Blocking spam by separating end-user machines from legitimate mail server machines

Author(s):  
Fernando Sanchez ◽  
Zhenhai Duan ◽  
Yingfei Dong
Keyword(s):  
End User ◽  
Author(s):  
Indranil Bose

Phishing is a new form of online crime where the unsuspecting user is tricked into revealing his/her personal information. It is usually conducted using social engineering or technical deceit–based methods. The various ways in which phishing can take place are described in this chapter. This is followed by a description of key strategies that can be adopted for protection of end users and organizations. The end user protection strategies include desktop protection agents, password management tools, secure e-mail, simple and trusted browser setting, and digital signature. Among corporate protection strategies are such measures as e-mail personalization, mail server authentication, monitoring transaction logs, detecting unusual downloading activities, token based and multifactor authentication, domain monitoring, and Web poisoning. Some of the commercially available and popular anti-phishing products are also described in this chapter.


2012 ◽  
Vol 9 (4) ◽  
pp. 316-326 ◽  
Author(s):  
Fernando Sanchez ◽  
Zhenhai Duan ◽  
Yingfei Dong
Keyword(s):  
End User ◽  

Author(s):  
Tosha B. Wetterneck ◽  
Pascale Carayon ◽  
Folasade Sobande ◽  
Ann Schoofs Hundt

1998 ◽  
Vol 37 (03) ◽  
pp. 247-253 ◽  
Author(s):  
K. Ohe ◽  
S. Kaihara ◽  
T. Kiuchi

AbstractWWW-based user interface is presented for secure electronic mail service for healthcare users. Using this method, communications between an electronic mail (WWW) server and users (WWW browsers) can be performed securely using Secure Socket Layer protocol-based Hypertext Transfer Protocol (SSL-HTIP). The mail can be encrypted, signed, and sent to the recipients and vice versa on the remote WWW server. The merit of this method is that many healthcare users can use a secure electronic mail system easily and immediately, because SSL-compatible WWW browsers are widely used and this system can be made available simply by installing a WWW-based mail user agent on a mail server. We implemented a WWWbased mail user agent which is compatible with PEM-based secure mail and made it available to about 16,000 healthcare users. We believe this approach is effective in facilitating secure network-based information exchange among medical professionals.


ICIT Journal ◽  
2020 ◽  
Vol 6 (2) ◽  
pp. 213-226
Author(s):  
Eka Fitri Rahayu

Informasi sangat dibutuhkan dalam pengambilan keputusan. Sistem informasi yang efektif adalah sistem informasi yang harus mampu memberikan kepuasan kepada para penggunanya. Tujuan dari penelitian ini adalah untuk mengetahui pengaruh model End User Computing Satisfaction (EUCS) dengan Instrumen Accuracy, Content, Format, Timeliness dan Ease of Use terhadap kepuasan pengguna sistem UG In Your Hand. Data yang digunakan sebanyak 96 responden yang diperoleh melalui kuesioner online yang dibagikan kepada Mahasiswa. Metode penelitian menggunakan model Regresi Linier Berganda. Hasil penelitian menunjukkan bahwa Instrumen Ease of Use dan Timeliness mempengaruhi kepuasan pengguna sistem, selain itu Instrumen Content, Accuracy dan Format tidak mempengaruhi kepuasan pengguna sistem UG In Your Hand.   Kata Kunci : Kepuasan Pengguna, UG In Your Hand, Metode EUCS


2017 ◽  
Vol 8 (2) ◽  
pp. 563 ◽  
Author(s):  
Usman Ependi

Heuristic evaluation merupakan salah satu bentuk usability testing perangkat lunak yang dinilai oleh pengguna (evaluator). Dalam melakukan heuristic evaluation instrumen penilaian terdiri dari sepuluh (10) pernyataan dengan lima pilihan jawaban dalam skala severity ratings. Dalam penelitian ini heuristic evaluation terhadap aplikasi Depo Auto 2000 Tanjung Api-Api Palembang yang dilakukan oleh 4 evaluator.  Hasil dari heuristic evaluation dikelompokkan kedalam  masing-masing instrumen yaitu visibility of system status dengan nilai 0,75, match between system and the real world dengan nilai 0,25, user control and freedom dengan nilai 0,25, consistency and standards dengan nilai 0,75, error prevention dengan nilai 1, recognition rather than recall dengan nilai 1,25, flexibility and efficiency of use dengan nilai 0,25, Aesthetic and minimalist design dengan nilai 0,25, help users recognize, diagnose, and recover from errors dengan nilai 1 dan Help and documentation dengan nilai 0. Dari hasil heuristic evaluation yang dilakukan menunjukkan bahwa evaluator memberikan nilai 0 dan 1 aplikasi Depo Atuo 2000 Tanjung Api-Api Palembang. Hasil penilaian tersebut menunjukkan bahwa aplikasi yang buat tidak ada masalah usability dan hanya memiliki cosmetic problem sehingga aplikasi Depo Auto 2000 Tanjung Api Api Palembang  dapat dinyatakan layak untuk didistribusikan kepada pengguna akhir (end user). 


2009 ◽  
Vol 17 (3) ◽  
pp. 333-334 ◽  
Author(s):  
David Edwards
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document