{"title":"Actions and Strategies: A Verbal Data Analysis of Phishing Emails","authors":"David Mueller","doi":"10.1145/3233756.3233950","DOIUrl":null,"url":null,"abstract":"This poster session examines the viability of verbal data analysis for phishing detection research. A verbal data analysis was conducted on both phishes and legitimate emails to identify differences in actions requested and influence strategies employed. The findings suggest that this methodology could be used to inform both user education and software enhancement phishing detection solutions.","PeriodicalId":153529,"journal":{"name":"Proceedings of the 36th ACM International Conference on the Design of Communication","volume":"307 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":null,"platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 36th ACM International Conference on the Design of Communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3233756.3233950","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0
Abstract
This poster session examines the viability of verbal data analysis for phishing detection research. A verbal data analysis was conducted on both phishes and legitimate emails to identify differences in actions requested and influence strategies employed. The findings suggest that this methodology could be used to inform both user education and software enhancement phishing detection solutions.