Introduction
In this article it talks about how phishing attacks are occurring in Cross River State which
is located in the country Nigeria. These phishing attacks are being targeted at the corporate
organizations. It seems that phishing attacks are increasing and due to the fact that
cybercriminals keep sending out these counterfeit emails and due to this, Cross River State is
losing profit. In the article they surveyed over one thousand people to collect data about these
attacks. After the results have come in from the survey, it looks like the corporate organizations
need to alert people to know how to detect these types of attacks and also it is suggested that the
corporate organizations should invest more time and resources.
Social science
After reading the article, I saw how it relates to social sciences. One social science that
this topic relates to is determinism. The reason why I say that is due to the fact that the article
explains that hackers would send fake emails to random people to steal their identity, seal their
credit card information. Determinism means that behavior is caused , determined or influenced
by preceding events . The article explains that unemployed graduates alongside adults are one of
the main targets in Nigeria for phishing which could be the fact that they need money. An
additional social size that relates to this article would be Objectivity. How objectivity relates to
the article is because this study is examining the rising incidence of fishing within the
organizations in Nigeria.
Hypothesis
After reading the article the Hypothesis stated that they believe that phishing attacks will
arise due to the fact that there are plenty of corporate organizations that are falling for these types
of attacks. So in order to find out if this is right, the article says that they went to over a thousand
people and took a survey.
Research Method
The types of research methods that were used to conduct this experiment were
Quantitative and qualitative data. This article also surveyed 1074 people selected from several
financial institutions, telecommunication Network providers, and manufacturing companies. An
additional research method that has been implemented in the article was an in-depth interview
guide which was used on 13 people from different corporate organizations and this was for the
qualitative data. The in-depth interview also aided the finding for the quantitative data in the
research. The respondents must have a computer connected to the internet attached to their
workstations, and they must be ICT workers, staff of the banks’ information security unit, and
engineers of these selected organizations. IDI was treated to a theme and content analysis.
Results
After the researchers conducted the experiment, the data and analysis shows that phishing
has been exposed to all of the corporate organizations. It is also shown that in the past three
quarters had different forms of phishing attacks such as vishing, smishing, and many kinds of
phishing attacks. So after this study it shows that the corporate organizations need better training
for the employees to recognize phishing attacks and many other disguisable attacks that can be
sent through email So it can mitigate corporate businesses from getting their data stolen.
How it relates to cybersecurity
How the concept discussed in class relates to this article is that in this class we learn
different types of ways hackers can steal information such as phishing which is also what my
article is about. How the topic relates to challenges and concerns of marginalized groups is that
hackers send fake emails out to innocent civilians around the world and these people wouldn’t
think much of a phishing email and they would click the email to think it’s a regular email which
isn’t good because they are at risk of having their personal information stolen and if this starts to
become a major problem it could affect everybody in a bad way.
Contribution to Society
The overall contribution of the studies of phishing to society Is that it informs people a
way hackers can get your information and it gives Insight so then people can enlighten this
information out to people so they will know when not to open these types of emails.
cited source
International Journal of Cyber Criminology. International Journal of Cyber Criminology (IJCC). (n.d.). Retrieved May 5, 2022, from https://www.cybercrimejournal.com/