223 Hits in 4.1 sec

Curbing junk e-mail via secure classification [chapter]

E. Gabber, M. Jakobsson, Y. Matias, A. Mayer
1998 Lecture Notes in Computer Science  
We i n troduce a new method and system to curb junk e-mail by employing extended e-mail addresses.  ...  which is backwards compatible to current e-mail tools.  ...  Discussion and Conclusion We h a ve proposed a design of a new system to e ectively help in curbing junk e-mail.  ... 
doi:10.1007/bfb0055484 fatcat:cade6oulnrcergu2p6a2rclztu

An Intellect Learning on E-Mail Security and Fraud, Spam and Phishing

Jagadeesh Kumar P.S, Meenakshi Sundaram S, Ranjeet Kumar
2015 International journal of network security and its applications  
Nonetheless hefty figure of security and privacy available with modern expertise; phishing, spam and email fraud are more equally exasperating.  ...  After discerning this curb in rehearsal, probed the delinquent of URL classification in an online setting.  ...  An E-Mail server has been shaped with hMail named as SSE Mail Server for the taxing tenacities.  ... 
doi:10.5121/ijnsa.2015.7503 fatcat:eibm2q4svnaexh2xzbkgrzuf4i

Cybercrime, its Adherent Negative Effects on Nigerian Youths and the Society at Large: Possible Solutions

EBELOGU Christopher U, OJO Samuel D, ANDEH Chioma P, AGU Edward O
2020 International Journal of Advances in Scientific Research and Engineering  
Every country has its fair share of security challenges, but when the state of insecurity increases by the day, and then there is a need for urgent action.  ...  Some students are exposed through the Internet to unwholesome literature via studying junk mails. Some of them visit pornographic websites to share amusing with human beings of the other sex.  ...  Internet users should ignore any e-mail asking for any financial information.  ... 
doi:10.31695/ijasre.2019.33658 fatcat:mkzybjkhgnaonjvjndvtc7iug4

Nigeria cybercrime and ICT development And Internet Service Provider

Yakubu Ajiji Makeri, Kampala International University
2018 ABC Research Alert  
Unfortunately, 'the 'country's 'image 'has 'also suffered as a result of the nefarious activities of some Nigerians, who has turn the .05 'level 'of significance 'revealed 'that 'the 'level 'of 'security  ...  (d) Hacking: Young Nigerians can be observed "on "daily "basis "engaging "in brainstorming "sessions "at "Cyber "Cafés trying "to "crack "security "codes "for "e-commerce, ATM cards and e-marketing product  ...  Individuals can only take precautions within the limit of the knowledge of the dynamics of the Internet and the e-mail system.  ... 
doi:10.18034/abcra.v6i1.320 fatcat:yaeqpqfxonb37pbglrhc266qcq

Social Engineering Attacks and Countermeasures in the New Zealand Banking System: Advancing a User-Reflective Mitigation Model

David Airehrour, Nisha Vasudevan Nair, Samaneh Madanian
2018 Information  
Social engineering attacks are possibly one of the most dangerous forms of security and privacy attacks since they are technically oriented to psychological manipulation and have been growing in frequency  ...  Plan and Prepare Attack Users should only interact via organizational verified websites and not through e-mail links received as these could be phishing mails.  ...  A G E D I S T R I B U T I O N O F O N L I N E B A N K I N G C U S TO M E R S I N N E W Z E A L A N D Impact of Social Engineering Attacks in the Banking Sector Most cyber security study reports have  ... 
doi:10.3390/info9050110 fatcat:v6ggtdp5x5febj2fjaeaopcx3m

Machine learning for email spam filtering: review, approaches and open research problems

Emmanuel Gbenga Dada, Joseph Stephen Bassi, Haruna Chiroma, Shafi'i Muhammad Abdulhamid, Adebayo Olusola Adetunmbi, Opeyemi Emmanuel Ajibuwa
2019 Heliyon  
A brief study on E-mail image spam filtering methods was presented by [22] .  ...  Since machine learning have the capacity to adapt to varying conditions, Gmail and Yahoo mail spam filters do more than just checking junk emails using pre-existing rules.  ... 
doi:10.1016/j.heliyon.2019.e01802 pmid:31211254 pmcid:PMC6562150 fatcat:n7qiq4tgnzh7xi6j5c2ah335hy

Principles and Regulations about Online Privacy: 'Implementation Divide' and Misunderstandings in the European Union

Nicola Lugaresi
2002 Social Science Research Network  
When I receive junk e-mail to my e-mail address, which has been published on the law school website, it is not the fact that my "public" e-mail address is on a spammer's list that irritates me most.  ...  Nevertheless, they are likely to receive junk e-mail in their inbox, or personalized banners while navigating, which means their browsing has been tracked and they have been profiled.  ...  Working Party, Opinion 7/2000 of 2 November 2000, on the proposal for the privacy and electronic communications Directive, which "welcomes and supports the proposals to address unsolicited electronic mail  ... 
doi:10.2139/ssrn.333440 fatcat:5fbh7uopdfbrvomcnfyoiq5evm

Health Domains for Sale: The Need for Global Health Internet Governance

Tim Ken Mackey, Bryan A Liang, Jillian C Kohler, Amir Attaran
2014 Journal of Medical Internet Research  
', 'spam drug*', 'pharma* spam', 'pharma* e-mail', 'junk e-mail', and 'pharma* phishing'.The literature search also included a limited search of references retrieved from included articles but did not  ...  bolster Internet and e-mail security, as well as mitigate the effects of successful attacks.  ... 
doi:10.2196/jmir.3276 pmid:24598602 pmcid:PMC3961808 fatcat:xtxdajf6xnas7p2hf4ig4ljt6m

Our Data, Ourselves: Privacy, Propertization, and Gender

Ann Bartow
2003 Social Science Research Network  
Perhaps, if nothing else, an attempt to secure property rights in our personal information will draw attention to the ongoing corporate propertization of everything.  ...  "Junk mailings" actually increased in 1998 and appear to be stoked, rather than usurped, by the Internet and the information it provides.  ...  We must work to create employment records, visit (and remunerate) physicians to produce medical records, register for Social Security numbers, pay to obtain and maintain phone numbers and e-mail accounts  ... 
doi:10.2139/ssrn.374101 fatcat:3eb3ktvgn5gezfbhnqyda7hby4

The Evolution (or Devolution) of Privacy

Debbie V. S. Kasper
2005 Sociological forum (Randolph, N.J.)  
Wiretapping and "bugs" are obvious instances of communication surveillance, but other examples include the interception of e-mails, tape-recording a person without consent, and reading another's mail  ...  Examples of sensory intrusions include junk mail, telephone calls from telemarketers, street lights shining in windows at night, loud music blaring nearby, and the like.  ... 
doi:10.1007/s11206-005-1898-z fatcat:odmfdkiebjgk3c3avekix5esqa

Adaptive Strategies and Person-Environment Fit among Functionally Limited Older Adults Aging in Place: A Mixed Methods Approach

Laura L. Lien, Carmen D. Steggell, Susanne Iwarsson
2015 International Journal of Environmental Research and Public Health  
Quantitative data described objective P-E fit in terms of accessibility, while qualitative data explored perceived P-E fit in terms of usability.  ...  Older adults prefer to age in place, necessitating a match between person and environment, or person-environment (P-E) fit.  ...  Sample To recruit initial participants, comprehensive e-mail announcements were sent to all adults aged 65 and older living within the study region that were members of a research center's participant  ... 
doi:10.3390/ijerph120911954 pmid:26404352 pmcid:PMC4586717 fatcat:b4acmjdphfef7kqif7qzqiabo4

Proactive Cybersecurity: A Comparative Industry and Regulatory Analysis

Amanda N. Craig, Scott J. Shackelford, Janine S. Hiller
2015 American Business Law Journal  
We then catalogue the proactive cybersecurity practices of more than twenty companies, focusing on four case studies that we consider in the context of polycentric "global security assemblages."  ...  Dewar, The "Triptych of Cyber Security": A Classification of Active Defense," 6THANNUAL CONF.  ...  E.  ... 
doi:10.1111/ablj.12055 fatcat:5b4p2q5otraflb6jjyxuvfdqju

Prometheus wired: the hope for democracy in the age of network technology

2001 ChoiceReviews  
1 941 -1 993) iii 'The kittdest of all God's dispensations is that individuals cannot predict the f i t w e in detail. " -George Grant, 1965 Heartfelt thanks to: Edward Andrew for his wisdom, generosity  ...  The movement of digitized information over computer networks is, according to Barlow, "the most profound technological shift since the capture ~f j r e . "~ Judging by the many volumes heralding the onset  ...  Lists of BITNET lists are available via e-mail from Lists of Internet lists can be acquired from mail-server@rtfm.miLedu.  ... 
doi:10.5860/choice.38-2996 fatcat:r6oqbybt7rhx5acnwrai6rszny

Evaluating Criminal Transactional Methods in Cyberspace as Understood in an International Context

R.V. Gundur, Michael Levi, Volkan Topalli, Marie Ouellet, Maria Stolyarova, Lennon Yao-Chung Chang, Diego Domínguez Mejía
2021 CrimRxiv  
Acknowledgements This work was supported by the UK Home Office through a National Cyber Security Programme research grant. Research assistance was provided by Tessa Cole and David Flint.  ...  Criminals contact victims via all available channels, including phone calls, email, messengers, texts, and even regular mail (Verevkin and Verevkin 2017) .  ...  Fourth, regardless of capacity, there appears to be a focus on the big picture of cybercrime, with countries and private enterprises looking to curb illicit activity via prevent and protect strategies.  ... 
doi:10.21428/cb6ab371.5f335e6f fatcat:vmrt7shntreqbg2z5mgysr5anq

Domain Names: Has Trade Mark Law Strayed From Its Path?

H. A. Deveci
2003 International Journal of Law and Information Technology  
For example, in the e-mail: '' and the URL: '' only '' is the domain name.  ...  Matsuura, Security, rights, and liabilities in e-commerce, Boston : Artech House, 2002, at 220.  ... 
doi:10.1093/ijlit/11.3.203 fatcat:prekxxqag5hdnfowm6tmz22nzy
« Previous Showing results 1 — 15 out of 223 results