Overview
- Describes how scams manipulate human principles of persuasion
- Suggests tools for measuring messaging credibility, campaign yields, and clustering and locations of scammers
- Provides methods for identifying and stopping enterprise scams, such as the surging Business Email Compromise scam
- Includes supplementary material: sn.pub/extras
Access this book
Tax calculation will be finalised at checkout
Other ways to access
About this book
This book describes trends in email scams and offers tools and techniques
to identify such trends. It also describes automated countermeasures
based on an understanding of the type of persuasive methods used by
scammers. It reviews both consumer-facing scams and enterprise scams,
describing in-depth case studies relating to Craigslist scams and Business
Email Compromise Scams. This book provides a good starting point for
practitioners, decision makers and researchers in that it includes
alternatives and complementary tools to the currently deployed email
security tools, with a focus on understanding the metrics of scams.
Both professionals working in security and advanced-level students
interested in privacy or applications of computer science will find this booka useful reference.
Similar content being viewed by others
Keywords
Table of contents (12 chapters)
-
Identifying Trends
-
Why Do People Fall for Scams?
-
Filtering Technology
-
Understanding the Problem Starts with Measuring It
-
Conclusion
Reviews
Editors and Affiliations
About the editor
Bibliographic Information
Book Title: Understanding Social Engineering Based Scams
Editors: Markus Jakobsson
DOI: https://doi.org/10.1007/978-1-4939-6457-4
Publisher: Springer New York, NY
eBook Packages: Computer Science, Computer Science (R0)
Copyright Information: Springer Science+Business Media New York 2016
Hardcover ISBN: 978-1-4939-6455-0Published: 14 September 2016
Softcover ISBN: 978-1-4939-8206-6Published: 09 June 2018
eBook ISBN: 978-1-4939-6457-4Published: 13 September 2016
Edition Number: 1
Number of Pages: XVI, 130
Number of Illustrations: 33 b/w illustrations, 18 illustrations in colour
Topics: Systems and Data Security, Information Systems Applications (incl. Internet), Cryptology