375 research outputs found

    Investigating Information Structure of Phishing Emails Based on Persuasive Communication Perspective

    Get PDF
    Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a method of formulating quantitative model that can represent persuasive information structure in phishing messages. This paper makes contribution to phishing classification research by presenting the idea of universal information structure in terms of persuasive communication theories

    Investigating Information Structure of Phishing Emails Based on Persuasive Communication Perspective

    Get PDF
    Current approaches of phishing filters depend on classifying messages based on textually discernable features such as IP-based URLs or domain names as those features that can be easily extracted from a given phishing message. However, in the same sense, those easily perceptible features can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified for feature extraction to serve as a basis for text classification. In this paper, we demonstrate that user perception regarding phishing message can be identified in central and peripheral routes of information processing. We also present a method of formulating quantitative model that can represent persuasive information structure in phishing messages. This paper makes contribution to phishing classification research by presenting the idea of universal information structure in terms of persuasive communication theories

    Exploring a method of extracting universal features of phishing emails

    Get PDF
    Current approaches of phishing filters depend on classifying emails based on obviously discernable features such as IP-based URLs or domain names. However, as those features can be easily extracted from a given phishing email, in the same sense, they can be easily manipulated by sophisticated phishers. Therefore, it is important that universal patterns of phishing messages should be identified to serve as a basis for novel phishing classification algorithm. In this paper, we argue that phishing is a kind of persuasion and explore feature extraction method based on persuasive communication perspective. Phishing message components, including message factors, source factors, and computer related factors, are investigated as message sender’s strategic message manipulation. On the other hand, message receiver’s cognitive components for information processing are discussed in terms of dual process of cognition. Our method consists of four major procedural steps. First, persuasive message components are identified through extensive literature review. Second, based on the identified persuasive message components, we conduct content analysis of email messages. Third, using factor analysis, persuasive components in phishing messages are classified for the validation of a dual process of cognition. From the pool of persuasive communication variables, we identify underlying dimensions to see whether central route information processing and peripheral route information processing are distinctly identified. Fourth, instances are classified by conducting logistic regression analysis based on the identified variables as a result of factor analysis in addition to known phishing factors identified by other studies. We, then, present a quantitative model that can represent persuasive information structure in phishing messages. This paper makes contribution to phishing classification research by presenting the idea of universal information structure in terms of persuasive communication theories

    Designing a Data Warehouse for Cyber Crimes

    Get PDF
    One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on the data warehouse. We discuss several ways of utilizing the data warehouse using OLAP and data mining technologies. We finally discuss legal issues and data population issues for the data warehouse

    Designing a Data Warehouse for Cyber Crimes

    Get PDF
    One of the greatest challenges facing modern society is the rising tide of cyber crimes. These crimes, since they rarely fit the model of conventional crimes, are difficult to investigate, hard to analyze, and difficult to prosecute. Collecting data in a unified framework is a mandatory step that will assist the investigator in sorting through the mountains of data. In this paper, we explore designing a dimensional model for a data warehouse that can be used in analyzing cyber crime data. We also present some interesting queries and the types of cyber crime analyses that can be performed based on the data warehouse. We discuss several ways of utilizing the data warehouse using OLAP and data mining technologies. We finally discuss legal issues and data population issues for the data warehouse

    Characterization of germanium/silicon p-n junction fabricated by low temperature direct wafer bonding and layer exfoliation

    Get PDF
    The current transport across a p-Ge/n-Si diode structure obtained by direct wafer bonding and layer exfoliation is analysed. A low temperature anneal at 400 degrees C for 30 min was used to improve the forward characteristics of the diode with the on/off ratio at -1 V being > 8000. Post anneal, the transport mechanism has a strong tunnelling component. This fabrication technique using a low thermal budget (T <= 400 degrees C) is an attractive option for heterogeneous integration. (C) 2012 American Institute of Physics. (doi:10.1063/1.3688174

    A Case of Fabry's Disease with Congenital Agammaglobulinemia

    Get PDF
    Fabry's disease is an X-linked lysosomal storage disorder caused by abnormalities in the α-galactosidase A (GLA) gene, which leads to a GLA deficiency and to the intracellular deposition of globotriaosylceramide (Gb3) within vascular endothelium and other tissues. It manifests as progressive multiple organ dysfunctions caused by the deposition of Gb3. On the other hand, congenital agammaglobulinemia is usually caused by mutations in Bruton's tyrosine kinase (Btk) gene with X-linked dominence, suppresses B cell maturation, and causes recurrent pyogenic infections. In former reports, the distance between the loci in the Xq22 region of the human X chromosome was found to be about 69 kilobases. A 23-yr-old man diagnosed with congenital agammaglobulinemia at age 5, showed typical clinical and laboratory and histopathological findings of Fabry's disease. The genetic basis of this combination of the two syndromes was studied in this patient. Here, we report a case of Fabry's disease with congenital agammaglobulinemia
    • …
    corecore