Exploring How User Behavior Shapes Cybersecurity Awareness in the Face of Phishing Attacks

  IJCTT-book-cover
 
         
 
© 2023 by IJCTT Journal
Volume-71 Issue-11
Year of Publication : 2023
Authors : Sivaraju Kuraku, Dinesh Kalla, Nathan Smith, Fnu Samaah
DOI :  10.14445/22312803/IJCTT-V71I11P111

How to Cite?

Sivaraju Kuraku, Dinesh Kalla, Nathan Smith, Fnu Samaah, "Exploring How User Behavior Shapes Cybersecurity Awareness in the Face of Phishing Attacks," International Journal of Computer Trends and Technology, vol. 71, no. 11, pp. 74-79, 2023. Crossref, https://doi.org/10.14445/22312803/IJCTT-V71I11P111

Abstract
The increased advancement of technology has increased computer users’ susceptibility to cyber threats like phishing attacks, which are a type of social engineering method utilized by phishers to masquerade as legitimate entities in order to deceive computer users into disclosing sensitive information like financial data or passwords. This study determines how computer users’ behavior affects their cybersecurity awareness towards phishing attacks. The study also identifies the major behavioral patterns that computer users exhibit that make them additionally susceptible to phishing attacks. These behavioral patterns include improper management of passwords, neglecting regular security and software updates, exposing sensitive information on online platforms, and clicking suspicious attachments and links. Through understanding the relationship between user behavior and cybersecurity awareness, computer users can implement proactive measures to minimize the impact and frequency of phishing attacks, thus enhancing cybersecurity resilience.

Keywords
Computer users, Cyber threats, Phishing attacks, sensitive information, computer users’ behavior, Cybersecurity Awareness, Behavioral patterns, Cyber Attacks, Cybersecurity education, Pharming, Information technology Security and cybersecurity resilience.

Reference

[1] Zainab Alkhalil et al., “Phishing Attacks: A Recent Comprehensive Study and a New Anatomy,” Frontiers in Computer Science, vol. 3, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[2] Heather J. Parker, and Stephen V. Flowerday, “Contributing Factors to Increased Susceptibility to Social Media Phishing Attacks,” South African Journal of Information Management, vol. 22, no. 1, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[3] Giuseppe Desolda et al., “Human Factors in Phishing Attacks: A Systematic Literature Review,” ACM Computing Surveys, vol. 54, no. 8, pp. 1-35, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[4] Junaid Ahsenali Chaudhry, Shafique Ahmad Chaudhry, and Robert G. Rittenhouse, “Phishing Attacks and Defenses,” International Journal of Security and its Applications, vol. 10, no. 1, pp. 247-256, 2016.
[CrossRef] [Google Scholar] [Publisher Link]
[5] Dhruv Bhanderi et al., “Impact of Two-Factor Authentication on User Convenience and Security” 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom), IEEE, pp. 617-622. 2023.
[Google Scholar] [Publisher Link]
[6] Dinesh Kalla et al., “Phishing Detection Implementation Using Databricks and Artificial Intelligence,” International Journal of Computer Applications, vol. 185, no. 11, pp. 1-11, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[7] Kuraku Sivaraju, Curiosity Clicks: The Need for Security Awareness, University of the Cumberlands ProQuest Dissertations Publishing, 2022.
[Google Scholar] [Publisher Link]
[8] Casey Crane, The Dirty Dozen: the 12 Most Costly Phishing Attack Examples, The SSL Store, 2019.
[Google Scholar] [Publisher Link]
[9] D. Stafford Christina, Weakest Link: Assessing Factors that Influence Susceptibility to Falling Victim to Phishing Attacks and Methods to Mitigate, Utica College ProQuest Dissertations Publishing, 2020.
[Google Scholar] [Publisher Link]
[10] David Maimon et al., “A Routine Activities Approach to Evidence-Based Risk Assessment: Findings from Two Simulated Phishing Attacks,” Social Science Computer Review, vol. 41, no. 1, pp. 286-304, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[11] Sivaraju Kuraku, and Dinesh Kalla, “Impact of Phishing on Users with Different Online Browsing Hours and Spending Habits,” International Journal of Advanced Research in Computer and Communication Engineering, vol. 12, no. 10, pp. 34-41, 2023.
[CrossRef] [Google Scholar] [Publisher Link]
[12] Prashanth Rajivan, Efrat Aharonov-Majar, and Cleotilde Gonzalez, “Update Now or Later? Effects of Experience, Cost, and Risk Preference on Update Decisions,” Journal of Cybersecurity, vol. 6, no. 1, 2020.
[CrossRef] [Google Scholar] [Publisher Link]
[13] Hossein Abroshan et al., “Phishing Happens Beyond Technology: The Effects of Human Behaviors and Demographics on Each Step of a Phishing Process,” IEEE Access, vol. 9, pp. 44928-44949, 2021.
[CrossRef] [Google Scholar] [Publisher Link]
[14] Ahmed Alzahrani, “Coronavirus Social Engineering Attacks: Issues and Recommendations,” International Journal of Advanced Computer Science and Applications, vol. 11, no. 5, 2020.
[CrossRef] [Google Scholar] [Publisher Link]