{"title":"行动和策略:网络钓鱼电子邮件的口头数据分析","authors":"David Mueller","doi":"10.1145/3233756.3233950","DOIUrl":null,"url":null,"abstract":"This poster session examines the viability of verbal data analysis for phishing detection research. A verbal data analysis was conducted on both phishes and legitimate emails to identify differences in actions requested and influence strategies employed. The findings suggest that this methodology could be used to inform both user education and software enhancement phishing detection solutions.","PeriodicalId":153529,"journal":{"name":"Proceedings of the 36th ACM International Conference on the Design of Communication","volume":"307 2 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"2018-08-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"Actions and Strategies: A Verbal Data Analysis of Phishing Emails\",\"authors\":\"David Mueller\",\"doi\":\"10.1145/3233756.3233950\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"This poster session examines the viability of verbal data analysis for phishing detection research. A verbal data analysis was conducted on both phishes and legitimate emails to identify differences in actions requested and influence strategies employed. The findings suggest that this methodology could be used to inform both user education and software enhancement phishing detection solutions.\",\"PeriodicalId\":153529,\"journal\":{\"name\":\"Proceedings of the 36th ACM International Conference on the Design of Communication\",\"volume\":\"307 2 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-08-03\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"Proceedings of the 36th ACM International Conference on the Design of Communication\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1145/3233756.3233950\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"Proceedings of the 36th ACM International Conference on the Design of Communication","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1145/3233756.3233950","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Actions and Strategies: A Verbal Data Analysis of Phishing Emails
This poster session examines the viability of verbal data analysis for phishing detection research. A verbal data analysis was conducted on both phishes and legitimate emails to identify differences in actions requested and influence strategies employed. The findings suggest that this methodology could be used to inform both user education and software enhancement phishing detection solutions.