emails from other types of emails. Main hubs and
clusters of words indicate that there are patterns and
pre-defined goals in the way phishing emails have
been crafted for the past twelve years. These need to
be part of a larger sample test which can integrate
both legitimate and scam emails to confirm, automate
and improve existing phishing detection tools.
ACKNOWLEDGEMENTS
This work is supported by TagUBig - Taming Your
Big Data (IF/00693/2015) from Researcher FCT
Program funded by National Funds through FCT
(Fundação para a Ciência e Tecnologia). Soraia Teles
is individually supported by the Portuguese
Foundation for Science and Technology (FCT;
D/BD/135496/2018); PhD Program in Clinical and
Health Services Research (PDICSS).
REFERENCES
Analyze my writing, 2020. Available at: http://www.
analyzemywriting.com/. Accessed in January 2020.
Balakrishnan, R., Parekh, R., 2014. Learning to predict
subject-line opens for large-scale email marketing. In
2014 IEEE International Conference on Big Data (Big
Data), Washington, DC, 2014, pp. 579-584.
Barabási AL., 2002. Linked: The New Science of
Networks. Cambridge, MA: Perseus Publishing.
Bick, E., 2000. The Parsing System" Palavras": Automatic
Grammatical Analysis of Portuguese. In a Constraint
Grammar Framework: Aarhus Universitetsforlag.
Available at: https://visl.sdu.dk/.
Bond, S., 2020. Gunning Fog Index. Available at:
http://gunning-fog-index.com/.
Chiluwa, I., Ovia, E., Uba, E., 2019. Attention Beneficiary!.
Handbook of Research on Deception, Fake News and
Misinformation Online, 421-438.
Drieger, P., 2013. Semantic Network Analysis as a Method
for Visual Text Analytics. Procedia - Social and
Behavioral Sciences. Volume 79, Pages 4-17.
Ferreira A., Chilro R., 2017. What to Phish in a Subject? In:
Brenner M. et al. (eds) Financial Cryptography and Data
Security. FC 2017. Lecture Notes in Computer Science,
vol 10323. Springer, Cham.
Ferreira, A., 2018. Why Ransomware Needs A Human
Touch. In 2018 International Carnahan Conference on
Security Technology (ICCST), 2018, pp. 1-5.
Ferreira, A., Vieira-Marques, P., 2018. Phishing Through
Time: A Ten-Year Story based on Abstracts. Proceedings
of the 4th ICISSP, pages 225-232.
Ferreira, A., Teles, S., 2019. Persuasion: How phishing
emails can influence users and bypass security measures.
International Journal of Human-Computer Studies.
Volume 125, Pages 19-31.
Goldfarb, A., Prince, J., 2008. Internet adoption and usage
patterns are different: Implications for the digital divide.
Inf Econ Policy. 20(1):2–15.
Gosset, S., 2019. The top cybersecurity threats of 2010. Built
In. Available at:
https://builtin.com/cybersecurity/cybersecurity-threats.
Accessed: November 2019.
Gunning, R., 1952. The Technique of Clear Writing.
McGraw-Hill International Book Co., NY, USA.
Hong, J., 2012. The state of phishing attacks. Commun. ACM,
55 (1), 74–81.
IntenCheck, 2018. Available at: https://www.
intencheck.com/how-it-works/. Accessed Jan 2020.
Kell, N., 2019. What will cybersecurity look like in 2020.
Techradar.pro. Available at: https://www.tech
radar.com/news/what-will-cyber-security-look-like-in-
2020. Accessed: November 2019.
Markošová, M., 2008. Network model of human language.
Physica A: Statistical Mechanics and its Applications.
387: 661-666.
Online Utility, 2020. OnlineUtility.org. Available at:
https://www.online-utility.org/text/analyzer.jsp.
Accessed January 2020.
RF, 2020. Readability Formulas. Available at:
https://readabilityformulas.com/free-readability-
formula-tests.php.
Sarmento, L., Maia, B., & Santos, D., 2004. The Corpógrafo-
a Web-based environment for corpora research.
Proceedings of the 4th International Conference on
Language Resources and Evaluation (LREC'2004).
Sentiment Analysis, 2020. Python NLTK 2.0.4 tet
classification. Available at: https://text-processing.
com/demo/sentiment/. Accessed Jan 2020.
Scott, M. (2018). WordSmith tools version 7. Liverpool:
Lexical Analysis Software, 122.
Solé, RV., Corominas -Murtra, B., Valverde, S., Steels, L.,
2010. Language networks: Their structure, function and
evolution. Complexity. 15(6): 20-26.
Tan, A., 2019. Top APAC security predictions for 2020.
ComputerWeekly. Available at: https://www.computer
weekly.com/news/252474724/Top-APAC-security-
predictions-for-2020. Accessed: Nov 2019.
UE, 2002. UsingEnglish.com. Available at: https://www.
usingenglish.com/resources/text-statistics/. Accessed Jan
2020.
Vishwanath, A., Herath, T., Chen, R., Wang, J., Rao, H.,
2011. Why do people get phished? Testing individual
differences in phishing vulnerability within an integrated,
information processing model. Decis. Support Syst. 51, 3
(June 2011), 576-586.
von Landesberger, T., Kuijper, A., Schreck, T., Kohlhammer,
J., van Wijk, J., Fekete, J.-D., & Fellner, D., 2010. Visual
analysis of large graphs. In Proceedings of
EuroGraphics: State of the Art Report.
Watts DJ., 2003. Six Degrees: The Science of a Connected
Age. New York: WW Norton & Company.
Watts, DJ., Strogatz, S. H., 1998. Collective dynamics of
small-world networks. Nature. 393.
WebFx, 2020. Readability Test Tool. Available at:
https://www.webfx.com/tools/read-able/