This chapter discusses some of the various security threats related to online users and then focuses on phishing – detection, solutions, and our proposed work. This chapter is organized as follows: first, a general introduction to website phishing and the different approaches currently used to mitigate the widespread of this online threat as discussed by previous researchers are discussed.
... [Show full abstract] Second, the problem background section explains the history of how phishing became a problem and how it attained an online threat level where it became important as a research area. Furthermore, this section also discusses how the threat affects e-commerce and the different approaches phishers (the perpetrators) invented over the years in carrying out the art of website phishing. Third, we explain the problem statement and the research questions addressed in this chapter. Fourth, the purpose of this study giving an overview of the methodology used and our expected result is discussed. Finally, the objectives of this chapter that serves as a roadmap to our study are listed; the significance of study discussing why our research is important is presented; and further, organization of our report to prepare the reader for the remaining content of the book serves as the concluding section of this chapter.