Journal articles on the topic 'Email Misuse'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Email Misuse.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Chiluwa, Innocent. "Nigerian English in informal email messages." English World-Wide 31, no. 1 (2010): 40–61. http://dx.doi.org/10.1075/eww.31.1.02chi.
Full textFarooqi, Shehroze, Maaz Musa, Zubair Shafiq, and Fareed Zaffar. "CanaryTrap: Detecting Data Misuse by Third-Party Apps on Online Social Networks." Proceedings on Privacy Enhancing Technologies 2020, no. 4 (2020): 336–54. http://dx.doi.org/10.2478/popets-2020-0076.
Full textBabeetha, Muruganantham, Modi Akash, Gehlot Eshwesh, and Botikar Abhishek. "Cloud Computing Technique Applied to Detect Cyber-Attacks on Web Application." International Journal of Engineering and Advanced Technology (IJEAT) 9, no. 4 (2020): 1498–500. https://doi.org/10.35940/ijeat.D7538.049420.
Full textKarlita, Tita. "HILLMAIL: A SECURE EMAIL SYSTEM FOR ANDROID-BASED MOBILE PHONE USING HILL CIPHER ALGORITHM." Kursor 8, no. 3 (2017): 141. http://dx.doi.org/10.28961/kursor.v8i3.89.
Full textKameg, Brayden N., Dawn Lindsay, Heeyoung Lee, and Ann Mitchell. "Substance Use and Exposure to Adverse Childhood Experiences in Undergraduate and Graduate Nursing Students." Journal of the American Psychiatric Nurses Association 26, no. 4 (2020): 354–63. http://dx.doi.org/10.1177/1078390320905669.
Full textSoma Niloy Ghosh and Jayesh V Jawade. "Comparative analysis on different phishing website detection techniques." International Journal of Frontiers in Engineering and Technology Research 8, no. 2 (2025): 055–62. https://doi.org/10.53294/ijfetr.2025.8.2.0036.
Full textOktaviani, Ayu Nur, Asep Id Hadiana, and Melina Melina. "Enhancing Email Client Security with HMAC and PGP Integration to Mitigate Cyberattack Risks." International Journal of Quantitative Research and Modeling 5, no. 3 (2024): 311–17. https://doi.org/10.46336/ijqrm.v5i3.758.
Full textYoun, Seongwook. "SPONGY (SPam ONtoloGY): Email Classification Using Two-Level Dynamic Ontology." Scientific World Journal 2014 (2014): 1–11. http://dx.doi.org/10.1155/2014/414583.
Full textThomas, Merly, and B. B. Meshram. "Optimizing Hyperparameters for Enhanced Email Classification and Forensic Analysis with Stacked Autoencoders." International Journal of Network Security & Its Applications 16, no. 1 (2024): 21–33. http://dx.doi.org/10.5121/ijnsa.2024.16102.
Full textFavre, G., N. Bausch Becker, D. Giacco, et al. "ECP09-03 - Information technologies in psychiatry." European Psychiatry 26, S2 (2011): 1807. http://dx.doi.org/10.1016/s0924-9338(11)73511-8.
Full textNorman, Ian J., Michael Bergin, Charles D. Parry, and Marie Claire Van Hout. "Best Practices and Innovations for Managing Codeine Misuse and Dependence." Journal of Pharmacy & Pharmaceutical Sciences 19, no. 3 (2016): 367. http://dx.doi.org/10.18433/j3t89k.
Full textGhani, Muhamad Abdul, and Hamdun Sulaiman. "Deteksi Spam Email dengan Metode Naive Bayes dan Particle Swarm Optimization (PSO)." Infotek : Jurnal Informatika dan Teknologi 6, no. 1 (2023): 11–20. http://dx.doi.org/10.29408/jit.v6i1.7049.
Full textBudiono, Budiono, Fachri Rizky Fadillah, and Novayandra Arinudin. "The Dangers of Phishing to Personal Data Security." Formosa Journal of Applied Sciences 4, no. 3 (2025): 831–44. https://doi.org/10.55927/fjas.v4i3.61.
Full textRancourt, Stephen J. "Hacking, Theft, and Corporate Negligence: Making the Case for Mandatory Encryption of Personal Information." Texas Wesleyan Law Review 18, no. 2 (2011): 183–219. http://dx.doi.org/10.37419/twlr.v18.i2.2.
Full textAtkinson, Sarah, Anna R. Whelan, and Abigail Litwiller. "Provider attitudes and current practice regarding the prescription of opioid-containing pain medication for vaginal delivery." Journal of Opioid Management 19, no. 6 (2023): 515–21. http://dx.doi.org/10.5055/jom.0836.
Full textEditorial, E. "Corrigendum: Genetic diversity and population structure analysis in Lonicera l. (Caprifoliaceae) with the use of ISSR molecular markers." Genetika 55, no. 2 (2023): 785. http://dx.doi.org/10.2298/gensr2302785e.
Full textEditorial, E. "Corrigendum: Species delimitation in Capparis (Capparaceae): Morphological and molecular." Genetika 55, no. 2 (2023): 787. http://dx.doi.org/10.2298/gensr2302786e.
Full textSupiyanto, Supiyanto, and Anastasia Sri Werdhani. "IMAGE DATA SECURITY USING VERNAM CIPHER ALGORITHM." Jurnal Teknik Informatika (Jutif) 5, no. 2 (2024): 405–13. https://doi.org/10.52436/1.jutif.2024.5.2.1864.
Full textSafa, Nader Sohrabi, and Hossein Abroshan. "The Effect of Organizational Factors on the Mitigation of Information Security Insider Threats." Information 16, no. 7 (2025): 538. https://doi.org/10.3390/info16070538.
Full textFortuna, Karen L., Stephanie Lebby, Pamela Geiger, et al. "Lived Experience–Led Research Agenda to Address Early Death in People With a Diagnosis of a Serious Mental Illness." JAMA Network Open 6, no. 5 (2023): e2315479. http://dx.doi.org/10.1001/jamanetworkopen.2023.15479.
Full textSyed Zulkiplee, Syed Muzammer, Mohd Afizi Mohd Shukran, Mohd Rizal Mohd Isa, Mohammad Adib Khairuddin, Norshahriah Wahab, and Hendra Hidayat. "Examining the Impact Factors Influencing Higher Education Institution (HEI) Students’ Security Behaviours in Cyberspace Environment." JOIV : International Journal on Informatics Visualization 9, no. 1 (2025): 146. https://doi.org/10.62527/joiv.9.1.2296.
Full textKilgore, Jacob T., Mariana M. Lanata, Brandi Holthaus, et al. "Pilot Dissemination of a Realtime, Statewide, Pediatric Outpatient Antimicrobial Stewardship Dashboard." Journal of the Pediatric Infectious Diseases Society 13, Supplement_3 (2024): S13. https://doi.org/10.1093/jpids/piae088.025.
Full textAheed, Sayed. "CYBERCRIMES, LAW, AND CYBER FORENSICS: COMPARATIVE STUDY OF INDIAN, BRITISH, AND AMERICAN CONTEXTS." International Scientific Journal of Engineering and Management 03, no. 04 (2024): 1–9. http://dx.doi.org/10.55041/isjem01520.
Full textPhilbrick, Ann M., Christine Danner, Abayomi Oyenuga, Chrystian Pereira, Jason Ricco, and Andrea L. Wendling. "Education and Attitudes on Medical Cannabis in Family Medicine Residency Programs." Family Medicine 52, no. 10 (2020): 730–35. http://dx.doi.org/10.22454/fammed.2020.645274.
Full textAleixandre-Benavent, Rafael, Antonio Vidal-Infer, Adolfo Alonso-Arroyo, Fernanda Peset, and Antonia Ferrer Sapena. "Research Data Sharing in Spain: Exploring Determinants, Practices, and Perceptions." Data 5, no. 2 (2020): 29. http://dx.doi.org/10.3390/data5020029.
Full textVivek Varadarajan. "Ethical and Adversarial Risks of Generative AI in Military Cyber Tools." Journal of Information Systems Engineering and Management 10, no. 53s (2025): 1036–48. https://doi.org/10.52783/jisem.v10i53s.11184.
Full textAnakotta, Fredrik, Nancy Silvana Haliwela, and Marselo Valentino Geovani Pariela. "Perlindungan Hukum Bagi Pengguna Jasa Internet Terhadap Kerahasiaan Data Pribadi." PATTIMURA Legal Journal 3, no. 3 (2024): 205–20. https://doi.org/10.47268/pela.v3i3.17348.
Full textColombo, Cinzia, Anna Roberto, Karmela Krleza-Jeric, Elena Parmelli, and Rita Banzi. "Sharing individual participant data from clinical studies: a cross-sectional online survey among Italian patient and citizen groups." BMJ Open 9, no. 2 (2019): e024863. http://dx.doi.org/10.1136/bmjopen-2018-024863.
Full textSharp, Marie-Louise, Margaret Jones, Ray Leal, et al. "Health and well-being of serving and ex-serving UK Armed Forces personnel: protocol for the fourth phase of a longitudinal cohort study." BMJ Open 13, no. 10 (2023): e079016. http://dx.doi.org/10.1136/bmjopen-2023-079016.
Full textElavsky, Steriani, Lenka Knapova, Kamil Janiš, Richard Cimler, Jitka Kuhnova, and Tomas Cernicky. "Multiple Perspectives on the Adoption of SMART Technologies for Improving Care of Older People: Mixed Methods Study." Journal of Medical Internet Research 26 (February 7, 2024): e45492. http://dx.doi.org/10.2196/45492.
Full textSharif, Safia, Suzanne Fergus, Amira Guirguis, Nigel Smeeton, and Fabrizio Schifano. "Assessing prevalence, knowledge and use of cognitive enhancers among university students in the United Arab Emirates: A quantitative study." PLOS ONE 17, no. 1 (2022): e0262704. http://dx.doi.org/10.1371/journal.pone.0262704.
Full textShah, Jasmit, Cynthia Smith, Cyprian Mostert, Linda Khakali, Zul Merali, and Sayed K. Ali. "Substance use among healthcare professionals: A cross-sectional study in Kenya." PLOS Global Public Health 5, no. 3 (2025): e0003863. https://doi.org/10.1371/journal.pgph.0003863.
Full textDoran, P., G. Sheppard, and B. Metcalfe. "P113: Examining emergency physicians’ self-reported opioid prescribing practices for the treatment of acute pain: A Newfoundland perspective." CJEM 22, S1 (2020): S105—S106. http://dx.doi.org/10.1017/cem.2020.319.
Full textDonald, L. Buresh Ph.D. Esq. "Nine Cases and Scenarios Involving Retail Financial Compliance." International Journal of Social Science and Human Research 07, no. 07 (2024): 5716–45. https://doi.org/10.5281/zenodo.13140586.
Full textRaja, Jawad, Jiann Lin Loo, Rajvinder Sambhi, and Somashekara Shivashankar. "Manualising the induction of higher trainees in psychiatry for North Wales: The CiSGC Guide (“Croeso i Seiciatreg Gogledd Cymru”)." BJPsych Open 7, S1 (2021): S214—S215. http://dx.doi.org/10.1192/bjo.2021.572.
Full textSantarossa, Maressa, Christina Walk, Cara J. Joyce, and Fritzie S. Albarillo. "2036. A Quasi-Experimental Survey Study of Antimicrobial Stewardship Education for Registered Nurses." Open Forum Infectious Diseases 6, Supplement_2 (2019): S684—S685. http://dx.doi.org/10.1093/ofid/ofz360.1716.
Full textHjollund, Niels Henrik I. "Fifteen Years’ Use of Patient-Reported Outcome Measures at the Group and Patient Levels: Trend Analysis." Journal of Medical Internet Research 21, no. 9 (2019): e15856. http://dx.doi.org/10.2196/15856.
Full textSuppan, Laurent, Mohamed Abbas, Loric Stuby, et al. "Effect of an E-Learning Module on Personal Protective Equipment Proficiency Among Prehospital Personnel: Web-Based Randomized Controlled Trial." Journal of Medical Internet Research 22, no. 8 (2020): e21265. http://dx.doi.org/10.2196/21265.
Full textRoguljić, Marija, Dina Šimunović, Ivan Buljan, Marija Franka Žuljević, Antonela Turić, and Ana Marušić. "Publishing Identifiable Patient Photographs in the Digital Age: Focus Group Study of Patients, Doctors, and Medical Students." Journal of Medical Internet Research 27 (March 5, 2025): e59970. https://doi.org/10.2196/59970.
Full textBendtsen, Marcus. "An Electronic Screening and Brief Intervention for Hazardous and Harmful Drinking Among Swedish University Students: Reanalysis of Findings From a Randomized Controlled Trial Using a Bayesian Framework." Journal of Medical Internet Research 21, no. 12 (2019): e14420. http://dx.doi.org/10.2196/14420.
Full textTOD-RĂILEANU, Gabriela, and Ioan BACIVAROV. "An Overview on Artificial Intelligence Applied in Offensive Cybersecurity." International Journal of Information Security and Cybercrime 12, no. 2 (2023): 23–26. http://dx.doi.org/10.19107/ijisc.2023.02.02.
Full textEmmanuel, O. Asani, Omotosho Adebayo, A. Danquah Paul, A. Ayoola Joyce, O. Ayegba Peace, and B. Longe Olumide. "A maximum entropy classification scheme for phishing detection using parsimonious features." TELKOMNIKA (Telecommunication, Computing, Electronics and Control) 19, no. 5 (2021): 1707–14. https://doi.org/10.12928/telkomnika.v19i5.15981.
Full textNamrata, A. Kale, and A. Darekar Seema. "SMS FOR ANDROID APPLICATION BY USING 3D-AES, PGP AND STEGNOGRAPHY." JournalNX - A Multidisciplinary Peer Reviewed Journal QIPCEI2K18 (April 29, 2018): 99–104. https://doi.org/10.5281/zenodo.1411782.
Full textGarcia Martinez, Francisco, and Maurice Dawson. "Unprotected Data: Review of Internet Enabled Psychological and Information Warfare." Land Forces Academy Review 24, no. 3 (2019): 187–98. http://dx.doi.org/10.2478/raft-2019-0022.
Full textKiser, Angelina I. T., Timothy Porter, and David Vequist. "Employee Monitoring and Ethics." International Journal of Digital Literacy and Digital Competence 1, no. 4 (2010): 30–45. http://dx.doi.org/10.4018/jdldc.2010100104.
Full textTrivedi, Sunny, Kevin Shea, Whitney Chadwick, Shabnam Gaskari, Ellen Wang, and Thomas Caruso. "A QUALITY IMPROVEMENT PROJECT TO REDUCE THE USE OF COMBINATION OPIOID/ACETAMINOPHEN MEDICATIONS WITHIN A LARGE HEALTH SYSTEM." Orthopaedic Journal of Sports Medicine 8, no. 4_suppl3 (2020): 2325967120S0025. http://dx.doi.org/10.1177/2325967120s00258.
Full textKorley, Solomon Kobina. "Social Media Misuse in Ghana: Ethical Implications and Its Influence on National Values." International Journal of Research and Innovation in Social Science IX, no. II (2025): 3947–62. https://doi.org/10.47772/ijriss.2025.9020308.
Full textHeriyanto Heriyanto, Yulius Efendi, and Teguh Wicaksono. "Perlindungan Hak Ahli Waris terhadap Aset Digital di Indonesia." Hukum Inovatif : Jurnal Ilmu Hukum Sosial dan Humaniora 1, no. 2 (2024): 169–80. https://doi.org/10.62383/humif.v1i2.612.
Full textSati, Devani Laras, Devina Laras Sita, and Khairunnisak Nur Isnaini. "Identifikasi Celah Kerentanan Keamanan Pada Website Dengan Metode Pengujian Penetrasi OWASP ZAP." Jurnal RESISTOR (Rekayasa Sistem Komputer) 7, no. 3 (2024): 153–61. https://doi.org/10.31598/jurnalresistor.v7i3.1459.
Full textLutsenko, O. "Legal security for employer monitoring of employee use of corporate email, internet resources, and computer technology in the United States of America." Uzhhorod National University Herald. Series: Law 3, no. 75 (2023): 47–54. http://dx.doi.org/10.24144/2307-3322.2022.75.3.8.
Full text