Figure 3: Phishing Example
This email appears to be from some com-pany domain, which is the social engi-neering approach of wanting to fake au-thenticity. The embedded message how-ever, talks about some order, which may be unknown to the target victim. There is scantly information except for the direc-tion link, which diverts the user into some other page, where he/she will possibly be, requested for the sensitive financial relat-ed information that will later be, used maliciously.
• The vagueness in the message, which normally is never, addressed by name di-rectly to the target. The message may purport from a reliable source like an or-ganization but may have scantly and in-accurate information that should pose mistrust.
• The target may not be having any associa-tion or dealings with the source of the in-formation.
• The communication in the message may have poor grammar/ or spelling. Odd phrases and typo errors are a common characteristic. The attackers are however, mastering the art of proficiency hence such mistakes are becoming less common. There are however, such careless mistakes being, made and such may be an im-portant lead to the user. Figure 4: Phishing Email with Spoofed Email Ad-dress; Poor Grammar; Luring Links and Inaccurate information
• The embedded communication is normal-ly so good for truth. It may have unrealis-tic threats or even an urgency sense.
• Commonly, the email address source may emulate the actual organization or faked source but will
<a href="http://socialwork.adelphi.edu/global/emailthispage.php" target="_blank"><img src="./Real Cases Andrea R. Case Study Part 1 Adelphi University_files/email.gif" alt="" width="178" height="23" border="0"></a><br>
1) Poor use of language or inappropriate language. This will cause the receiver to switch off. The sender must present in a clear understandable format without resorting to swearing.
This email was not well organised with overly long sentences and irrelevant information found in the email. From line 6 to 9, the sentence being overly long is tiring to read and should be split into 2 or 3 shorter sentences to put the point across to the recipients more effectively. In line 23, there is a spelling error of the word “lovely” instead of “likely”. From line 34 to 36, the content is unrelated to the purpose of the email and should be
Most people can’t go a single productive day without seeing an (Enter bank name here) message show up in their inboxes, now it’s become so prevalent seeing these messages that they aren’t even considered “Spam Mail” anymore. It’s just sent directly to your inbox along with a ton of other important emails that it should not be mixed with, which in fact, is a complete breach of our privacy.
There may be poor expression of messages, unclarified assumptions, and lack of planning, distrust and threat or information overload.
The government of Canada, Canadian Radio-television and Telecommunications Commission (CRTC). (2015, November 20). Undertakings 2015 – Compliance and Enforcement of Canada's Anti-Spam Legislation. Retrieved May 25, 2017, from
Sending a direct message, text message, or email can often be read incorrectly because the presence of the other person is simply not there. This causes the human mind to make assumptions about what the other person actually meant and can make this “conversation” askew very quickly.
Senders who overload receivers with a lot of information may make the receiver not to receive the whole message. ( Baccarani, & Bonfanti, 2015). For instance, if the sender is speaking fast the receiver will not be able to receive the correct message and will miss some information hence this is considered as an ineffective way of communication.
This electronic mail message serves as a follow-up of your inquiry to the Privacy and Diversity Office (PDO), U.S. Customs and Border Protection (CBP).
Sam Dillon’s “ What Corporate America Can't Build: A Sentence” is a New York Times article talking about the inefficient written communication in the workplace, and how schools/classes are appearing to teach employees the correct way to email. In the article there is numerous examples of poorly worded emails coming from regular employees to the top chiefs themselves.The emails examples in the article
However this type of communication also has its disadvantages as there is no physical proof on what has been discussed.
Phishing: these are emails sent to people by fraudsters with the malicious intention of obtaining your credit or debit card number, expiration date and the three digits security code, to later use it to commit
Information gathered from various nationwide newspapers have indicated that some employees of companies that handle personal consumer information such as banks and utility companies, among others, have emailed confidential loan files to unauthorized third parties. This inappropriate employee use of email can result in identity persecution of the customer who have entrusted them with their personal data.
The second email contained a video that played automatically upon opening the email. This was clever to have the video play when the email was opened, because the number of people who watched the video would have been significantly lower. The third email contained an audio recording in which Oxfam’s executive director made a plea for the cause. The first email also contained plain text explaining what the situation was and how the reader could help deliver clean water to those in the camps. The second one did not contain plain text, but the third one did and explained aid items that could be provided with the given monetary amount. By including a brief synopsis in the first and explaining that they needed clean water this was a clear way to show the reader how they needed help. The second email did not need plain text because it was a video and could get the message across that way. The third email provided more details because by that point they hoped that by showing specific amounts more people would be willing to pay that amount and know what they were providing.