Posted: No Phishing

41 Pages Posted: 31 Mar 2020 Last revised: 10 Aug 2020

See all articles by Lawrence J. Trautman

Lawrence J. Trautman

Prairie View A&M University - College of Business

Mohammed Hussein

Prairie View A&M University - College of Business

Emmanuel U. Opara

Prairie View A&M University

Mason J. Molesky

George Washington University

Shahedur Rahman

Prairie View A&M University - College of Business

Date Written: March 6, 2020

Abstract

Any engineering approach to cybersecurity must recognize that many breaches are the result of human behavior, rather that sophisticated malware. Effective cybersecurity defenses require a systematic engineering approach that recognizes the organizational, cultural and psychological barriers to effectively dealing with this problem. The U.S. Securities and Exchange Commission (SEC) defines “phishing” as, “the use of fraudulent emails and copy-cat websites to trick you into revealing valuable personal information ̶ such as account numbers for banking, securities, mortgage, or credit accounts, your social security numbers, and the login IDs and passwords you use when accessing online financial service providers.” Once this information is fraudulently obtained, it may be used to steal your identity, money, or both.

A review of the literature reveals an alarming lack of attention to the prevalent threat of low-technology, or low-complexity phishing attacks. Accordingly, here is a primer on the prominent exploit known as phishing, illustration of several cases, and the necessity for organizational and societal education of data users as to appropriate computer hygiene.

Keywords: computer hygiene, congressional oversight, constitutional law, corporate governance, crisis, cyber security, data mining, Definers, duties of loyalty and care, ethics, Facebook, fake news, FTC, Google, GozNym, hacking, Internet, national security, Ormerod-Trautman Cybersecurity Model

JEL Classification: D72, D74, G32, G34, J15, K00, K10, K11, K12, K13, K20, K36, K49, L82, L86, M3, M31, M37, M38, N32

Suggested Citation

Trautman, Lawrence J. and Hussein, Mohammed and Opara, Emmanuel U. and Molesky, Mason and Rahman, Shahedur, Posted: No Phishing (March 6, 2020). Available at SSRN: https://ssrn.com/abstract=3549992 or http://dx.doi.org/10.2139/ssrn.3549992

Lawrence J. Trautman (Contact Author)

Prairie View A&M University - College of Business ( email )

Prairie View, TX
United States

Mohammed Hussein

Prairie View A&M University - College of Business ( email )

Prairie View, TX
United States

Emmanuel U. Opara

Prairie View A&M University

Prairie View, TX
United States
77446 (Fax)

Mason Molesky

George Washington University ( email )

Washington, DC 20052
United States

Shahedur Rahman

Prairie View A&M University - College of Business ( email )

Prairie View, TX
United States

Here is the Coronavirus
related research on SSRN

Paper statistics

Downloads
69
Abstract Views
331
rank
365,434
PlumX Metrics