{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T18:08:30Z","timestamp":1754158110568,"version":"3.41.2"},"reference-count":12,"publisher":"Emerald","issue":"5","license":[{"start":{"date-parts":[[2004,10,1]],"date-time":"2004-10-01T00:00:00Z","timestamp":1096588800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.emerald.com\/insight\/site-policies"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004,10,1]]},"abstract":"<jats:p>An e\u2010mail virus is an e\u2010mail that can infect other programs by modifying them to include a replication of itself. When the infected e\u2010mails are opened, the e\u2010mail virus spreads itself to others. Today's society has seen a dramatic increase in the use of e\u2010mails. As a result, organizations must take even more precautions to guard against the introduction of e\u2010mail viruses into their systems. This paper discusses how organizations can protect their e\u2010mails from the intrusion of e\u2010mail virus and how to develop their own e\u2010mail virus security plan.<\/jats:p>","DOI":"10.1108\/14684520410564280","type":"journal-article","created":{"date-parts":[[2005,5,18]],"date-time":"2005-05-18T05:27:53Z","timestamp":1116394073000},"page":"356-366","source":"Crossref","is-referenced-by-count":6,"title":["E\u2010mail viruses: how organizations can protect their e\u2010mails"],"prefix":"10.1108","volume":"28","author":[{"given":"Dong\u2010Her","family":"Shih","sequence":"first","affiliation":[]},{"given":"Hsiu\u2010Sen","family":"Chiang","sequence":"additional","affiliation":[]}],"member":"140","reference":[{"unstructured":"Bridwell, L. (2002), ICSA Labs\u2019 Eighth Annual Virus Prevalence Survey 2002, available at: www.icsalabs.com\/2002avpsurvey\/index.shtml.","key":"key2022030819575661900_b1"},{"doi-asserted-by":"crossref","unstructured":"Coulthard, A. and Vuori, T.A. (2002), \u201cComputer viruses: a quantitative analysis\u201d, Logistics Information Management, Vol. 15 No. 5\/6, pp. 400\u20109.","key":"key2022030819575661900_b2","DOI":"10.1108\/09576050210447091"},{"doi-asserted-by":"crossref","unstructured":"Garber, L. (1999), \u201cMelissa virus creates a new type of threat\u201d, Computer, Vol. 32 No. 6, pp. 16\u201019.","key":"key2022030819575661900_b3","DOI":"10.1109\/MC.1999.769438"},{"doi-asserted-by":"crossref","unstructured":"Gorman, G.E. and Corbitt, B.J. (2002), \u201cCore competencies in information management education\u201d, New Library World, Vol. 103 No. 11, pp. 436\u201045.","key":"key2022030819575661900_b4","DOI":"10.1108\/03074800210452969"},{"doi-asserted-by":"crossref","unstructured":"Hawkins, S.M., Yen, D.C. and Chou, D.C. (2000), \u201cDisaster recovery planning: a strategy for data security\u201d, Information Management & Computer Security, Vol. 8 No. 5, pp. 222\u201030.","key":"key2022030819575661900_b5","DOI":"10.1108\/09685220010353150"},{"doi-asserted-by":"crossref","unstructured":"Lee, Y.C. (2003), \u201cWill self\u2010regulation work in protecting online privacy?\u201d, Online Information Review, Vol. 27 No. 4, pp. 276\u201083.","key":"key2022030819575661900_b6","DOI":"10.1108\/14684520310489069"},{"doi-asserted-by":"crossref","unstructured":"McGraw, G. and Morrisett, G. (2000), \u201cAttacking malicious code: report to the Infosec Research Council\u201d, IEEE Software, Vol. 17 No. 5, pp. 33\u201041.","key":"key2022030819575661900_b7","DOI":"10.1109\/52.877857"},{"doi-asserted-by":"crossref","unstructured":"Okamoto, T. and Ishida, Y. (2002), \u201cAn analysis of a model of computer viruses spreading via electronic mail\u201d, Systems and Computers in Japan, Vol. 33 No. 14, pp. 81\u201090.","key":"key2022030819575661900_b8","DOI":"10.1002\/scj.1178"},{"doi-asserted-by":"crossref","unstructured":"Savage, M. (2002), \u201cBusiness continuity planning\u201d, Work Study, Vol. 51 No. 5, pp. 254\u201061.","key":"key2022030819575661900_b9","DOI":"10.1108\/00438020210437277"},{"unstructured":"Shih, D.H. and Chiang, H.S. (2003), \u201cBayesian classification method for detection of new malicious e\u2010mails\u201d, International Conference on Pacific Rim Management 13th Annual Meeting, July 31\u2010August 2, Seattle,  WA, pp. 904\u20109.","key":"key2022030819575661900_b10"},{"unstructured":"White, S.R., Swimmer, M., Pring, E.J., Arnold, W.C., Chess, D.M. and Morar, J.F. (1999), \u201cAnatomy of a commercial\u2010grade immune system\u201d, available at: www.av.ibm.com\/ScientificPapers\/White\/Anatomy\/anatomy.html.","key":"key2022030819575661900_b11"},{"doi-asserted-by":"crossref","unstructured":"Yag\u00fce, M.I., Ma\u00f1a, A., L\u00f3pez, J., Pimentel, E. and Troya, J.M. (2003), \u201cA secure solution for commercial digital libraries\u201d, Online Information Review, Vol. 27 No. 3, pp. 147\u201059.","key":"key2022030819575661900_b12","DOI":"10.1108\/14684520310481418"}],"container-title":["Online Information Review"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.emeraldinsight.com\/doi\/full-xml\/10.1108\/14684520410564280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520410564280\/full\/xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/www.emerald.com\/insight\/content\/doi\/10.1108\/14684520410564280\/full\/html","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,25]],"date-time":"2025-07-25T00:40:15Z","timestamp":1753404015000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.emerald.com\/oir\/article\/28\/5\/356-366\/302140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,1]]},"references-count":12,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2004,10,1]]}},"alternative-id":["10.1108\/14684520410564280"],"URL":"https:\/\/doi.org\/10.1108\/14684520410564280","relation":{},"ISSN":["1468-4527"],"issn-type":[{"type":"print","value":"1468-4527"}],"subject":[],"published":{"date-parts":[[2004,10,1]]}}}