Affiliation:
1. University of Southern California
Abstract
ABSTRACT
Accountants and auditing firms are frequent phishing targets because of the proximity to organizational resources. Since phishing typically is done using emails, text analysis is used to explore differences between phishing e gmails and other emails. By analyzing and comparing a database of phishing messages to a database of the Enron emails, we find that the phishing data is statistically significantly different across a large number of univariate text variable categories. Further, we generate a model of phishing as “power,” based on independent variables of friend (who they pretend to be), achievement (of their goal), (to take your) money, and (typically done at) work. These variables are used as a basis to estimate power in both the phishing and non-phishing messages, where we find differences on the signs of the independent variables. Finally, using text analysis, we examine the ability of neural network models to differentiate between phishing emails and Enron emails.
Publisher
American Accounting Association
Subject
Management of Technology and Innovation,Information Systems and Management,Human-Computer Interaction,Accounting,Information Systems,Software,Management Information Systems
Reference72 articles.
1. Accenture. 2017. Cost of cyber crime study. Available at: https://www.accenture.com/t20170926T072837Z__w__/us-en/_acnmedia/PDF-61/Accenture-2017-CostCyberCrimeStudy.pdf
2. PhishAri: Automatic realtime phishing detection on twitter;Aggarwal,2012
3. Beware of phishing scams;AICPA,2017
4. Allison, P.
2012. When can you safely ignore multicollinearity? Available at: https://statisticalhorizons.com/multicollinearity
5. Detecting phishing attacks: A comprehensive approach;Basnet,2011
Cited by
13 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献