Skip to main content

Awareness of Scam E-Mails: An Exploratory Research Study – Part 2

  • Conference paper
  • First Online:
Digital Forensics and Cyber Crime (ICDF2C 2015)

Abstract

This paper is the second part of an entire study conducted regarding general awareness of email scams. The goal of this particular part of research was to check the awareness level and knowledge gap among email users with respect to the actions that need to be taken in case of scam email victimization, and awareness regarding common practices that are used in identifying scam email and types of online scam media. Most common actions mentioned by respondents in case of financial scams and clicking on a malicious link were to contact their banks to close their accounts and cancel their credit cards (41.17 %) and running an anti-virus scan (20.83 %) respectively. The most frequently mentioned online scam media other than email was online ads with pop-ups, while the most common practice employed to identify email scam was to check for emails asking for or giving away money. A definite lack of awareness was found among the users with respect to the actions that need to be taken in case of financial scam victimization. In conclusion, the researchers suggest a need for formal education regarding email scam awareness and best email usage practices.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 54.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 72.00
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Bracketed numbers indicate frequency.

References

  1. Sophos: the security threat report 2014 (2014). http://www.sophos.com/en-us/medialibrary/PDFs/other/sophos-security-threat-report-2014.pdf

  2. Securelist: spam report: January 2014 (2014). https://www.securelist.com/en/analysis/204792327/Spam_report_January_2014

  3. Securelist: spam report: February 2014 (2014). https://www.securelist.com/en/analysis/204792328/Spam_report_February_2014#09

  4. Office: identify fraudulent email and phishing schemes (n.d.). http://office.microsoft.com/en-us/outlook-help/identify-fraudulent-e-mail-and-phishing-schemes-HA001140002.aspx

  5. Apple: identifying fraudulent “phishing” email (n.d.). http://support.apple.com/kb/ht4933

  6. OnGuardOnline: identity theft. (n.d.) http://www.onguardonline.gov/articles/0005-identity-theft

  7. OnGuardOnline: phishing (n.d.). http://www.onguardonline.gov/phishing#action%20steps

  8. Michgan State Police: victim action steps (n.d.). http://www.michigan.gov/msp/0,4643,7-123-1589_35832_38137---,00.html

  9. Microsoft: email and web scams: how to help protect yourself (n.d.). http://www.microsoft.com/en-GB/security/online-privacy/phishing-scams.aspx

  10. Federal Bureau of Investigation: new e-scams and warnings (n.d.). http://www.fbi.gov/scams-safety/e-scams

  11. Acohido: USA Today, 3 must-do steps to recover from a phishing scam (17 May 2013). http://www.usatoday.com/story/cybertruth/2013/05/17/phishing-scams-steps-to-recover-privacy/2193105/

  12. Computer world: don’t click that link, but if you do… (11 April 2014). http://blogs.computerworld.com/15907/dont_click_that_link_but_if_you_do

  13. Fortinet: you clicked on that (malicious) link: from panic to peace of mind (20 April 2012). https://blog.fortinet.com/you-clicked-on-that-malicious-link-from-panic-to-peace-of-mind/

  14. Gudkova, D: Kaspersky Security Bulletin. Spam evolution 2013 (2014). http://securelist.com/analysis/kaspersky-security-bulletin/58274/kaspersky-security-bulletin-spam-evolution-2013/

  15. Internet crime complaint center: internet crime schemes (n.d.). http://www.ic3.gov/crimeschemes.aspx#item-17

  16. Internet crime complaint center: scam alerts (March 2014). http://www.ic3.gov/media/2014/140321.aspx

  17. Norton: your security resource (n.d.). http://us.norton.com/yoursecurityresource/detail.jsp?aid=social_media_scams

  18. Norton: social networking scam (n.d.). http://us.norton.com/social-networking-scams/article

  19. OnGuardOnline: common online scams (n.d.). https://www.onguardonline.gov/articles/0002-common-online-scams

  20. Jakobsson, M., Tsow, A., Shah, A., Blevis, E., Lim, Y.-k.: What Instills trust? A qualitative study of phishing. In: Dietrich, S., Dhamija, R. (eds.) FC 2007 and USEC 2007. LNCS, vol. 4886, pp. 356–361. Springer, Heidelberg (2007)

    Chapter  Google Scholar 

  21. Shannon, L., Bennett, J.: A case study: applying critical thinking skills to computer science and technology. In: Information Systems Educators Conference, vol. 28 (2011)

    Google Scholar 

  22. Wang, J., Herath, T., Chen, R., Vishwanath, A., Rao, H.R.: Phishing susceptibility: an investigation into the processing of a targeted spear phishing email. IEEE Trans. Prof. Commun. 99 (2012). doi:10.1109/TPC.2012.2208392

  23. Freiermuth, M.: Text, lies and electronic bait: An analysis of email fraud and the decisions of the unsuspecting. Discourse Commun. 5, 123–125 (2011). doi:10.1177/1750481310395448

    Article  Google Scholar 

  24. Ragucci, J., Robila, S.: Societal aspects of phishing. IEEE, pp. 1–5 (2006). doi:10.1109/ISTAS.2006.4375893

  25. Datar, T.D., Cole, K.A., Rogers, M.K.: Awareness of scam e-mails: an exploratory research study. In: Proceedings of the Conference on Digital Forensics, Security and Law, pp. 11–34 (May 2014)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Tejashree D. Datar .

Editor information

Editors and Affiliations

Appendix: Tables

Appendix: Tables

See Tables 5, 6, 7, 8.

Table 5. Demographics of the respondents
Table 6. Frequency of receipt of scam email, and email scam victimization
Table 7. Frequency of actions taken after receiving a scam email
Table 8. Frequency of awareness of other scam media

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Institute for Computer Sciences, Social informatics and Telecommunication Engineering

About this paper

Cite this paper

Cole, K.A., Datar, T.D., Rogers, M.K. (2015). Awareness of Scam E-Mails: An Exploratory Research Study – Part 2. In: James, J., Breitinger, F. (eds) Digital Forensics and Cyber Crime. ICDF2C 2015. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol 157. Springer, Cham. https://doi.org/10.1007/978-3-319-25512-5_9

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-25512-5_9

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-25511-8

  • Online ISBN: 978-3-319-25512-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics