scholarly journals For whom and under what circumstances does email message batching work?

2022 ◽  
pp. 100494
Author(s):  
Indy Wijngaards ◽  
Florie R. Pronk ◽  
Martijn J. Burger
Keyword(s):  
2020 ◽  
Vol 35 (3) ◽  
pp. 214-231
Author(s):  
Daniel Pienta ◽  
Jason Bennett Thatcher ◽  
Allen Johnston

Whaling is one of the most financially damaging, well-known, effective cyberattacks employed by sophisticated cybercriminals. Although whaling largely consists of sending a simplistic email message to a whale (i.e. a high-value target in an organization), it can result in large payoffs for cybercriminals, in terms of money or data stolen from organizations. While a legitimate cybersecurity threat, little information security research has directed attention toward whaling. In this study, we begin to provide an initial understanding of what makes whaling such a pernicious problem for organizations, executives, or celebrities (e.g. whales), and those charged with protecting them. We do this by defining whaling, delineating it from general phishing and spear phishing, presenting real-world cases of whaling, and provide guidance on future information security research on whaling. We find that whaling is far more complex than general phishing and spear phishing, spans multiple domains (e.g. work and personal), and potentially results in spillover effects that ripple across the organization. We conclude with a discussion of promising future directions for whaling and information security research.


2000 ◽  
Vol 6 (1_suppl) ◽  
pp. 126-128 ◽  
Author(s):  
G Michelson ◽  
W Striebel ◽  
W Prihoda ◽  
Volker Schmidt

Glaucoma is one of the most common causes of blindness in the Western world and a major risk factor is increased intra-ocular pressure. We therefore used telemedicine in its control. Patients measured their intra-ocular pressure several times a day with a portable instrument and the values were then entered into a portable digital assistant. These data were transmitted by a modem to a central server. If the intra-ocular pressure was pathologically high, an email message was automatically sent to the ophthalmologist. The pressure curve, including a statistical analysis, was displayed in an easily readable chart format. Ten patients with glaucoma participated in a trial. Self-tonometry with telemedicine enabled continuous evaluation of the patient by the ophthalmologist. This approach offered the advantage of controlling the treatment remotely. Advantages for the patient were that the measurements were easily done at home under normal conditions, and the patient could control when the measurement and data transmission would be performed. Telemedicine is a cost-effective technique enabling the early diagnosis of pathologically increased intra-ocular pressure.


2012 ◽  
Vol 4 (1) ◽  
pp. 37-59 ◽  
Author(s):  
Megan Squire

Artifacts of the software development process, such as source code or emails between developers, are a frequent object of study in empirical software engineering literature. One of the hallmarks of free, libre, and open source software (FLOSS) projects is that the artifacts of the development process are publicly-accessible and therefore easily collected and studied. Thus, there is a long history in the FLOSS research community of using these artifacts to gain understanding about the phenomenon of open source software, which could then be compared to studies of software engineering more generally. This paper looks specifically at how the FLOSS research community has used email artifacts from free and open source projects. It provides a classification of the relevant literature using a publicly-available online repository of papers about FLOSS development using email. The outcome of this paper is to provide a broad overview for the software engineering and FLOSS research communities of how other researchers have used FLOSS email message artifacts in their work.


2021 ◽  
Vol 4 (2) ◽  
pp. 1-48
Author(s):  
Frank L. Greitzer ◽  
Wanru Li ◽  
Kathryn B. Laskey ◽  
James Lee ◽  
Justin Purl

This article reports on a simulated phishing experiment targeting 6,938 faculty and staff at George Mason University. The three-week phishing campaign employed three types of phishing exploits and examined demographic, linked workstation/network monitoring audit data, and a variety of behavioral and psychological factors measured via pre- and post-campaign surveys. While earlier research studies have reported disparate effects of gender and age, the present results suggest that these effects are not significant or are of limited strength and that other underlying factors may be more important. Specifically, significant differences in phishing susceptibility were obtained for different email contexts and based on whether individuals have been successfully phished before (these people were more likely to succumb to subsequent phishing emails in our study). Further, participants who responded to phishing exploits scored higher on impulsivity than the non-clickers. Also, participants whose survey responses indicated that they had more appropriate online “security hygiene habits,” such as checking the legitimacy of links, were less likely to be successfully phished in our campaign. Participants whose post-campaign survey responses indicated that they were suspicious of a phishing email message in our campaign were far less likely to click on the phishing link than those who were not suspicious. Similar results were obtained for judgments of pertinence of the email. Participants who indicated that they thought about the negative consequences of clicking the link were less likely to do so than participants who did not think about the negative consequences. Implications for effective training and awareness are discussed.


Electronics ◽  
2021 ◽  
Vol 10 (6) ◽  
pp. 668
Author(s):  
Justinas Rastenis ◽  
Simona Ramanauskaitė ◽  
Ivan Suzdalev ◽  
Kornelija Tunaitytė ◽  
Justinas Janulevičius ◽  
...  

Spamming and phishing are two types of emailing that are annoying and unwanted, differing by the potential threat and impact to the user. Automated classification of these categories can increase the users’ awareness as well as to be used for incident investigation prioritization or automated fact gathering. However, currently there are no scientific papers focusing on email classification concerning these two categories of spam and phishing emails. Therefore this paper presents a solution, based on email message body text automated classification into spam and phishing emails. We apply the proposed solution for email classification, written in three languages: English, Russian, and Lithuanian. As most public email datasets almost exclusively collect English emails, we investigate the suitability of automated dataset translation to adapt it to email classification, written in other languages. Experiments on public dataset usage limitations for a specific organization are executed in this paper to evaluate the need of dataset updates for more accurate classification results.


2019 ◽  
Vol 17 (2) ◽  
pp. 62-66
Author(s):  
Travis M. Combest ◽  
Allison Howell ◽  
Harjinder Kumar ◽  
Samer Koutoubi ◽  
Karen Cieslewicz ◽  
...  

Background and Program: Secure email messaging is used to provide timely communication between healthcare providers and patients with medical information and education. There have been increasing rates of overweight and obesity among military healthcare patients. To address this issue, we utilized a secure email messaging system that is primarily used for medication refills. This commentary demonstrates the extent to which the message was viewed and how much the message was liked. Preliminary Results: Of the 16,020 individuals emailed, 7,011 participants (43.8%) opened the email, and 1,023 patients (14.6% of those who opened it) completed the survey. Satisfaction rate for the health promotion message was 77.2%. Participants reported an intent to eat more fruit and vegetables (49.6%), decrease portion sizes (38.8%), and increase physical activity (51.1%), while 33.6% reported having no intent to change. Conclusion: The majority were satisfied with the health promotion message. This email method enables a single provider to have increased contact with patients. It is unknown if this message reached higher risk or harder to reach participants, a patient subset that could benefit most from this type of communication. This study is unique in that to our knowledge it is the first one to use secure email messaging in the military healthcare system for health promotion.


HortScience ◽  
2006 ◽  
Vol 41 (3) ◽  
pp. 513C-513
Author(s):  
Richard G. Snyder

The greenhouse-tomatoes list was created to provide a method for commercial greenhouse tomato growers to communicate with each other to learn from others' experiences. Its purpose is to connect growers with vendors of greenhouses, fertilizers, seeds, and other supplies, and to facilitate networking among growers, agents, specialists, and researchers. The goal of the greenhouse-tomatoes list is to develop high quality discussion that benefits commercial growers and the entire greenhouse tomato industry. This is accomplished by promoting the list to growers; keeping the list small so that the traffic is manageable; avoiding promotion to hobbyists so the list does not become cluttered; avoiding SPAM. Excellent majordomo software has been 100% effective in the latter. The list was first offered to growers at the 2004 Greenhouse Tomato Short Course (GHSC) in Jackson, Miss. Then, it was promoted through other e-lists for vegetable specialists, new crops, greenhouse growers, hydroponics, etc. The final phase was to promote it at various grower meetings around the U.S., through trade magazines, and at the 2005 GHSC. Currently, the list consists of 141 members. Subscribers are from the U.S., Argentina, Australia, Canada, England, Germany, Newfoundland, Pakistan, Romania, South Africa, Virgin Islands, and Thailand. Demographics are 31% university, 15% suppliers, 34% growers, 20% unknown. The greenhouse-tomatoes list is housed on a server at Mississippi State University with nearly all functions handled seamlessly by majordomo software. To subscribe: send e-mail to [email protected] with the following message: subscribe greenhouse-tomatoes. You will get a confirmation email telling you that you must reply. You must be subscribed to send anything to the list. Once subscribed, to communicate with the whole group, address an email message to [email protected] and everybody on the list will receive it. To make this easy, the user can save that address to a nickname, such as ght or greenhouselist. More information can be found at http://www.greenhousetomatosc.com.


2011 ◽  
Vol 6 (5) ◽  
Author(s):  
Ram Subramanian ◽  
Ross A. Malaga

Andy Steiner was checking the Internet for late night West Coast baseball game scores early on Saturday morning, August 3rd, 2007, when an email message popped up on his screen. It was a message from a prospective buyer for Classy Delicates, Steiner’s online lingerie retailing business.  Intrigued by the offer, Steiner contacted the prospective buyer who reiterated his intention and talked specific terms for the purchase.  “Isn’t this a coincidence,” remarked Steiner to his wife, Julia.  “We were just talking about the future of our business and here comes this new offer. This is the fourth offer we’ve had.”  “We should consider a sale of the business seriously,” said Julia, “even though you were thinking of upgrading the site to improve traffic.”  “How much time do we have to examine the offers?” asked Julia to her husband.  “The current buyer has made an offer to one other business and he told me that it’s either the other business or us, and not both.  I don’t know if he is bluffing or not, but I think we have a week to decide for all four,” answered Steiner. 


2020 ◽  
pp. 10.1212/CPJ.0000000000000993
Author(s):  
Muhammad Taimur Malik ◽  
Ramin Zand ◽  
Shelly M Vezendy ◽  
Eric Newman ◽  
Neil R. Holland

Abstract:Objective:The demand for neurology services at Geisinger exceeds the current clinical capacity. Therefore, we implemented and assessed the utility of Ask-a-Doc (AAD) which is an EMR-based interface developed at Geisinger to facilitate communication between primary care physicians (PCP) and specialists.Methods:AAD was employed at the end of 2015 in our department. Based on the clinical picture, the PCP assesses whether to send an urgent AAD question with a phone request, or a more elective question that can be answered by email message. The AAD message is then relayed to the on-call neurologist. We analyzed 4-year longitudinal data to assess for the efficacy of this tool in our department in improving patient care and communication.Results:There were a total of 3190 messages during this period. 2927 (91.7%) were completed and routed correctly, 263(8.3%) messages had errors including routing issues, communication mismatch, and delayed time frame. The average specialist turnaround time was 5 hours. During this period the number of AAD messages increased by 300% as PCPs and neurologists became more comfortable with the process.Conclusions:AAD provides an interface between PCP and neurology specialists and can assist in determining if a patient needs to be seen urgently in the clinic, the correct subspecialty, and prerequisite diagnostic tests. AAD was successfully implemented and utilized in our rural neurology setting, with rapid turnaround, increased usage and accuracy.


Sign in / Sign up

Export Citation Format

Share Document