IRMA-International.org: Creator of Knowledge
Information Resources Management Association
Advancing the Concepts & Practices of Information Resources Management in Modern Organizations

Can Identity Theft Defense be Practically Effective? A TAM-Derived Survey of Software-Based Deterrence to Phishing and Pharming

Can Identity Theft Defense be Practically Effective? A TAM-Derived Survey of Software-Based Deterrence to Phishing and Pharming
View Free PDF
Author(s): Charles McClain (Capella University, USA)
Copyright: 2006
Pages: 5
Source title: Emerging Trends and Challenges in Information Technology Management
Source Editor(s): Mehdi Khosrow-Pour, D.B.A. (Information Resources Management Association, USA)
DOI: 10.4018/978-1-59904-019-6.ch114
ISBN13: 9781616921286
EISBN13: 9781466665361

Abstract

Phishing uses technical legerdemain and social engineering to defraud on-line consumers into divulging confidential information. Pharming is a complimentary activity which misdirects clueless internet users to phony destinations, where they are induced to voluntarily give up their valuable data through Phishing schemes. These crimes are on the rise. Filings with the Anti-Phising Working Group (APWG) indicate that, on average, 456 incidents of Phishing were occurring each day during the month of July, 2005, and these were only those incidents which were reported to APWG. This paper discusses practical challenges to the problem of identity theft prevention through an evaluation of the perceived user acceptance over a variety of software products which share the goal of enabling web-users to avoid becoming ID Theft victims, based on hypothesis’ of the Davis Technology Assessment Model (TAM).

Body Bottom