{"id":"https://openalex.org/W4367310968","doi":"https://doi.org/10.1145/3543873.3587303","title":"Creation and Analysis of a Corpus of Scam Emails Targeting Universities","display_name":"Creation and Analysis of a Corpus of Scam Emails Targeting Universities","publication_year":2023,"publication_date":"2023-04-28","ids":{"openalex":"https://openalex.org/W4367310968","doi":"https://doi.org/10.1145/3543873.3587303"},"language":"en","primary_location":{"id":"doi:10.1145/3543873.3587303","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3543873.3587303","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Companion Proceedings of the ACM Web Conference 2023","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"green","oa_url":"https://scholarsphere.psu.edu/resources/66a58a0f-da83-4eb4-a667-f53a634a3048/downloads/34835","any_repository_has_fulltext":true},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5032412373","display_name":"Grace Ciambrone","orcid":"https://orcid.org/0009-0006-8176-8821"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Grace Ciambrone","raw_affiliation_strings":["Human Language Technologies Lab, Pennsylvania State University, USA"],"affiliations":[{"raw_affiliation_string":"Human Language Technologies Lab, Pennsylvania State University, USA","institution_ids":["https://openalex.org/I130769515"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5056978982","display_name":"Shomir Wilson","orcid":"https://orcid.org/0000-0003-1235-3754"},"institutions":[{"id":"https://openalex.org/I130769515","display_name":"Pennsylvania State University","ror":"https://ror.org/04p491231","country_code":"US","type":"education","lineage":["https://openalex.org/I130769515"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Shomir Wilson","raw_affiliation_strings":["Human Language Technologies Lab, Pennsylvania State University, USA"],"affiliations":[{"raw_affiliation_string":"Human Language Technologies Lab, Pennsylvania State University, USA","institution_ids":["https://openalex.org/I130769515"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5032412373"],"corresponding_institution_ids":["https://openalex.org/I130769515"],"apc_list":null,"apc_paid":null,"fwci":1.3784,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.83998445,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"24","last_page":"27"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.998199999332428,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12488","display_name":"Mental Health via Writing","score":0.9970999956130981,"subfield":{"id":"https://openalex.org/subfields/3207","display_name":"Social Psychology"},"field":{"id":"https://openalex.org/fields/32","display_name":"Psychology"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}},{"id":"https://openalex.org/T11045","display_name":"Privacy, Security, and Data Protection","score":0.9883999824523926,"subfield":{"id":"https://openalex.org/subfields/3312","display_name":"Sociology and Political Science"},"field":{"id":"https://openalex.org/fields/33","display_name":"Social Sciences"},"domain":{"id":"https://openalex.org/domains/2","display_name":"Social Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/popularity","display_name":"Popularity","score":0.7604374885559082},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.6570032835006714},{"id":"https://openalex.org/keywords/boom","display_name":"Boom","score":0.6163440346717834},{"id":"https://openalex.org/keywords/latent-dirichlet-allocation","display_name":"Latent Dirichlet allocation","score":0.5506448745727539},{"id":"https://openalex.org/keywords/phishing","display_name":"Phishing","score":0.5064946413040161},{"id":"https://openalex.org/keywords/empirical-evidence","display_name":"Empirical evidence","score":0.47654634714126587},{"id":"https://openalex.org/keywords/world-wide-web","display_name":"World Wide Web","score":0.4255833327770233},{"id":"https://openalex.org/keywords/password","display_name":"Password","score":0.4186231195926666},{"id":"https://openalex.org/keywords/business","display_name":"Business","score":0.3960273265838623},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.38503432273864746},{"id":"https://openalex.org/keywords/topic-model","display_name":"Topic model","score":0.31632739305496216},{"id":"https://openalex.org/keywords/political-science","display_name":"Political science","score":0.2673928737640381},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.24534004926681519},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.21246188879013062},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.15285277366638184},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.10804042220115662}],"concepts":[{"id":"https://openalex.org/C2780586970","wikidata":"https://www.wikidata.org/wiki/Q1357284","display_name":"Popularity","level":2,"score":0.7604374885559082},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.6570032835006714},{"id":"https://openalex.org/C141441539","wikidata":"https://www.wikidata.org/wiki/Q1970908","display_name":"Boom","level":2,"score":0.6163440346717834},{"id":"https://openalex.org/C500882744","wikidata":"https://www.wikidata.org/wiki/Q269236","display_name":"Latent Dirichlet allocation","level":3,"score":0.5506448745727539},{"id":"https://openalex.org/C83860907","wikidata":"https://www.wikidata.org/wiki/Q135005","display_name":"Phishing","level":3,"score":0.5064946413040161},{"id":"https://openalex.org/C166052673","wikidata":"https://www.wikidata.org/wiki/Q83021","display_name":"Empirical evidence","level":2,"score":0.47654634714126587},{"id":"https://openalex.org/C136764020","wikidata":"https://www.wikidata.org/wiki/Q466","display_name":"World Wide Web","level":1,"score":0.4255833327770233},{"id":"https://openalex.org/C109297577","wikidata":"https://www.wikidata.org/wiki/Q161157","display_name":"Password","level":2,"score":0.4186231195926666},{"id":"https://openalex.org/C144133560","wikidata":"https://www.wikidata.org/wiki/Q4830453","display_name":"Business","level":0,"score":0.3960273265838623},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.38503432273864746},{"id":"https://openalex.org/C171686336","wikidata":"https://www.wikidata.org/wiki/Q3532085","display_name":"Topic model","level":2,"score":0.31632739305496216},{"id":"https://openalex.org/C17744445","wikidata":"https://www.wikidata.org/wiki/Q36442","display_name":"Political science","level":0,"score":0.2673928737640381},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.24534004926681519},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.21246188879013062},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.15285277366638184},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.10804042220115662},{"id":"https://openalex.org/C87717796","wikidata":"https://www.wikidata.org/wiki/Q146326","display_name":"Environmental engineering","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C199539241","wikidata":"https://www.wikidata.org/wiki/Q7748","display_name":"Law","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3543873.3587303","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3543873.3587303","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Companion Proceedings of the ACM Web Conference 2023","raw_type":"proceedings-article"},{"id":"pmh:oai:scholarsphere.psu.edu:253121a3-91cf-4c53-b9d5-2d3b41c2d919","is_oa":true,"landing_page_url":"https://scholarsphere.psu.edu/resources/253121a3-91cf-4c53-b9d5-2d3b41c2d919","pdf_url":"https://scholarsphere.psu.edu/resources/66a58a0f-da83-4eb4-a667-f53a634a3048/downloads/34835","source":{"id":"https://openalex.org/S4306401507","display_name":"ScholarSphere (Penn State Libraries)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I3130638595","host_organization_name":"Pangasinan State University","host_organization_lineage":["https://openalex.org/I3130638595"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Proceeding"}],"best_oa_location":{"id":"pmh:oai:scholarsphere.psu.edu:253121a3-91cf-4c53-b9d5-2d3b41c2d919","is_oa":true,"landing_page_url":"https://scholarsphere.psu.edu/resources/253121a3-91cf-4c53-b9d5-2d3b41c2d919","pdf_url":"https://scholarsphere.psu.edu/resources/66a58a0f-da83-4eb4-a667-f53a634a3048/downloads/34835","source":{"id":"https://openalex.org/S4306401507","display_name":"ScholarSphere (Penn State Libraries)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I3130638595","host_organization_name":"Pangasinan State University","host_organization_lineage":["https://openalex.org/I3130638595"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":null,"raw_type":"Conference Proceeding"},"sustainable_development_goals":[{"score":0.8299999833106995,"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4"}],"awards":[],"funders":[],"has_content":{"pdf":true,"grobid_xml":false},"content_urls":{"pdf":"https://content.openalex.org/works/W4367310968.pdf"},"referenced_works_count":8,"referenced_works":["https://openalex.org/W1561887350","https://openalex.org/W2520576807","https://openalex.org/W2597473562","https://openalex.org/W2944103016","https://openalex.org/W2966985053","https://openalex.org/W3093550423","https://openalex.org/W3184208314","https://openalex.org/W4250441411"],"related_works":["https://openalex.org/W2888805565","https://openalex.org/W4312773271","https://openalex.org/W4315588616","https://openalex.org/W2769501189","https://openalex.org/W2962686197","https://openalex.org/W2207653751","https://openalex.org/W4293863151","https://openalex.org/W3159709618","https://openalex.org/W2611137333","https://openalex.org/W3005513013"],"abstract_inverted_index":{"Email-based":[0],"scams":[1,173,191],"pose":[2],"a":[3,18,113,193],"threat":[4,70,210],"to":[5,67,103,142,152,207,220],"the":[6,21,39,49,91,131,144,209],"personally":[7],"identifiable":[8],"information":[9,107,123],"and":[10,41,53,76,86,105,146,159],"financial":[11],"safety":[12],"of":[13,34,43,56,115,126,148,211],"all":[14],"email":[15,45,109,212],"users.":[16,46,79],"Within":[17],"university":[19,153],"environment,":[20],"risks":[22],"are":[23,100],"potentially":[24],"greater:":[25],"traditional":[26],"students":[27,175],"(i.e.,":[28],"within":[29],"an":[30],"age":[31],"range":[32],"typical":[33],"college":[35],"students)":[36],"often":[37],"lack":[38],"experience":[40],"knowledge":[42],"older":[44],"By":[47],"understanding":[48],"topics,":[50],"temporal":[51],"trends,":[52],"other":[54],"patterns":[55],"scam":[57,119,149],"emails":[58,120,150],"targeting":[59,174],"universities,":[60],"these":[61,89],"institutions":[62],"can":[63],"be":[64],"better":[65],"equipped":[66],"reduce":[68],"this":[69,216],"by":[71],"improving":[72],"their":[73,78],"filtering":[74],"methods":[75],"educating":[77],"While":[80],"anecdotal":[81],"evidence":[82,93],"suggests":[83],"common":[84],"topics":[85,162],"trends":[87,147],"in":[88,130,168,181,187,195,200],"scams,":[90,110,213],"empirical":[92],"is":[94],"limited.":[95],"Observing":[96],"that":[97,161],"large":[98,128],"universities":[99,129],"uniquely":[101],"positioned":[102],"gather":[104],"share":[106],"about":[108],"we":[111,214],"built":[112],"corpus":[114,217],"5,155":[116],"English":[117],"language":[118],"scraped":[121],"from":[122],"security":[124],"websites":[125],"five":[127],"United":[132],"States.":[133],"We":[134,155],"use":[135],"Latent":[136],"Dirichlet":[137],"Allocation":[138],"(LDA)":[139],"topic":[140],"modelling":[141],"assess":[143],"landscape":[145],"sent":[151],"addresses.":[154],"examine":[156],"themes":[157],"chronologically":[158],"observe":[160],"vary":[163],"over":[164],"time,":[165],"indicating":[166],"changes":[167],"scammer":[169],"strategies.":[170],"For":[171],"example,":[172],"with":[176],"disabilities":[177],"have":[178,198],"steadily":[179],"risen":[180],"popularity":[182],"since":[183],"they":[184],"first":[185],"appeared":[186],"2015,":[188],"while":[189],"password":[190],"experienced":[192],"boom":[194],"2016":[196],"but":[197],"lessened":[199],"recent":[201],"years.":[202],"To":[203],"encourage":[204],"further":[205],"research":[206],"mitigate":[208],"release":[215],"for":[218],"others":[219],"study.":[221]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
