The results of the open card sorting study showed a large amount of inter-participant variation making the research team wonder how the consequences of security attacks were comprehended by the participants.
In this paper, we crafted a set of phishing and legitimate emails with similar indicators in order to investigate whether these cues are captured or disregarded by email embeddings, i. e., vectorizations.
This paper conducts an experiment through which several mainstream and conventional machine learning algorithms are developed to study the prediction of emotions perceived from sounds.
We compare the performance through various machine learning models employing word vectors obtained using both tf-idf and Doc2Vec models.
Cryptography and Security Human-Computer Interaction
Online reviews play an integral part for success or failure of businesses.
Customers represent their satisfactions of consuming products by sharing their experiences through the utilization of online reviews.