
- Electronic commerce
- Identifier
- Computer security
- Identifier
- Internet -- Safety measures
- Description
- E-Commerce has been plagued with problems since its inception and this study examines one of these problems: The lack of user trust in E-Commerce created by the risk of phishing. Phishing has grown exponentially together with the expansion of the Internet. This growth and the advancement of technology has not only benefited honest Internet users, but has enabled criminals to increase their effectiveness which has caused considerable damage to this budding area of commerce. Moreover, it has negatively impacted both the user and online business in breaking down the trust relationship between them. In an attempt to explore this problem, the following was considered: First, E-Commerce’s vulnerability to phishing attacks. By referring to the Common Criteria Security Model, various critical security areas within E-Commerce are identified, as well as the areas of vulnerability and weakness. Second, the methods and techniques used in phishing, such as phishing e-mails, websites and addresses, distributed attacks and redirected attacks, as well as the data that phishers seek to obtain, are examined. Furthermore, the way to reduce the risk of phishing and in turn increase the trust between users and websites is identified. Here the importance of Trust and the Uncertainty Reduction Theory plus the fine balance between trust and control is explored. Finally, the study presents Critical Success Factors that aid in phishing prevention and control, these being: User Authentication, Website Authentication, E-mail Authentication, Data Cryptography, Communication, and Active Risk Mitigation.
- Format
- 168 leaves; 30 cm
- Format
- Publisher
- University of Fort Hare
- Publisher
- Faculty of Management & Commerce
- Language
- English
- Rights
- University of Fort Hare
- Hits: 3399
- Visitors: 3533
- Downloads: 215
Thumbnail | File | Description | Size | Format | |||
---|---|---|---|---|---|---|---|
View Details | SOURCEPDF | 3 MB | Adobe Acrobat PDF | View Details |