Search results

1 – 10 of over 2000
Open Access
Article
Publication date: 23 July 2020

Rami Mustafa A. Mohammad

Spam emails classification using data mining and machine learning approaches has enticed the researchers' attention duo to its obvious positive impact in protecting internet…

1962

Abstract

Spam emails classification using data mining and machine learning approaches has enticed the researchers' attention duo to its obvious positive impact in protecting internet users. Several features can be used for creating data mining and machine learning based spam classification models. Yet, spammers know that the longer they will use the same set of features for tricking email users the more probably the anti-spam parties might develop tools for combating this kind of annoying email messages. Spammers, so, adapt by continuously reforming the group of features utilized for composing spam emails. For that reason, even though traditional classification methods possess sound classification results, they were ineffective for lifelong classification of spam emails duo to the fact that they might be prone to the so-called “Concept Drift”. In the current study, an enhanced model is proposed for ensuring lifelong spam classification model. For the evaluation purposes, the overall performance of the suggested model is contrasted against various other stream mining classification techniques. The results proved the success of the suggested model as a lifelong spam emails classification method.

Details

Applied Computing and Informatics, vol. 20 no. 1/2
Type: Research Article
ISSN: 2634-1964

Keywords

Article
Publication date: 22 August 2023

Karen Yvonne Green, Meng Huang, Keith S. Walker, Steven A. Wallace and Xinlei Zhao

The increasing number of online courses in higher education has provided students with convenience and flexibility. However, some adverse effects also come with online learning…

Abstract

Purpose

The increasing number of online courses in higher education has provided students with convenience and flexibility. However, some adverse effects also come with online learning, including negatively affecting student beliefs in themselves and their perceptions of the instructor. Both are important factors for academic success. Grounded in media richness theory, this study aims to examine the impact of medium choices by investigating instructor messages on student beliefs and perceptions in an online course.

Design/methodology/approach

This study employs a survey methodology using validated items to assess university student perceptions following faculty interactions (video versus customized email).

Findings

The authors find that videos and personalized emails, using mass distribution Excel features, help increase student beliefs, including social belongingness and self-efficacy, and improve students' perceptions of the instructor and learning environment.

Originality/value

This study contributes to the literature by establishing that the richness of media of faculty messages can impact student beliefs, which in turn, may help with student success and retention. The activities used in this study are low-effort for the instructor and may have lasting effects on the students. In addition, this study fills a gap in the literature by examining multiple forms of the richness of media and their impact on multiple aspects of students' beliefs and perceptions of the instructor.

Details

International Journal of Educational Management, vol. 37 no. 6/7
Type: Research Article
ISSN: 0951-354X

Keywords

Article
Publication date: 14 December 2023

Durrey Shahwar and Rajib Lochan Dhar

The current digital work environment promoting a “constant-on” culture is a hotbed for cyber incivility. Thus, there is a pressing need to understand its mechanisms. This study…

Abstract

Purpose

The current digital work environment promoting a “constant-on” culture is a hotbed for cyber incivility. Thus, there is a pressing need to understand its mechanisms. This study aims to shed light on the triggers, sources and impact of rude behaviours in cyberspace. The authors also present the boundary conditions that exacerbate or alleviate the effects of such negative experiences.

Design/methodology/approach

Through a systematic literature review based on predefined search protocols, the authors synthesised the current knowledge on cyber incivility and identified 21 peer-reviewed research articles.

Findings

The findings reveal the different sources of cyber incivility, its personal, relational and organisational antecedents and consequences, and its personal and situational boundary conditions that curb or enhance the negative impact.

Research limitations/implications

The authors unravel the main future research avenues based on the review findings by systemising knowledge on cyber incivility. Managerial efforts in the form of interventions and mitigation are also discussed to help combat this grieving issue in the workplace.

Originality/value

This paper presents the first systematic review of the cyber incivility literature and identifies new avenues for future research. Scholars can expand upon the findings of this study to fill gaps and move the incivility in cyberspace forward. It also offers practical insights on mitigating the advancement of such behaviours in organisations.

Details

International Journal of Conflict Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 1044-4068

Keywords

Article
Publication date: 5 September 2023

Megan Vladoiu, Pnina Fichman and Jieli Liu

This article examines if there is evidence of racial or gender bias in email reference services in American public and academic libraries.

Abstract

Purpose

This article examines if there is evidence of racial or gender bias in email reference services in American public and academic libraries.

Design/methodology/approach

Using a two-by-two study design and an unobtrusive data collection, the authors conducted two studies in which the authors sent 1,960 email requests to 505 academic and public libraries. Requests in both studies differed in the perceived identity of the user as indicated by their name, and the counterbalanced method was utilized to control for intervening variables. Based on content analysis of the responses, the authors examined the statistical significance of the differences by race, gender and race by gender.

Findings

Overall, the authors found equitable service to users regardless of their race and gender; at times, however, there was evidence of favorable service to the White female in academic and public libraries and to the Black male in academic libraries.

Originality/value

There is little research into potential bias in email reference services in both academic and public libraries in the United States of America. Yet, following the rise of the Black Lives Matter Movement in 2020, there has been an increased focus on racial equality in library services and the American Library Association (ALA) Code of Ethics was modified accordingly. The authors' study makes significant contributions to the increasing body of research on racial and gender equality in online library services.

Details

Reference Services Review, vol. 51 no. 3/4
Type: Research Article
ISSN: 0090-7324

Keywords

Article
Publication date: 29 March 2024

Njod Aljabr, Dimitra Petrakaki and Petros Chamakiotis

Existing research on how professionals manage after-hours connectivity to work has been dominated by studies on the strategies/practices individuals develop. In these studies…

Abstract

Purpose

Existing research on how professionals manage after-hours connectivity to work has been dominated by studies on the strategies/practices individuals develop. In these studies, mobile technology is perceived as a tool or an enabler that supports otherwise human-centric connectivity decisions. This view sees technology as separate or external to the organisation, missing out on its nuanced role in shaping connectivity decisions. Our study aims to bring technology back into the sociomaterially imbricated context of connectivity and to unpack its parameters.

Design/methodology/approach

Drawing on data collected from documents and semi-structured interviews, we adopt the framework of “sociomaterial imbrications” (Leonardi, 2011) to understand the social and material parameters that influence connectivity management practices at two different academic institutions in Saudi Arabia.

Findings

The study identifies a set of social and material parameters (organisational, individual, technological and situational) that imbricate to shape, collectively and not individually, professionals’ connectivity management practices. Connectivity decisions to change practice (such as decisions of where, when or why to connect) or technology (how to connect) are not as distinct as they appear but originate from, and are founded on, imbricated sociomaterial parameters. Our study further suggests that connectivity decisions are shaped by individuals’ perceptions of sociomaterial imbrications, but decisions are not solely idiosyncratic. The context within which connectivity decisions are taken influences the type of decisions made.

Originality/value

Connectivity management emerged from sociomaterial imbrications within a context constitutive of four interacting parameters: organisational, technological, situational and individual. Decisions around the “how” and the “what” of connectivity – i.e. the practice of connectivity and its underpinning technology – originate from how people perceive sociomaterial imbrications as enabling or constraining within a context. Individual perceptions account for changes in practice and in technology, but the context they find themselves in is also important. For instance, we show that professionals may perceive a certain technology as affording, but eventually they may use another technology for communications due to social norms.

Details

Information Technology & People, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 0959-3845

Keywords

Article
Publication date: 31 January 2024

Rufai Ahmad, Sotirios Terzis and Karen Renaud

This study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing.

Abstract

Purpose

This study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing.

Design/methodology/approach

In total, 67 examples of real-world MIM phishing attacks were collected from various online sources. Each example was coded using established guidelines from the literature to identify the persuasion principles, and the URL construction techniques employed.

Findings

The principles of social proof, liking and authority were the most widely used in MIM phishing, followed by scarcity and reciprocity. Most phishing examples use three persuasion principles, often a combination of authority, liking and social proof. In contrast to email phishing but similar to vishing, the social proof principle was the most commonly used in MIM phishing. Phishers implement the social proof principle in different ways, most commonly by claiming that other users have already acted (e.g. crafting messages that indicate the sender has already benefited from the scam). In contrast to email, retail and fintech companies are the most commonly targeted in MIM phishing. Furthermore, phishers created deceptive URLs using multiple URL obfuscation techniques, often using spoofed domains, to make the URL complex by adding random characters and using homoglyphs.

Originality/value

The insights from this study provide a theoretical foundation for future research on the psychological aspects of phishing in MIM apps. The study provides recommendations that software developers should consider when developing automated anti-phishing solutions for MIM apps and proposes a set of MIM phishing awareness training tips.

Details

Information & Computer Security, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2056-4961

Keywords

Article
Publication date: 12 February 2024

Kate-Riin Kont

This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates…

Abstract

Purpose

This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates Estonian library staff awareness of information security and shares recommendations concerning focus areas that should be given more attention in the future.

Design/methodology/approach

The data used in this paper is based on an overview of relevant literature highlighting the theoretical points and giving the reasons why human factor is considered the weakest link in information security and cyber security and studying how to mitigate the related risks in the organisation. To perform the survey, a web questionnaire was designed which included 63 sentences and was developed based on the knowledge-attitude-behaviour (KAB) model supported by Kruger and Kearney and Human Aspects of Information Security Questionnaire (HAIS-Q) designed by Parsons et al.

Findings

The research results show that the information security awareness of library employees is at a good level; however, awareness in two focus areas needs special attention and should be improved. The output of this study is the mapping of seven focus areas of information security policy in libraries based on the HAIS-Q framework and the KAB model.

Originality/value

The cyber awareness of library employees has not been studied in the world using HAIS-Q and KAB model, and to the best of the authors’ knowledge, no research has been previously carried out in the Estonian library context into cyber security awareness.

Details

Library Management, vol. 45 no. 1/2
Type: Research Article
ISSN: 0143-5124

Keywords

Article
Publication date: 26 December 2023

Martin A. Kesselman and Wilson Esquivel

This study aims to provide insight of how conference sessions and poster sessions are relevant to libraries.

Abstract

Purpose

This study aims to provide insight of how conference sessions and poster sessions are relevant to libraries.

Design/methodology/approach

Recently attended IFLA and Internationale Funkaussteilung (IFA) and focused the conference report on generative artificial intelligence (AI).

Findings

Disappointed in the IFLA and IFA conferences and instead find that the email newsletter from Shelly Palmer is much better in keeping up with exponential growth in ChatGPT and other generative AI tools.

Research limitations/implications

This study may provide ideas for libraries to experiment with generative AI tools.

Originality Value

This study is an original report by the authors. All photos were taken by the authors except for a table from the email newsletter of Shelly Palmer, which was included by him from another source.

Details

Library Hi Tech News, vol. 41 no. 1
Type: Research Article
ISSN: 0741-9058

Keywords

Book part
Publication date: 20 November 2023

Malakeh Itani

The chapter argues that implementing a professional writing program in universities can help students build expertise, confidence, and a strong professional portfolio that can…

Abstract

The chapter argues that implementing a professional writing program in universities can help students build expertise, confidence, and a strong professional portfolio that can advance their future careers to greater heights. This is achieved through a curriculum directly connected to the industry of the students' disciplines, expert instructors providing extensive feedback, and tips to transform ideas and knowledge into professional writing pieces. Additionally, the chapter highlights the importance of students gaining a comprehensive understanding of communication, being aware of the benefits of professional writing, and having hands-on experience through active engagement in the learning process to improve their craft. The chapter emphasizes that transformative learning implemented through strong writing and communication skills are highly valued by all industries seeking job candidates.

Finally, the chapter provides a strategy for improving students' employability by implementing a professional writing program in universities, which is based on the understanding of the changing career demands and the importance of communication and writing skills in all industries seeking job candidates.

Details

Active and Transformative Learning in STEAM Disciplines
Type: Book
ISBN: 978-1-83753-619-1

Keywords

Open Access
Article
Publication date: 23 February 2024

Vanessa Honson, Thuy Vu, Tich Phuoc Tran and Walter Tejada Estay

Large class sizes are becoming the norm in higher education against concerns of dropping learning qualities. To maintain the standard of learning and add value, one of the common…

Abstract

Purpose

Large class sizes are becoming the norm in higher education against concerns of dropping learning qualities. To maintain the standard of learning and add value, one of the common strategies is for the course convenor to proactively monitor student engagement with learning activities against their assessment outcomes and intervene timely. Learning analytics has been increasingly adopted to provide these insights into student engagement and their performance. This case study explores how learning analytics can be used to meet the convenor’s requirements and help reduce administrative workload in a large health science class at the University of New South Wales.

Design/methodology/approach

This case-based study adopts an “action learning research approach” in assessing ways of using learning analytics for reducing workload in the educator’s own context and critically reflecting on experiences for improvements. This approach emphasises reflexive methodology, where the educator constantly assesses the context, implements an intervention and reflects on the process for in-time adjustments, improvements and future development.

Findings

The results highlighted ease for the teacher towards the early “flagging” of students who may not be active within the learning management system or who have performed poorly on assessment tasks. Coupled with the ability to send emails to the “flagged” students, this has led to a more personal approach while reducing the number of steps normally required. An unanticipated outcome was the potential for additional time saving through improving the scaffolding mechanisms if the learning analytics were customisable for individual courses.

Originality/value

The results provide further benefits for learning analytics to assist the educator in a growing blended learning environment. They also reveal the potential for learning analytics to be an effective adjunct towards promoting personal learning design.

Details

Journal of Work-Applied Management, vol. ahead-of-print no. ahead-of-print
Type: Research Article
ISSN: 2205-2062

Keywords

1 – 10 of over 2000