WSEAS Transactions on Computer Research


Print ISSN: 1991-8755
E-ISSN: 2415-1521

Volume 6, 2018

Notice: As of 2014 and for the forthcoming years, the publication frequency/periodicity of WSEAS Journals is adapted to the 'continuously updated' model. What this means is that instead of being separated into issues, new papers will be added on a continuous basis, allowing a more regular flow and shorter publication times. The papers will appear in reverse order, therefore the most recent one will be on top.



Email Fraud: Question of Motive

AUTHORS: Janko Žufić, Marko Pogarčić, Ivan Pogarčić

Download as PDF

ABSTRACT: Mail, regardless of the form or manner of implementation, is the way of communication. Traditional forms or modern use of ICT are standardized forms of human communication. This does not mean, of course, the exclusion of (non)human communication e.g. machine - machine. The assumption of standards as an accepted form of communication realization often becomes necessary due to all aspects of this communication. Communication takes place in a communication channel, which implies a sender-receiver relationship. The channel and the primary sender-receiver axis may be, and most often are, of an altering character, which means that the roles change during the realization of the communication. In doing so, the form of realization is not so important. Since e-mail is a form of communication, predominantly human, it also implies certain forms of human behavior. However, it does seem that these features are not standardized, and even less implied in some cases. All deviations from the established moral and ethical norms can be seen as deformations in behavior during email communication. These norms should be a reflection of the cultural, ethical and moral framework of a certain, specific community, and respect for them should be understood and guaranteed. Accordingly, participants of such communication can find themselves in different situations, so they behave differently. The paper presents a summary review of various fraud attempts via email, which is owned by one of the authors. The data were collected in a database for a period of seven years. This paper is a continuation of two previous investigations that treated the time of email fraud (day of the week and hour of the day). This paper is a continuation of analysis on a broader database with the subject of analysis being a motive of fraud. Motive articulation can serve for further action that can eliminate negative aspects of email.

KEYWORDS: - eMail, fraud, attempt, communication, ACTE, GDPR

REFERENCES:

[1] Braut, Marino; Pogarčić, Marko; Pogarčić, Ivan. Electronic mail as possibility of inapt communication // 35th Internetional convention on information and communication tehnology, electronics and microelectronics (Mipro 2012), Computers in education (CE) : proceedings / ČičinŠain, Marina ; Uroda, Ivan ; Turčić Prstačić, Ivana ; Sluganović, Ivanka (ur.). Zagreb : MIPRO, 2012. 1444-1449

[2] Pogarčić, Ivan; Panev, Ida; Pogarčić, Marko; Cultural Inheritance as Prerequisite to eLearning // Zbornik 14. mednarodne multikonference Informacijska družba (IS 2011). Zvezek A = Proceedings of the 14th International Multiconference Information Society (IS 2011). Vol. A Ljubljana : Institut Jožef Stefan, 2011. 411-415

[3] Ainsworth, Heather L.; Eaton, Sarah Elaine; Formal, Non-Formal and Informal Learning in the Science, Onate Press and Eaton International Consulting (EIC) Inc, Editor: Jacquelyn Clydesdale, ISBN: 978- 0-9733594-5-9

[4] Hrvatska enciklopedija: Leksikografski zavod Miroslav Krleža, Zagreb, ISBN 9536036290

[5] Shannon Claude E., Weaver Warren (The Mathematical Theory of Communication. University of Illinois Press, ISBN 0-252- 72548-41963).

[6] Republika Hrvatska,Official Gazette 73/08, 90/11, 133/12, 80/13, 71/14, hereinafter ECA

[7] Electronic Communications Act, Official Gazette, No. 73/2008 Ministry Of The Sea, Transport And Infrastructure, Republic Of Croatia

[8] Vitor R. Carvalho : Modeling Intention in Email: Speech Acts, Information Leaks and Recommendation Models (Studies in Computational Intelligence), Springer, 2011, ISBN-13: 978-3642199554

WSEAS Transactions on Computer Research, ISSN / E-ISSN: 1991-8755 / 2415-1521, Volume 6, 2018, Art. #9, pp. 60-70


Copyright © 2018 Author(s) retain the copyright of this article. This article is published under the terms of the Creative Commons Attribution License 4.0

Bulletin Board

Currently:

The editorial board is accepting papers.


WSEAS Main Site