Improving Protection and Security Awareness Amongst Home User


Share / Export Citation / Email / Print / Text size:

International Journal of Advanced Network, Monitoring and Controls

Xi'an Technological University

Subject: Computer Science, Software Engineering


eISSN: 2470-8038





Volume / Issue / page

Related articles

VOLUME 1 , ISSUE 1 (June 2016) > List of articles

Improving Protection and Security Awareness Amongst Home User

Muhammad Farhan / Muhammed Fazil Ali / Sajid Ahmed Khan / Syed Shaji Ul hassan

Keywords : Internet Security, Security Awareness

Citation Information : International Journal of Advanced Network, Monitoring and Controls. Volume 1, Issue 1, Pages 0-0, DOI:

License : (CC-BY-NC-ND-4.0)

Published Online: 01-April-2018



The growth of the Internet brings threats to the end user, which affects the home users more severely. The result from the different surveys shows that these vulnerabilities affect home user very badly. As strong security, controls have been implemented in businesses to minimize losses, hackers and fraudsters have moved their attention towards end users, which are normally easier prey. The increase in the need of security amongst end users is an important task of the today. A small security survey has been conducted to get an overview of the user’s perception about Internet security and their knowledge. Some suggestions are also given which would help to create awareness about Internet security in home users.

Content not available PDF Share



Andy Phippen, Steve Furnell 2007 “Taking responsibility for online protection – why citizens have their part to play” Computer Fraud & Security, Volume 2007, Issue 11, November 2007, Pages 8-13


AOL/NCSA 2005, America Online and the National Cyber Security Alliance, safety_study_2005.pdf Accessed on [June 2008]

Australian home user computer security survey 2008. Survey report issued by AUS cert based at university of queen’s land, Available at,


APACS 2008. “Fraud and the Facts” APACS (the UK payment associations)”, publications/documents/FraudtheFacts2008.pdf Accessed [July 2008]


Bryant. P, “Improving Protection and Security Awareness amongst Home Users”, 2006. University of Plymouth, Accessed [July 2008]


British computer society security 2008. “Britain surfs safely” Available at conWebDoc.6307, Accessed [July 2008]


Barclays 2008, “Barclays Online banking” Accessed [July 2008]


CSI 2008. “Computer crime and security survey”, DARGS =/forms/csi_survey.jhtml.2, Accessed [July 2008]


Cheryl Vroom and Rossouw von Solms 2004. “Towards information security behavioral compliance” Computers & Security, Volume 23, Issue 3, May 2004, Pages 191-198.


Deloitte 2007. “Global Security Survey”, GISS_2007_Download Accessed [July 2008]


DTI 2008. “Information security breaches surveys” BERR_ISBS_2008(sml).pdf. Accessed [July 2008]


Esther E. Klein, Thomas Tellefsen and Paul J. Herskovitz 2007, “The use of group support systems in focus groups: Information technology meets qualitative research” Computers in Human Behavior, Volume 23, Issue 5, Pages 2113-2132.[July 2008]


Furnell, S. 2008. End-user security culture: A lesson that will never be learnt? Computer Fraud & Security, 6-9.


Federal Trade Commission 2006. “Consumer Fraud and identity theft complaint data Jan-Dec 2005”, http://www. consumer. gov/sentinel/pubs/Top10Fraud2006.pdf Accessed [18 August 2008]


Fraud email 2008., 2008 [Email] message to S. M. Kamran, ( available at: f6e3 Accessed [July 2008]


GetSafeOnline 2006. “The Get safe online report”, 2006. pdf Accessed [July 2008]


Get safe online 2007 “Social networkers and wireless networks users provide: rich pickings for criminals” Accessed [July 2008]


Get safe online 2007” Online fraudsters ‘sting’ users for £875” cfm? a_id=1449 Accessed [July 2008]


Gerald Post and Albert Kagan 1998. “The use and effectiveness of anti-virus software”, Computers & Security, Volume 17, Issue 7, Pages 589-599


Julie J.C.H. Ryan, Daniel J. Ryan 2006 “Expected benefits of information security investments’’ Computers & Security, Volume 25, Issue 8, Pages 579-588


Message labs 2008. “Google Sites Becomes Newest Addition to Spammers”, intelligence.aspx Accessed [July 2008]


NCSA 2007. “McAfee/NCSA Cyber security Survey report”, Accessed [July 2008]


National Statistics 2007. “National statistics survey report 2007”, Accessed [July 2008]


Oxis 2008, “Perceptions of Security and Risks on the InternetExperience and learned levels of trust” available at : Accessed on [June 2008]


P. S. Dowland, S. M. F., H. M. Illingworth, P. L. Reynolds 1999. Computer crime and abuse:A survey of public attitudes and awareness. Computers & Security, 18, 715-726.


PC World 2008. PC World{45712ef7-9ce7-49f4-aa10-afb4bffc 8174} &ID={e4b8726e-f726-44c2-a7f2-4331312ee1be} Accessed on [July,2008]


Ronald C. Dodge Jr., Curtis Carver, Aaron J. Ferguson 2007. “Phishing for user security awareness’’Computers & Security, Volume 26, Issue 1, February 2007, Pages 73-80


Symantec 2008. “Symantec Internet Security Threat Report” /white _papers/bwhitepaperinternet_security_threat_report_xiii_04-2008.en-us.pdf, Accessed on [June 2008]