To see the other types of publications on this topic, follow the link: Emails.

Journal articles on the topic 'Emails'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 journal articles for your research on the topic 'Emails.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.

1

Singh, Kuldeep, Palvi Aggarwal, Prashanth Rajivan, and Cleotilde Gonzalez. "What makes phishing emails hard for humans to detect?" Proceedings of the Human Factors and Ergonomics Society Annual Meeting 64, no. 1 (2020): 431–35. http://dx.doi.org/10.1177/1071181320641097.

Full text
Abstract:
This research investigates the email features that make a phishing email difficult to detect by humans. We use an existing data set of phishing and ham emails and expand that data set by collecting annotations of the features that make the emails phishing. Using the new, annotated data set, we perform cluster analyses to identify the categories of emails and their attributes. We then analyze the accuracy of detection in each category. Our results indicate that the similarity of the features of phishing emails to benign emails, play a critical role in the accuracy of detection. The phishing ema
APA, Harvard, Vancouver, ISO, and other styles
2

Lüthje, Corinna, and Franziska Thiele. "Communication floods – Emails in scholarly communication." Studies in Communication and Media 9, no. 3 (2020): 367–93. http://dx.doi.org/10.5771/2192-4007-2020-3-367.

Full text
Abstract:
The aim of this study is to display the current email usage among academics and the email‘s influence on the field of science by analyzing qualitative interviews and media diaries with 55 German-speaking academics. Emails pose a particular challenge for separating work and personal spheres. Mobile media such as tablets and smartphones reinforce the penetrating effects of emails. Our results show that scholars hardly engage in a temporal and spatial separation of the spheres when accessing work emails. This is one of the reasons why emails contribute to a perception of information overload and
APA, Harvard, Vancouver, ISO, and other styles
3

Mackintosh, Patrick, Luke Brantley, Alexander Hansen, et al. "Maximizing Clicks in Email Marketing Campaigns for a Retail Company." International Journal of Applied Industrial Engineering 4, no. 2 (2017): 33–46. http://dx.doi.org/10.4018/ijaie.2017070103.

Full text
Abstract:
Retailers rely on strong marketing programs to make sales in a competitive environment. One of the biggest sectors of marketing is email loyalty programs. The industry uses Click Through Rate to measure the effectiveness of an email marketing campaign. Click Through Rate measures the ratio between emails sent to customers and the number of customers that open and click on the email's link. The purpose of this analysis is to define the relationship between the rate of emails sent and the amount of emails opened, opened and clicked, sent to spam, and unsubscribed. The authors' 800 million record
APA, Harvard, Vancouver, ISO, and other styles
4

Julysa C. Cardona. "Real or Reel: A Comparative Analysis of Authentic and Phishing Emails." Journal of English Language Teaching and Applied Linguistics 7, no. 1 (2025): 159–72. https://doi.org/10.32996/jeltal.2025.7.1.15.

Full text
Abstract:
Although technology can be used for good reasons, the same can be exploited by cybercriminals for malicious intents and activities like phishing attacks. The use of phishing emails in such crimes makes it riveting to understand language's role in such a deceptive undertaking. Hence, this qualitative work comparatively analyzed the language correctness and deviations, illocutionary speech acts, and persuasion principles of phishing and authentic emails to draw the line that separates the genuine from the copycat. The results reveal that although phishing emails commit more types of language dev
APA, Harvard, Vancouver, ISO, and other styles
5

Eze, Chibuike Samuel, and Lior Shamir. "Analysis and Prevention of AI-Based Phishing Email Attacks." Electronics 13, no. 10 (2024): 1839. http://dx.doi.org/10.3390/electronics13101839.

Full text
Abstract:
Phishing email attacks are among the most common and most harmful cybersecurity attacks. With the emergence of generative AI, phishing attacks can be based on emails generated automatically, making it more difficult to detect them. That is, instead of a single email format sent to a large number of recipients, generative AI can be used to send each potential victim a different email, making it more difficult for cybersecurity systems to identify the scam email before it reaches the recipient. Here, we describe a corpus of AI-generated phishing emails. We also use different machine learning too
APA, Harvard, Vancouver, ISO, and other styles
6

T. Vacalares, Sophomore, Brian Paul E. Sta. Ana, and Daryl Q. Dranto. "Bank Emails: The Language of Legit and Scam." International Journal of Research and Review 11, no. 7 (2024): 192–203. http://dx.doi.org/10.52403/ijrr.20240721.

Full text
Abstract:
Amidst the pandemic, the surge in unsolicited scam emails has made internet technology a significant concern. Distinguishing between scams and authentic/legit emails has become increasingly difficult. This research aimed to identify typical characteristics and language patterns found in emails. It also aimed to identify the common linguistics and technical features of the scams and legitimate bank emails. Two legitimate emails and two scam or fraudulent emails from different banks in the Philippines (i.e., LandBank and BDO). A qualitative method was used to analyze and interpret the language f
APA, Harvard, Vancouver, ISO, and other styles
7

Lim, Hajin, Dan Cosley, and Susan R. Fussell. "Understanding Cross-lingual Pragmatic Misunderstandings in Email Communication." Proceedings of the ACM on Human-Computer Interaction 6, CSCW1 (2022): 1–32. http://dx.doi.org/10.1145/3512976.

Full text
Abstract:
Communication tools such as email facilitate communication and collaboration between speakers of different languages, who use two primary strategies-English as a common language and machine translation (MT) tools-to help them overcome language barriers. However, each of these communication strategies creates its own challenges for cross-lingual communication. In this paper, we compare how people's interpretations of an email sender's social intention, and their evaluation of the email and the senders, differ when using a common language versus MT in email communication. We conducted an online
APA, Harvard, Vancouver, ISO, and other styles
8

Harjot, Kaur* Er. Prince Verma. "SURVEY ON E-MAIL SPAM DETECTION USING SUPERVISED APPROACH WITH FEATURE SELECTION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 4 (2017): 120–28. https://doi.org/10.5281/zenodo.496096.

Full text
Abstract:
Electronic Mail (E-mail) has established a significant place in information user’s life. Mails are used as a major and important mode of information sharing because emails are faster and effective way of communication. Email plays its important role of communication in both personal and professional aspects of one’s life. The rapid increase in the number of account holders from last few decades and the increase in the volume of mails have generated various serious issues too. Emails are categorized into ham and spam emails. From past decades spam emails are spreading at tremendous rate. These
APA, Harvard, Vancouver, ISO, and other styles
9

Sarno, Dawn M., Joanna E. Lewis, Corey J. Bohil, Mindy K. Shoss, and Mark B. Neider. "Who are Phishers luring?: A Demographic Analysis of Those Susceptible to Fake Emails." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 1735–39. http://dx.doi.org/10.1177/1541931213601915.

Full text
Abstract:
Previous research has identified several populations that are susceptible to inauthentic emails (e.g., spam). However, these studies utilize retrospective, self-report measures to assess email users’ interactions with limited sets of inauthentic emails. In order to fill this gap in the literature, the present study assessed participants’ likelihood to rate a wide variety of emails as spam, authentic, and dangerous. The results highlighted several key findings, 1) there were no gender differences for the email ratings, there were only differences in experience with email, 2) those who do not re
APA, Harvard, Vancouver, ISO, and other styles
10

Ben Amor, Imen Aribi. "Email as a mode of communication among Tunisian postgraduate students." International Journal of Learning and Teaching 9, no. 3 (2017): 388–409. http://dx.doi.org/10.18844/ijlt.v9i3.2381.

Full text
Abstract:
Abstract
 
 Emails have great potential in facilitating academic communication. However, writing effective academic emails depends on many factors including students’ knowledge, experiences and perceptions about emails. According to Brown and Levinson (1987), people use certain politeness strategies to enhance face between themselves and their interlocutors. Yet, the underlying processes of email communication may be poorly understood, especially as far as politeness is concerned. This study seeks to examine the perceptions, practices and attitudes of 38 postgraduateTunisian students
APA, Harvard, Vancouver, ISO, and other styles
11

Konuk, Sümeyye. "E-mail Literacy in Higher Education Academic Settings." International Journal of Education and Literacy Studies 9, no. 3 (2021): 29. http://dx.doi.org/10.7575/aiac.ijels.v.9n.3p.29.

Full text
Abstract:
The research purpose was to identify (1) the problems encountered by academic and administrative staff in emails received from students, (2) positive and negative qualities of the authentic emails of higher education students, (3) functional explanations of the academic email, (4) the problems encountered by students in emails received from academic and administrative staff, and (5) higher education students’ email writing awareness. An exploratory sequential mixed design was used. The study group consisted of 15 staff and 1064 higher education students. The qualitative data were collected fro
APA, Harvard, Vancouver, ISO, and other styles
12

Iswanto, Hery, Erni Seniwati, Yuli Astuti, and Dina Maulina. "Comparison of Algorithms on Machine Learning For Spam Email Classification." IJISTECH (International Journal of Information System and Technology) 5, no. 4 (2021): 446. http://dx.doi.org/10.30645/ijistech.v5i4.164.

Full text
Abstract:
The rapid development of email use and the convenience provided make email as the most frequently used means of communication. Along with its development, many parties are abusing the use of email as a means of advertising promotion, phishing and sending other unimportant emails. This information is called spam email. One of the efforts in overcoming the problem of spam emails is by filtering techniques based on the content of the email. In the first study related to the classification of spam emails, the Naïve Bayes method is the most commonly used method. Therefore, in this study researchers
APA, Harvard, Vancouver, ISO, and other styles
13

Surekha, P., M. Ganga Pavani, B. Jahanavi, B. Siri, and Tilottama Singh. "Voice-based e-mail for Information systems: An aid to visually impaired." E3S Web of Conferences 430 (2023): 01062. http://dx.doi.org/10.1051/e3sconf/202343001062.

Full text
Abstract:
Artificial intelligence has the potential to revolutionize the way that visually impaired individuals interact with technology. With this in mind, a voice-based email system for visually impaired individuals has been proposed as a solution to provide a convenient and accessible way of managing email. The system leverages advanced Natural language processing (NLP)and Automatic Speech Recognition(ASR) technologies to convert spoken commands into email actions. The system supports voice commands for dictating emails, text-to-speech functionality for reading emails, and speech-to-text for writing
APA, Harvard, Vancouver, ISO, and other styles
14

B.V, Harshini, and Vadivazhagi S. "Enhancing Workflow Efficiency through Machine Learning- Based Email Sorting." Journal of Soft Computing and Computational Intelligence 1, no. 2 (2024): 13–24. http://dx.doi.org/10.46610/joscci.2024.v01i02.003.

Full text
Abstract:
The present scenario of email management poses significant challenges due to the overwhelming volume of emails received daily across various domains. Traditional manual email sorting and classification methods are time-consuming, inefficient, and prone to errors. One of the critical limitations of the present scenario is the reliance on rule-based or keyword-based approaches for email classification. These methods often need more flexibility and help to adapt to the dynamic nature of email content, leading to inaccurate classification results. Additionally, the sheer volume of emails and the p
APA, Harvard, Vancouver, ISO, and other styles
15

Alemi, Minoo, and Zahra Maleknia. "Politeness markers in emails of non-native English speaking university students." Russian Journal of Linguistics 27, no. 1 (2023): 67–87. http://dx.doi.org/10.22363/2687-0088-33334.

Full text
Abstract:
The use of computer-mediated communication including emails has become pervasive in academic contexts as a result of the COVID-19 pandemic. What seems to be significant but simply overlooked by students is meeting politeness netiquettes while sending emails. To this end, the current study investigated the extent to which non-native English speaking university students adjust the level of politeness in their response emails written in English to that of the emails received from an American professor. To collect data, four versions of an academic email message with different levels of politeness
APA, Harvard, Vancouver, ISO, and other styles
16

Salazar-Campillo, Patricia. "Address forms and politeness markers in Spanish students' emails to faculty." Revista Electrónica de Lingüística Aplicada 21, no. 1 (2023): 58–73. http://dx.doi.org/10.58859/rael.v21i1.501.

Full text
Abstract:
In the present era of global online communication, email exchanges are one the most common means of interaction between students and professors (Tseng, 2015). However, emails may convey an impolite tone if students do not take status or power imbalance into account to show politeness (Economidou-Kogetsidis, 2011). The present study explored the informal second person pronoun of address (tú) and the formal one (usted) in first and follow-up requestive emails sent by Spanish students. In addition, some structural elements to show politeness in the emails were also examined. Although students had
APA, Harvard, Vancouver, ISO, and other styles
17

Skourou, Evangelia, and Dimitris Spiliotopoulos. "Assessment of Purchasing Influence of Email Campaigns Using Eye Tracking." Multimodal Technologies and Interaction 8, no. 10 (2024): 87. http://dx.doi.org/10.3390/mti8100087.

Full text
Abstract:
Most people struggle to articulate the reasons why a promotional email they are exposed to influences them to make a purchase. Marketing experts and companies find it beneficial to understand these reasons, even if consumers themselves cannot express them, by using neuromarketing tools, specifically the technique of eye tracking. This study analyses various types of email campaigns and their metrics and explores neuromarketing techniques to examine how email recipients view promotional emails. This study deploys eye tracking to investigate and also verify user attention, gaze, and behaviour. A
APA, Harvard, Vancouver, ISO, and other styles
18

Ahmed, Naeem, Rashid Amin, Hamza Aldabbas, Deepika Koundal, Bader Alouffi, and Tariq Shah. "Machine Learning Techniques for Spam Detection in Email and IoT Platforms: Analysis and Research Challenges." Security and Communication Networks 2022 (February 3, 2022): 1–19. http://dx.doi.org/10.1155/2022/1862888.

Full text
Abstract:
Nowaday, emails are used in almost every field, from business to education. Emails have two subcategories, i.e., ham and spam. Email spam, also called junk emails or unwanted emails, is a type of email that can be used to harm any user by wasting his/her time, computing resources, and stealing valuable information. The ratio of spam emails is increasing rapidly day by day. Spam detection and filtration are significant and enormous problems for email and IoT service providers nowadays. Among all the techniques developed for detecting and preventing spam, filtering email is one of the most essen
APA, Harvard, Vancouver, ISO, and other styles
19

Zhang, Xi (Alan), V. Kumar, and Koray Cosguner. "Dynamically Managing a Profitable Email Marketing Program." Journal of Marketing Research 54, no. 6 (2017): 851–66. http://dx.doi.org/10.1509/jmr.16.0210.

Full text
Abstract:
Although email marketing is highly profitable and widely used by marketers, it has received limited attention in the marketing literature. Extant research has focused on either customers’ email responses or the “average” effect of emails on purchases. In this article, the authors use data from a U.S. home improvement retailer to study customers’ email open and purchase behaviors by using a unified hidden Markov and copula framework. Contrary to conventional wisdom, the authors find that email-active customers are not necessarily active in purchases, and vice versa. Furthermore, the number of e
APA, Harvard, Vancouver, ISO, and other styles
20

Englehardt, Steven, Jeffrey Han, and Arvind Narayanan. "I never signed up for this! Privacy implications of email tracking." Proceedings on Privacy Enhancing Technologies 2018, no. 1 (2018): 109–26. http://dx.doi.org/10.1515/popets-2018-0006.

Full text
Abstract:
Abstract We show that the simple act of viewing emails contains privacy pitfalls for the unwary. We assembled a corpus of commercial mailing-list emails, and find a network of hundreds of third parties that track email recipients via methods such as embedded pixels. About 30% of emails leak the recipient’s email address to one or more of these third parties when they are viewed. In the majority of cases, these leaks are intentional on the part of email senders, and further leaks occur if the recipient clicks links in emails. Mail servers and clients may employ a variety of defenses, but we ana
APA, Harvard, Vancouver, ISO, and other styles
21

Malarvizhi, Dr K., Nitish R G, Gayathri M, Agalya R, and Sowmithra R. "Anomaly Detection and Prevention in SMTP." INTERANTIONAL JOURNAL OF SCIENTIFIC RESEARCH IN ENGINEERING AND MANAGEMENT 09, no. 01 (2025): 1–9. https://doi.org/10.55041/ijsrem40430.

Full text
Abstract:
Emails are a vital part of communication in organizations, but they are increasingly at risk of threats like data breaches and cyberattacks. Protecting sensitive information shared through emails is essential for maintaining data security and complying with regulations. However, manually checking emails for anomalies or confidential information can be tedious and impractical, especially in large-scale setups.To address this issue, we propose a system that detects and classifies email anomalies in real time. The system uses advanced machine learning algorithms to analyze email content and sendi
APA, Harvard, Vancouver, ISO, and other styles
22

Babhulkar, Vaishnavi, Apurva Salphale, Anagha Garkade, Kalyanee Pachghare, Tanvi Sagane, and Prof. Vanisha P. Vaidya. "ML-Driven Technique for Adaptive Email Filtering." International Journal of Ingenious Research, Invention and Development (IJIRID) 3, no. 1 (2024): 50–55. https://doi.org/10.5281/zenodo.10822621.

Full text
Abstract:
<em>Email filtering technology must be developed quickly due to the increase of unsolicited emails, or spam mail. Computer security has struggled with spam emails consistently. They are incredibly expensive economically and exceedingly risky for networks and computers. Spam emails are found and filtered using machine learning techniques. This project mainly focuses on machine learning used to find and remove spam emails. Using the K-nearest neighbour algorithm for email spam detection is one of the simple supervised learning techniques. Initially, the relevant features for filtering the spam m
APA, Harvard, Vancouver, ISO, and other styles
23

Townley, Anthony. "The intertextual nature of embedded email communication for contract negotiation activities." Text & Talk 41, no. 4 (2021): 539–60. http://dx.doi.org/10.1515/text-2019-0249.

Full text
Abstract:
Abstract Emails have become the institutionalised communication medium for many discourse activities in work contexts. Sociolinguistic research in this area has mainly focused on the textual and communicative conventions of emails, as defined by disciplinary cultures and practices. This study is the first to analyse the intertextual nature of email communication for commercial contract negotiation purposes, with a particular focus on the communicative function of embedded emails. This concept relates to a genre of email discourse, which embeds the meaning of a series of messages generated by d
APA, Harvard, Vancouver, ISO, and other styles
24

Bouchareb, Nasser, and Ismail Morad. "Analyzing The Impact of Ai-Generated Email Marketing Content on Email Deliverability in Spam Folder Placement." HOLISTICA – Journal of Business and Public Administration 15, no. 1 (2024): 96–106. http://dx.doi.org/10.2478/hjbpa-2024-0006.

Full text
Abstract:
Abstract This study investigated the impact of AI-generated email content on email marketing deliverability, specifically its placement in spam folders. A controlled experiment was conducted with 450 participants who received AI-generated emails sent from different domains using plain text content and clear subject lines. The emails were analyzed for placement in inboxes or spam folders based on participant responses. The results revealed no significant impact of AI-generated content on email deliverability, regardless of the sender's domain or the recipient's email provider. All emails consis
APA, Harvard, Vancouver, ISO, and other styles
25

Panchal, Brijeshkumar Y., Janvi Patel, Kauresh V. Vachhrajani, Amit Gantara, Akshat Chhaya, and Vrushali Thakkar. "Survey on Carbon Dioxide Emissions Through Email Conversion." SAMRIDDHI : A Journal of Physical Sciences, Engineering and Technology 15, no. 01 (2023): 122–27. http://dx.doi.org/10.18090/samriddhi.v15i01.16.

Full text
Abstract:
In today’s scenario emissions of carbon dioxide and methane areca increasing day by day, leading to climate change. The aim of this paper is to explain carbon dioxide emissions through e-mail conversion. As an average spam email, a standard email, and an email with ‘long attachments’ emits 0.3g CO2e (carbon dioxide equivalent), 4g CO2e and 50g CO2e, respectively. The number of emails received by a common office worker is 121 and half of them are spam. The carbon footprint of emails received in a day is similar to 1,652 g CO2e. And those one year- received emails emit 0.6 tons of carbon dioxide
APA, Harvard, Vancouver, ISO, and other styles
26

Mathur, Shubham, and Aakash Purohit. "Performance Evaluation of Machine Learning Algorithms on Textual Datasets for Spam Email Classification." International Journal for Research in Applied Science and Engineering Technology 10, no. 7 (2022): 4726–34. http://dx.doi.org/10.22214/ijraset.2022.46072.

Full text
Abstract:
Abstract: Email is one of the most popular modes of communication we have today. Billions of emails are sent every day in our world but not every one of them is relevant or of importance. The irrelevant and unwanted emails are termed email spam. These spam emails are sent with many different targets that range from advertisement to data theft. Filtering these spam emails is very essential in order to keep the email space fluent in its functioning. Machine Learning algorithms are being extensively used in the classification of spam emails. This paper showcases the performance evaluation of some
APA, Harvard, Vancouver, ISO, and other styles
27

ILIESCU, Andreea. "The Essentials of Writing Business Emails." ANALELE UNIVERSITĂȚII DIN CRAIOVA SERIA ȘTIINȚE FILOLOGICE LIMBI STRĂINE APLICATE 2024, no. 1 (2024): 258–67. http://dx.doi.org/10.52744/aucsflsa.2024.01.29.

Full text
Abstract:
The present article addresses the relevance of business emails to a technology-driven world. With staggering numbers of professional emails, sent worldwide on a daily basis, this medium of communication remains a commonly used method in the workplace. Though fast and effective, business emails require a thorough training, with specific rules to be observed. Just as importantly, the guidelines for writing professional emails also refer to business email etiquette
APA, Harvard, Vancouver, ISO, and other styles
28

Nivedha, M. A., and S. Raja. "Detection of Email Spam using Natural Language Processing Based Random Forest Approach." International Journal of Computer Science and Mobile Computing 11, no. 2 (2022): 7–22. http://dx.doi.org/10.47760/ijcsmc.2022.v11i02.002.

Full text
Abstract:
An unsolicited means of digital communications in the internet world is the spam email, which could be sent to an individual or a group of individuals or a company. These spam emails may cause serious threat to the user i.e., the email addresses used for any online registrations may be collected by the malignant third parties (spammers) and they expose the genuine user to various kinds of attacks. Another method of spamming is by creating a temporary email register and receive emails that can be terminated after some certain amount of time. This method is well suited for misusing those tempora
APA, Harvard, Vancouver, ISO, and other styles
29

Raj S, Jeevan, Raghav K Sejpal, Priya N, and Dr Mir Aadil. "SUSPICIOUS E-MAIL DETECTION USING VARIOUS TECHNIQUES." International Journal of Engineering Applied Sciences and Technology 6, no. 10 (2022): 212–16. http://dx.doi.org/10.33564/ijeast.2022.v06i10.028.

Full text
Abstract:
In today's world, email spam has become a serious concern, since the number of internet users has grown rapidly. Illegal and unethical practices, such as phishing and fraud, are taking advantage of the diverse classes of users that use different web services. Users that send unsolicited emails with the intention of disrupting or attracting legitimate customers are known as "spammers" by infecting the user system by sending malicious links in a spam email. Spammers prey on those who are unaware of their deceptions by posing as real people in their unsolicited emails and setting up bogus social
APA, Harvard, Vancouver, ISO, and other styles
30

Ali, Sadia. "An Investigation into Academic Email Practices of Arab Female Undergraduate Students and Their Attitudes Towards Correction of Errors in Their Email Messages." Learning and Teaching in Higher Education: Gulf Perspectives 2, no. 2 (2005): 2–10. http://dx.doi.org/10.18538/lthe.v2.n2.02.

Full text
Abstract:
Students’ assignments are often much better in style and organisation than the email messages they send to theirteachers. Some teachers, including myself, often ‘covertly’ correct students’ email messages for style, organisation,content, or correctness. While some students appreciate this extra effort from the teachers, others see it as an inhibitingintrusion. However, I have frequently noticed that students who are corrected repeatedly improve in writing emails. Myresearch concerns both the use of academic email writing and the correction of errors in student emails, and concludesthe followin
APA, Harvard, Vancouver, ISO, and other styles
31

Ghaleb Abdulkadhim, Ekhlas, and Muqdad Abdulraheem Hayder. "SURVEY OF E-MAIL CLASSIFICATION: REVIEW AND OPEN ISSUES." Iraqi Journal for Computers and Informatics 46, no. 2 (2020): 17–23. http://dx.doi.org/10.25195/ijci.v46i2.274.

Full text
Abstract:
Email is an economical facet of communication, the importance of which is increasing in spite of access to other approaches, such as electronic messaging, social networks, and phone applications. The business arena depends largely on the use of email, which urges the proper management of emails due to disruptive factors such as spams, phishing emails, and multi-folder categorization. The present study aimed to review the studies regarding emails, which were published during 2016-2020, based on the problem description analysis in terms of datasets, applications areas, classification techniques,
APA, Harvard, Vancouver, ISO, and other styles
32

Takhmiri, Hamoon, and Dr Ali Haroonabadi. "Identifying Valid Email Spam Emails Using Decision Tree." International Journal of Computer Applications Technology and Research 5, no. 2 (2016): 61–65. http://dx.doi.org/10.7753/ijcatr0502.1004.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Rosário, Albérico Travassos. "E-Mail Marketing." International Journal of Online Marketing 11, no. 4 (2021): 63–83. http://dx.doi.org/10.4018/ijom.2021100104.

Full text
Abstract:
Email marketing is a considerable development and includes direct emails, transactional emails, and email newsletters to attract new customers and retain existing ones. This research paper aims to identify and synthesize literature on the effectiveness of email marketing and potential challenges affecting its proper implementation. The research establishes that businesses in the current business environment recognize email marketing's capacity to produce a higher return on investment and generate more sales than traditional marketing channels, such as television. The adoption of permission-bas
APA, Harvard, Vancouver, ISO, and other styles
34

Asadi, Saeid. "Collaboration and document exchange among librarians in virtual communities: A case study of LIS Group." Journal of Librarianship and Information Science 51, no. 3 (2017): 763–70. http://dx.doi.org/10.1177/0961000617742464.

Full text
Abstract:
This paper investigates collaborations and document sharing activities among Iranian librarians over a nation-wide email forum known as LIS Group. The emails sent in 2016 were searched for traces of interlibrary loan, document delivery and knowledge sharing that resulted in 1038 emails. The sample was transferred to Excel where other features were extracted. The emails were categorized and their contents and attachments were labelled. Results showed that the female librarians participated more than male members in both request and response emails. Slightly more than half (54.1%) of emails cont
APA, Harvard, Vancouver, ISO, and other styles
35

Liu, Xin. "Email Security Detection Solution Based on Multi-Scenario Classification." Frontiers in Computing and Intelligent Systems 11, no. 2 (2025): 110–14. https://doi.org/10.54097/pb830p09.

Full text
Abstract:
In the backdrop of the rapidly advancing global network informatization, cybercriminals frequently utilize a variety of phishing emails to launch attacks against numerous crucial organizations and information systems. Once these attacks succeed, they can inflict substantial damage on physical and digital systems as well as assets, resulting in the leakage of sensitive information, reputation impairment, and economic losses. The issue of how to detect phishing emails from a vast number of emails has long drawn significant attention. However, with the increasingly complex deception techniques of
APA, Harvard, Vancouver, ISO, and other styles
36

Luo, Xun, Qingyu Zhang, Fang Fang, and Qiang Lu. "EmailVis Visual Analysis of Events in Emails." Journal of Computer-Aided Design & Computer Graphics 33, no. 1 (2021): 19–28. http://dx.doi.org/10.3724/sp.j.1089.2021.18255.

Full text
APA, Harvard, Vancouver, ISO, and other styles
37

Atherton, Helen, Anne-Marie Boylan, Abi Eccles, Joanna Fleming, Clare R. Goyder, and Rebecca L. Morris. "Email Consultations Between Patients and Doctors in Primary Care: Content Analysis." Journal of Medical Internet Research 22, no. 11 (2020): e18218. http://dx.doi.org/10.2196/18218.

Full text
Abstract:
Background Increasingly, consultations in health care settings are conducted remotely using a range of communication technologies. Email allows for 2-way text-based communication, occurring asynchronously. Studies have explored the content and nature of email consultations to understand the use, structure, and function of email consultations. Most previous content analyses of email consultations in primary care settings have been conducted in North America, and these have shown that concerns and assumptions about how email consultations work have not been realized. There has not been a UK-base
APA, Harvard, Vancouver, ISO, and other styles
38

Ismail Shauki, Nur Baiti, and Manvender Kaur Sarjit Singh. "Analysing Generical Moves in Pedagogical Sales Reply Emails." Journal of Entrepreneurship and Business 6, no. 2 (2021): 48–59. http://dx.doi.org/10.17687/jeb.v6i2.431.

Full text
Abstract:
This study aimed to investigate the generic features in the business emails written by the undergraduates of Universiti Malaysia Kelantan (UMK). Besides that, this study intended to propose a standard generic structure in writing a business email. The emails were gathered from the respondents' assignment that comprised of two email-based questions; however, this study analysed the generic structure of sales reply emails. The emails were compared with Bhatia's promotional sales letter moves. The methodology of this study was computer-assisted corpus analysis (CACA) by Manvender (2011). The data
APA, Harvard, Vancouver, ISO, and other styles
39

Chamnan-asawakul, Thammawat, Sarinrat Sertpunya, Prasit Nakpathumswat, and Pikun Ekwarangkoon. "An Analysis of Strategies and Problems in English E-mail Writing of Employees Working on a Thai Commercial Bank in Bangkok, Thailand." Rajamangala University of Technology Tawan-ok Social Science Journal 14, no. 1 (2025): 11–24. https://doi.org/10.63271/rmuttosj.v14i1.273238.

Full text
Abstract:
This study utilized a mixed research design, integrating both quantitative and qualitative methods to investigate the challenges of English email writing among bank employees and to explore the strategies they employ to manage these difficulties. For data collection, the study analyzed 172 English emails sent and received by 63 bank employees between May 1, 2023, and July 31, 2023. The purpose was to classify email types and examine writing issues along with strategies for improvement. The data were analyzed using descriptive statistics including frequency, percentage, mean, and standard devia
APA, Harvard, Vancouver, ISO, and other styles
40

Aruna, Kumara B., S. Hiremath Vishal, V. Sanjana, S. Narayanan Naveen, and B. G. Sumukha. "E-Mail Classification System Using Ontology-Base Binary Tree." Recent Innovations in Wireless Network Security 5, no. 3 (2023): 8–15. https://doi.org/10.5281/zenodo.8162647.

Full text
Abstract:
<em>The internet has changed everyone&rsquo;s lives. It has made accessing, retrieving and exchanging information easy. Email is one such service that has made communication with any person in any part of the world simple and easy. As the number of users is increasing every day, so is the number of emails sent and received. An email inbox contains different emails from important to spam emails. Categorising them manually is a tedious task. This paper will be presenting an approach to classification of mail into different categories using an ontology-based binary search tree.</em>
APA, Harvard, Vancouver, ISO, and other styles
41

Kanmani J, Kanmani J., M. Kavitha M. Kavitha, and T. Prabaharan T. Prabaharan. "Influence Of Marketing Automation on Customer Retention." Journal of Neonatal Surgery 14, no. 12S (2025): 997–1001. https://doi.org/10.52783/jns.v14.3456.

Full text
Abstract:
Automating email campaigns, including sending personalized emails, newsletters, and promotional offers. It create email workflows that cater to customers based on real-time triggers, specific behaviors, and timelines. Automating tasks like sending welcome emails, follow-up emails, and cart abandonment reminders frees up time for other marketing efforts. Automation tools help present timely upsell and cross-sell offers by analyzing past behavior and predicting future needs. The important factors that influence customers on marketing automation are Social Media Management, Lead Generation, Lead
APA, Harvard, Vancouver, ISO, and other styles
42

Smith, C. N. C., S. D. Quan, D. Morra, et al. "Understanding interprofessional communication: a content analysis of email communications between doctors and nurses." Applied Clinical Informatics 03, no. 01 (2012): 38–51. http://dx.doi.org/10.4338/aci-2011-11-ra-0067.

Full text
Abstract:
SummaryBackground: Clinical communication is recognized as a major source of errors in hospitals. The lack of documentation of communication, especially among verbal interactions, often creates hindrances and impedes improvement efforts. By providing smartphones to residents and encouraging nurses to communicate with residents by email shifted much of the communication to emails which permitted analysis of content.Objective: Description on the interprofessional email communication between doctors and nurses occurring on the general internal medicine wards at two academic hospitals.Design: A pr
APA, Harvard, Vancouver, ISO, and other styles
43

Tornblad, McKenna K., Miriam E. Armstrong, Keith S. Jones, and Akbar Siami Namin. "Unrealistic Promises and Urgent Wording Differently Affect Suspicion of Phishing and Legitimate Emails." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 65, no. 1 (2021): 363–67. http://dx.doi.org/10.1177/1071181321651277.

Full text
Abstract:
Phishing emails have certain characteristics, including wording related to urgency and unrealistic promises (i.e., “too good to be true”), that attempt to lure victims. To test whether these characteristics affected users’ suspiciousness of emails, users participated in a phishing judgment task in which we manipulated 1) email type (legitimate, phishing), 2) consequence amount (small, medium, large), 3) consequence type (gain, loss), and 4) urgency (present, absent). We predicted users would be most suspicious of phishing emails that were urgent and offered large gains. Results supporting the
APA, Harvard, Vancouver, ISO, and other styles
44

Lappas, Dimitrios, Panagiotis Karampelas, and Giorgos Fesakis. "Enhancement of Phishing Email Detection with Bayesian Networks. A Cyber Security Training Module." European Conference on Cyber Warfare and Security 24, no. 1 (2025): 328–37. https://doi.org/10.34190/eccws.24.1.3315.

Full text
Abstract:
In today’s digital world, we rely on various applications to protect ourselves from malicious software on the internet. Many of these tools also aim to shield us from phishing emails, which are increasingly prevalent. But how reliable are these phishing protection tools? Do we uncritically trust their indication that an email is safe, or are their assessments merely probabilistic estimates? These questions became the focal point of an innovative educational process in cybersecurity training. In this training activity, participants initially assumed the role of phishing email creators, crafting
APA, Harvard, Vancouver, ISO, and other styles
45

Neha, Gupta, Chauhan Nitin, Pal Nirbhay, Bhatnagar Mayank, and Fardeen Mohd. "DRISHTI: VOICE BASED EMAIL SYSTEM FOR VISUALLY IMPAIRED." International Journal of Engineering Sciences & Emerging Technologies 10, no. 06 (2021): 140–48. https://doi.org/10.5281/zenodo.5139573.

Full text
Abstract:
<em>A voice-based email writing and management system will facilitate visually impaired people to access and write emails in a problem-free manner. This system will enable visually impaired people to navigate through their emails and manage them using their voice commands eliminating the need for touch or mouse gestures which often hampers the usability of similar solutions for visually impaired people. This system greatly reduces reliance of visually impaired people on others for their activities regarding emails. Pre specific voice commands are used to perform actions in the system such as w
APA, Harvard, Vancouver, ISO, and other styles
46

Choppa Ananda Kumar Reddy. "Machine Learning with IoT Based Email Phishing Detection." Communications on Applied Nonlinear Analysis 32, no. 3s (2024): 479–86. https://doi.org/10.52783/cana.v32.2686.

Full text
Abstract:
Email is a popular method for communicating for individuals as well as professionals. Email is routinely used to send sensitive personal data such as passwords for accounts, credit report specifics, and banking information. As a result, cybercriminals may profit from the information, making them lucrative. Con artists utilise phishing to act as trusted sources in order to gain confidential information from people. By employing false pretences, the sender or a phishing email might deceive you into exposing personal information. This work approaches the detection of compromised emails as a class
APA, Harvard, Vancouver, ISO, and other styles
47

K. Suresh Babu, G.Murali, and Paul John Maddala. "USING MACHINE LEARNING AND NLP TECHNIQUES FOR EFFICIENT SPAM EMAIL DETECTION." international journal of engineering technology and management sciences 7, no. 1 (2023): 216–18. http://dx.doi.org/10.46647/ijetms.2023.v07i01.030.

Full text
Abstract:
Email spam has become a prevalent issue in recent times, with the growing number of internet users, spam emails are also on the rise. Many individuals use them for illegal and unethical activities such as phishing and fraud. Spammers send dangerous links through spam emails, which can harm our systems and gain access to personal information. It has become easier for criminals to create fake profiles and email accounts. They often impersonate real individuals in their spam emails, making them difficult to identify. This project aims to identify and detect fraudulent spam messages. The paper wil
APA, Harvard, Vancouver, ISO, and other styles
48

Gabriel, Aju Omojokun, and Adedeji Ayomiposi Joy. "An Email Spam Filtering Model Using Ensemble of Machine Learning Techniques." International Journal of Computer Applications Technology and Research 11, no. 03 (2022): 66–71. http://dx.doi.org/10.7753/ijcatr1103.1003.

Full text
Abstract:
The growth of spam emails is on the increase responsible for larger portions of the global email traffics. Aside the annoyance and the time wasted sifting through the unwanted messages; spam emails can also cause immeasurable harms through malicious software capable of damaging systems and compromising confidential information. The risks of filtering spam emails is that sometimes, legitimate mails are marked as spam, yet the results of not filtering spam are the constant flood of spam clogs on networks that adversely impacts users inboxes while draining valuable resources on the networks such
APA, Harvard, Vancouver, ISO, and other styles
49

Armstrong, Melissa J. "Improving email strategies to target stress and productivity in clinical practice." Neurology: Clinical Practice 7, no. 6 (2017): 512–17. http://dx.doi.org/10.1212/cpj.0000000000000395.

Full text
Abstract:
AbstractPhysician burnout is gaining increased attention in medicine and neurology and often relates to hours worked and insufficient time. One component of this is administrative burden, which relates to regulatory requirements and electronic health record tasks but may also involve increased time spent processing emails. Research in academic medical centers demonstrates that physicians face increasing inbox sizes related to mass distribution emails from various sources on top of emails required for patient care, research, and teaching. This commentary highlights the contribution of administr
APA, Harvard, Vancouver, ISO, and other styles
50

Low, Choon Keat, and Xuan Ying Tan. "Artificial Intelligence-Based Email Spam Filtering." Journal of Advanced Research in Artificial Intelligence & It's Applications 2, no. 2 (2024): 67–75. https://doi.org/10.5281/zenodo.14264139.

Full text
Abstract:
<em>Email spamming has become a big issue in spreading unsolicited emails. This project </em><em>focuses on tackling the prevalent issue of email spam through the implementation of machine learning techniques, particularly emphasizing spam filtering using artificial intelligence (AI). The goal is to develop an AI-powered application for efficient identification and filtration of spam emails. Key functionalities include email content preprocessing, feature extraction using techniques like Count Vectorization and TF-IDF Vectorization, and deploying machine learning models such as Support Vector
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!