Academic literature on the topic 'Email Misuse'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Email Misuse.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Email Misuse"

1

Chiluwa, Innocent. "Nigerian English in informal email messages." English World-Wide 31, no. 1 (2010): 40–61. http://dx.doi.org/10.1075/eww.31.1.02chi.

Full text
Abstract:
This study applies a sociolinguistic and discourse-analytical methodology to the study of features and manifestations of Nigerian English in computer-mediated communication, particularly informal emails. The data comprise 133 email samples consisting of messages received or sent within a seven-year period, i.e. between 2002 and 2009, from typical Nigerian environments, as well as by the youth, adults and the elderly. Analyses reveal that the rise of new media technologies and digital communication has provided a resource for the use and dissemination of Nigerian English alongside Nigerian cult
APA, Harvard, Vancouver, ISO, and other styles
2

Farooqi, Shehroze, Maaz Musa, Zubair Shafiq, and Fareed Zaffar. "CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 336–54. http://dx.doi.org/10.2478/popets-2020-0076.

Full text
Abstract:
AbstractOnline social networks support a vibrant ecosystem of third-party apps that get access to personal information of a large number of users. Despite several recent high-profile incidents, methods to systematically detect data misuse by third-party apps on online social networks are lacking. We propose CanaryTrap to detect misuse of data shared with third-party apps. CanaryTrap associates a honeytoken to a user account and then monitors its unrecognized use via different channels after sharing it with the third-party app. We design and implement CanaryTrap to investigate misuse of data sh
APA, Harvard, Vancouver, ISO, and other styles
3

Babeetha, Muruganantham, Modi Akash, Gehlot Eshwesh, and Botikar Abhishek. "Cloud Computing Technique Applied to Detect Cyber-Attacks on Web Application." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 1498–500. https://doi.org/10.35940/ijeat.D7538.049420.

Full text
Abstract:
The targeted malignant emails (TME) for PC arrange misuse have become progressively deceptive and all the more generally common as of late. Aside from spam or phishing which is intended to fool clients into uncovering individual data, TME can misuse PC systems and accumulate touchy data which can be a major issue for the association. They can comprise of facilitated and industrious battles that can be terrible. Another email-separating procedure which depends on bowl classifier and beneficiary arranged highlights with an arbitrary backwoods classifier which performs superior to two conventiona
APA, Harvard, Vancouver, ISO, and other styles
4

Karlita, Tita. "HILLMAIL: A SECURE EMAIL SYSTEM FOR ANDROID-BASED MOBILE PHONE USING HILL CIPHER ALGORITHM." Kursor 8, no. 3 (2017): 141. http://dx.doi.org/10.28961/kursor.v8i3.89.

Full text
Abstract:
Nowadays, email has become the most widely communication way in daily life. Email is a very important method of communicating across the internet. During transmission and downloads, it uses protocols which are not secure. Spammers and scammers misuse these protocols to gain access to critical data stored in the email. This triggered concerns because sometimes email is used to exchange confidential messages. To improve security and efficiency of email system, we made an email security system for Android mobile phone using Hill Cipher algorithm. Hill Cipher is a classic cryptography algorithm th
APA, Harvard, Vancouver, ISO, and other styles
5

Kameg, Brayden N., Dawn Lindsay, Heeyoung Lee, and Ann Mitchell. "Substance Use and Exposure to Adverse Childhood Experiences in Undergraduate and Graduate Nursing Students." Journal of the American Psychiatric Nurses Association 26, no. 4 (2020): 354–63. http://dx.doi.org/10.1177/1078390320905669.

Full text
Abstract:
BACKGROUND: Substance misuse remains a public health crisis and contributor to morbidity and mortality. The nursing workforce is not immune to the impacts of substance misuse as rates are thought to mirror those of the general population. Additionally, as substance misuse often begins in adolescence or early adulthood, prevalence of misuse among practicing nurses highlights the fact that students are also at risk. OBJECTIVES: The purpose of this study was to examine rates and patterns of substance use and adverse childhood experience (ACE) exposure among nursing students while also examining a
APA, Harvard, Vancouver, ISO, and other styles
6

Soma Niloy Ghosh and Jayesh V Jawade. "Comparative analysis on different phishing website detection techniques." International Journal of Frontiers in Engineering and Technology Research 8, no. 2 (2025): 055–62. https://doi.org/10.53294/ijfetr.2025.8.2.0036.

Full text
Abstract:
Phishing attack is an attempt to obtain confidential information or data, such as credit and debit card details, username, passwords, etc. by creating a fake website which is very much similar to genuine website. Because of visual similarity of website, users are not able to distinguish between a legitimate and phishing websites. Phishing attack often targets users to enter their personal information at a phishing website. Then that information is directly send to attackers. In today’s world most of the phishing attack takes place with the help of spoofed emails. The attackers first send the e
APA, Harvard, Vancouver, ISO, and other styles
7

Oktaviani, Ayu Nur, Asep Id Hadiana, and Melina Melina. "Enhancing Email Client Security with HMAC and PGP Integration to Mitigate Cyberattack Risks." International Journal of Quantitative Research and Modeling 5, no. 3 (2024): 311–17. https://doi.org/10.46336/ijqrm.v5i3.758.

Full text
Abstract:
The rapid advancement of technology in the modern era has significantly increased the risk of data breaches and misuse, particularly in email communications. Ensuring data privacy and security is crucial to preventing information theft and mitigating cyberattack risks. This research focuses on enhancing email client security through the integration of Hash-Based Message Authentication Code (HMAC) and Pretty Good Privacy (PGP). HMAC is employed as a message authentication mechanism to ensure the integrity and authenticity of email messages, while PGP is utilized to generate public and private k
APA, Harvard, Vancouver, ISO, and other styles
8

Youn, Seongwook. "SPONGY (SPam ONtoloGY): Email Classification Using Two-Level Dynamic Ontology." Scientific World Journal 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/414583.

Full text
Abstract:
Email is one of common communication methods between people on the Internet. However, the increase of email misuse/abuse has resulted in an increasing volume of spam emails over recent years. An experimental system has been designed and implemented with the hypothesis that this method would outperform existing techniques, and the experimental results showed that indeed the proposed ontology-based approach improves spam filtering accuracy significantly. In this paper, two levels of ontology spam filters were implemented: a first level global ontology filter and a second level user-customized on
APA, Harvard, Vancouver, ISO, and other styles
9

Thomas, Merly, and B. B. Meshram. "Optimizing Hyperparameters for Enhanced Email Classification and Forensic Analysis with Stacked Autoencoders." International Journal of Network Security & Its Applications 16, no. 1 (2024): 21–33. http://dx.doi.org/10.5121/ijnsa.2024.16102.

Full text
Abstract:
Electronic mail, commonly known as email, is a crucial technology that enables streamlined operations and communications in corporate environments. Empowering swift and dependable transactions, email is a driving force behind heightened productivity and organizational effectiveness. However, its versatility also renders it susceptible to misuse by cybercriminals engaging in activities such as hacking, spoofing, phishing, email bombing, whaling, and spamming. As a result, effective and efficient data analysis is important in avoiding and detecting cyber-attacks and crime on times. To overcome t
APA, Harvard, Vancouver, ISO, and other styles
10

Favre, G., N. Bausch Becker, D. Giacco, et al. "ECP09-03 - Information technologies in psychiatry." European Psychiatry 26, S2 (2011): 1807. http://dx.doi.org/10.1016/s0924-9338(11)73511-8.

Full text
Abstract:
Even if technology and information are omnipresent, they rarely meet harmoniously. Either the lack of sufficient means prevents good information to reach its target or the technology is too complex to integrate flawlessly in the daily workflow.The use and misuse of information technologies (internet, email, e-learning, social networks) has recently significantly increased among psychiatrists and patients and the changes in behavior of communication and seeking informations are real challenges.Using the European Federation of Psychiatric Trainees network, the self-questionnaires concerning the
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Email Misuse"

1

Chang, Chun-Pin, and 張峻賓. "Misuse detection of new malicious Email viruses." Thesis, 2004. http://ndltd.ncl.edu.tw/handle/51457641028195182648.

Full text
Abstract:
碩士<br>國立雲林科技大學<br>資訊管理系碩士班<br>92<br>A serious security threat today is malicious emails, arriving as email attachments. An email virus is an email that can infect other programs by modifying them to include a replication of it. When the infected emails are opened, the email virus spreads itself to others. Today’s society has seen a dramatic increase in the use of emails. We present a novel approach to detect misuse emails by gathering and maintaining knowledge of the behavior of the malicious emails rather than anticipating attacks by unknown assailants. Our approach is based on building and m
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Email Misuse"

1

Your Missed EMails. Tate Publishing & Enterprises, 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Shorter, Edward, and Max Fink. Emil Kraepelin. Oxford University Press, 2018. http://dx.doi.org/10.1093/med/9780190881191.003.0004.

Full text
Abstract:
Emil Kraepelin, professor of psychiatry first in Heidelberg then Munich, originated modern psychiatric diagnosis. So it was a fateful error when, in 1899, Kraepelin made catatonia a “subtype” of schizophrenia (which Kraepelin called “dementia praecox”). He did so on the basis of what Kraepelin considered a downhill course and outcome. Catatonia thus disappeared into the schizophrenia tent and ceased to be an independent disease entity. There it remained for the next century. It was because of Kraepelin’s immense prestige that his disease classification has survived virtually until the present.
APA, Harvard, Vancouver, ISO, and other styles
3

Barnhurst, Kevin G. Modern Events Resumed Online. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252040184.003.0009.

Full text
Abstract:
This chapter analyzes the impact of online news on news reporting. In the first decade of the 2000s, the “what” in accident, crime, employment, and political stories first began reporting more events in stories, reversing decades of declines. But by 2010, the references to current events within stories had declined to the levels of the 1990s, with political stories concentrating even more than other topics on a single current event. The changes in the “what” echo earlier patterns of modern news, when practitioners responded to then-new technologies by reverting to established ways. Online, the
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Email Misuse"

1

Guerraoui, Rachid, and Nirupam Gupta. "Robust and Private Federated Learning on LLMs." In Large Language Models in Cybersecurity. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-54827-7_21.

Full text
Abstract:
AbstractLarge Language Models (LLMs) have gained significant attention in recent years due to their potential to revolutionize various industries and sectors. However, scaling LLMs further requires access to substantial linguistic resources that are being rapidly depleted. Moreover, the available text sources such as emails, social media interactions, or internal documents may contain private information, making them susceptible to misuse. On-premises Federated Learning (FL) with privacy-preserving model updates is an alternative avenue for LLMs’ development that ensures data sovereignty and e
APA, Harvard, Vancouver, ISO, and other styles
2

Rafiee, Hosnieh, Martin von Löwis, and Christoph Meinel. "Cryptography in Electronic Mail." In Theory and Practice of Cryptography Solutions for Secure Information Systems. IGI Global, 2013. http://dx.doi.org/10.4018/978-1-4666-4030-6.ch016.

Full text
Abstract:
Electronic Mail (email) is a very important method of communicating across the Internet, but the protocols used to handle emails during transmission, downloads, and organizational processes are not secure. Spammers and scammers misuse these protocols to propagate spam or scams across the Internet for advertising purposes or to gain access to critical data, such as credit card information. Cryptographic approaches are applied as a tool to help in securing email components, such as the header, data, etc. This chapter classifies the approaches used according to the protection mechanisms provided
APA, Harvard, Vancouver, ISO, and other styles
3

MACDONALD, L. "Legal Liabilities Arising From Misuse of Email and the Internet." In Tolley's Managing Email & Internet Use. Elsevier, 2004. http://dx.doi.org/10.1016/b978-0-7545-2443-4.50004-3.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sánchez, Yaira K. Rivera, and Steven A. Demurjian. "Towards User Authentication Requirements for Mobile Computing." In Data Analytics in Medicine. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-1204-3.ch062.

Full text
Abstract:
The emergence and ubiquity of mobile computing has placed powerful capabilities in one's hand providing a wide range of applications such as email, calendar, photos, browsers, social network, communication, shopping, health and fitness, games etc., which were once restricted to traditional platforms. Such applications on a single mobile device raise critical security issues related to managing identity, re-authenticating users that stay active for long periods of time, protecting sensitive PII and PHI against access and misuse, insuring secure transactions, and protecting the physical device.
APA, Harvard, Vancouver, ISO, and other styles
5

Wijngaard, Peter, Ina Wensveen, Anne Basten, and Tim de Vries. "Projects without Email, Is that Possible?" In Strategic Integration of Social Media into Project Management Practice. IGI Global, 2016. http://dx.doi.org/10.4018/978-1-4666-9867-3.ch013.

Full text
Abstract:
Email is standard way of communication in our daily life and in projects. But email traffic becomes more and more cumbersome. More than 25 percent of a working day is spend on email related tasks. Email is misused, and can create crisis in project teams. Nowadays the current generation of project team members is more used to using social media and social collaboration to communicate. To take advantage of that and to limit the use of email, the Zero email program was introduced within Atos. Limiting the use of emails with project teams can be achieved by introducing the right set of tools, a th
APA, Harvard, Vancouver, ISO, and other styles
6

Safren, Steven A., Susan E. Sprich, Carol A. Perlman, and Michael W. Otto. "Organizational Systems." In Mastering Your Adult ADHD, edited by Steven A. Safren, Susan E. Sprich, Carol A. Perlman, and Michael W. Otto. Oxford University Press, 2017. http://dx.doi.org/10.1093/med:psych/9780190235567.003.0007.

Full text
Abstract:
The main goal of this chapter is for the adult client with ADHD to learn strategies for developing organizational systems. Information is presented on how to develop a system for sorting mail, reducing the chance that important mail or bills will be misplaced. Having an organizational system in place will decrease difficulties related to poor organization such as feeling overwhelmed or out of control, paying late fees, and missing out on opportunities because of missed deadlines or lost paperwork.The chapter also covers how to develop systems for other items that might be problematic, includin
APA, Harvard, Vancouver, ISO, and other styles
7

Kagawa, Takuhiro, Sachio Saiki, and Masahide Nakamura. "PRISM." In Improving the Safety and Efficiency of Emergency Services. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-2535-7.ch009.

Full text
Abstract:
This article describes how local governments in Japan recently provide security information services for residents, which deliver regional incident information using Email or Web. However, since the conventional services usually provide “one-for-all” information. users tend to miss important incidents within the flood of information. This article proposes a new security information service, called PRISM (Personalized Real-time Information with Security Map). For given incident information and user's living area, PRISM first computes severity of the incident, based on distance, time, and type o
APA, Harvard, Vancouver, ISO, and other styles
8

Meredith, Dennis. "Make the Interview Work for You." In Explaining Research. Oxford University Press, 2021. http://dx.doi.org/10.1093/oso/9780197571316.003.0025.

Full text
Abstract:
In conducting the interview, researchers should decide who will participate; while journalists generally do not like having a public information officer (PIO) sit in, institutional policy might require it. A PIO can, in fact, contribute to an interview’s success, for example, by bringing up points otherwise missed. The researcher should also understand how or whether to go off the record. Strategies for being interviewed include understanding the journalist’s level of understanding and the nature of their medium. Interviews should avoid technical terms and equations; they should also repeat ke
APA, Harvard, Vancouver, ISO, and other styles
9

Astor, Ron Avi, Linda Jacobson, Stephanie L. Wrabel, Rami Benbenishty, and Diana Pineda. "Preparing for the Next Move." In Welcoming Practices. Oxford University Press, 2017. http://dx.doi.org/10.1093/oso/9780190845513.003.0016.

Full text
Abstract:
School transitions sometimes happen with little time for the family or the teachers to prepare. A teacher might walk into the classroom one morning to find that a student withdrew the previous afternoon and there was no opportunity to say goodbye or tell the child that he or she will be missed. These situations should not keep teachers or counselors from contacting the family and offering support through the process of transferring to a new school. If the child is relocating to another school in the district, a process can be created for teachers from the sending and receiving schools to commu
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Email Misuse"

1

Liu, Wayne W. "Identifying and Addressing Rogue Servers in Countering Internet Email Misuse." In 2010 Fifth IEEE International Workshop on Systematic Approaches to Digital Forensic Engineering. IEEE, 2010. http://dx.doi.org/10.1109/sadfe.2010.12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Winkels, Alvaro, Marko Schuba, Tim Höner, Sacha Hack, and Georg Neugebauer. "On the Lack of Phishing Misuse Prevention in Public Artificial Intelligence Tools." In 13th International Conference on Human Interaction & Emerging Technologies: Artificial Intelligence & Future Applications. AHFE International, 2025. https://doi.org/10.54941/ahfe1005893.

Full text
Abstract:
Phishing remains one of the most common and effective forms of social engineering, with cybercriminals constantly refining their tactics to exploit human vulnerabilities. The sheer volume of phishing attacks is staggering: almost 1.2% of all emails sent are malicious. This equates to around 3.4 billion phishing emails per day. The effectiveness of phishing attacks is also underlined by numerous studies. Phishing is identified as the leading initial attack vector, responsible for 41% of security incidents. This means that practically every company is threatened by phishing attacks.In parallel,
APA, Harvard, Vancouver, ISO, and other styles
3

Baumgaertner, Lars, Jonas Hochst, Matthias Leinweber, and Bernd Freisleben. "How to Misuse SMTP over TLS: A Study of the (In) Security of Email Server Communication." In 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Vugdelija, Natalija, Nikola Nedeljković, and Nenad Kojić. "Security of Data and Web Applications during COVID-19." In Fifth International Scientific Conference ITEMA Recent Advances in Information Technology, Tourism, Economics, Management and Agriculture. Association of Economists and Managers of the Balkans, Belgrade, Serbia, 2021. http://dx.doi.org/10.31410/itema.2021.1.

Full text
Abstract:
Numerous companies in Serbia have come under attack, in­cluding large companies, state-owned companies and institutions. Various security vulnerabilities have been identified, which clearly indicates insuffi­cient education of employees in the field of information systems security, as well as insufficiently developed awareness of the consequences of misuse of unprotected information and vulnerability of systems and applications. This paper lists some security measures, which may prevent unauthorized access to the system and misuse of personal or sensitive data. The paper also lists some exampl
APA, Harvard, Vancouver, ISO, and other styles
5

Momčilov, Milena. "Odgovornost za štetu prouzrokovanu zloupotrebom elektronskog memoranduma." In Prouzrokovanje štete, naknada štete i osiguranje. Institut za uporedno pravo, Udruženje za odštetno pravo, Pravosudna akademija, 2023. http://dx.doi.org/10.56461/zr_23.ons.07.

Full text
Abstract:
One of the ways in which interested parties can conclude a contract through the Internet involves the technique of exchanging e-mails. Depending on whether a written form is required for the conclusion of a contract or not, a distinction can be made between "ordinary" email contracts and "qualified" email contracts. The conclusion of the contract by exchanging e-mails may also include the use of electronic memorandum. Such a contract-concluding technique is particularly accompanied by the risk of unauthorised conclusion of the contract. Therefore, it is important provide enhanced protection to
APA, Harvard, Vancouver, ISO, and other styles
6

Binnani, Ojaswi. "Author Identification using Traditional Machine Learning Models." In 9th International Conference on Computer Science and Information Technology (CSIT 2022). Academy and Industry Research Collaboration Center (AIRCC), 2022. http://dx.doi.org/10.5121/csit.2022.121402.

Full text
Abstract:
The Internet has many useful resources with bountiful information at our fingertips. However, there are nefarious uses to this resource, and can be misused in cybercrime, fake emails, stealing content, plagiarism etc. In many cases, the text is anonymously written, and it is important to accurately find the author to bring the criminal to justice. The topic of author identification helps with this task, where from a set of suspect authors, the writer of a given text will be determined. We aim to create a computationally non-complex model that works to find the author of a given text. The model
APA, Harvard, Vancouver, ISO, and other styles
7

Baryshnikova, Vera, and Lyudmila Filina-Dawidovych. "Digitalization urgency of the Danube ports." In X International scientific-practical conference PROBLEMS OF TRANSPORT LOGISTICS DEVELOPMENT. Odessa National Maritime University, 2024. http://dx.doi.org/10.31375/978-966-7716-95-0-48-49.

Full text
Abstract:
The digital optimization of the Port Community System (PCS) must be based on new business models: business to business (B2B) and business-togovernment (B2G), which involves simple business transactions which are carried out through a blockchain-based platform. This revolution solution changes all modern business including maritime industry and global logistic chains. Unfortunately, the Danube ports are still very far away from digitalization, and this concerns not only the Ukrainian side but the main part of Danube’s Ports. A lot of port operations and interaction with business partners are pr
APA, Harvard, Vancouver, ISO, and other styles
8

Mehdy, A. K. M. Nuhil, and Hoda Mehrpouyan. "A Multi-Input Multi-Output Transformer-Based Hybrid Neural Network for Multi-Class Privacy Disclosure Detection." In 2nd International Conference on Machine Learning Techniques and NLP (MLNLP 2021). Academy and Industry Research Collaboration Center (AIRCC), 2021. http://dx.doi.org/10.5121/csit.2021.111419.

Full text
Abstract:
The concern regarding users’ data privacy has risen to its highest level due to the massive increase in communication platforms, social networking sites, and greater users’ participation in online public discourse. An increasing number of people exchange private information via emails, text messages, and social media without being aware of the risks and implications. Researchers in the field of Natural Language Processing (NLP) have concentrated on creating tools and strategies to identify, categorize, and sanitize private information in text data since a substantial amount of data is exchange
APA, Harvard, Vancouver, ISO, and other styles
9

Chollet, Gérard, Hugues Sansen, Yannis Tevissen, et al. "Privacy Preserving Personal Assistant with On-Device Diarization and Spoken Dialogue System for Home and beyond." In Human Interaction and Emerging Technologies (IHIET-AI 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004577.

Full text
Abstract:
In the age of personal voice assistants, we have witnessed the proliferation of "personal" vocal companions across smartphones, smart speakers, and other smart devices. Yet, the question arises: Are these virtual assistants genuinely "personal"? The answer may surprise you. Most of these digital companions lack the ability to remember past interactions or truly understand who you are. They heavily rely on an internet connection to process your spoken words in remote servers. Even though users provide informed consent for these interactions, concerns linger regarding potential misuse of speech
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!