Skip to main content

Attempts and Impact of Phishing in Cyberworld

  • Chapter
  • First Online:
Book cover Cybercrime, Digital Forensics and Jurisdiction

Part of the book series: Studies in Computational Intelligence ((SCI,volume 593))

  • 2433 Accesses

Abstract

Phishing is the act of sending an email to a user falsely claiming to be an established legitimate business, in an attempt to scam the user into surrendering private information that will be used for identity theft.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 99.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 129.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    See Phishing Statistics, available at (www.brighthub.com), (visited 29/07/2011).

  2. 2.

    Ibid.

  3. 3.

    Ibid.

References

  • S. Brenner, Cybercrime metrics, old wine, new bottles. Va. J. Law Technol. 9, (2004)

    Google Scholar 

  • M. Chawki, M. Wahab, Identity theft in cyberspace: issues & solutions (Lex Electronica), (2006)

    Google Scholar 

  • Federal Trade Commission, Take charge: fighting back against identity theft (2004), www.ftc.gov. Accessed 01 Aug 2011

  • J. Legon, Phishing scams reel in your identity (2004), www.articles.cnn.com. Accessed 30 July 2011

  • R. Lininger, R. Dean, Phishing, Cutting Identity Theft Line (Wiley, New York, 2005)

    Google Scholar 

  • S. Perumal, Impact of cybercrime on virtual banking (2008), www.ssrn.com. Accessed 02 Aug 2011

  • J. Rusch, The compleat cyber—angler: a guide to phishing. Comput. Fraud Secur. 2005(1), (2005)

    Google Scholar 

  • C. Soghoian, Legal risks for phishing researchers (2008), www.ssrn.com. Accessed 01 Aug 2011

  • Trend Micro, Phishing (2006), www.antiphishing.org. Accessed 29 July 2011

  • D. Wall, Hunting, Shooting and Phishing: New Cybercrime Challenges for Cybercanadians in the 21st Century (The British Library, London, 2008)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Mohamed Chawki .

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Chawki, M., Darwish, A., Khan, M.A., Tyagi, S. (2015). Attempts and Impact of Phishing in Cyberworld. In: Cybercrime, Digital Forensics and Jurisdiction. Studies in Computational Intelligence, vol 593. Springer, Cham. https://doi.org/10.1007/978-3-319-15150-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15150-2_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15149-6

  • Online ISBN: 978-3-319-15150-2

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics