131 resultados para emails


Relevância:

10.00% 10.00%

Publicador:

Resumo:

Micro-blogging services such as Twitter, Yammer, Plurk and Google Buzz have generated substantial interest among members of the business community in recent years. Many CEOs, managers and front-line employees have embraced micro-blogs as a tool for interacting with colleagues, employees, customers, suppliers and investors. Micro-blogs are considered a more informal channel than emails and official websites, and thus present a different set of challenges to businesses. As a positional paper, this paper uses a case study of a bogus Twitter account to emphasise security and ethical issues relating to (i) Trust, Accuracy and Authenticity of Information, (ii) Privacy and Confidentiality, and (iii) Scams and Frauds, when micro-blogs are used in the workplace. It also highlights the potential risks businesses are exposed to if employees use micro-blogs irresponsibly. The paper contributes to practice by providing suggestions on managing security and ethical risks associated with micro-blogging in the workplace. It contributes to research by building on existing research in trust and data privacy in electronic communication.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Spam is commonly known as unsolicited or unwanted email messages in the Internet causing potential threat to Internet Security. Users spend a valuable amount of time deleting spam emails. More importantly, ever increasing spam emails occupy server storage space and consume network bandwidth. Keyword-based spam email filtering strategies will eventually be less successful to model spammer behavior as the spammer constantly changes their tricks to circumvent these filters. The evasive tactics that the spammer uses are patterns and these patterns can be modeled to combat spam. This paper investigates the possibilities of modeling spammer behavioral patterns by well-known classification algorithms such as Naïve Bayesian classifier (Naive Bayes), Decision Tree Induction (DTI) and Support Vector Machines (SVMs). Preliminary experimental results demonstrate a promising detection rate of around 92%, which is considerably an enhancement of performance compared to similar spammer behavior modeling research.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Classifying user emails correctly from penetration of spam is an important research issue for anti-spam researchers. This paper has presented an effective and efficient email classification technique based on data filtering method. In our testing we have introduced an innovative filtering technique using instance selection method (ISM) to reduce the pointless data instances from training model and then classify the test data. The objective of ISM is to identify which instances (examples, patterns) in email corpora should be selected as representatives of the entire dataset, without significant loss of information. We have used WEKA interface in our integrated classification model and tested diverse classification algorithms. Our empirical studies show significant performance in terms of classification accuracy with reduction of false positive instances.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Employees continue to report multifarious e-mail concerns ('e-mail defects') including ambiguous unclear messages, e-mail overload, security and privacy issues, and e-mail interruptions. These defects have an effect on employee efficiency and effectiveness. This paper explores the importance of identifying e-mail defects and the effectiveness of training employees in efficient use of e-mail at four UK organisations, using Seminar-Based Training (SBT) and Computer-Based Training (CBT) delivery modes. The findings suggest that SBT has a diminishing impact over a very short period of time, but a combined approach of SBT and CBT is more effective and provides better results.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In online role plays, students are asked to engage with a story that serves as a metaphor for real-life experience as they learn and develop skills. However, practitioners rarely examine the characteristics and management of this story as factors in the students' engagement in and learning from the activity. In this paper I present findings from a recent case study which examines these factors in an online role play that has been named as an exemplar and has been run for 19 years in Australian and international universities to teach Middle East politics and journalism. Online role plays are increasingly popular in tertiary education, in forms ranging from simple text-based role plays to virtual learning environment activities and e-simulations. The role play I studied required students to communicate in role via simulated email messages and draw on real-life resources and daily simulated online newspaper publications produced by the journalism students rather than rely on information or automated interactions built into an interface. This relatively simple format enabled me to observe clearly the impact of the technique's basic design elements. I studied both the story elements of plot, character and setting and the non-story elements of assessment, group work and online format. The data collection methods include analysis of student emails in the role play, a questionnaire, a focus group, interviews and the journal I kept as a participant-observer in the role play. In evaluating the qualities and impact of story elements I drew upon established aesthetic principles for drama and poststructuralist drama education.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Phishing emails are more dynamic and cause high risk of significant data, brand and financial loss to average computer user and organizations. To address this problem, we propose a hybrid feature selection approach based on combination of content-based and behavior-based. Our proposed hybrid features selections are able to achieve 93% accuracy rate as compared to other approaches. In addition, we successfully tested the quality of our proposed behavior-based feature using the Information Gain, Gain Ratio and Symmetrical Uncertainty.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Phishing emails are more active than ever before and putting the average computer user and organizations at risk of significant data, brand and financial loss. Through an analysis of a number of phishing and ham email collected, this paper focused on fundamental attacker behavior which could be extracted from email header. It also put forward a hybrid feature selection approach based on combination of content-based and behavior-based. The approach could mine the attacker behavior based on email header. On a publicly available test corpus, our hybrid features selections are able to achieve 96% accuracy rate. In addition, we successfully tested the quality of our proposed behavior-based feature using the information gain.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Spam or unwanted email is one of the potential issues of Internet security and classifying user emails correctly from penetration of spam is an important research issue for anti-spam researchers. In this paper we present an effective and efficient spam classification technique using clustering approach to categorize the features. In our clustering technique we use VAT (Visual Assessment and clustering Tendency) approach into our training model to categorize the extracted features and then pass the information into classification engine. We have used WEKA (www.cs.waikato.ac.nz/ml/weka/) interface to classify the data using different classification algorithms, including tree-based classifiers, nearest neighbor algorithms, statistical algorithms and AdaBoosts. Our empirical performance shows that we can achieve detection rate over 97%.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper provides a temporal snapshot of two midterm PhD candidates as they both grapple with paradigms and methodology, research questions, external challenges within the research field, locating their voices as doctoral students, and maintaining energy and focus to continue their doctoral journey. These two candidates, one of whom is interstate, share the same supervisor and have come to know each other through telephone reading groups, email communications, and face-to-face meetings with their supervisor, and attending conferences and other collegial opportunities. The catalyst for this paper was a reading group discussion of a paper by Pirrie and Macleod (2010, p. 367) applying the descriptors of ʻjourneyman, wayfarer, fellow traveller or craftsmanʼ to the conceptualisation of the identities of researchers at temporal moments in the research process. We were also inspired by Kamler and Thomsonʼs (2001) paper where they respond to each otherʼs emails in a conversation formulating ideas and perspectives about ʻwriting upʼ research. Additionally, we have considered the work of Ryan, Amorim and Kusch (2010) and Lindsay, Kell, Ouellette and Westall (2010). We have linked their work on reflective learning to our experience of reflecting ʻaloudʼ in a supportive learning community and our subsequent individual reflexive learning. At the heart of our reflections is a relationship between supervisor (Jennifer) and doctoral candidates (Christine and Cheryl); the relationship is a fluid community of practice (Wenger, 1998). A community of practice that depends not so much on direction from the supervisor, but rather as a space where concepts and ideas can be spoken aloud in a safe, critical and supportive environment. Members are able to listen, both to themselves and to each other, before reflecting and finding their own way. At other times each juggles their own professional and personal identities as they become teacher, journeyman, fellow traveller and recalcitrant.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Online social networks have not only become a point of aggregation and exchange of information, they have so radically rooted into our everyday behaviors that they have become the target of important network attacks. We have seen an increasing trend in Sybil based activity, such as in personification, fake profiling and attempts to maliciously subvert the community stability in order to illegally create benefits for some individuals, such as online voting, and also from more classic informatics assaults using specifically mutated worms. Not only these attacks, in the latest months, we have seen an increase in spam activities on social networks such as Facebook and RenRen, and most importantly, the first attempts at propagating worms within these communities. What differentiates these attacks from normal network attacks, is that compared to anonymous and stealthy activities, or by commonly untrusted emails, social networks regain the ability to propagate within consentient users, who willingly accept to partake. In this paper, we will demonstrate the effects of influential nodes against non-influential nodes through in simulated scenarios and provide an overview and analysis of the outcomes.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

This paper is devoted to multi-tier ensemble classifiers for the detection and filtering of phishing emails. We introduce a new construction of ensemble classifiers, based on the well known and productive multi-tier approach. Our experiments evaluate their performance for the detection and filtering of phishing emails. The multi-tier constructions are well known and have been used to design effective classifiers for email classification and other applications previously. We investigate new multi-tier ensemble classifiers, where diverse ensemble methods are combined in a unified system by incorporating different ensembles at a lower tier as an integral part of another ensemble at the top tier. Our novel contribution is to investigate the possibility and effectiveness of combining diverse ensemble methods into one large multi-tier ensemble for the example of detection and filtering of phishing emails. Our study handled a few essential ensemble methods and more recent approaches incorporated into a combined multi-tier ensemble classifier. The results show that new large multi-tier ensemble classifiers achieved better performance compared with the outcomes of the base classifiers and ensemble classifiers incorporated in the multi-tier system. This demonstrates that the new method of combining diverse ensembles into one unified multi-tier ensemble can be applied to increase the performance of classifiers if diverse ensembles are incorporated in the system.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Social network worms, such as email worms and facebook worms, pose a critical security threat to the Internet. Modeling their propagation dynamics is essential to predict their potential damages and develop countermeasures. Although several analytical models have been proposed for modeling propagation dynamics of social network worms, there are two critical problems unsolved: temporal dynamics and spatial dependence. First, previous models have not taken into account the different time periods of Internet users checking emails or social messages, namely, temporal dynamics. Second, the problem of spatial dependence results from the improper assumption that the states of neighboring nodes are independent. These two problems seriously affect the accuracy of the previous analytical models. To address these two problems, we propose a novel analytical model. This model implements a spatial-temporal synchronization process, which is able to capture the temporal dynamics. Additionally, we find the essence of spatial dependence is the spreading cycles. By eliminating the effect of these cycles, our model overcomes the computational challenge of spatial dependence and provides a stronger approximation to the propagation dynamics. To evaluate our susceptible-infectious-immunized (SII) model, we conduct both theoretical analysis and extensive simulations. Compared with previous epidemic models and the spatial-temporal model, the experimental results show our SII model achieves a greater accuracy. We also compare our model with the susceptible-infectious-susceptible and susceptible-infectious- recovered models. The results show that our model is more suitable for modeling the propagation of social network worms.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Email has become the critical communication medium for most organizations. Unfortunately, email-born attacks in computer networks are causing considerable economic losses worldwide. Exiting phishing email blocking appliances have little effect in weeding out the vast majority of phishing emails. At the same time, online criminals are becoming more dangerous and sophisticated. Phishing emails are more active than ever before and putting the average computer user and organizations at risk of significant data, brand and financial loss. In this paper, we propose a hybrid feature selection approach based combination of content-based and behaviour-based. The approach could mine the attacker behaviour based on email header. On a publicly available test corpus, our hybrid features selection is able to achieve 94% accuracy rate.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

In this paper, an approach for profiling email-born phishing activities is proposed. Profiling phishing activities are useful in determining the activity of an individual or a particular group of phishers. By generating profiles, phishing activities can be well understood and observed. Typically, work in the area of phishing is intended at detection of phishing emails, whereas we concentrate on profiling the phishing email. We formulate the profiling problem as a clustering problem using the various features in the phishing emails as feature vectors. Further, we generate profiles based on clustering predictions. These predictions are further utilized to generate complete profiles of these emails. The performance of the clustering algorithms at the earlier stage is crucial for the effectiveness of this model. We carried out an experimental evaluation to determine the performance of many classification algorithms by incorporating clustering approach in our model. Our proposed profiling email-born phishing algorithm (ProEP) demonstrates promising results with the RatioSize rules for selecting the optimal number of clusters.

Relevância:

10.00% 10.00%

Publicador:

Resumo:

Sitting, particularly in prolonged, unbroken bouts, is widespread within the office workplace, yet few interventions have addressed this newly-identified health risk behaviour. This paper describes the iterative development process and resulting intervention procedures for the Stand Up Australia research program focusing on a multi-component workplace intervention to reduce sitting time. The development of Stand Up Australia followed three phases. 1) Conceptualisation: Stand Up Australia was based on social cognitive theory and social ecological model components. These were operationalised via a taxonomy of intervention strategies and designed to target multiple levels of influence including: organisational structures (e.g. via management consultation), the physical work environment (via provision of height-adjustable workstations), and individual employees (e.g. via face-to-face coaching). 2) Formative research: Intervention components were separately tested for their feasibility and acceptability. 3) Pilot studies: Stand Up Comcare tested the integrated intervention elements in a controlled pilot study examining efficacy, feasibility and acceptability. Stand Up UQ examined the additional value of the organisational- and individual-level components over height-adjustable workstations only in a three-arm controlled trial. In both pilot studies, office workers’ sitting time was measured objectively using activPAL3 devices and the intervention was refined based on qualitative feedback from managers and employees. Results and feedback from participants and managers involved in the intervention development phases suggest high efficacy, acceptance, and feasibility of all intervention components. The final version of the Stand Up Australia intervention includes strategies at the organisational (senior management consultation, representatives consultation workshop, team champions, staff information and brainstorming session with information booklet, and supportive emails from managers to staff), environmental (height-adjustable workstations), and individual level (face-to-face coaching session and telephone support). Stand Up Australia is currently being evaluated in the context of a cluster-randomised controlled trial at the Department of Human Services (DHS) in Melbourne, Australia. Stand Up Australia is an evidence-guided and systematically developed workplace intervention targeting reductions in office workers’ sitting time.