To see the other types of publications on this topic, follow the link: Spam message.

Dissertations / Theses on the topic 'Spam message'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 18 dissertations / theses for your research on the topic 'Spam message.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Qvist, Olof, and Julia Berggren. "Viral Marketing : How does the individual view a viral marketing message and what makes him or her pass it along?" Thesis, University of Gävle, Department of Business Administration and Economics, 2008. http://urn.kb.se/resolve?urn=urn:nbn:se:hig:diva-672.

Full text
Abstract:

Viral marketing is a form of marketing that is based on individuals sharing of a message within their social network. When viral marketing works, it’s cheap and efficient and there are several examples of successful viral marketing campaigns that has given products or companies great success.

Viral marketing is relatively unexplored as a phenomenon, and there are several different suggested paths to choose to form a successful campaign. One suggestion is that viral marketers base their campaigns on different feelings to make the individual share the campaign, or feeling, with its social network. This is one of the things that we are looking at in this report. With a quantitative study based on the replies of over 800 students, we try to determine which feeling is more efficient in viral marketing campaigns. We also try to determine how viral campaigns are received and handled as well as students view on viral marketing as a phenomenon.

This report shows that receivers of viral marketing campaigns have a pattern in the way they act as a result of it. Receivers who view one viral marketing campaign as spam, block the messages sender or delete the message are likely to view all campaigns as spam, no matter which type of viral marketing campaign they receive. This pattern does not exist for those who choose to forward viral messages, nor does the strength of the feeling matter. However, we are able to distinguish that campaigns based on sadness, anger, fear and disgust are forwarded more than campaigns based on other feelings. These types of campaigns are often forwarded by women. Campaigns based on sick humor or surprise are more commonly forwarded by men. However, women are more likely to forward viral messages.


Virusmarknadsföring är en typ av marknadsföring som går ut på att individer inom sociala nätverk skickar ett budskap vidare till varandra. När marknadsföringsformen fungerar är den mycket billig och effektiv. Det finns ett flertal exempel på framgångsrika virusmarknadsföringskampanjer som lyckats och gett produkter eller företag stor framgång.

Virusmarknadsföringen som fenomen är relativt outforskad och det finns olika förslag på vägar att gå för att forma en framgångsrik kampanj. Bland annat kan virusmarknadsförare spela på individers känslor för att få dem att skicka ett budskap vidare inom sitt sociala nätverk. I denna uppsats tittar vi närmare på just detta, och tar reda på vilka känslor som bäst lämpar sig för en virusmarknadsföringskampanj. Genom en kvantitativ undersökning där cirka 800 studenter från Blekinge Tekniska Högskola och Högskolan i Gävle deltagit tar vi också reda på hur synen på virusmarknadsföring ser ut, samt vilken reaktion det får när det mottas.

Detta examensarbete visar att de som tar emot virusmarknadsföring har ett mönster i sitt agerande. De som ser en virusmarknadsföringskampanj som spam eller till och med blockerar avsändaren, gör detsamma för oberoende av vilken typ av kampanj de mottar. Samma sak gäller de som väljer att radera meddelandet. Mönstret i agerandet gäller dock inte för de som skickar budskap vidare. Hur stark känsla som väcks av kampanjen spelar heller ingen roll. Dock tycker vi oss se att virusmarknadsföringskampanjer baserade på sorg, ilska, rädsla och äckel fungerar bättre än andra kampanjer. Dessa skickas oftast vidare av kvinnor. Män skickar inte virusmarknadsföringskampanjer vidare lika ofta som kvinnor. När de gör det så väljer de dock att skicka vidare sjuk humor eller budskap baserade på förvåning.

APA, Harvard, Vancouver, ISO, and other styles
2

Рабізо, А. В. "Інформаційна технологія фільтрації спам-повідомлень." Thesis, Сумський державний університет, 2017. http://essuir.sumdu.edu.ua/handle/123456789/64946.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Cheung, Pak-to Patrick. "A study on combating the problem of unsolicited electronic messages in Hong Kong." Click to view the E-thesis via HKUTO, 2007. http://sunzi.lib.hku.hk/hkuto/record/B38608248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Martins, Da Cruz José Márcio. "Contribution au classement statistique mutualisé de messages électroniques (spam)." Phd thesis, École Nationale Supérieure des Mines de Paris, 2011. http://pastel.archives-ouvertes.fr/pastel-00637173.

Full text
Abstract:
Depuis la fin des années 90, les différentes méthodes issues de l'apprentissage artificiel ont été étudiées et appliquées au problème de classement de messages électroniques (filtrage de spam), avec des résultats très bons, mais pas parfaits. Il a toujours été considéré que ces méthodes étaient adaptées aux solutions de filtrage orientées vers un seul destinataire et non pas au classement des messages d'une communauté entière. Dans cette thèse notre démarche a été, d'abord, de chercher à mieux comprendre les caractéristiques des données manipulées, à l'aide de corpus réels de messages, avant de proposer des nouveaux algorithmes. Puis, nous avons utilisé un classificateur à régression logistique avec de l'apprentissage actif en ligne - pour démontrer empiriquement qu'avec un algorithme simple et une configuration d'apprentissage mieux adaptée au contexte réel de classement, on peut obtenir des résultats aussi bons que ceux que l'on obtient avec des algorithmes plus complexes. Nous avons aussi démontré, avec des ensembles de messages d'un petit groupe d'utilisateurs, que la perte d'efficacité peut ne pas être significative dans un contexte de classement mutualisé.
APA, Harvard, Vancouver, ISO, and other styles
5

Cruz, José Marcio Martins da. "Contribution au classement statistique mutualisé de messages électroniques (spam)." Paris, ENMP, 2011. https://pastel.archives-ouvertes.fr/pastel-00637173.

Full text
Abstract:
Depuis la fin des années 90, les différentes méthodes issues de l'apprentissage artificiel ont été étudiées et appliquées au problème de classement de messages électroniques (filtrage de spam), avec des résultats très bons, mais pas parfaits. Il a toujours été considéré que ces méthodes étaient adaptées aux solutions de filtrage orientées vers un seul destinataire et non pas au classement des messages d'une communauté entière. Dans cette thèse notre démarche a été, d'abord, de chercher à mieux comprendre les caractéristiques des données manipulées, à l'aide de corpus réels de messages, avant de proposer des nouveaux algorithmes. Puis, nous avons utilisé un classificateur à régression logistique avec de l'apprentissage actif en ligne - pour démontrer empiriquement qu'avec un algorithme simple et une configuration d'apprentissage mieux adaptée au contexte réel de classement, on peut obtenir des résultats aussi bons que ceux que l'on obtient avec des algorithmes plus complexes. Nous avons aussi démontré, avec des ensembles de messages d'un petit groupe d'utilisateurs, que la perte d'efficacité peut ne pas être significative dans un contexte de classement mutualisé
Since the 90's, different machine learning methods were investigated and applied to the email classification problem (spam filtering), with very good but not perfect results. It was always considered that these methods are well adapted to filter messages to a single user and not filter to messages of a large set of users, like a community. Our approach was, at first, look for a better understanding of handled data, with the help of a corpus of real messages, before studying new algorithms. With the help of a logistic regression classifier with online active learning, we could show, empirically, that with a simple classification algorithm coupled with a learning strategy well adapted to the real context it's possible to get results which are as good as those we can get with more complex algorithms. We also show, empirically, with the help of messages from a small group of users, that the efficiency loss is not very high when the classifier is shared by a group of users
APA, Harvard, Vancouver, ISO, and other styles
6

Cheung, Pak-to Patrick, and 張伯陶. "A study on combating the problem of unsolicited electronic messages inHong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B38608248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rajdev, Meet. "Fake and Spam Messages: Detecting Misinformation During Natural Disasters on Social Media." DigitalCommons@USU, 2015. https://digitalcommons.usu.edu/etd/4462.

Full text
Abstract:
During natural disasters or crises, users on social media tend to easily believe contents of postings related to the events, and retweet the postings, hoping that the postings will be reached by many other users. Unfortunately, there are malicious users who understand the tendency and post misinformation such as spam and fake messages with expecting wider propagation. To resolve the problem, in this paper we conduct a case study of the 2013 Moore Tornado and Hurricane Sandy. Concretely, we (i) understand behaviors of these malicious users; (ii) analyze properties of spam, fake and legitimate messages; (iii) propose at and hierarchical classification approaches; and (iv) detect both fake and spam messages with even distinguishing between them. Our experimental results show that our proposed approaches identify spam and fake messages with 96.43% accuracy and 0.961 F-measure.
APA, Harvard, Vancouver, ISO, and other styles
8

Laurent-Ricard, Eric. "Rétablir la confiance dans les messages électroniques : Le traitement des causes du "spam"." Thesis, Paris 2, 2011. http://www.theses.fr/2011PA020085/document.

Full text
Abstract:
L'utilisation grandissante de la messagerie électronique dans les échanges dématérialisés, aussi bien pour les entreprises que pour les personnes physiques, et l'augmentation du nombre de courriers indésirables, nommés « spams » (pourriels) génèrent une perte de temps importante de traitement manuel, et un manque de confiance à la fois dans les informations transmises et dans les émetteurs de ces messages. Quels sont les solutions pour rétablir ou établir la confiance dans ces échanges ? Comment traiter et faire diminuer le nombre grandissant de « spams » ? Les solutions existantes sont parfois lourdes à mettre en oeuvre ou relativement peu efficaces et s’occupent essentiellement de traiter les effets du « spam », en oubliant d’analyser et de traiter les causes. L'identification, si ce n'est l'authentification de l'émetteur et des destinataires, est un des points clés permettant de valider l'origine d'un message et d’en garantir le contenu, aussi bien qu’un niveau important de traçabilité, mais ce n’est pas le seul, et les mécanismes de base mêmes de la messagerie électronique, plus précisément au niveau des protocoles de communication sont également en jeu. Le contenu de cette thèse portera plus spécifiquement sur les possibilités liées aux modifications de certains protocoles de l'Internet, en particulier le protocole SMTP, la mise en oeuvre de spécifications peu utilisées, et les outils et méthodes envisageables pour garantir l’identification des parties de façon simple et transparente pour les utilisateurs. L’objectif est de définir, d'une part une méthodologie d'utilisation de la messagerie pouvant assurer fiabilité et confiance, et d'autre part de rédiger les bases logiques de programmes clients et serveurs pour la mise en application de cette méthodologie
The growing use of email in dematerialized exchanges, for both businesses and individuals, and the increase of undesirable mails, called "spam" (junk emails) generate a significant loss of time of manual processing And a lack of confidence both in the information transmitted and the issuers of such messages. What are the solutions to restore or build confidence in these exchanges? How to treat and reduce the growing number of «spam»?Existing solutions are often cumbersome to implement or relatively ineffective and are primarily concerned with treating the effects of "«spam»", forgetting to analyze and address the causes.The identification, if not the authentication, of the sender and recipients, is a key point to validate the origin of a message and ensure the content, as well as a significant level of traceability, but it is not the only one, and the basic mechanisms, themselves, of the email system, more precisely in terms of communication protocols are also at stake.The content of this thesis will focus primarily on opportunities related to changes in some Internet protocols, in particular SMTP, implementation specifications rarely used, and the tools and possible methods to ensure the identification of parties in a simple and transparent way for users.The objective is to define, firstly a methodology for using the mail with reliability and confidence, and secondly to draw the logical foundations of client and server programs for the implementation of this methodology
APA, Harvard, Vancouver, ISO, and other styles
9

Kigerl, Alex Conrad. "An Empirical Assessment of the CAN SPAM Act." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/704.

Full text
Abstract:
In January 2004, the United States Congress passed and put into effect the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN SPAM). The Act was set forth to regulate bulk commercial email (spam) and set the limits for what was acceptable. Various sources have since investigated and speculated on the efficacy of the CAN SPAM Act, few of which report a desirable outcome for users of electronic mail. Despite the apparent consensus of anti-spam firms and the community of email users that the Act was less than effective, there is little to no research on the efficacy of the Act that utilizes any significant statistical rigor or accepted scientific practices. The present study seeks to determine what, if any, impact the CAN SPAM act had on spam messages, to identify areas of improvement to help fight spam that is both fraudulent and dangerous. The data consisted of 2,071,965 spam emails sent between February 1, 1998 and December 31, 2008. The data were aggregated by month and an interrupted time series design was chosen to assess the impact the CAN SPAM Act had on spam. Analyses revealed that the CAN SPAM Act had no observable impact on the amount of spam sent and received; no impact on two of three CAN SPAM laws complied with among spam emails, the remaining law of which there was a significant decrease in compliance after the Act; and no impact on the number of spam emails sent from within the United States. Implications of these findings and suggestions for policy are discussed.
APA, Harvard, Vancouver, ISO, and other styles
10

Kaushik, Saket. "Policy-controlled email services." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2937.

Full text
Abstract:
Thesis (Ph. D.)--George Mason University, 2007.
Title from PDF t.p. (viewed Jan. 18, 2008). Thesis directors: Paul Amman, Duminda Wijesekera. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Vita: p. 198. Includes bibliographical references (p. 189-197). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
11

Sroufe, Paul Dantu Ram. "E-shape analysis." [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/ark:/67531/metadc12201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Sroufe, Paul. "E‐Shape Analysis." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc12201/.

Full text
Abstract:
The motivation of this work is to understand E-shape analysis and how it can be applied to various classification tasks. It has a powerful feature to not only look at what information is contained, but rather how that information looks. This new technique gives E-shape analysis the ability to be language independent and to some extent size independent. In this thesis, I present a new mechanism to characterize an email without using content or context called E-shape analysis for email. I explore the applications of the email shape by carrying out a case study; botnet detection and two possible applications: spam filtering and social-context based finger printing. The second part of this thesis takes what I apply E-shape analysis to activity recognition of humans. Using the Android platform and a T-Mobile G1 phone I collect data from the triaxial accelerometer and use it to classify the motion behavior of a subject.
APA, Harvard, Vancouver, ISO, and other styles
13

Chen, Pei-chi, and 陳沛綺. "Detecting spam on Twitter via message-passing based on retweet-relation." Thesis, 2014. http://ndltd.ncl.edu.tw/handle/19100812890900918032.

Full text
Abstract:
碩士
國立臺灣科技大學
資訊工程系
102
The last few years, Twitter has become one of the most popular platforms for users to exchange real-time information on the Web. Due to the popularity of Twitter, it attracts malicious users' interests. Previous works focused on detecting Twitter spam accounts individually. Moreover, most of previous approaches relied on account features such as message similarity between tweets, following-followers ratio, and so on. Those features can be easily manipulated by spam accounts. Spam collusion is a new way to escape the detection mechanisms. Therefore, we propose a system based on analyzing information diffusion.
APA, Harvard, Vancouver, ISO, and other styles
14

Chen, Peng. "Detecting spam zombies by monitoring outgoing messages." 2008. http://etd.lib.fsu.edu/theses/available/etd-10212008-091932.

Full text
Abstract:
Thesis (M.S.)--Florida State University, 2008.
Advisor: Zhenhai Duan, Florida State University, College of Arts and Sciences, Dept. of Computer Science. Title and description from dissertation home page (viewed Feb. 9, 2009). Document formatted into pages; contains viii, 34 pages. Includes bibliographical references.
APA, Harvard, Vancouver, ISO, and other styles
15

Geissler, Michelle Lara. "Bulk unsolicited electronic messages (spam) : a South African perspective." Thesis, 2004. http://hdl.handle.net/10500/1141.

Full text
Abstract:
In the context of the Internet, spam generally refers to unsolicited and unwanted electronic messages, usually transmitted to a large number of recipients. The problem with spam is that almost all of the related costs are shifted onto the recipients, and many of the messages contain objectionable content. Spam has become a significant problem for network administrators, businesses and individual Internet users that threatens to undermine the usefulness of e-mail. Globally, spam spiralled to account for over 60% of all e-mail near the end of 2004. It is a problem that costs the global economy billions of dollars a year in lost productivity, anti-spam measures and computer resources. It has forced governments to enact legislation against the problem and it has prompted the development of numerous technical countermeasures. Spam can only be defeated by a combination of legal measures, informal measures (including self regulation and social norms), technical measures and consumer education. Because spam is a relatively recent and evolving problem, the application of various common law mechanisms are explored, including the law of privacy and the law of nuisance. Various constitutional concerns may also arise in the context of spam, and the right to freedom of expression must be balanced against other competing rights and values, including the right to privacy. Comparative legislation is examined, because it is important to recognise trends in spam legislation in other jurisdictions so as to ensure a measure of interoperability with those laws. The practical difficulties in identifying spammers, and the lack of jurisdiction over offshore offenders affect the practical implementation of the current protection offered by the ECT Act. In conclusion, this thesis identifies the need for direct anti-spam legislation in South Africa, and suggests various clauses that will need to be catered for in the legislation. It is submitted that "opt-in" legislation should be preferred over "opt-out" legislation. It is further submitted that a definition of spam should be based on the volume and indiscriminate nature of the e-mail, and not only on whether the communication was commercial. Therefore, a definition of bulk unsolicited e-mail is proposed.
Criminal & Procedural Law
LLD
APA, Harvard, Vancouver, ISO, and other styles
16

Diale, Melvin. "Investigating unsupervised feature learning for email spam classification." Thesis, 2017. https://hdl.handle.net/10539/24027.

Full text
Abstract:
A dissertation submitted in partial ful llment of the requirements for the degree Master of Science. School of Computer Science and Applied Mathematics, Faculty of Science, University of the Witwatersrand, Johannesburg. November 2017
In the cyberspace, spam emails are used as a way to divulge sensitive information of victims through social engineering. There are various classi cation systems that have been employed previously to identify spam emails. The primary objective of email spam classi cation systems is to classify incoming email as either legitimate (non-spam) or spam emails. The spam classi cation task can thus be regarded as a two-class classi cation problem. This kind of a problem involves the use of various classi ers such as Decision Trees (DTs) and Support Vector Machines (SVMs). DTs and SVMs have been shown to perform well on email spam classi cation tasks. Several studies have failed to mention how these classi ers were optimized in terms of their hyperparameters. As a result, poor performance was encountered with complex datasets. This is because SVM classi er is dependent on the selection of the kernel function and the optimization of kernel hyperparameters. Additionally, many studies on spam email ltering task use words and characters to compute Term-Frequency (TF) based feature space. However, TF based feature space leads to sparse representation due to the continuous vocabulary growth. This problem is linked with the curse of dimensionality. Overcoming dimensionality issues involves the use of feature reduction techniques. Traditional feature reduction techniques, for instance, Information Gain (IG) may cause feature representations to lose important features for identifying spam emails. This proposed study demonstrates the use of Distributed Memory (DM), Distributed Bag of Words (DBOW), Cosine Similarity (CS) and Autoencoder for feature representation to retain a better class separability. Generated features enable classi ers to identify spam emails in a lower dimension feature space. The use of the Autoencoder for feature reduction led to improved classi cation performance. Furthermore, a comparison of kernel functions and CS measure is taken into consideration to evaluate their impacts on classi ers when employed for feature transformation. The study further shows that removal of more frequent words, which have been regarded as noisy words and stemming process, may negatively a ect the performance of the classi ers when word order is taken into consideration. In addition, this study investigates the performance of DTs and SVM classi ers on the publicly available datasets. This study makes a further investigation on the selection of optimal kernel function and optimization of kernel hyperparameters for each feature representation. It is further investigated whether the use of Stacked Autoencoder as a pre-processing step for multilayer perceptron (MLP) will lead to improved classi cation results.
MT 2018
APA, Harvard, Vancouver, ISO, and other styles
17

Huang, Hui-Ching, and 黃惠靜. "A Study on Consumer’s Orientation to Body SPA Space and Message Ways." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/18306207337327326318.

Full text
Abstract:
碩士
明道大學
設計學院碩士班
101
The purpose of this study was to analyze massage techniques and spaces design which consumer preference. In response to the economy era of beauty and creative exerperience’s industries will coming. Body SPA industry was development in R.O.C. for a long time, but it almost focus on the quantitative of the massage techniques which consumer preference. For the massage techniques and space design which consumer preference, it lack of qualitative research. The study used the qualitative research, for the Body SPA operators and consumers which used the interview by field investigation. For the interview techniques which situations were at “relaxed” and “stress-free” to dialogue. The result showed the proprietors were mostly combined with variety of massage techniques in the type of massage. But the consumers preferred aromatherapy. In the space design, although there were a variety of styles available in the market, such as Bali style, Japanese Zen, Oriental Aesthetic or European style, The projection of the guidance principles for the space design almost focus on relax, comfortable, warm and covert for the proprietors, but for the type of styles which were unapparent. That was the reason why the consumers had not apparent preference any particular style of space design.
APA, Harvard, Vancouver, ISO, and other styles
18

Tladi, Sebolawe Erna Mokowadi. "The regulation of unsolicited electronic communications (SPAM) in South Africa : a comparative study." Thesis, 2017. http://hdl.handle.net/10500/25265.

Full text
Abstract:
The practice of spamming (sending unsolicited electronic communications) has been dubbed “the scourge of the 21st century” affecting different stakeholders. This practice is also credited for not only disrupting electronic communications but also, it overloads electronic systems and creates unnecessary costs for those affected than the ones responsible for sending such communications. In trying to address this issue nations have implemented anti-spam laws to combat the scourge. South Africa not lagging behind, has put in place anti-spam provisions to deal with the scourge. The anti-spam provisions are scattered in pieces of legislation dealing with diverse issues including: consumer protection; direct marketing; credit laws; and electronic transactions and communications. In addition to these provisions, an Amendment Bill to one of these laws and two Bills covering cybercrimes and cyber-security issues have been published. In this thesis, a question is asked on whether the current fragmented anti-spam provisions are adequate in protecting consumers. Whether the overlaps between these pieces of legislation are competent to deal with the ever increasing threats on electronic communications at large. Finally, the question as to whether a multi-faceted approach, which includes a Model Law on spam would be a suitable starting point setting out requirements for the sending of unsolicited electronic communications can be sufficient in protecting consumers. And as spam is not only a national but also a global problem, South Africa needs to look at the option of entering into mutual agreements with other countries and organisations in order to combat spam at a global level.
Mercantile Law
LL. D.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography