{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,14]],"date-time":"2025-05-14T12:01:00Z","timestamp":1747224060401,"version":"3.40.5"},"reference-count":54,"publisher":"IGI Global","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,10,1]]},"abstract":"<p>With the advancement of modern science and technology, data emerging from different fields are escalating gradually. Recently, with this huge amount of data, Big Data has become a source of immense opportunities for large scale organizations related to various business sectors as well as to information technology (IT) professionals. Hence, one of the biggest challenges of this context is the security of this big set of data in different ICT based organizations. The fundamental objective of this article is to explore how big data may create security challenges in email communication. As an outcome, this article first shows that big data analysis helps to understand the behavior or interest of email users, which in turn can help phishers to create the phishing sites or emails that result in IT security threat; second, the article finds that phishing e-mail generation based on the (email) users' behavior can break an organization's IT security; and finally, a framework was proposed that would help to enhance the security of email communication.<\/p>","DOI":"10.4018\/ijicthd.2018100101","type":"journal-article","created":{"date-parts":[[2018,9,28]],"date-time":"2018-09-28T18:53:15Z","timestamp":1538160795000},"page":"1-18","source":"Crossref","is-referenced-by-count":2,"title":["Security Threats for Big Data"],"prefix":"10.4018","volume":"10","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7189-4879","authenticated-orcid":true,"given":"Muhammad Nazrul","family":"Islam","sequence":"first","affiliation":[{"name":"Military Institute of Science and Technology (MIST), Bangladesh"}]},{"given":"Tarannum","family":"Zaki","sequence":"additional","affiliation":[{"name":"Military Institute of Science and Technology (MIST), Bangladesh"}]},{"given":"Md. Sami","family":"Uddin","sequence":"additional","affiliation":[{"name":"Military Institute of Science and Technology (MIST), Bangladesh"}]},{"given":"Md. Mahedi","family":"Hasan","sequence":"additional","affiliation":[{"name":"Military Institute of Science and Technology (MIST), Bangladesh"}]}],"member":"2432","reference":[{"key":"IJICTHD.2018100101-0","unstructured":"Accountingverse. (2016), Types of businesses and forms of business organizations. Retrieved from http:\/\/www.accountingverse.com\/accounting-basics\/types-of-businesses.html"},{"key":"IJICTHD.2018100101-1","unstructured":"Acevado, L. (2018). The advantages of email in business communication. Chron. Retrieved from http:\/\/smallbusiness.chron.com\/advantages-email-business-communication-122.html"},{"key":"IJICTHD.2018100101-2","unstructured":"Akalp, N. (2014). How to properly handle your company\u2019s meeting minutes, in Startup. Small Business Trends. Retrieved from http:\/\/smallbiztrends.com\/2014\/09\/what-are-meeting-minutes.html"},{"key":"IJICTHD.2018100101-3","doi-asserted-by":"crossref","unstructured":"Alam, S., Horspool, R. N., & Traore, I. (2014). MARD: A framework for metamorphic malware analysis and real-time detection. In 2014 proceedings of the international conference Advanced information networking and applications (AINA), Victoria, Canada. IEEE.","DOI":"10.1109\/AINA.2014.59"},{"key":"IJICTHD.2018100101-4","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2014.10.011"},{"key":"IJICTHD.2018100101-5","doi-asserted-by":"crossref","unstructured":"Arachchilage, N. A. G., & Cole, M. (2011). Design a mobile game for home computer users to prevent from \u201cphishing attacks.\u201d In 2011 proceedings of the international conference Information society (i-Society), London, UK (pp. 485-489). IEEE.","DOI":"10.1109\/i-Society18435.2011.5978543"},{"key":"IJICTHD.2018100101-6","doi-asserted-by":"publisher","DOI":"10.1016\/j.inffus.2015.08.005"},{"key":"IJICTHD.2018100101-7","unstructured":"CDW.com. (n.d.). Email security: Defending the enterprise. Retrieved from https:\/\/webobjects.cdw.com\/webobjects\/media\/pdf\/Solutions\/Security\/144921-Email-Security-Defending-the-Enterprise.pdf"},{"key":"IJICTHD.2018100101-8","unstructured":"Cocca, P. (2004). Email security threats (Rep. Version 1.4b Option 1). SANS Institute."},{"key":"IJICTHD.2018100101-9","unstructured":"Crowe, J. (2016). Phishing by the numbers: Must-know phishing statistics 2016. Barkly. Retrieved from https:\/\/blog.barkly.com\/phishing-statistics-2016"},{"key":"IJICTHD.2018100101-10","first-page":"517","article-title":"Unsupervised learning and clustering","author":"R. O.Duda","year":"2012","journal-title":"Pattern Classification"},{"key":"IJICTHD.2018100101-11","unstructured":"Edrm.net. (n.d.). New EDRM Enron email dataset. Retrieved from http:\/\/www.edrm.net\/resources\/data-sets\/edrm-enron-email-data-set"},{"key":"IJICTHD.2018100101-12","article-title":"Enron Corporation","author":"M.Frontain","year":"2010","journal-title":"Handbook of Texas Online"},{"key":"IJICTHD.2018100101-13","unstructured":"Gluck, S. (2016). Strategies in a company. Chron. Retrieved from http:\/\/smallbusiness.chron.com\/strategies-company-4648.html"},{"key":"IJICTHD.2018100101-14","unstructured":"Hackingaccount.com. (2016). How to hack Smtp email server. Retrieved from http:\/\/www.hackingaccount.com\/how-to-hack-smtp-email-server\/"},{"key":"IJICTHD.2018100101-15","article-title":"Exploring Enron: Visualizing ANLP results","author":"J.Heer","year":"2004","journal-title":"Course Project, InfoSys 290-2 \u2013 Applied Natural Language Processing"},{"key":"IJICTHD.2018100101-16","unstructured":"Heimerl, J. L. (2012), \u201cWhy phishing works and how to avoid becoming a victim\u201d, available at: http:\/\/www.securityweek.com\/why-phishing-works-and-how-avoid-becoming-victim"},{"key":"IJICTHD.2018100101-17","unstructured":"Inc.com. (2005). Corporate image. Retrieved from http:\/\/www.inc.com\/encyclopedia\/corporate-image.html"},{"key":"IJICTHD.2018100101-18","unstructured":"Kadi, A. I. E. (2011). Top ten tips to secure your email server. Vircom. Retrieved from https:\/\/www.vircom.com\/blog\/top-10-tips-to-secure-your-email-server\/"},{"key":"IJICTHD.2018100101-19","doi-asserted-by":"publisher","DOI":"10.1016\/j.eij.2015.11.004"},{"key":"IJICTHD.2018100101-20","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2013.032213.00009"},{"key":"IJICTHD.2018100101-21","doi-asserted-by":"crossref","unstructured":"Kumaraguru, P., Rhee, Y., Acquisti, A., Cranor, L. F., Hong, J., & Nunge, E. (2007). Protecting people from phishing: The design and evaluation of an embedded training email system. In Proceedings of the international conference human factors in computer systems (SIGCHI) 2007, San Jose, CA (pp. 905-914). NY: ACM.","DOI":"10.1145\/1240624.1240760"},{"key":"IJICTHD.2018100101-22","unstructured":"Landau, C. (2016). Planning for the future: Your exit strategy. Bplans Blog. Retrieved from http:\/\/articles.bplans.com\/types-of-exit-strategies\/"},{"key":"IJICTHD.2018100101-23","unstructured":"Leskovec, J. (n.d.). Enron email network. Retrieved from https:\/\/snap.stanford.edu\/data\/email-Enron.html"},{"key":"IJICTHD.2018100101-24","unstructured":"Mad-hacking.net. (2010). E-mail virtual-hosting system using Postfix and CourierIMAP. Retrieved from http:\/\/www.madhacking.net\/documentation\/linux\/applications\/mail\/mail-access.xml"},{"key":"IJICTHD.2018100101-25","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2015.12.055"},{"key":"IJICTHD.2018100101-26","unstructured":"McGraw-Hill Companies. (2001). Trip reports. Retrieved from http:\/\/www.mhhe.com\/mayfieldpub\/tsw\/rep-trip.htm"},{"key":"IJICTHD.2018100101-27","unstructured":"Mindfulsecurity.com. (2009). Why is information security important? Retrieved from http:\/\/mindfulsecurity.com\/2009\/07\/01\/why-is-information-security-important\/"},{"key":"IJICTHD.2018100101-28","doi-asserted-by":"publisher","DOI":"10.1103\/PhysRevE.69.066133"},{"key":"IJICTHD.2018100101-29","unstructured":"Nextstep4it.com. (2014). Mail server components - MTA, MDA & MUA. Retrieved from http:\/\/www.nextstep4it.com\/mail-server-components-mta-mda-mua\/"},{"key":"IJICTHD.2018100101-30","unstructured":"Oxford Dictionaries. (n.d.). Big data. Retrieved from http:\/\/www.oxforddictionaries.com\/definition\/english\/big-data"},{"key":"IJICTHD.2018100101-31","unstructured":"Palsetia, D., Patwary, M. M. A., Zhang, K., Lee, K., Moran, C., Xie, Y., ... & Choudhary, A. (2012, August). User-interest based community extraction in social networks. In The 6th SNA-KDD Workshop (Vol. 12)."},{"key":"IJICTHD.2018100101-32","unstructured":"PESTLEanalysis Contributor. (2015). Internal factors that may affect the business organization, in Business. Retrieved from http:\/\/pestleanalysis.com\/internal-factors-affect-business-organization\/"},{"key":"IJICTHD.2018100101-33","unstructured":"Posey, B. (n.d.). How do buffer overflow attack works. Techtarget. Retrieved from http:\/\/searchsecurity.techtarget.com\/news\/1048483\/Buffer-overflow-attacks-How-do-they-work"},{"key":"IJICTHD.2018100101-34","unstructured":"Project management questions. (2010). Internal vs external projects. Retrieved from http:\/\/www.projectmanagementquestions.com\/3934\/internal-vs-external-projects"},{"key":"IJICTHD.2018100101-35","unstructured":"Puryear, D. (2006). Stop email server attacks. Windowsitpro. Retrieved from http:\/\/windowsitpro.com\/exchange-server\/stop-email-server-attacks"},{"key":"IJICTHD.2018100101-36","doi-asserted-by":"crossref","unstructured":"Rahul, P.K. & GireeshKumar, T. (2014). A novel authentication framework for Hadoop. in 2014 proceedings of the international conference on Artificial intelligence and evolutionary algorithms in engineering systems (ICAEES), Kumaracoil, India (pp. 333-340). New Delhi, India: Springer.","DOI":"10.1007\/978-81-322-2126-5_37"},{"key":"IJICTHD.2018100101-37","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04117-4_23"},{"key":"IJICTHD.2018100101-38","doi-asserted-by":"crossref","unstructured":"Sahu, K.R. & Dubey, J. (2014). A survey on phishing attacks. International Journal of Computer Applications, 88(10), 0975-8887.","DOI":"10.5120\/15392-4007"},{"key":"IJICTHD.2018100101-39","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.020"},{"key":"IJICTHD.2018100101-40","unstructured":"SBA. (n.d.). Choose a business structure. Retrieved from https:\/\/www.sba.gov\/starting-business\/choose-your-business-structure\/partnership"},{"key":"IJICTHD.2018100101-41","unstructured":"Shcherbakova, T., Vergelis, M., & Demidova, N. (2015). Spam and phishing in Q3 2015. Retrieved from https:\/\/securelist.com\/analysis\/quarterly-spam-reports\/72724\/spam-and-phishing-in-q3-2015\/"},{"key":"IJICTHD.2018100101-42","doi-asserted-by":"crossref","unstructured":"Sheng, S., Holbrook, M., Kumaraguru, P., Cranor, L. F., & Downs, J. (2010). Who falls for phish?: A demographic analysis of phishing susceptibility and effectiveness of interventions. In 2010 Proceedings of the international conference human factors in computer systems (SIGCHI), Atlanta, GA (pp. 373-382). NY: ACM.","DOI":"10.1145\/1753326.1753383"},{"key":"IJICTHD.2018100101-43","first-page":"74","article-title":"Discovering important nodes through graph entropy the case of Enron email database","author":"J.Shetty","year":"2005","journal-title":"Link discovery \u2013 LinkKDD 2005 proceedings of the international workshop, Chicago, IL"},{"key":"IJICTHD.2018100101-44","unstructured":"StackExchange. (2016). Can my email account be accessed without the password? How secure is it? Retrieved from http:\/\/security.stackexchange.com\/questions\/14794\/can-my-emailaccount-be-accessed-without-the-password-how-secure-is-it"},{"key":"IJICTHD.2018100101-45","unstructured":"Symantec corporation. (n.d.). A look inside targeted Email attacks. Retrieved from https:\/\/www.symantec.com\/connect\/blogs\/look-inside-targeted-emailattacks"},{"key":"IJICTHD.2018100101-46","unstructured":"The Barking Seal. (2008). Every company needs to have a security program. Retrieved from https:\/\/www.appliedtrust.com\/resources\/security\/every-company-needs-to-have-a-security-program"},{"key":"IJICTHD.2018100101-47","unstructured":"Tran, M., & Khaw, S. (2006, July 6). Enron. The Guardian."},{"key":"IJICTHD.2018100101-48","unstructured":"Vermont.gov. (2016). Information security: Threats. Retrieved from http:\/\/itsecurity.vermont.gov\/threats"},{"key":"IJICTHD.2018100101-49","unstructured":"Wilson, T.V. (2005). How phishing works. How stuff works. Retrieved from http:\/\/computer.howstuffworks.com\/phishing.htm"},{"key":"IJICTHD.2018100101-50","doi-asserted-by":"crossref","unstructured":"Xu, K., Yao, D., P\u00e9rez-Qui\u00f1ones, M. A., Link, C., & Geller, S. E. (2014). Role-playing game for studying user behaviors in security: A case study on email secrecy. In 2014 proceedings of the international conference on Collaborative computing: Networking, applications and worksharing (CollaborateCom), Miami, FL (pp. 18\u201326). IEEE.","DOI":"10.4108\/icst.collaboratecom.2014.257242"},{"key":"IJICTHD.2018100101-51","doi-asserted-by":"crossref","unstructured":"Zaki, T., Uddin, M. S., Hasan, M. M., & Islam, M. N. (2017, July). Security threats for big data: A study on Enron e-mail dataset. In 2017 International Conference on Research and Innovation in Information Systems (ICRIIS) (pp. 1-6). IEEE.","DOI":"10.1109\/ICRIIS.2017.8002481"},{"key":"IJICTHD.2018100101-52","doi-asserted-by":"publisher","DOI":"10.1016\/j.jcss.2014.02.007"},{"key":"IJICTHD.2018100101-53","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2004.1401687"}],"container-title":["International Journal of Information Communication Technologies and Human Development"],"original-title":[],"language":"ng","link":[{"URL":"https:\/\/www.igi-global.com\/viewtitle.aspx?TitleId=215432","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,7]],"date-time":"2022-05-07T01:46:57Z","timestamp":1651888017000},"score":1,"resource":{"primary":{"URL":"https:\/\/services.igi-global.com\/resolvedoi\/resolve.aspx?doi=10.4018\/IJICTHD.2018100101"}},"subtitle":["An Empirical Study"],"short-title":[],"issued":{"date-parts":[[2018,10,1]]},"references-count":54,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,10]]}},"URL":"https:\/\/doi.org\/10.4018\/ijicthd.2018100101","relation":{},"ISSN":["1935-5661","1935-567X"],"issn-type":[{"type":"print","value":"1935-5661"},{"type":"electronic","value":"1935-567X"}],"subject":[],"published":{"date-parts":[[2018,10,1]]}}}