Understanding Nigerian e-mail scams: A computational content analysis approach
暂无分享,去创建一个
Yegin Genc | Hasan T. Arslan | Li-Chiou Chen | Harpreet Kour | Li-Chiou Chen | Y. Genc | Harpreet Kour
[1] Arjun P. Ghatule,et al. Crop Cultivation Intelligent Decision Support Systems Using Fuzzy Logic , 2020 .
[2] Jalindar Gandal,et al. A Study Of Advance Fee Fraud Detection Using Data Mining And Machine Learning Technique , 2020 .
[3] E. Creamer. Striving for Methodological Integrity in Mixed Methods Research: The Difference Between Mixed Methods and Mixed‐Up Methods , 2018, Journal of Engineering Education.
[4] T. Rich. You can trust me: a multimethod analysis of the Nigerian email scam , 2018 .
[5] Monica T. Whitty,et al. Do You Love Me? Psychological Characteristics of Romance Scam Victims , 2017, Cyberpsychology Behav. Soc. Netw..
[6] E. Creamer. A Primer About Mixed Methods Research in an Educational Context , 2016 .
[7] Karina Korpela,et al. Improving Cyber Security Awareness and Training Programs with Data Analytics , 2015, Inf. Secur. J. A Glob. Perspect..
[8] Patrice Bellot,et al. Accurate and effective latent concept modeling for ad hoc information retrieval , 2014, Document Numérique.
[9] J. Froyd,et al. Systematic Literature Reviews in Engineering Education and Other Developing Interdisciplinary Fields , 2014 .
[10] Dan Siroker,et al. A/B Testing: The Most Powerful Way to Turn Clicks Into Customers , 2013 .
[11] Aurélien Francillon,et al. Inside the scam jungle: a closer look at 419 scam email operations , 2013, 2013 IEEE Security and Privacy Workshops.
[12] Cormac Herley,et al. Why do Nigerian Scammers Say They are From Nigeria? , 2012, WEIS.
[13] David B. Dunson,et al. Probabilistic topic models , 2011, KDD '11 Tutorials.
[14] Jiwoo Park,et al. ‘I’m Sister Maria. Please help me’: A lexical study of 4-1-9 international advance fee fraud email communications , 2012 .
[15] Hosseini Ali,et al. A Critical Analysis of Financial Fraud Spam in English in Terms of Persuasive Strategies: Personalization, Presupposition, and Lexical Choices , 2011 .
[16] O. Tade,et al. Social Organization of Internet Fraud among University Undergraduates in Nigeria , 2011 .
[17] K. Hornik,et al. topicmodels: An R Package for Fitting Topic Models , 2011 .
[18] Jude Oboh,et al. Nigerian Advance Fee Fraud in Transnational Perspective , 2010 .
[19] Chong Wang,et al. Reading Tea Leaves: How Humans Interpret Topic Models , 2009, NIPS.
[20] Sheng Tang,et al. A density-based method for adaptive LDA model selection , 2009, Neurocomputing.
[21] Andrew D Smith. NIGERIAN SCAM E-MAILS AND THE CHARMS OF CAPITAL , 2009 .
[22] Derek G. Ross. ARS Dictaminis Perverted: The Personal Solicitation E-Mail as a Genre , 2009 .
[23] Joshua Chang,et al. An analysis of advance fee fraud on the internet , 2008 .
[24] N. Denzin,et al. The SAGE handbook of qualitative research , 2005 .
[25] Wendy L. Cukier,et al. Genre, Narrative and the "Nigerian Letter" in Electronic Mail , 2007, 2007 40th Annual Hawaii International Conference on System Sciences (HICSS'07).
[26] Harvey Glickman,et al. The Nigerian “419” Advance Fee Scams: Prank or Peril? , 2005 .
[27] Mark Steyvers,et al. Finding scientific topics , 2004, Proceedings of the National Academy of Sciences of the United States of America.
[28] Michael I. Jordan,et al. Latent Dirichlet Allocation , 2001, J. Mach. Learn. Res..
[29] Valerie J. Caracelli,et al. Toward a Conceptual Framework for Mixed-Method Evaluation Designs , 1989 .
[30] Steve Mansfield-Devine,et al. Bad behaviour: exploiting human weaknesses , 2017 .
[31] Ron Kohavi,et al. Online Controlled Experiments and A/B Testing , 2017, Encyclopedia of Machine Learning and Data Mining.
[32] Kenneth Benoit,et al. quanteda: Quantitative Analysis of Textual Data (R package) , 2015 .
[33] W. Underwood. What Can Topic models of PMLA Teach Us About the History of Literary Scholarship , 2012 .
[34] A. Adogame. The 419 Code as Business Unusual: Youth and the Unfolding of the Advance Fee Fraud Online Discourse , 2009 .
[35] D. C. Graves,et al. A Qualitative Analysis of Advance Fee Fraud E-mail Schemes , 2007 .
[36] Edoardo M. Airoldi,et al. Technologies to Defeat Fraudulent Schemes Related to Email Requests , 2005, AAAI Spring Symposium: AI Technologies for Homeland Security.
[37] M. D. C. Ruiz de Villa,et al. [Repeated measures analysis]. , 2004, Medicina clinica.
[38] J. C. Oates. Do You Love Me , 2004 .
[39] I CASTILLO ODENA,et al. [Social organization]. , 1956, Prensa medica argentina.
[40] Bilge Mutlu,et al. Qualitative Analysis , 1928, Nature.
[41] S. Niwattanakul,et al. Using of Jaccard Coefficient for Keywords Similarity , 2022 .