

Thus manufacturers need to develop more secure products by devoting more time to the development of security features and design of human–computer interface (HCI). Urgent action is required in light of the recent high-profile security breaches due to ignorance and negligent use.Most threats come from the ignorance of users, the inactive attitudes of corporations, and the improper implementation of security features by wireless devices manufacturers. IT managers are not paying enough attention to issues and that pose a serious threat. IT managers do not provide enough education and support for users’ wireless connections at home or public places. These problems must be rectified quickly due to expanding use of wireless facilities.Corporations also underestimate the potential dangers.

Many users believe their wireless connections are safe and they do not realize the serious consequences of possible security breaches. This chapter examines the misunderstanding of wireless security from user behavior perspectives. This study presents a timely empirical study on identity theft, and provides valuable insights for consumers, government agencies, and e-commerce industries. Technological coping is determined by an individual's conventional coping, self-efficacy, perceived effectiveness of coping, and social influence. The results reveal that both conventional coping and technological coping are effective to defend against identity theft. Following structural equation modeling approach, we test the model using data collected from 117 subjects through a survey. Drawing upon coping behavior theories, this study examines two types of coping behaviors to fight identity theft (i.e., conventional coping and technological coping). Although the practical significance of fighting identity theft has been of great interest, empirical studies on identity theft are very limited. Fighting identity theft is important for both online business and consumers. The proliferation of the online business transaction has led to a large number of incidents of identity theft, which have incurred expensive costs to consumers and e-commerce industries. Based on these findings, suggestions are made for improving consumer awareness and future research is recommended. What is clear, however, is that there are good practice preventative measures (behaviour) that consumers are not following. In some instances, the US cohort indicated a more extensive awareness of the issues than the Irish cohort and in other instances the Irish cohort scored higher. The results are compared with a similar study of undergraduate students carried out in 2001 by George R.M Milne. The study uses an exploratory approach of measuring the self-reported behaviour of undergraduate students from different disciplines and age cohorts. This paper focuses on consumer awareness of the protective measures they can take to prevent identity theft. Identity theft is one of the primary ways that fraudsters can take advantage of these systems. Many of these systems have been designed and implemented with little regard for security and privacy issues and as a result, cyber crimes such as identity theft have been growing rapidly. The increased use of Information and Communication Technology (ICT) has meant that there is a vast increase in the collection and dissemination of private and confidential information on the web. The paper concludes by suggesting that the behavioral aspect of susceptible users be integrated into the current tools and materials used in antiphishing efforts. It was found that four behavioral factors were influential as to whether the phishing e-mails were answered with sensitive information. The model was tested using a field study in which each participant received a phishing e-mail asking for sensitive information. Using past research on deception detection, a research model was developed to help explain compliant phishing responses. The goal of this paper is to better understand the behavioral factors that may increase one's susceptibility for complying with a phisher's request for personal information. Even so, research has yet to explore many of the reasons why Internet users continue to be exploited.

In 2008, it was estimated that phishing resulted in close to $50 billion in damages to U.S. Phishing has been a major problem for information systems managers and users for several years now.
