A systematic review of randomized controlled trials was conducted to evaluate the effectiveness of eHealth interventions for the prevention and treatment of overweight and obesity in adults. Eight ...databases were searched for studies published in English from 1995 to 17 September 2014. Eighty‐four studies were included, with 183 intervention arms, of which 76% (n = 139) included an eHealth component. Sixty‐one studies had the primary aim of weight loss, 10 weight loss maintenance, eight weight gain prevention, and five weight loss and maintenance. eHealth interventions were predominantly delivered using the Internet, but also email, text messages, monitoring devices, mobile applications, computer programs, podcasts and personal digital assistants. Forty percent (n = 55) of interventions used more than one type of technology, and 43.2% (n = 60) were delivered solely using eHealth technologies. Meta‐analyses demonstrated significantly greater weight loss (kg) in eHealth weight loss interventions compared with control (MD −2.70 −3.33,−2.08, P < 0.001) or minimal interventions (MD −1.40 −1.98,−0.82, P < 0.001), and in eHealth weight loss interventions with extra components or technologies (MD 1.46 0.80, 2.13, P < 0.001) compared with standard eHealth programmes. The findings support the use of eHealth interventions as a treatment option for obesity, but there is insufficient evidence for the effectiveness of eHealth interventions for weight loss maintenance or weight gain prevention.
Purpose - The purpose of this paper is to explore the effect of e-mail interruptions on tasks and to explore the concept of e-mail addiction within the workplace.Design methodology approach - Data ...were collected from a large car rental company in the UK. The first collection method involved observing the effects of simulated e-mail interruptions on seven employees by measuring the interrupt handling time, the interrupt recovery time, and the additional time required to complete the task given the number of interruptions. The second part of the study involved a questionnaire sent to 100 employees to capture addictive characteristics in employees' e-mail communication behaviour.Findings - E-mail interruptions have a negative time impact upon employees and show that both interrupt handling and recovery time exist. A typical task takes one third longer than undertaking a task with no e-mail interruptions. The questionnaire data show clinical characteristics classify 12 per cent of e-mail addicts, and behavioural characteristics classify 15 per cent of e-mail addicts in the workplace.Research limitations implications - Observation was constrained by the timeframes and availability of the participating organisation. Measuring an employee receiving e-mail interruptions over a greater time period might achieve a more comprehensive understanding of the impact.Originality value - The small study is the first to determine the impact of e-mail interruptions on work tasks by observing employees, and to present a method to determine e-mail addiction. By understanding these factors, organisations can manage workflow strategies to improve employee efficiency and effectiveness.
The Internet emerged as a powerful infrastructure for the worldwide communication and interaction of people. Some unethical uses of this technology (for instance spam or viruses) generated challenges ...in the development of mechanisms to guarantee an affordable and secure experience concerning its usage. This study deals with the massive delivery of unwanted content or advertising campaigns without the accordance of target users (also known as spam). Currently, words (tokens) are selected by using feature selection schemes; they are then used to create feature vectors for training different Machine Learning (ML) approaches. This study introduces a new feature selection method able to take advantage of a semantic ontology to group words into topics and use them to build feature vectors.
To this end, we have compared the performance of nine well-known ML approaches in conjunction with (i) Information Gain, the most popular feature selection method in the spam-filtering domain and (ii) Latent Dirichlet Allocation, a generative statistical model that allows sets of observations to be explained by unobserved groups that describe why some parts of the data are similar, and (iii) our semantic-based feature selection proposal. Results have shown the suitability and additional benefits of topic-driven methods to develop and deploy high-performance spam filters.
•Use semantic meaning of e-mail words to provide successful inputs for ML classifiers.•Review of existing methodologies to select the best features from data sources.•Introduce of a novel semantic-based feature selection strategy.•Performance comparison against other well-known feature selection methods.
Over the past 30 years, the nature of communication at work has changed. Leaders in particular rely increasingly on e-mail to communicate with their superiors and subordinates. However, researchers ...and practitioners alike suggest that people frequently report feeling overloaded by the e-mail demands they experience at work. In the current study, we develop a self-regulatory framework that articulates how leaders' day-to-day e-mail demands relate to a perceived lack of goal progress, which has a negative impact on their subsequent enactment of routine (i.e., initiating structure) and exemplary (i.e., transformational) leadership behaviors. We further theorize how two cross-level moderators-centrality of e-mail to one's job and trait self-control-impact these relations. In an experience sampling study of 48 managers across 10 consecutive workdays, our results illustrate that e-mail demands are associated with a lack of perceived goal progress, to which leaders respond by reducing their initiating structure and transformational behaviors. The relation of e-mail demands with leader goal progress was strongest when e-mail was perceived as less central to performing one's job, and the relations of low goal progress with leadership behaviors were strongest for leaders low in trait self-control.
What makes phishing emails hard for humans to detect? Singh, Kuldeep; Aggarwal, Palvi; Rajivan, Prashanth ...
Proceedings of the Human Factors and Ergonomics Society Annual Meeting,
12/2020, Letnik:
64, Številka:
1
Journal Article
Recenzirano
This research investigates the email features that make a phishing email difficult to detect by humans. We use an existing data set of phishing and ham emails and expand that data set by collecting ...annotations of the features that make the emails phishing. Using the new, annotated data set, we perform cluster analyses to identify the categories of emails and their attributes. We then analyze the accuracy of detection in each category. Our results indicate that the similarity of the features of phishing emails to benign emails, play a critical role in the accuracy of detection. The phishing emails that are most similar to ham emails had the lowest accuracy while the phishing emails that were most dissimilar to the ham emails were detected more accurately. Regression models reveal the contribution of phishing email’s features to phishing detection accuracy. We discuss the implications of these results to theory and practice.
This paper investigated individual differences in attentional strategies during the non-driving-related tasks in Level 2 automated driving. Ward’s method was used to cluster participants into ...different groups according to the characteristics of their sequential off-road glances in the email-sorting task: duration, frequency, variance, and intensity. The clustering results showed two types of sequential off-road glance patterns in distracted Level 2 driving: infrequent long glances vs. frequent short glances. However, participants in the two groups showed similar workload, driving engagement, and email-sorting accuracy. They also reported similar feelings of safety and feedback about the Level 2 vehicle automation. The glance differences demonstrated the complexity of attentional strategies among individual drivers, which is a necessary aspect of driver state to be monitored in automated driving.
Adoption of Email Anti-Spoofing Schemes: A Large Scale Analysis Maroofi, Sourena; Korczynski, Maciej; Holzel, Arnold ...
IEEE eTransactions on network and service management,
2021-Sept., 2021-9-00, 20210901, 2021-09, Letnik:
18, Številka:
3
Journal Article
Recenzirano
Sending forged emails by taking advantage of domain spoofing is a common technique used by attackers. The lack of appropriate email anti-spoofing schemes or their misconfiguration may lead to ...successful phishing attacks or spam dissemination. In this paper, we evaluate the extent of the SPF and DMARC deployment in two large-scale campaigns measuring their global adoption rate with a scan of 236 million domains and high-profile domains of 139 countries. We propose a new algorithm for identifying defensively registered domains and enumerating the domains with misconfigured SPF rules by emulating the SPF check_function. We define for the first time new threat models involving subdomain spoofing and present a methodology for preventing domain spoofing, a combination of good practices for managing SPF and DMARC records and analyzing DNS logs. Our measurement results show that a large part of the domains do not correctly configure the SPF and DMARC rules, which enables attackers to successfully deliver forged emails to user inboxes. Finally, we report on remediation and its effects by presenting the results of notifications sent to CSIRTs responsible for affected domains in two separate campaigns.
Motivated by a real life problem of sharing social network data that contain sensitive personal information, we propose a novel approach to release and analyse synthetic graphs to protect privacy of ...individual relationships captured by the social network while maintaining the validity of statistical results. A case-study using a version of the Enron e-mail corpus data set demonstrates the application and usefulness of the proposed techniques in solving the challenging problem of maintaining privacy and supporting open access to network data to ensure reproducibility of existing studies and discovering new scientific insights that can be obtained by analysing such data. We use a simple yet effective randomized response mechanism to generate synthetic networks under ϵ-edge differential privacy and then use likelihood-based inference for missing data and Markov chain Monte Carlo techniques to fit exponential family random-graph models to the generated synthetic networks.
While it is often suggested that individuals' pro-environmental behaviors may be linked with their subjective wellbeing, the strength and direction (e.g. positive or negative) of this relation is ...unclear. Because pro-environmental behaviors impact peoples' everyday lives, understanding this relation is critical for promoting long-term environmental solutions. Using a series of meta-analyses, we systematically reviewed the literature on the association between individuals' pro-environmental behaviors and their subjective wellbeing. We hypothesized that the relation between pro-environmental behavior and subjective wellbeing would be positive and strongest among types of behaviors (e.g. sustainable purchase decisions) and indicators of subjective wellbeing which more clearly reflect personal meaning (e.g. warm glow). We sourced studies via PsychINFO, PsychARTICLES, GreenFile, SocINDEX, Web of Science, and Scopus, as well as professional email lists, direct contact with authors who publish in this domain, data from the authorship team, and the European Social Survey (2016). We included studies with quantitative data on the relation between individuals' pro-environmental behavior and their subjective wellbeing, ultimately identifying 78 studies (73 published, 5 unpublished) for synthesis. Across multiple indicators of pro-environmental behaviors and subjective wellbeing, we found a significant, positive relation (overall r = .243), and this relation did not meaningfully differ across study characteristics (e.g. sample, design). As predicted, the relation was particularly strong for indicators of pro-environmental behavior and subjective wellbeing which clearly reflect meaning, such as sustainable purchase decisions (r = .291) and for warm glow (r = .408). We found a robust, positive relation between people's pro-environmental behaviors and subjective wellbeing, and initial evidence that this relation may be stronger the more clearly behaviors and indicators of subjective wellbeing reflect meaning. Our results indicate that program and policy-makers can seek opportunities to design 'win-win' sustainability programs which could positively impact both people and the environment.
While research has linked social media phishing susceptibility to individual Facebook habits, the underlying process by which habits lead to victimization and the extent to which it explains ...e‐mail‐based phishing remains unclear. The study compared the antecedents and consequences of e‐mail habits and cognitive processing on the outcome of a simulated phishing attack. E‐mail habits were rooted in stable personality dimensions of conscientiousness and emotional stability, while cognitive processing was premised on contextual information adequacy considerations. Interestingly, habits and processing jointly influenced the outcome of the attack: Systematic processing attenuated phishing susceptibility by a small factor; the cumulative effects of heuristic processing and e‐mail habits, however, caused a fourfold increase in likely victimization, overwhelming any advantage from detailed processing.