Background: Computer users often need to distinguish between good and bad instances of software and e-mail messages without the aid of experts. This decision process is further complicated as the perception of spam and spyware varies between individuals. As a consequence, users can benefit from using a decision support system to make informed decisions concerning whether an instance is good or bad. Objective: This thesis investigates approaches for estimating the utility of e-mail and software. These approaches can be used in a personalized decision support system. The research investigates the performance and accuracy of the approaches. Method: The scope of the research is limited to the legal grey- zone of software and e-mail messages. Ex...
The email communication system is threatened by unsolicited commercial email aka spam. In response, ...
Privacy-invasive software, loosely labeled spyware, is an increasingly common problem for today’s co...
Abstract: Email spam or junk e-mail is one of the major problems of the today's usage of Intern...
One of the security challenges of e-Government is to offer a fluid dialogue to citizens that guarant...
As computers are increasingly more integrated into our daily lives we become more dependent on softw...
Abstract. Many classification techniques used for identifying spam emails, treat spam filtering as a...
Privacy-invasive software is an increasingly common problem for today's computer users, one to ...
Background. E-mail phishing is a type of social engineering where the threat actor sends e-mails wit...
Many users have such experience that after downloading or buying a software product, it does not wor...
Abstract: This paper uses a cases study about a technical decision to review to computerethics decis...
Today we are primarily using computers for communication. We communicate via computers as profession...
With the increasing emergence of electronic communication on the internet, spam, which is defined as...
Spam messages in the form of e-mail is a growing problem in today's businesses. It is a problem that...
We examine the problem of determining a user's value for his/her private information. Web businesses...
There is a growing realisation from the Australian government that new models of health care will ne...
The email communication system is threatened by unsolicited commercial email aka spam. In response, ...
Privacy-invasive software, loosely labeled spyware, is an increasingly common problem for today’s co...
Abstract: Email spam or junk e-mail is one of the major problems of the today's usage of Intern...
One of the security challenges of e-Government is to offer a fluid dialogue to citizens that guarant...
As computers are increasingly more integrated into our daily lives we become more dependent on softw...
Abstract. Many classification techniques used for identifying spam emails, treat spam filtering as a...
Privacy-invasive software is an increasingly common problem for today's computer users, one to ...
Background. E-mail phishing is a type of social engineering where the threat actor sends e-mails wit...
Many users have such experience that after downloading or buying a software product, it does not wor...
Abstract: This paper uses a cases study about a technical decision to review to computerethics decis...
Today we are primarily using computers for communication. We communicate via computers as profession...
With the increasing emergence of electronic communication on the internet, spam, which is defined as...
Spam messages in the form of e-mail is a growing problem in today's businesses. It is a problem that...
We examine the problem of determining a user's value for his/her private information. Web businesses...
There is a growing realisation from the Australian government that new models of health care will ne...
The email communication system is threatened by unsolicited commercial email aka spam. In response, ...
Privacy-invasive software, loosely labeled spyware, is an increasingly common problem for today’s co...
Abstract: Email spam or junk e-mail is one of the major problems of the today's usage of Intern...