Analysis of ergonomics and security of email software
Article Sidebar
Open full text
Issue Vol. 36 (2025)
-
Classification of cyber attacks in IoMT networks using deep learning: a comparative study
Asif Rahman Rumee232-242
-
Assessing the memorability and usability of the Gutenberg Editor Interface in the Drupal CMS
Paweł Iwon, Marek Miłosz243-250
-
Analysis of the directions of development of digital aesthetics on the example of Windows interfaces
Maksymilian Cegiełka, Marek Miłosz251-257
-
Analysis of the effectiveness of the portal integrating various tender platforms
Adrian Krzysztof Jedynak, Marek Miłosz258-261
-
Review and assessment of the quality of applications related to diet man-agement using the Mobile App Rating Scale (MARS)
Kamil Lewartowski, Marek Miłosz262-265
-
Comparison of the accessibility of websites of voivodeship cities in Poland
Dawid Drzewiecki, Marek Miłosz266-270
-
Study of factors affecting the performance of web applications on mobile devices
Jarosław Królikowski, Marek Miłosz271-277
-
The impact of changing graphic settings on performance in selected video games
Łukasz Stanik, Marek Miłosz278-283
-
Analysis of the use of Angular and Svelte products in mobile web applications
Michał Nurzyński, Marcin Badurowicz284-288
-
Comparative analysis of web and mobile interfaces of popular sales portals
Kacper Dudek, Marek Miłosz289-295
-
Comperative analasys of JavaScript runtime environments
Konrad Kalman, Marek Miłosz296-302
-
Image classification using PyTorch and Core ML
Jakub Ślusarski, Arkadiusz Szumny, Maria Skublewska-Paszkowska303-311
-
Analysis of ergonomics and security of email software
Marceli Szarapajew, Tomasz Szymczyk312-319
-
Comparative analysis of Cypress and Playwright frameworks in end-to-end testing for applications based on Angular
Przemysław Gosik, Marek Miłosz320-327
-
Password managers: a critical review of security, usability, and innovative designs
Hussein Abdulkhaleq Saleh328-335
-
Benchmarking the performance of Python web frameworks
Bartłomiej Bednarz, Marek Miłosz336-341
-
Comparison of chosen image classification methods on Android
Mariusz Zapalski, Patryk Żabczyński, Paweł Powroźnik342-349
-
Performance evaluation of REST and GraphQL API aproaches in data retrieval scenarios using NestJS
Kacper Stępień, Maria Skublewska-Paszkowska350-356
-
Comparative analysis of cross-platform application development tools in terms of operating system integration
Rafał Milichiewicz, Marcin Badurowicz357-364
-
Comparative analysis of selected mobile applications for language learning
Jakub Furtak, Emilia Drabik365-370
Main Article Content
DOI
Authors
marceli.szarapajew@pollub.edu.pl
Abstract
Within the scope of the article, two studies were carried out on the most frequently used email programs. In the first study, parameters were measured regarding the speed and ergonomics of these programs, and the intuitiveness of their interfaces was compared. In the second study, the performance of email security mechanisms, the possibility to change their settings, and the security vulnerabilities detected in these programs in the past were verified. The results of the study clearly indicate the weaknesses of the security mechanisms studied, and also allowed to verify which email programs are the easiest and most intuitive to use.
Keywords:
References
[1] Y. Fang, G. Mogos, Detecting attacks on e-mail, Indonesian Journal of Electrical Engineering and Computer Science 33(3) (2024) 1576–1588, https://doi.org/10.11591/ijeecs.v33.i3.pp1576-1588. DOI: https://doi.org/10.11591/ijeecs.v33.i3.pp1576-1588
[2] How Many Emails Are Sent Per Day? (2023–2027), https://www.oberlo.com/statistics/how-many-emails-are-sent-per-day, [10.06.2024].
[3] A Comprehensive Guide to Email Threats and How to Protect Yourself, https://abusix.com/blog/a-comprehensive-guide-to-email-threats-and-how-to-protect-yourself, [26.03.2025].
[4] What Is Email Security? – Protect Against Email Threats, https://www.cisco.com/site/us/en/learn/topics/security/what-is-email-security.html, [26.03.2025].
[5] M. Eichelberger, I.B. Brubaker, “How do I send an Email?” : Technology Challenges for First-Year Students in the College Library, Library Hi Tech 33(3) (2015) 329–339, https://doi.org/10.1108/LHT-03-2015-0027. DOI: https://doi.org/10.1108/LHT-03-2015-0027
[6] B. Wentz, J. Lazar, Usability Evaluation of Email Applications by Blind Users, Journal of Usability Studies 6(2) (2011) 75–89, https://doi.org/10.5555/2010380.2010384.
[7] L. Pullagura, D.M. Rao, N.V. Kumari, R. K. Lanke, S.K. Gowda Katta, R. Chiwariro, A Study of Suspicious E-Mail Detection Techniques, In 2024 2nd International Conference on Intelligent Data Communication Technologies and Internet of Things (IDCIoT) (2024) 1120–1126, https://doi.org/10.1109/IDCIoT59759.2024.10467633. DOI: https://doi.org/10.1109/IDCIoT59759.2024.10467633
[8] T.P. Fowdur, L. Veerasoo, An email application with active spoof monitoring and control, In 2016 International Conference on Computer Communication and Informatics (ICCCI) (2016) 1–6, https://doi.org/10.1109/ICCCI.2016.7480002. DOI: https://doi.org/10.1109/ICCCI.2016.7480002
[9] T.P. Fowdur, D. Mooloo, An SSL-Based Client-Oriented Anti-Spoofing Email Application, Proceedings of IEEE Africon (2013) 1–5, https://doi.org/10.1109/AFRCON.2013.6757757. DOI: https://doi.org/10.1109/AFRCON.2013.6757757
[10] E. Altulaihan, A. Alismail, M.M. Hafizur Rahman, A.A. Ibrahim, Email Security Issues, Tools, and Techniques Used in Investigation, Sustainability (Switzerland) 15(13) (2023) 10612, https://doi.org/10.3390/su151310612. DOI: https://doi.org/10.3390/su151310612
[11] L. Burita, P. Matoulek, K. Halouzka, P. Kozak, Analysis of phishing emails, AIMS Electronics and Electrical Engineering 5(1) (2021) 93–116, https://doi.org/10.3934/electreng.2021006. DOI: https://doi.org/10.3934/electreng.2021006
[12] M.A. Alqahtani, Cybersecurity Awareness Based on Software and E-mail Security with Statistical Analysis, Computational Intelligence and Neuroscience 2022 (2022) 1–12, https://doi.org/10.1155/2022/6775980. DOI: https://doi.org/10.1155/2022/6775980
[13] Specyfikacja laptopa Lenovo Legion 5 15ACH6H, https://psref.lenovo.com/syspool/Sys/PDF/Legion/Lenovo_Legion_5_15ACH6H/Lenovo_Legion_5_15ACH6H_Spec.pdf, [07.10.2024].
[14] Mousotron – strona główna programu, https://www.blacksunsoftware.com/mousotron.html, [10.10.2024].
[15] Aplikacja Mouse Metrics Distance & Click w Mac App Store, https://apps.apple.com/us/app/mouse-metrics-distance-click/id6737716371, [27.12.2024].
[16] Aplikacja OneplusClock w Google Play, https://play.google.com/store/apps/details?id=com.oneplus.deskclock&pli=1, [21.03.2025].
[17] Opis i wzór na medianę – Zintegrowana Platforma Edukacyjna, https://zpe.gov.pl/a/przeczytaj/D141WaQJ8, [15.04.2025].
[18] S.K. Card, T.P. Moran, A. Newell, The keystroke-level model for user performance time with interactive systems, Communications of the ACM 23(7) (1980) 396–410, https://doi.org/10.1145/358886.358895. DOI: https://doi.org/10.1145/358886.358895
[19] D. Kieras, Using the Keystroke-Level Model to Estimate Execution Times, University of Michigan, Ann Arbor, 2001.
[20] A. Dampc, Keystroke level model, https://medium.com/archiwum-ux-watch/keystroke-level-model-5616238c9789, [12.06.2024].
[21] How Google Collects Data About You and the Internet, https://www.pingdom.com/blog/how-google-collects-data-about-you-and-the-internet/, [11.01.2025].
[22] Baza rekordów CVE – strona główna, https://cve.mitre.org/, [13.01.2025].
[23] Baza rekordów CVE – wyniki wyszukiwania dla hasła „thunderbird”, https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=thunderbird, [13.01.2025].
[24] Baza rekordów CVE – wyniki wyszukiwania dla hasła „outlook”, https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=outlook, [13.01.2025].
[25] Baza rekordów CVE – wyniki wyszukiwania dla hasła „apple mail”, https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=apple+mail, [13.01.2025].
[26] Baza rekordów CVE – wyniki wyszukiwania dla hasła „gmail”, https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=gmail, [13.01.2025].
[27] Baza rekordów CVE – opis rekordu CVE-2020-12618, https://www.cve.org/CVERecord?id=CVE-2020-12618, [13.01.2025].
[28] Baza rekordów CVE – wyniki wyszukiwania dla hasła „evolution”, https://cve.mitre.org/cgi-bin/cvekey.cgi?keyword=evolution, [13.01.2025].
[29] A. Haertle, Poważny błąd Onetu pozwalał pobrać pocztę i dane użytkowników, https://zaufanatrzeciastrona.pl/post/powazny-blad-onetu-udostepnial-poczte-i-dane-uzytkownikow/, [13.01.2025].
Article Details
Abstract views: 100

