2009
DOI: 10.2190/tw.39.1.c
|View full text |Cite
|
Sign up to set email alerts
|

ARS Dictaminis Perverted: The Personal Solicitation E-Mail as a Genre

Abstract: Phishing e-mails deceive individuals into giving out personal information which may then be utilized for identity theft. One particular type, the Personal Solicitation E-mail (PSE) mimics personal letters-modern perversions of ars dictaminis (the classical art of letter writing). In this article, I determine and discuss 19 appeals common to the PSE. These appeals were established first by conducting generative rhetorical analysis, then by volunteer coding, on 170 e-mails collected over a 12-month period. After… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
10
0

Year Published

2013
2013
2022
2022

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 5 publications
(4 reference statements)
0
10
0
Order By: Relevance
“…The RFLP type, based on the University of Minnesota expanded nomenclature [19], which is an extension of the Wesley nomenclature [20], was determined from the sequence data. The 3 most common wild-type virus RFLP types (1-3-4, 1-18-4, and 1-8-2) were selected for further analysis.…”
Section: Methodsmentioning
confidence: 99%
“…The RFLP type, based on the University of Minnesota expanded nomenclature [19], which is an extension of the Wesley nomenclature [20], was determined from the sequence data. The 3 most common wild-type virus RFLP types (1-3-4, 1-18-4, and 1-8-2) were selected for further analysis.…”
Section: Methodsmentioning
confidence: 99%
“…Due to the low number of advance-fee e-mails on the MillerSmiles site, only 15 e-mails were gathered, with the other 85 e-mails coming from the researchers' inboxes. The selection criteria and process for the previously mentioned 85 e-mails were consistent with that of prior studies (Blommaert & Omoniyi, 2006;Ross, 2009;Huang & Brockman, 2011). The criteria were the e-mails had to be written in English despite grammatical errors or typos found in the text; they had to appear to be full letters, showing an e-mail address, subject line, salutation, body text, and closing; and they had to reflect the sender's control of funds, power of monetary distribution, and knowledge of scheme procedures.…”
Section: Methodsmentioning
confidence: 73%
“…These techniques were authority, urgency, tradition, fear/threat, attraction/excitement, pity, politeness, and formality. Definitions of these persuasions are based on Capaldi (1971), Huang and Brockman (2011), and Ross (2009). After coding the e-mails, the collected data were entered into Microsoft Excel and then transferred into SPSS.…”
Section: Measuring Triggers and Persuasionsmentioning
confidence: 99%
See 1 more Smart Citation
“…It is often desirable to find, given a variable order, an empirical estimate about the space complexity of the OBDD for a given function. Or, one may require a subset of satisfying assignments for further use in verification [13, 121 or test generation [14]. For example, in a circuit, if a significant fraction of the functionality (total number of minterms) can be determined, it can suffice for generating satisfying vectors for exciting and propagating faults in a circuit.…”
Section: Introductionmentioning
confidence: 99%