Academic literature on the topic 'Email Proliferation'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Email Proliferation.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Email Proliferation"

1

Dr.A.Shaji, George. "The Digital Carbon Footprint: Examining Email Proliferation and its Socio-Environmental Impact." Partners Universal Multidisciplinary Research Journal (PUMRJ) 02, no. 03 (2025): 160–82. https://doi.org/10.5281/zenodo.15477192.

Full text
Abstract:
The ubiquitous nature of email communication has revolutionized professional and personal interactions, yet its environmental and social costs remain largely unexamined. This paper investigates the substantial carbon footprint generated by the over 300 billion daily emails traversing global networks, with particular focus on unnecessary corporate communication practices. Through rigorous analysis of email-related CO2 emissions estimated at 300,000 metric tons daily alongside the documented psychological impacts of email overload, we present compelling evidence for systemic reform. Our research
APA, Harvard, Vancouver, ISO, and other styles
2

Joglekar, Pushkar, Janhavi Rajurkar, Madhuri Shinde, Pranav Tayde, and Ved Gadmade. "Machine Learning Based Email Spam Detection: Achieving High Accuracy and Efficiency." International Journal for Research in Applied Science and Engineering Technology 12, no. 5 (2024): 3575–80. http://dx.doi.org/10.22214/ijraset.2024.62390.

Full text
Abstract:
Abstract: Email communication has become an essential aspect of modern-day interactions, but the proliferation of spam emails poses significant challenges to users' productivity and security. This research paper presents a comprehensive study on the development and implementation of an efficient email spam detection and categorization system. The project aims to categorize emails into predefined sections by using the Support Vector Machine (SVM) model, Flask, and the Gmail API, ensuring accuracy and efficiency in email classification. The methodology involves data preparation, processing, stor
APA, Harvard, Vancouver, ISO, and other styles
3

Kashif Iqbal, Muhammad Khalid, Shamim Akhtar, Sajid Yasin, Noor Ahmed, and Aqsa Shahid. "Improving Spam Detection for German Users: A Machine Learning Approach to German Email Classification." Kashf Journal of Multidisciplinary Research 2, no. 06 (2025): 81–99. https://doi.org/10.71146/kjmr487.

Full text
Abstract:
The proliferation of unsolicited and potentially harmful emails has necessitated the development of robust email classification systems. This study focuses on the classification of German-language emails using the CODEAALTAG dataset, a comprehensive collection of both legitimate (ham) and unwanted (spam) emails. By leveraging this dataset, we apply various machine learning algorithms—including Naive Bayes, Support Vector Machines (SVM), Random Forests, and deep learning models—to accurately distinguish between ham and spam emails. The CODEAALTAG dataset is meticulously curated and features a w
APA, Harvard, Vancouver, ISO, and other styles
4

Alsudani, Saif, Hussein Nasrawi, Muntadher Shattawi, and Adel Ghazikhani. "Enhancing Spam Detection: A Crow-Optimized FFNN with LSTM for Email Security." Wasit Journal of Computer and Mathematics Science 3, no. 1 (2024): 28–39. http://dx.doi.org/10.31185/wjcms.199.

Full text
Abstract:
Email security is paramount in today's digital landscape, as the proliferation of spam emails poses a significant threat to individuals and organizations alike. To combat this menace, this study introduces a novel approach that marries the power of Crow Search Optimization (CSO) with a Feedforward Neural Network (FFNN) and Long Short-Term Memory (LSTM) architecture to bolster spam detection. The proposed Crow-Optimized FFNN with LSTM (C-FFNN-LSTM) leverages CSO to fine-tune the neural network's parameters, optimizing its ability to distinguish between legitimate emails and spam. The CSO algori
APA, Harvard, Vancouver, ISO, and other styles
5

Febriyani, Widia, Dhiya Fathia, Adityas Widjajarto, and Muharman Lubis. "Security Awareness Strategy for Phishing Email Scams: A Case Study One of a Company in Singapore." JOIV : International Journal on Informatics Visualization 7, no. 3 (2023): 808. http://dx.doi.org/10.30630/joiv.7.3.2081.

Full text
Abstract:
Social Engineering Procedures and phishing are some of the standard procedures and problems today, mainly through sophisticated media such as email, the official means of communication companies use. Phishing emails are usually associated with Social Designing. They can be sent via joins and connections in this email, but they are not secure. Proliferation can be hacked into private/confidential data or total control over the computer/Email without the client's knowledge. The method used in this research is a cycle that will run continuously in a life cycle, starting from problem identificatio
APA, Harvard, Vancouver, ISO, and other styles
6

Ahmad, Sadique, Mohammed A.Elaffendi, Naveed Ahmad, and Ismail Shah. "Machine Learning-Enhanced Simulation of Multi-Vector Email Malware Spread in Organizational Networks." European Journal of Pure and Applied Mathematics 18, no. 3 (2025): 6542. https://doi.org/10.29020/nybg.ejpam.v18i3.6542.

Full text
Abstract:
The proliferation of sophisticated email-borne malware necessitates advanced modeling techniques to predict and mitigate cyber threats. While prior research established foundational lattice-based models for virus propagation via email, contemporary attacks exploit multi-vector infiltration (e.g., malicious links, macros, and embedded scripts) and evade traditional detection. This paper presents a novel hybrid model combining agent-based deterministic simulations with machine learning-driven defense adaptations to quantify malware spread in heterogeneous organizational networks. Key innovations
APA, Harvard, Vancouver, ISO, and other styles
7

Boyinbode, Olutayo K., Oluwatoyin C. Agbonifo, and Aderonke Ogundare. "Supporting Mobile Learning with WhatsApp based on Media Richness." Circulation in Computer Science 2, no. 3 (2017): 37–46. http://dx.doi.org/10.22632/ccs-2017-251-89.

Full text
Abstract:
With the proliferation of mobile devices, mobile learning has become a learning paradigm in education. The aim of this paper is to evaluate the media richness of various message delivery methods in mobile learning (m-learning) environment. This study evaluates media richness in respect to content timeliness, content richness, content accuracy and content adaptability in WhatsApp, Email, SMS, Twitter and BBM. One-way ANOVA analysis and Post hoc analysis show that: (i) SMS has better performance than WhatsApp, Email, Twitter and BBM on content timeliness; this implies that SMS may be more approp
APA, Harvard, Vancouver, ISO, and other styles
8

Dr., Paravathi C., G. Dhanyashree, R. Yeshaswini, and S. Lisha. "Unmasking the Evolution of Social Engineering in Cybersecurity: Techniques, Vulnerabilities, and Countermeasures." International Journal of Engineering and Management Research 14, no. 1 (2024): 65–70. https://doi.org/10.5281/zenodo.10686537.

Full text
Abstract:
This research explores the historical evolution, tactics, and classifications of social engineering in the realm of cyber security. Tracing its roots back to the 1990s when attackers would exploit human vulnerabilities through phone calls, the paper highlights the shift towards sophisticated techniques targeting individuals to transfer substantial sums or disclose sensitive information. The term "social engineering" was coined in 1894, gaining prominence in cybersecurity in the 1990s and evolving with the proliferation of the internet. The attackers meticulously research their targets, utilizi
APA, Harvard, Vancouver, ISO, and other styles
9

SOUSA, PEDRO, PAULO CORTEZ, RUI VAZ, MIGUEL ROCHA, and MIGUEL RIO. "EMAIL SPAM DETECTION: A SYMBIOTIC FEATURE SELECTION APPROACH FOSTERED BY EVOLUTIONARY COMPUTATION." International Journal of Information Technology & Decision Making 12, no. 04 (2013): 863–84. http://dx.doi.org/10.1142/s0219622013500326.

Full text
Abstract:
The electronic mail (email) is nowadays an essential communication service being widely used by most Internet users. One of the main problems affecting this service is the proliferation of unsolicited messages (usually denoted by spam) which, despite the efforts made by the research community, still remains as an inherent problem affecting this Internet service. In this perspective, this work proposes and explores the concept of a novel symbiotic feature selection approach allowing the exchange of relevant features among distinct collaborating users, in order to improve the behavior of anti-sp
APA, Harvard, Vancouver, ISO, and other styles
10

Talekar, P. R. "A Study of Digital Marketing Opportunities & Challenges in India." International Journal of Advance and Applied Research 5, no. 23 (2024): 8–10. https://doi.org/10.5281/zenodo.13600571.

Full text
Abstract:
The growth of digital marketing in India is fueled by the rapid expansion of internet access, the proliferation of mobile devices, and the emergence of online commerce. As more consumers turn to online platforms, businesses are adopting digital marketing strategies to reach and engage with a broader audience. Key opportunities in this sector include using search engine optimization (SEO), social media marketing, content marketing, email marketing, pay-per-click advertising, and influencer collaborations. Businesses must navigate several challenges to succeed in India, even though digital marke
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Email Proliferation"

1

Blakey, Leah. "The Proliferation, Pitfalls, and Power of Online Education." In Web-Based Education. IGI Global, 2010. http://dx.doi.org/10.4018/978-1-61520-963-7.ch003.

Full text
Abstract:
Accreditation, Assessment, Asynchronous Discussion, Bloom’s Taxonomy, Case Study, Classroom Instruction, Continuing Studies, Course Evaluation, Course Objectives, Curriculum Designers,Distance Education, Electronic Mail (Email), Faculty, Higher Education,instructional designers, Interactive Assignments, Internet Access, Learning Management System (LMS), learning styles, Online Classroom, Online Course,online education, Online Teaching,Pedagogy, Synchronous Tools, Virtual World
APA, Harvard, Vancouver, ISO, and other styles
2

Marchewka, Jack T., Chang Liu, and Charles G. Petersen. "Issues and Perceptions of Unsolicited Commercial Electronic Mail." In The Social and Cognitive Impacts of e-Commerce on Modern Organizations. IGI Global, 2004. http://dx.doi.org/10.4018/978-1-59140-249-7.ch008.

Full text
Abstract:
The proliferation of unsolicited commercial electronic mail (UCE) or spam is becoming a global concern for many organizations. This chapter explores issues of unsolicited email, the cost and loss of productivity, the impact of UCE and computer viruses, privacy concerns, electronic mail filters, attempts to control spam, and legislative action. A strengths, weaknesses, opportunities, and threats (SWOT) analysis was also applied in this study. The results of a survey concerning the perceptions of UCE are presented. The results clearly show that while the respondents find spam annoying, they spen
APA, Harvard, Vancouver, ISO, and other styles
3

Pratap, Ajay, and Gauri Giri. "Cybersecurity in the Age of Social Engineering." In Advances in Information Security, Privacy, and Ethics. IGI Global, 2024. https://doi.org/10.4018/979-8-3693-6665-3.ch004.

Full text
Abstract:
In the digital era, the proliferation of social engineering attacks poses a significant threat to cybersecurity. Unlike traditional cyber threats that exploit technical vulnerabilities, social engineering attacks manipulate human psychology to gain unauthorized access to sensitive information and systems. This paper explores the evolving landscape of social engineering, examining its various forms such as phishing, pretexting, baiting, and tailgating. The core of this study focuses on developing comprehensive defense strategies to mitigate the risks associated with social engineering. We advoc
APA, Harvard, Vancouver, ISO, and other styles
4

Rao, Sanjeev, Anil Kumar Verma, and Tarunpreet Bhatia. "Evolving Cyber Threats, Combating Techniques, and Open Issues in Online Social Networks." In Handbook of Research on Cyber Crime and Information Privacy. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-5728-0.ch012.

Full text
Abstract:
Online social networks (OSNs) are renowned powerful web tools that allow worldwide users to connect with their friends, families, professional groups, and social circle through social interaction for sharing common interests. With the proliferation, ease, and efficacy of OSNs, these are becoming an essential tool for communication. But many OSN users innocently uncover their personal information such as their home address, phone numbers, email id, etc. that can be used by the malicious user to perform various kind for cyber-crimes like cyber-bullying, spamming, click-jacking, identity theft, p
APA, Harvard, Vancouver, ISO, and other styles
5

Manju and Priyanshi Pandey. "IoT Based Home Security System." In IoT-enabled Sensor Networks: Architecture, Methodologies, Security, and Futuristic Applications. BENTHAM SCIENCE PUBLISHERS, 2024. http://dx.doi.org/10.2174/9789815049480124060008.

Full text
Abstract:
Internet of Things (IoT)-enabled intelligent systems are proliferating rapidly, providing the capability to connect virtually any device to the Internet. Consequently, this concept can be effectively utilized in home security applications. In this paper, we have introduced an IoT-enabled system designed to send security alerts to users via email upon detecting human intrusion. The system comprises a PIR sensor, Pi camera, Raspberry Pi-3, and an Internet connection. There are two operational modes in the proposed security system. In the first mode, movement by an intruder is detected, and simul
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Email Proliferation"

1

Lueg, Christopher. "Spam and Anti-Spam Measures: A Look at Potential Impacts." In 2003 Informing Science + IT Education Conference. Informing Science Institute, 2003. http://dx.doi.org/10.28945/2729.

Full text
Abstract:
The proliferation of unrestricted Internet access has brought the community spam which has become a serious problem costing companies billions of dollars per annum. Typical anti-spam measures, such as filtering and blocking techniques, exist but focus on solving the spam problem on the message transportation level. Using such techniques may have impacts beyond the realm of spam-filters and block lists. In this paper we argue that implementing typical anti-spam measures means that computers are assigned the power to assess legitimacy of email. This means, for example, that legitimate email migh
APA, Harvard, Vancouver, ISO, and other styles
2

Fukuda, Shuichi, Yoshifusa Matsuura, and Kigen Kandie. "Intelligent-Agent Approach to Distance Learning." In ASME 1997 Design Engineering Technical Conferences. American Society of Mechanical Engineers, 1997. http://dx.doi.org/10.1115/detc97/eim-3715.

Full text
Abstract:
Abstract With the proliferation of computers at home and in the work place, email, internet browsers, chat rooms, and network bandwidth availability, the traditional concept of skill training passed from experts to apprentices can now take on a new paradigm shift where these skills can be taught over the internet. With the primary goal of developing a general tool that supports the transfer of skill from an expert to a group of users, this paper proposes a new approach to distance learning, which we consider a subset of the above group, from the current one-to-one (or top-down) approach to a m
APA, Harvard, Vancouver, ISO, and other styles
3

Chollet, Gérard, Hugues Sansen, Yannis Tevissen, et al. "Privacy Preserving Personal Assistant with On-Device Diarization and Spoken Dialogue System for Home and beyond." In Human Interaction and Emerging Technologies (IHIET-AI 2024). AHFE International, 2024. http://dx.doi.org/10.54941/ahfe1004577.

Full text
Abstract:
In the age of personal voice assistants, we have witnessed the proliferation of "personal" vocal companions across smartphones, smart speakers, and other smart devices. Yet, the question arises: Are these virtual assistants genuinely "personal"? The answer may surprise you. Most of these digital companions lack the ability to remember past interactions or truly understand who you are. They heavily rely on an internet connection to process your spoken words in remote servers. Even though users provide informed consent for these interactions, concerns linger regarding potential misuse of speech
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!