Search results
1 – 10 of over 2000Spam emails classification using data mining and machine learning approaches has enticed the researchers' attention duo to its obvious positive impact in protecting internet…
Abstract
Spam emails classification using data mining and machine learning approaches has enticed the researchers' attention duo to its obvious positive impact in protecting internet users. Several features can be used for creating data mining and machine learning based spam classification models. Yet, spammers know that the longer they will use the same set of features for tricking email users the more probably the anti-spam parties might develop tools for combating this kind of annoying email messages. Spammers, so, adapt by continuously reforming the group of features utilized for composing spam emails. For that reason, even though traditional classification methods possess sound classification results, they were ineffective for lifelong classification of spam emails duo to the fact that they might be prone to the so-called “Concept Drift”. In the current study, an enhanced model is proposed for ensuring lifelong spam classification model. For the evaluation purposes, the overall performance of the suggested model is contrasted against various other stream mining classification techniques. The results proved the success of the suggested model as a lifelong spam emails classification method.
Details
Keywords
Karen Yvonne Green, Meng Huang, Keith S. Walker, Steven A. Wallace and Xinlei Zhao
The increasing number of online courses in higher education has provided students with convenience and flexibility. However, some adverse effects also come with online learning…
Abstract
Purpose
The increasing number of online courses in higher education has provided students with convenience and flexibility. However, some adverse effects also come with online learning, including negatively affecting student beliefs in themselves and their perceptions of the instructor. Both are important factors for academic success. Grounded in media richness theory, this study aims to examine the impact of medium choices by investigating instructor messages on student beliefs and perceptions in an online course.
Design/methodology/approach
This study employs a survey methodology using validated items to assess university student perceptions following faculty interactions (video versus customized email).
Findings
The authors find that videos and personalized emails, using mass distribution Excel features, help increase student beliefs, including social belongingness and self-efficacy, and improve students' perceptions of the instructor and learning environment.
Originality/value
This study contributes to the literature by establishing that the richness of media of faculty messages can impact student beliefs, which in turn, may help with student success and retention. The activities used in this study are low-effort for the instructor and may have lasting effects on the students. In addition, this study fills a gap in the literature by examining multiple forms of the richness of media and their impact on multiple aspects of students' beliefs and perceptions of the instructor.
Details
Keywords
Durrey Shahwar and Rajib Lochan Dhar
The current digital work environment promoting a “constant-on” culture is a hotbed for cyber incivility. Thus, there is a pressing need to understand its mechanisms. This study…
Abstract
Purpose
The current digital work environment promoting a “constant-on” culture is a hotbed for cyber incivility. Thus, there is a pressing need to understand its mechanisms. This study aims to shed light on the triggers, sources and impact of rude behaviours in cyberspace. The authors also present the boundary conditions that exacerbate or alleviate the effects of such negative experiences.
Design/methodology/approach
Through a systematic literature review based on predefined search protocols, the authors synthesised the current knowledge on cyber incivility and identified 21 peer-reviewed research articles.
Findings
The findings reveal the different sources of cyber incivility, its personal, relational and organisational antecedents and consequences, and its personal and situational boundary conditions that curb or enhance the negative impact.
Research limitations/implications
The authors unravel the main future research avenues based on the review findings by systemising knowledge on cyber incivility. Managerial efforts in the form of interventions and mitigation are also discussed to help combat this grieving issue in the workplace.
Originality/value
This paper presents the first systematic review of the cyber incivility literature and identifies new avenues for future research. Scholars can expand upon the findings of this study to fill gaps and move the incivility in cyberspace forward. It also offers practical insights on mitigating the advancement of such behaviours in organisations.
Details
Keywords
Megan Vladoiu, Pnina Fichman and Jieli Liu
This article examines if there is evidence of racial or gender bias in email reference services in American public and academic libraries.
Abstract
Purpose
This article examines if there is evidence of racial or gender bias in email reference services in American public and academic libraries.
Design/methodology/approach
Using a two-by-two study design and an unobtrusive data collection, the authors conducted two studies in which the authors sent 1,960 email requests to 505 academic and public libraries. Requests in both studies differed in the perceived identity of the user as indicated by their name, and the counterbalanced method was utilized to control for intervening variables. Based on content analysis of the responses, the authors examined the statistical significance of the differences by race, gender and race by gender.
Findings
Overall, the authors found equitable service to users regardless of their race and gender; at times, however, there was evidence of favorable service to the White female in academic and public libraries and to the Black male in academic libraries.
Originality/value
There is little research into potential bias in email reference services in both academic and public libraries in the United States of America. Yet, following the rise of the Black Lives Matter Movement in 2020, there has been an increased focus on racial equality in library services and the American Library Association (ALA) Code of Ethics was modified accordingly. The authors' study makes significant contributions to the increasing body of research on racial and gender equality in online library services.
Details
Keywords
Njod Aljabr, Dimitra Petrakaki and Petros Chamakiotis
Existing research on how professionals manage after-hours connectivity to work has been dominated by studies on the strategies/practices individuals develop. In these studies…
Abstract
Purpose
Existing research on how professionals manage after-hours connectivity to work has been dominated by studies on the strategies/practices individuals develop. In these studies, mobile technology is perceived as a tool or an enabler that supports otherwise human-centric connectivity decisions. This view sees technology as separate or external to the organisation, missing out on its nuanced role in shaping connectivity decisions. Our study aims to bring technology back into the sociomaterially imbricated context of connectivity and to unpack its parameters.
Design/methodology/approach
Drawing on data collected from documents and semi-structured interviews, we adopt the framework of “sociomaterial imbrications” (Leonardi, 2011) to understand the social and material parameters that influence connectivity management practices at two different academic institutions in Saudi Arabia.
Findings
The study identifies a set of social and material parameters (organisational, individual, technological and situational) that imbricate to shape, collectively and not individually, professionals’ connectivity management practices. Connectivity decisions to change practice (such as decisions of where, when or why to connect) or technology (how to connect) are not as distinct as they appear but originate from, and are founded on, imbricated sociomaterial parameters. Our study further suggests that connectivity decisions are shaped by individuals’ perceptions of sociomaterial imbrications, but decisions are not solely idiosyncratic. The context within which connectivity decisions are taken influences the type of decisions made.
Originality/value
Connectivity management emerged from sociomaterial imbrications within a context constitutive of four interacting parameters: organisational, technological, situational and individual. Decisions around the “how” and the “what” of connectivity – i.e. the practice of connectivity and its underpinning technology – originate from how people perceive sociomaterial imbrications as enabling or constraining within a context. Individual perceptions account for changes in practice and in technology, but the context they find themselves in is also important. For instance, we show that professionals may perceive a certain technology as affording, but eventually they may use another technology for communications due to social norms.
Details
Keywords
Rufai Ahmad, Sotirios Terzis and Karen Renaud
This study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing.
Abstract
Purpose
This study aims to investigate how phishers apply persuasion principles and construct deceptive URLs in mobile instant messaging (MIM) phishing.
Design/methodology/approach
In total, 67 examples of real-world MIM phishing attacks were collected from various online sources. Each example was coded using established guidelines from the literature to identify the persuasion principles, and the URL construction techniques employed.
Findings
The principles of social proof, liking and authority were the most widely used in MIM phishing, followed by scarcity and reciprocity. Most phishing examples use three persuasion principles, often a combination of authority, liking and social proof. In contrast to email phishing but similar to vishing, the social proof principle was the most commonly used in MIM phishing. Phishers implement the social proof principle in different ways, most commonly by claiming that other users have already acted (e.g. crafting messages that indicate the sender has already benefited from the scam). In contrast to email, retail and fintech companies are the most commonly targeted in MIM phishing. Furthermore, phishers created deceptive URLs using multiple URL obfuscation techniques, often using spoofed domains, to make the URL complex by adding random characters and using homoglyphs.
Originality/value
The insights from this study provide a theoretical foundation for future research on the psychological aspects of phishing in MIM apps. The study provides recommendations that software developers should consider when developing automated anti-phishing solutions for MIM apps and proposes a set of MIM phishing awareness training tips.
Details
Keywords
This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates…
Abstract
Purpose
This article surveys why libraries are vulnerable to social engineering attacks and how to manage risks of human-caused cyber threats on organizational level; investigates Estonian library staff awareness of information security and shares recommendations concerning focus areas that should be given more attention in the future.
Design/methodology/approach
The data used in this paper is based on an overview of relevant literature highlighting the theoretical points and giving the reasons why human factor is considered the weakest link in information security and cyber security and studying how to mitigate the related risks in the organisation. To perform the survey, a web questionnaire was designed which included 63 sentences and was developed based on the knowledge-attitude-behaviour (KAB) model supported by Kruger and Kearney and Human Aspects of Information Security Questionnaire (HAIS-Q) designed by Parsons et al.
Findings
The research results show that the information security awareness of library employees is at a good level; however, awareness in two focus areas needs special attention and should be improved. The output of this study is the mapping of seven focus areas of information security policy in libraries based on the HAIS-Q framework and the KAB model.
Originality/value
The cyber awareness of library employees has not been studied in the world using HAIS-Q and KAB model, and to the best of the authors’ knowledge, no research has been previously carried out in the Estonian library context into cyber security awareness.
Details
Keywords
Martin A. Kesselman and Wilson Esquivel
This study aims to provide insight of how conference sessions and poster sessions are relevant to libraries.
Abstract
Purpose
This study aims to provide insight of how conference sessions and poster sessions are relevant to libraries.
Design/methodology/approach
Recently attended IFLA and Internationale Funkaussteilung (IFA) and focused the conference report on generative artificial intelligence (AI).
Findings
Disappointed in the IFLA and IFA conferences and instead find that the email newsletter from Shelly Palmer is much better in keeping up with exponential growth in ChatGPT and other generative AI tools.
Research limitations/implications
This study may provide ideas for libraries to experiment with generative AI tools.
Originality Value
This study is an original report by the authors. All photos were taken by the authors except for a table from the email newsletter of Shelly Palmer, which was included by him from another source.
Details
Keywords
The chapter argues that implementing a professional writing program in universities can help students build expertise, confidence, and a strong professional portfolio that can…
Abstract
The chapter argues that implementing a professional writing program in universities can help students build expertise, confidence, and a strong professional portfolio that can advance their future careers to greater heights. This is achieved through a curriculum directly connected to the industry of the students' disciplines, expert instructors providing extensive feedback, and tips to transform ideas and knowledge into professional writing pieces. Additionally, the chapter highlights the importance of students gaining a comprehensive understanding of communication, being aware of the benefits of professional writing, and having hands-on experience through active engagement in the learning process to improve their craft. The chapter emphasizes that transformative learning implemented through strong writing and communication skills are highly valued by all industries seeking job candidates.
Finally, the chapter provides a strategy for improving students' employability by implementing a professional writing program in universities, which is based on the understanding of the changing career demands and the importance of communication and writing skills in all industries seeking job candidates.
Details
Keywords
Vanessa Honson, Thuy Vu, Tich Phuoc Tran and Walter Tejada Estay
Large class sizes are becoming the norm in higher education against concerns of dropping learning qualities. To maintain the standard of learning and add value, one of the common…
Abstract
Purpose
Large class sizes are becoming the norm in higher education against concerns of dropping learning qualities. To maintain the standard of learning and add value, one of the common strategies is for the course convenor to proactively monitor student engagement with learning activities against their assessment outcomes and intervene timely. Learning analytics has been increasingly adopted to provide these insights into student engagement and their performance. This case study explores how learning analytics can be used to meet the convenor’s requirements and help reduce administrative workload in a large health science class at the University of New South Wales.
Design/methodology/approach
This case-based study adopts an “action learning research approach” in assessing ways of using learning analytics for reducing workload in the educator’s own context and critically reflecting on experiences for improvements. This approach emphasises reflexive methodology, where the educator constantly assesses the context, implements an intervention and reflects on the process for in-time adjustments, improvements and future development.
Findings
The results highlighted ease for the teacher towards the early “flagging” of students who may not be active within the learning management system or who have performed poorly on assessment tasks. Coupled with the ability to send emails to the “flagged” students, this has led to a more personal approach while reducing the number of steps normally required. An unanticipated outcome was the potential for additional time saving through improving the scaffolding mechanisms if the learning analytics were customisable for individual courses.
Originality/value
The results provide further benefits for learning analytics to assist the educator in a growing blended learning environment. They also reveal the potential for learning analytics to be an effective adjunct towards promoting personal learning design.
Details