Skip to content
Universities of Wisconsin
Call Now608-262-2011 Call 608-262-2011 Request Info Request Info Search the UW Extended Campus website Search
Wisconsin Online Collaboratives
  • About Us
    • About Us
    • Accreditation
    • Our Campus Partners
  • Degrees & Programs
  • Admissions & Aid
    • How to Apply
    • Admission Pathways
    • Important Dates
    • Tuition & Financial Aid
    • Transferring Credits
    • Contact an Enrollment Adviser
  • Online Learning
    • About Online Learning
    • Online Learning Formats
    • Capstone Projects
    • Success Coaching
    • Technology Requirements
  • Stories & News
Home Home / Capstone Projects / Exploratory Case Study on Identifying Phishing Email with Text Mining

Exploratory Case Study on Identifying Phishing Email with Text Mining

Program: Data Science Master's Degree
Location: Not Specified (onsite)
Student: Esmeralda D. Robledo

The growing problem of phishing emails has urged a need for intelligent phishing email identification. And only when phishing email characteristics are fully understood can an effective counter measure be taken to minimize the risk of these fraud emails. This paper describes text mining techniques topic modeling, network analysis and clustering for intelligent phishing email identification, which focuses on unsupervised methods to help identify phishing emails. In this paper a fraud email dataset from Kaggle is used to demonstrate the use of topic modeling, network analysis and clustering for analyzing emails. Topic modeling is used to find a set of topics. Then integrate network analysis on emails topic results to view the relationships with network graphs. Finally, after exploring the email topics, a strategy can be formed to apply a clustering model that can be used to identify phishing/fraud emails for the given fraud email dataset. The results on the fraud email dataset showed that the text mining techniques used in this paper for identifying phishing email can easily and accurately cluster emails between legitimate and phishing emails. This case study ends by recommending that these techniques provide information to improve decisions on information security risks. Text mining techniques are learned from the study of data science. And with phishing emails that continue to make it pass email filtering systems, the demand for security data science will only increase to aid in the defense against fraud on computer information systems.

Let's Get Started Together

Apply Apply Schedule an Advising Call Schedule an Advising Call Request Info Request Info

This field is for validation purposes and should be left unchanged.
Are you interested in pursuing the degree or taking one or two courses?(Required)
Can we text you?(Required)

By selecting yes, I agree to receive updates about online degrees, events, and application deadlines from the Universities of Wisconsin.

Msg frequency varies depending on the activity of your record. Message and data rates may apply. Text HELP for help. You can opt out by responding STOP at any time. View our Terms and Conditions and Privacy Policy for more details.

Wisconsin Online Collaboratives will not share your personal information. Privacy Policy

Wisconsin Online Collaboratives

A Collaboration of the
Universities of Wisconsin

University of Wisconsin System

Pages

  • Our Degrees & Programs
  • How to Apply
  • Online Learning Formats
  • Our Campus Partners

Enrollment Advising

608-800-6762
learn@uwex.wisconsin.edu

Contact

780 Regent Street
Suite 130
Madison, WI 53715

Technical Support

1-877-724-7883
https://uwex.wisconsin.edu/technical-support/

Connect

  • . $name .facebook
  • . $name .linkedin
  • . $name .instagram
  • . $name .youtube

Copyright © 2026 Board of Regents of the University of Wisconsin System. | Privacy Policy