• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 78
  • 29
  • 21
  • 15
  • 11
  • 9
  • 8
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 208
  • 83
  • 51
  • 42
  • 32
  • 31
  • 30
  • 29
  • 27
  • 26
  • 25
  • 22
  • 22
  • 21
  • 20
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
131

Truth or Dare? : An exploration of Opinion Spam’s affect on dimensions of Brand Trust

Collinder, Eric, Södergren, Oskar January 2017 (has links)
Consumer generated product reviews is a tool growing in popularity among e-retailers. On account of its many benefits and as the internet is continuously taking over as a market place this may come as no surprise. However, deception has found its way in with the intention to further extend these benefits and as reviews keep growing as a go-to tool for the practitioners – so does the phenomenon of brand generated opinion spam. Since legal repercussions of opinion spamming is found in theory to be largely absent, the authors sought for other facets of a brand that could potentially be influenced by this phenomenon. Aiming straight for the heart of a brand, namely brand trust. Taking a foothold in theory on brand trust as a psychological variable, the present thesis aims to explore how revealed opinion spam activities can affect brand trust. Through a qualitative and embedded case study, this thesis thereby aims to explore how brand trust is affected by opinion spam activities unveiled within brands, and ultimately contribute with a deeper understanding of this affect. Data was collected through two focus groups consisting of 14 participants in total, and as found – being engaged in opinion spam activities is a risky business. Brand generated opinion spam is found to influence the antecedents of brand trust negatively. Further research is advised to examine the relationship between opinion spam and brand trust extending beyond an exploratory stage. As antecedents of brand trust can be derived from an array of different constructs, and since brand trust is not uniformly defined in literature - varying sets of findings can surface depending on how brand trust is conceptualized. Brand generated opinion spam itself and its supposed affects ought to be examined further as this contemporary phenomenon is certainly on the horizon for most retailers operating online.   "Dare to be true: nothing can need a lie; A fault which needs it most, grows two thereby." – George Herbert - 1633 / Konsumentgenererade produktrecensioner är ett verktyg som växer i popularitet bland internetbaserade återförsäljare. På grund av dess många fördelar och eftersom internet kontinuerligt växer som marknadsplats är detta kanske ingen överraskning. Dock, har bedrägeri letat sig in i syfte att ytterligare utöka dessa fördelar allteftersom kundrecensioner fortsätter att växa som ett verktyg bland utövare, så kommer opinion spam – fenomenet att växa i takt. Då de juridiska påföljderna av opinion-spamming lyser med sin frånvaro i den vetenskapliga litteraturen, sökte författarna till denna avhandling efter andra aspekter av ett varumärke som potentiellt kan påverkas av detta fenomen. Med siktet inställt på hjärtat av ett varumärke, nämligen varumärkesförtroendet. Avhandlingen tar avstamp i teorier om varumärkesförtroende som en psykologisk variabel i syfte att undersöka hur ett avslöjade opinion spam-aktiviteter kan påverka just varumärkesförtroende. Genom en kvalitativ och en ”embedded” fallstudie syftar denna avhandling därmed till att undersöka hur varumärkesförtroende är påverkat av opinion-spammande aktiviteter som avslöjats inom varumärken, och bidra med en djupare förståelse av denna påverkan. Datan samlades in genom två fokusgrupper bestående av totalt 14 deltagare, och som påvisat är opinion-spamming en riskabel verksamhet. Varumärkesgenererad opinion-spamming har visat sig påverka förtroendet för varumärken negativt. Ytterligare forskning rekommenderas att undersöka förhållandet mellan opinion spam och varumärkesförtroende bortom ett förberedande stadium. Då förtroende för varumärken kan härledas från en rad olika konceptualiseringar, och eftersom varumärkesförtroende som en vetenskaplig term inte är enhetligt definierat i litteraturen – kan varierande uppsättningar av resultat genereras beroende på hur varumärkesförtroende som koncept är uppbyggt. Varumärkesproducerad opinion-spam i sig, och dess påverkan på förtroendet till varumärken borde undersökas ytterligare, detta eftersom det som ett kontemporärt fenomen ligger i riktlinjen för de flesta återförsäljare som är verksamma på internet.
132

Automatické rozpoznávání adres elektronické pošty na webových stránkách. / Automatic recognition of e-mail addresses on the websites

Moravcová, Iva January 2011 (has links)
This work is focusing on reasons for protection of email addresses against automatic recognition, which aims to find other recipients of spam. Includes description of how this protection can be increased and these methods are evaluated in terms of level of protection and conservation addresses accessibility of websites. The part of this work is to determine the current status of the website addresses of public universities in terms of utilized methods of record. Status on these sites is investigated using application, which in addition to finding addresses, finding the method of writing on a selected sample sites. The various methods used to write addresses are evaluated on the results of the application and other recommendations for improvement are discussed.
133

System and Methods for Detecting Unwanted Voice Calls

Kolan, Prakash 12 1900 (has links)
Voice over IP (VoIP) is a key enabling technology for the migration of circuit-switched PSTN architectures to packet-based IP networks. However, this migration is successful only if the present problems in IP networks are addressed before deploying VoIP infrastructure on a large scale. One of the important issues that the present VoIP networks face is the problem of unwanted calls commonly referred to as SPIT (spam over Internet telephony). Mostly, these SPIT calls are from unknown callers who broadcast unwanted calls. There may be unwanted calls from legitimate and known people too. In this case, the unwantedness depends on social proximity of the communicating parties. For detecting these unwanted calls, I propose a framework that analyzes incoming calls for unwanted behavior. The framework includes a VoIP spam detector (VSD) that analyzes incoming VoIP calls for spam behavior using trust and reputation techniques. The framework also includes a nuisance detector (ND) that proactively infers the nuisance (or reluctance of the end user) to receive incoming calls. This inference is based on past mutual behavior between the calling and the called party (i.e., caller and callee), the callee's presence (mood or state of mind) and tolerance in receiving voice calls from the caller, and the social closeness between the caller and the callee. The VSD and ND learn the behavior of callers over time and estimate the possibility of the call to be unwanted based on predetermined thresholds configured by the callee (or the filter administrators). These threshold values have to be automatically updated for integrating dynamic behavioral changes of the communicating parties. For updating these threshold values, I propose an automatic calibration mechanism using receiver operating characteristics curves (ROC). The VSD and ND use this mechanism for dynamically updating thresholds for optimizing their accuracy of detection. In addition to unwanted calls to the callees in a VoIP network, there can be unwanted traffic coming into a VoIP network that attempts to compromise VoIP network devices. Intelligent hackers can create malicious VoIP traffic for disrupting network activities. Hence, there is a need to frequently monitor the risk levels of critical network infrastructure. Towards realizing this objective, I describe a network level risk management mechanism that prioritizes resources in a VoIP network. The prioritization scheme involves an adaptive re-computation model of risk levels using attack graphs and Bayesian inference techniques. All the above techniques collectively account for a domain-level VoIP security solution.
134

Predikce povahy spamových krátkých textů textovým klasifikátorem / Machine Learning Text Classifier for Short Texts Category Prediction

Drápela, Karel January 2018 (has links)
This thesis deals with categorization of short spam texts from SMS messages. First part summarizes current methods for text classification and~it's followed by description of several commonly used classifiers. In following chapters test data analysis, program implementation and results are described. The program is able to predict text categories based on predefined set of classes and also estimate classification accuracy on training data. For the two category types, that I designed, classifier reached accuracy of 82% and 92% . Both preprocessing and feature selection had a positive impact on resulting accuracy. It is possible to improve this accuracy further by removing portion of samples, which are difficult to classify. With 80\% recall it is possible to increase accuracy by 8-10%.
135

Analýza zdrojů nevyžádané elektronické pošty / Analysis of email spam sources

Caha, Tomáš January 2019 (has links)
The first part of this thesis deals with an approach of designing and developing of application for IP geolocation using various geolocation databases. Methods of geographical location of network devices and amount of available data provided by chosen commercial and freely accessible geolocation databases are presented. The data are summarized with focus on methods of obtaining information about IP addresses from various databases. In the paper there are also presented ways used to develop the Python application and its parts, which can be easily reused in other programs. The command line program was created to demonstrate that all parts of the developed application work properly. The whole application is freely accesible under the conditions of the MIT license, published on GitHub (https://github.com/tomas-net/ip2geotools/) and in the Python package index PyPi. The second part of this thesis deals with the description of cyberthreats and the use of developed application to mass geolocation of IP addresses that are listed in chosen freely accessible lists as sources of email spam or cyberattacks. Geographical analysis of cyberattacks sources shows countries of origin. Results of analysis are presented in graphs and maps.
136

Antispamové filtry / Antispam filters

František, Jiří January 2011 (has links)
The thesis is involves the desing antispam solution for operating system GNU/Linux. At the first is going through theory of transport, receive mail message and problematic of spam. The content of thesis is realize mail server with mail transfer agent Postfix. Amavis was used as antispam solution, which make an interface between Postfix and content checkers. This was created by SpamAssassin and ClavAV. Main goal was created aplication for setting of antispam filters. The result is possibility of setting a creating filters with black and white lists. Messages in quarantine ca
137

Model e-reklamy ve zvoleném segmentu elektronického obchodu / Model e-advertising Segment of the Selected e-commerce

Smrž, Marek January 2010 (has links)
Master’s thesis describes plus evaluates small firm that the deal with production plus sale ceramic performances. Work is divided on several part, in which survey especially on analysis e - commerce that the firm employs plus on his inadequacies, largely in the area e- advertising. Feature plus scope of employment is suggest mock - up e- advertising, that shall in connection with his costs viable.
138

Proxy servery v síti Internet / Proxy servers in Internet

Henek, Jan January 2016 (has links)
The goal of this paper is to analyze the representation of proxy servers in cyber attacks conducted by Internet. For this purpose I used method which compares tested IP address with database of open proxy servers. I assembled a list of IP address taken from the blacklist of cyber attacks committed in 2015. Then I checked this list with the created program Proxy checker and compared them with a database of open proxy servers. By measurement I demonstrate the inefficacy of this method for reverse detection of proxy servers in the IP list of past attacks.
139

E-Mail für Dich - Lust oder Frust?

Richter, Frank, Sontag, Ralph 20 June 2003 (has links)
Genervte Nutzer, verunsicherte Admins, panische Mailserver: Die täglich zu Tausenden eintreffenden unerwünschten Mails - Spam - gefährden die Mailinfrastruktur.Der Vortrag wird Vor- und Nachsorgemöglichkeiten für geplagte Nutzer und Administratoren erläutern. Techniken der Spamerkennung werden vorgestellt.
140

Bayes kontra Spam

Sontag, Ralph 02 July 2003 (has links)
Workshop Mensch-Computer-Vernetzung Derzeitige Spam-Erkennung weist eklatante Mängel auf. Die Zunahme des Spam-Aufkommens erfordet neue Ansätze, um der Plage Herr zu werden. Der Vortrag erläutert, wie mit Hilfe des Satzes von Bayes die Spam-Erkennung deutlich verbessert werden kann.

Page generated in 0.0169 seconds