Posted: No Phishing

Emory Corporate Governance and Accountability Review (2021)

41 Pages Posted: 31 Mar 2020 Last revised: 2 Nov 2020

See all articles by Lawrence J. Trautman

Lawrence J. Trautman

Prairie View A&M University - College of Business

Mohammed Hussein

Prairie View A&M University - College of Business

Emmanuel U. Opara

Prairie View A&M University

Mason J. Molesky

George Washington University

Shahedur Rahman

Prairie View A&M University - College of Business

Date Written: March 6, 2020

Abstract

Any engineering approach to cybersecurity must recognize that many breaches are the result of human behavior, rather that sophisticated malware. Effective cybersecurity defenses require a systematic engineering approach that recognizes the organizational, cultural and psychological barriers to effectively dealing with this problem. The U.S. Securities and Exchange Commission (SEC) defines “phishing” as, “the use of fraudulent emails and copy-cat websites to trick you into revealing valuable personal information ̶ such as account numbers for banking, securities, mortgage, or credit accounts, your social security numbers, and the login IDs and passwords you use when accessing online financial service providers.” Once this information is fraudulently obtained, it may be used to steal your identity, money, or both.

A review of the literature reveals an alarming lack of attention to the prevalent threat of low-technology, or low-complexity phishing attacks. Accordingly, here is a primer on the prominent exploit known as phishing, illustration of several cases, and the necessity for organizational and societal education of data users as to appropriate computer hygiene.

Keywords: computer hygiene, congressional oversight, constitutional law, corporate governance, crisis, cyber security, data mining, Definers, duties of loyalty and care, ethics, Facebook, fake news, FTC, Google, GozNym, hacking, Internet, national security, Ormerod-Trautman Cybersecurity Model

JEL Classification: D72, D74, G32, G34, J15, K00, K10, K11, K12, K13, K20, K36, K49, L82, L86, M3, M31, M37, M38, N32

Suggested Citation

Trautman, Lawrence J. and Hussein, Mohammed and Opara, Emmanuel U. and Molesky, Mason and Rahman, Shahedur, Posted: No Phishing (March 6, 2020). Emory Corporate Governance and Accountability Review (2021), Available at SSRN: https://ssrn.com/abstract=3549992 or http://dx.doi.org/10.2139/ssrn.3549992

Lawrence J. Trautman (Contact Author)

Prairie View A&M University - College of Business ( email )

Prairie View, TX
United States

Mohammed Hussein

Prairie View A&M University - College of Business ( email )

Prairie View, TX
United States

Emmanuel U. Opara

Prairie View A&M University ( email )

Prairie View, TX
United States
77446 (Fax)

Mason Molesky

George Washington University ( email )

Washington, DC 20052
United States

Shahedur Rahman

Prairie View A&M University - College of Business ( email )

Prairie View, TX
United States

Do you have a job opening that you would like to promote on SSRN?

Paper statistics

Downloads
217
Abstract Views
788
rank
165,660
PlumX Metrics