Academic literature on the topic 'E-mail address'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'E-mail address.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "E-mail address"

1

Utz, Sonja. "Enter Your E-mail Address: How German Internet Users Manage their E-mail Addresses." CyberPsychology & Behavior 7, no. 2 (2004): 241–46. http://dx.doi.org/10.1089/109493104323024492.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hill, Karen. "Register your e-mail address." Nursing in Critical Care 16, no. 1 (2011): 47. http://dx.doi.org/10.1111/j.1478-5153.2010.00441_7.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hill, Karen. "Register your e-mail address." Nursing in Critical Care 17, no. 2 (2012): 106. http://dx.doi.org/10.1111/j.1478-5153.2012.00493_2.x.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Thomas, Brendan. "E-mail Address Harvesting on PubMed—A Call for Responsible Handling of E-mail Addresses." Mayo Clinic Proceedings 86, no. 4 (2011): 362. http://dx.doi.org/10.4065/mcp.2010.0817.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Horn, David J. "Change in Editorial E-Mail Address." Entomological News 127, no. 2 (2017): 184. http://dx.doi.org/10.3157/021.127.0201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Han, Dongyun, and Kyongsok Kim. "A Design and Implementation of SMTPUTF8 Mail Server to Support EAI(E-Mail Address Internationalization) bis Standard." Journal of the Korea society of IT services 12, no. 2 (2013): 321–34. http://dx.doi.org/10.9716/kits.2013.12.2.321.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

JIA, Yong-xin, and Ai-mei XIAO. "New method for identifying behavior patterns of worm E-mail based on dummy E-mail address." Journal of Computer Applications 29, no. 8 (2009): 2236–39. http://dx.doi.org/10.3724/sp.j.1087.2009.02236.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

DeAngelo, Tessa I., and Bo Feng. "From Inbox Reception to Compliance: A Field Experiment Examining the Effects of E-mail Address and Subject Line on Response and Compliance Rates in Initial E-mail Encounters." Social Science Computer Review 38, no. 6 (2019): 766–78. http://dx.doi.org/10.1177/0894439319839924.

Full text
Abstract:
Within text-based computer-mediated communication, individuals use available cues to form and guide initial encounters. The goal of this study was to examine how e-mail cues influence the effectiveness of initial e-mail communication in a professional context. A field experiment was conducted to examine how two readily available inbox-level cues— e-mail address (professional vs. nonprofessional) and subject line (clear vs. unclear)—influence the likelihood that an e-mail will be opened and the likelihood of the receiver complying with the e-mail’s request to complete an online survey. Analysis
APA, Harvard, Vancouver, ISO, and other styles
9

Hemalatha, M., Sriharsha Katta, R. Sai Santosh, and Priyanka Priyanka. "E-MAIL SPAM DETECTION." International Journal of Computer Science and Mobile Computing 11, no. 1 (2022): 36–44. http://dx.doi.org/10.47760/ijcsmc.2022.v11i01.006.

Full text
Abstract:
E-mail is the most important form of communication. Used for a wide range of people including individuals and organizations. But these people using this e-mail they find it difficult to use because of spam mail. These spam emails are also called unsolicited bulk mail or junk mail. Spam emails are available randomly sent messages to people by anonymous users. Sites are trying to steal yours personal, electronic and financial information. An increase in spam emails leads to crime of theft of sensitive information, reduced productivity. Spam detection is dirty. The line between spam and non-spam
APA, Harvard, Vancouver, ISO, and other styles
10

Riadi, Imam, Sunardi Sunardi, and Fitriyani Tella Fitri. "Spamming Forensic Analysis Using Network Forensics Development Life Cycle Method." INTENSIF: Jurnal Ilmiah Penelitian dan Penerapan Teknologi Sistem Informasi 6, no. 1 (2022): 108–17. http://dx.doi.org/10.29407/intensif.v6i1.16830.

Full text
Abstract:
E-mail is electronic mail used to send files, pictures, and others easily and quickly. However, as time goes by, there is a lot of misuse of e-mail, causing inconvenience to the recipient. One of them is spam e-mail sent to many people without prior permission from the intended owner. Hackers can forge e-mail headers anonymously for malicious purposes. The research object is to simulate sending spamming e-mails to 1 victim with a total of 40 spamming e-mails. The research follows the flow of the Network Forensics Development Life Cycle (NFDLC) method with the stages of initiation, acquisition,
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "E-mail address"

1

Moraes, Juliana Granço Marcelino de. "O tratamento na interação: formas e fórmulas usadas no estabelecimento e encerramento de contato em e-mails de lingua alemã e de língua portuguesa." Universidade de São Paulo, 2011. http://www.teses.usp.br/teses/disponiveis/8/8144/tde-14022013-104046/.

Full text
Abstract:
Na presente pesquisa faz-se um estudo sobre o tratamento na interação, considerando que o tratamento não se limita apenas às formas pronominais e nominais, mas faz parte de um ritual da interação. Entende-se que ele está presente durante toda a interação, de forma mais marcada no estabelecimento e encerramento do contato e, como faz parte de um ritual lingüístico, a escolha do tratamento dispensado ao interlocutor é culturalmente marcada e segue padrões sociais de comportamento. Para adequar-se às diferentes situações comunicativas, os locutores utilizam formas de tratamento (pronominais e nom
APA, Harvard, Vancouver, ISO, and other styles
2

Scarlato, Michele. "Sicurezza di rete, analisi del traffico e monitoraggio." Master's thesis, Alma Mater Studiorum - Università di Bologna, 2012. http://amslaurea.unibo.it/3223/.

Full text
Abstract:
Il lavoro è stato suddiviso in tre macro-aree. Una prima riguardante un'analisi teorica di come funzionano le intrusioni, di quali software vengono utilizzati per compierle, e di come proteggersi (usando i dispositivi che in termine generico si possono riconoscere come i firewall). Una seconda macro-area che analizza un'intrusione avvenuta dall'esterno verso dei server sensibili di una rete LAN. Questa analisi viene condotta sui file catturati dalle due interfacce di rete configurate in modalità promiscua su una sonda presente nella LAN. Le interfacce sono due per potersi interfacciar
APA, Harvard, Vancouver, ISO, and other styles
3

Δελέγκου, Βασιλική. "Ανάλυση πρωτοκόλλων σε επίπεδο εφαρμογής σε δίκτυα τηλεϊατρικής". Thesis, 2011. http://hdl.handle.net/10889/4956.

Full text
Abstract:
Η ύπαρξη Διαδικτύου παρέχει την δυνατότητα μεταφοράς δομημένης πληροφορίας, μέσω πολλών διαφορετικών εφαρμογών. Μια από τις πλέον χρησιμοποιούμενες εφαρμογές αποτελεί το ηλεκτρονικό ταχυδρομείο, το οποίο υπάρχει από την αρχή κιόλας του Διαδικτύου. Τα τελευταία χρόνια έχει κάνει την εμφάνιση της μια νέα σημαντική εφαρμογή η τηλεϊατρική, η οποία περιλαμβάνει μηχανισμούς παρόμοιους με το ηλεκτρονικό ταχυδρομείο. Στην παρούσα διπλωματική εργασία παρουσιάζονται τα πρωτόκολλα μορφοποίησης μηνυμάτων Διαδικτύου RFC 822, RFC 2822, RFC 2045 της κατηγορίας MIME καθώς και το RFC 2231. Αποτελούν κάποια από
APA, Harvard, Vancouver, ISO, and other styles
4

Tladi, Sebolawe Erna Mokowadi. "The regulation of unsolicited electronic communications (SPAM) in South Africa : a comparative study." Thesis, 2017. http://hdl.handle.net/10500/25265.

Full text
Abstract:
The practice of spamming (sending unsolicited electronic communications) has been dubbed “the scourge of the 21st century” affecting different stakeholders. This practice is also credited for not only disrupting electronic communications but also, it overloads electronic systems and creates unnecessary costs for those affected than the ones responsible for sending such communications. In trying to address this issue nations have implemented anti-spam laws to combat the scourge. South Africa not lagging behind, has put in place anti-spam provisions to deal with the scourge. The anti-spam provis
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "E-mail address"

1

Address Book: To Keep the Address, Phone Number, e-Mail Address, Organizer. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Mikkonen/, John. WebShark : The Ultimate Website & E-Mail Address Book. M&H Press, Inc., 1997.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Zellers-Rainey, Diane. The Best Little E-Mail Address & Password Organizer. MLB Printing, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Address Book: Use to Keep the Address, Phone Number, e-Mail Address, Organizer Notes. Independently Published, 2021.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Godin, Seth. E-Mail Address Rich Fam Countrpk 13W/1 Free. Pearson Education, Limited, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Joly, Victoria. Address Book: Address / Telephone / E-mail / Birthday / Web address / Log in / Password / Space Collection 5. CreateSpace Independent Publishing Platform, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Joly, Victoria. Address Book: Address / Telephone / E-mail / Birthday / Web address / Log in / Password / Music Collection 1. Createspace Independent Publishing Platform, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Joly, Victoria. Address Book: Address / Telephone / E-mail / Birthday / Web address / Log in / Password / Mysteries Collection 5. Createspace Independent Publishing Platform, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

po. Address Book: Art Style Design [ Keep Organised Name, Address, Phone, Fax , E-Mail ]. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

po. Address Book: Art Style Design [ Keep Organised Name, Address, Phone, Fax , E-Mail ]. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "E-mail address"

1

Asscher, Lodewijk F., and Sjo Anne Hoogcarspel. "Harvesting E-Mail Addresses." In Information Technology and Law Series. T.M.C. Asser Press, 2006. http://dx.doi.org/10.1007/978-90-6704-711-1_4.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Bell, Mary Ann, Bobby Ezell, and James L. Van Roekel. "E-Mail Addresses and Privacy." In Cybersins and Digital Good Deeds. CRC Press, 2024. http://dx.doi.org/10.1201/9781003573302-31.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Tellenbach, Bernhard. "Identity-Based Cryptography." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_12.

Full text
Abstract:
AbstractIdentity-based encryption systems are characterized by the fact that the public key is easy to remember, and the step of linking the public key to a specific identity is omitted; the identity (e.g., an e-mail address) is the public key. Applications of Identity-based encryption are still relatively rare, although there are now various standards for Identity-based encryption procedures and their application. Properties such as needing a trusted third party to generate the private keys might hinder its adoption. There are initial solutions to optimize away or mitigate such negative features for many applications, but they are not yet well-tested and still subject to research. However, for application areas where a trusted third party for private key escrow is acceptable, for example, in government and enterprise applications or public safety and mission-critical applications, Identity-based encryption can be an exciting technology that simplifies key management and handling.
APA, Harvard, Vancouver, ISO, and other styles
4

Achugbue, Edwin I. "Electronic Mail Security." In Handbook of Research on Information Communication Technology Policy. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-847-0.ch010.

Full text
Abstract:
The chapter focuses on the history of the internet system of e-mail; e-mail security; threat to e-mail security, usefulness of e-mail address and country codes, how e-mails can be secured by the individual and electronic mail policy. The future of e-mail security is also described.
APA, Harvard, Vancouver, ISO, and other styles
5

Veluru, Suresh, Yogachandran Rahulamathavan, B. B. Gupta, and Muttukrishnan Rajarajan. "Privacy Preserving Text Analytics." In Handbook of Research on Securing Cloud-Based Databases with Biometric Applications. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-6559-0.ch017.

Full text
Abstract:
An e-mail address is a source of communication for major social networking sites. In general, e-mail addresses hold identity in the form a surname as a substring in it. Identities such as names are far from random and can exhibit community distributions over populations. However, these identities reflect cultural, ethnic, and genetic structures generated among populations. Hence, identity establishment in e-mail address mining can be seen as a categorization of e-mail address-based community structure in names data set. It involves community modeling in names, categorization of an e-mail addresses, and identity privacy preservation. This chapter presents a survey of text mining and privacy preserving techniques followed by research challenges and strategies in name analysis. The research challenges are: (1) e-mail address categorization based on community structure of identities, (2) correlation of surnames and forenames within and across communities, and (3) privacy preserving of identities in communities.
APA, Harvard, Vancouver, ISO, and other styles
6

Veluru, Suresh, Yogachandran Rahulamathavan, B. B. Gupta, and Muttukrishnan Rajarajan. "Privacy Preserving Text Analytics." In Standards and Standardization. IGI Global, 2015. http://dx.doi.org/10.4018/978-1-4666-8111-8.ch066.

Full text
Abstract:
An e-mail address is a source of communication for major social networking sites. In general, e-mail addresses hold identity in the form a surname as a substring in it. Identities such as names are far from random and can exhibit community distributions over populations. However, these identities reflect cultural, ethnic, and genetic structures generated among populations. Hence, identity establishment in e-mail address mining can be seen as a categorization of e-mail address-based community structure in names data set. It involves community modeling in names, categorization of an e-mail addresses, and identity privacy preservation. This chapter presents a survey of text mining and privacy preserving techniques followed by research challenges and strategies in name analysis. The research challenges are: (1) e-mail address categorization based on community structure of identities, (2) correlation of surnames and forenames within and across communities, and (3) privacy preserving of identities in communities.
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Hamdani, Wasim A. "Cryptography in E-Mail and Web Services." In Applied Cryptography for Cyber Security and Defense. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch004.

Full text
Abstract:
Cryptography has been used since ancient times in many different shapes and forms to protect messages from being intercepted. However, since 1976, cryptography started to be part of protected public communication when e-mail became commonly used by the public. Webmail (or Web-based e-mail) is an e-mail service intended to be primarily accessed via a web browser, as opposed to through an e-mail client, such as Microsoft Outlook, Mozilla‘s Thunderbird Mail. Very popular webmail providers include Gmail, Yahoo! Mail, Hotmail and AOL. Web based email has its advantages, especially for people who travel. Email can be collected by simply visiting a website, negating the need for an email client, or to logon from home. Wherever a public terminal with Internet access exists one can check, sends and receive email quickly and easily. Another advantage of web based email is that it provides an alternate address allowing user to reserve his/her ISP address for personal use. If someone would like to subscribe to a newsletter, enter a drawing, register at a website, participate in chats, or send feedback to a site, a web based email address is the perfect answer. It will keep non-personal mail on a server for you to check when you wish, rather than filling up your private email box. Web service is defined as “a software system designed to support interoperable machine-to-machine interaction over a network”. Web services are frequently just Internet application programming interfaces (API) that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services. Other approaches with nearly the same functionality as web services are Object Management Group‘s (OMG) Common Object Request Broker Architecture (CORBA), Microsoft‘s Distributed Component Object Model (DCOM) or SUN‘s Java/Remote Method Invocation (RMI). Integrating Encryption with web service could be performing in many ways such as: XML Encryption and XML Signature. In this article we present client and Web-based E-mail, next generation E-mail and secure E-mail, followed by cryptography in web service and the last part is the future of web service security. The article start with the integration of cryptography with E-mail client and web base then the integration of cryptography and web service is presented. At the end of the major two sections: e-mail service and web service there is a general prospect vision of encryption future for e-mail service and web service. This section presents our view for the cryptography integration with the second generation of e-mail and web service.
APA, Harvard, Vancouver, ISO, and other styles
8

Pournelle, Jerry. "The Ten Worst E-mail Mistakes." In 1001 Computer Words You Need to Know. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780195167757.003.0010.

Full text
Abstract:
Anyone who uses e-mail should avoid the following mistakes: Giving confidential information in an unsecured e-mail. Your credit card number, for instance, can easily be sent throughout the world. It’s best to send credit-card information only through secure Web sites. See “How to Shop Safely Online” on p.143. Opening attachments from strangers. Never open an e-mail that has an attachment that is vague or says “Check this out!” A virus may spread by invading the contact list on a computer and sending itself to every e-mail address on the list. Opening unsolicited e-mail without first scanning for viruses. There are several free anti-virus programs available, and they should be updated regularly. Hitting “reply” to an unsolicited e-mail when asking to be taken off the sender’s list. By hitting “reply” you may be opening up your account to a deluge of spam. Hitting “reply all” when only the sender needs a response. Does everyone really need to know your reply? Think before you reply, especially if the e-mail was sent to a very large group. Forwarding hoaxes or jokes. Most people get too much e-mail, and they would prefer a real note from you, not a hoary joke or, worse, a scaremongering urban legend or false charity scam. If something sounds too good (or too shocking) to be true, it probably is. Check the web for information before you send something on; www.snopes.com is a great site for checking stories. Sending an e-mail without a signature. It’s helpful to include at least your name and e-mail address at the bottom of your message, especially if you are e-mailing someone for the first time. Don’t use a vCard (virtual business card). It may be mistaken for a virus. Sending an e-mail without spell-checking it. Most e-mail systems spell-check as you type or have a “spell-check before sending” setting. Sending large files or pictures. Don’t clog up your recipient’s mailbox—ask before sending big files. Sending e-mail without a “subject” line or with a vague subject line. Be specific.A subject that reads “Looking forward to dinner Saturday!” will get more attention than one that reads “hi” or “see you soon?” A blank subject line may get no attention at all.
APA, Harvard, Vancouver, ISO, and other styles
9

Pournelle, Jerry. "Dealing with Spam." In 1001 Computer Words You Need to Know. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780195167757.003.0012.

Full text
Abstract:
If you’ve used e-mail for any time at all, you’ve no doubt had your inbox deluged with messages pitching aphrodisiacs, mortgages, junk stocks, pornography, and substances that claim to help you lose weight in your sleep. But don’t despair. Such messages don’t have to be part of the Internet experience. You can avoid them, or certainly reduce the annoyance level, with a few simple measures. Some spammers harvest e-mail addresses from the Internet by using a “spider” (also known as a robot or crawler)—a computer program that creeps through the World Wide Web collecting information you’d prefer to keep private. So the better you are at hiding your address from faceless prowlers, the less spam you will receive. 1. If your Internet Service Provider gives you the choice, create a long, fairly complicated address preceding the @; don’t just use your first name: donquixote@example.com is better than don@example.com. Better still is donquixotedelamancha@example. com. It may be unwieldy, but your friends can always use a nickname—or just click on your address. Happily, longer addresses confuse spammers, who—without having exact user accounts in hand—use a “dictionary attack” to find them, testing the validity of every possible address from lists of common words and names: arline@example.com, barbara@example.com, and so forth. 2. Again, unless some online service makes it mandatory, don’t use your e-mail address as part of a login name or identity. However convenient that might make it when logging in to eBay, it’s equally convenient for spammers. 3. Use a second, public address for nonpersonal mail and for public posting. Create a free account with Hotmail, Yahoo, or Excite, or set up another screen name if you use either AOL or another Internet Service Provider that allows you to have multiple addresses. This keeps your main address private and exposes only your public address to spammers. Check the public account at least occasionally, in case something innocent has come in. Then massively delete the rest. It’s important to learn how your e-mail client (the program you use to send and receive e-mail) handles thorough deleting; in Outlook Express, for example, you have to delete an e-mail you don’t want from your inbox, delete it from the “Deleted” folder, and then compact folders before you are genuinely rid of it.
APA, Harvard, Vancouver, ISO, and other styles
10

Pavan, Elisabetta. "Politeness, Intercultural Communication, E-Mails." In Intercultural Foreign Language Teaching and Learning in Higher Education Contexts. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-8128-4.ch003.

Full text
Abstract:
In this chapter, the focus shifts from oral communication to written communication, considering the sometimes controversial issue of politeness in written intercultural communication. Firstly, a definition of politeness is discussed; secondly, some key issues related to the topic of intercultural communication are considered; and finally, intercultural e-mail communication is introduced. The aim is to understand how intercultural communication, mediated by the internet, can create compelling and sometime challenging conditions for additional language learning. For example, university students use e-mails a lot. Nonetheless, some issues, amongst which the level of formality when they address university staff, may vary, depending on their own national culture and on the training they receive on the use of this medium. As a result, intercultural clashes may occur. To facilitate foreign language teaching and communication, an instrument to assess politeness in intercultural e-mail communication in an intercultural context will be presented.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "E-mail address"

1

Avramescu, Elena Taina, Mariya Hristova Monova-Zheleva, Arslan Say, and Irina Ghiata. "DEVELOPMENT OF NEW SKILLS FOR MEDICAL STUDENTS IN PANDEMIC CONTEXT." In 11th SWS International Scientific Conferences on SOCIAL SCIENCES - ISCSS 2024. SGEM WORLD SCIENCE, 2024. https://doi.org/10.35603/sws.iscss.2024/s08/52.

Full text
Abstract:
The present paper presents the results of an Erasmus+ project entitled � Development of New Skills for Medical Students in Pandemic Context. For most of the medical universities digital readiness/capacity was found unprepared for the COVID induced changes toward on-line education. Now, after 2 years, on line education is not anymore a novelty in higher education. But, especially for medical students, the problem raised during COVID pandemics was to follow practical stages. Telemedicine is a solution adopted in many countries both for medical as for educational services. By our approach we addr
APA, Harvard, Vancouver, ISO, and other styles
2

Banday, M. Tariq, and Shafiya Afzal Sheikh. "Multiple E-mail address certificate." In 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI). IEEE, 2013. http://dx.doi.org/10.1109/icacci.2013.6637337.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mashwani, Syed Rahman, Shah Khusro, and A. Min Tjoa. "E-Mail Address Privacy via PEA's (Proxy E-Mails Accounts)." In 2009 Second International Symposium on Electronic Commerce and Security. IEEE, 2009. http://dx.doi.org/10.1109/isecs.2009.257.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gupta, Surekha, Emmanuel S. Pilli, Preeti Mishra, Sumit Pundir, and R. C. Joshi. "Forensic analysis of E-mail address spoofing." In 2014 5th International Conference- Confluence The Next Generation Information Technology Summit. IEEE, 2014. http://dx.doi.org/10.1109/confluence.2014.6949302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Joffily, M., M. S. Miranda, A. Nigri, and A. F. S. Santoro. "MAILBOOK: An E-mail Address Handling Tool." In Proceedings of the International Conference. WORLD SCIENTIFIC, 1996. http://dx.doi.org/10.1142/9789814447188_0108.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Veluru, Suresh, Yogachandran Rahulamathavan, P. Viswanath, Paul Longley, and Muttukrishnan Rajarajan. "E-mail address categorization based on semantics of surnames." In 2013 IEEE Symposium on Computational Intelligence and Data Mining (CIDM). IEEE, 2013. http://dx.doi.org/10.1109/cidm.2013.6597240.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Banday, M. Tariq, and Shafiya Afzal Sheikh. "S/MIME with multiple e-mail address certificates: A usability study." In 2014 International Conference on Contemporary Computing and Informatics (IC3I). IEEE, 2014. http://dx.doi.org/10.1109/ic3i.2014.7019789.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Jin, Lei, Hassan Takabi, and James B. D. Joshi. "Security and Privacy Risks of Using E-mail Address as an Identity." In 2010 IEEE Second International Conference on Social Computing (SocialCom). IEEE, 2010. http://dx.doi.org/10.1109/socialcom.2010.134.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Benesch, Thomas. "Is Their Craze on the Internet?" In 2001 Informing Science Conference. Informing Science Institute, 2001. http://dx.doi.org/10.28945/2372.

Full text
Abstract:
For a long time researchers have been considered the question of the use of Internet for its users. In this study we do not want to execute a collection over companies or an entire state, but to limit us to a user group, the students of the Graz University of Technology.From the total extent of the students with a valid e-mail address a representative sample survey has been carried out. To those students a message, which refers to the questionnaire, was sent by means of e-mail. The questionnaire is available electronically at the WWW. The results of this study give us a view, how strong electr
APA, Harvard, Vancouver, ISO, and other styles
10

Carvalho, Junia Costa, Natália Tomaz Pires, Silvana Soares dos Santos, et al. "CONDUCTING BREAST CANCER RESEARCH DURING A PANDEMIC ISOLATION TIME." In Brazilian Breast Cancer Symposium 2022. Mastology, 2022. http://dx.doi.org/10.29289/259453942022v32s2063.

Full text
Abstract:
Objective: Aiming at the assistance of women with breast cancer, quality of life indicators can help in clinical practice, guide therapeutic intervention strategies, and evaluate the success of intervention after surgery and cancer treatment, in addition to defining parameters for actions. This perspective study is about the quality of life of patients treated for breast cancer at the Institution. However, as soon as the pandemic started, the need to readapt the way of filling out the questionnaires to an online model emerged. Our objective is to share the facilities and difficulties of online
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "E-mail address"

1

Lyon, J. Purported Responsible Address in E-Mail Messages. RFC Editor, 2006. http://dx.doi.org/10.17487/rfc4407.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Allocchio, C. GSTN Address Element Extensions in E-mail Services. RFC Editor, 2000. http://dx.doi.org/10.17487/rfc2846.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Jeff Huang, Jeff Huang. How do spammers harvest your e-mail address? Experiment, 2012. http://dx.doi.org/10.18258/0009.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Skow, Jason, and Smitha Koduru. PR-244-163728-R01 In-Line Inspection Crack Tool Performance Evaluation Phase II. Pipeline Research Council International, Inc. (PRCI), 2018. http://dx.doi.org/10.55274/r0011531.

Full text
Abstract:
After recent high profile pipeline incidents in the United States, the National Transportation Safety Board (NTSB) issued recommendations to review ILI technologies with respect to tool tolerance, probability of detection and probability of identi?cation, and to provide a model with detailed procedures for evaluating the e?ect of interacting corrosion and crack threats. Phase I of the PRCI project NDE-4E was initiated in 2013 to address the ?rst of these recommendations to the extent possible by mining existing historical operator data. The main goal of the project was to create a database of
APA, Harvard, Vancouver, ISO, and other styles
5

Briones, Roehlano. Market and State in Philippine Agricultural Policy. Philippine Institute for Development Studies, 2022. https://doi.org/10.62986/dp2022.08.

Full text
Abstract:
This paper aims to evaluate the country's agricultural modernization strategy under the lens of the market-driven approach. The early post-War period of economic policy relates to solving the food problem solution for low-income countries, which minimizes farmer welfare and emphasizes benefits to the wealthier, nonfarming class. This prevailed until the 1970s when the interest of the farming class began to be reasserted. By the 1990s, the main issue was the disparity problems, which considers as almost equally weighty, the interests of poor farmers, as well as that of nonagricultural consumers
APA, Harvard, Vancouver, ISO, and other styles
6

Cortiñas-Rovira, S., and B. Salvador-Mata. Pseudociencia y sociedad en España. Sociedad Latina de Comunicación Social, 2022. http://dx.doi.org/10.4185/cac179.

Full text
Abstract:
Pseudociencia y sociedad en España. Estado de la cuestión e investigaciones recientes analyses the communicative strategies that pseudoscience uses for its social ex-pansion. This work begins with the definition of an epistemological framework that allows us to understand the phenomenon of pseudoscience and its rela-tionship with the main factors of contemporary society, such as relativism and liquidity. As a consequence of the postmodern condition, absolute certainties vanish and the possibility of not only ignoring science but even denying it be-comes real. In this sense, one of the main the
APA, Harvard, Vancouver, ISO, and other styles
7

Jones, Emily, Beatriz Kira, Anna Sands, and Danilo B. Garrido Alves. The UK and Digital Trade: Which way forward? Blavatnik School of Government, 2021. http://dx.doi.org/10.35489/bsg-wp-2021/038.

Full text
Abstract:
The internet and digital technologies are upending global trade. Industries and supply chains are being transformed, and the movement of data across borders is now central to the operation of the global economy. Provisions in trade agreements address many aspects of the digital economy – from cross-border data flows, to the protection of citizens’ personal data, and the regulation of the internet and new technologies like artificial intelligence and algorithmic decision-making. The UK government has identified digital trade as a priority in its Global Britain strategy and one of the main sourc
APA, Harvard, Vancouver, ISO, and other styles
8

Atuesta, Laura, Agustina Schijman, Salvatore Schiavo-Campo, and Monika Huppi. IDB-9: Country Systems. Inter-American Development Bank, 2013. http://dx.doi.org/10.18235/0010516.

Full text
Abstract:
The Inter-American Development Bank (IDB, or Bank), in its Ninth General Capital Increase (IDB-9), committed to improve country systems in order to increase their use in programs financed by Bank resources. This report examines the implementation of that commitment. It assesses the Country Systems Strategy developed in late 2009 for that purpose, the quality of the fiduciary assessments that underpin the opportunities for increasing the use of country systems by the Bank, and the new organizational arrangements. It then reviews the progress since late 2009 in implementing the Strategy in the t
APA, Harvard, Vancouver, ISO, and other styles
9

D’Agostino, Martin, Nigel Cook, Liam O’Connor, et al. Optimising extraction and RT-qPCR-based detection of hepatitis E virus (HEV) from pork meat and products. Food Standards Agency, 2023. http://dx.doi.org/10.46756/sci.fsa.ylv958.

Full text
Abstract:
Hepatitis E is an infection of the liver caused by the hepatitis E virus (HEV). HEV infection usually produces a mild disease, hepatitis E. However, disease symptoms can vary from no apparent symptoms to liver failure. There are 4 main types (genotypes) of the virus that cause concern in humans. Genotypes 1 and 2 infections are mainly restricted to humans but 3 and 4 can be identified in numerous other animal species including pigs. Transmission routes of HEV genotypes 3 and 4 have been identified to include the consumption of food products derived from infected animals and shellfish, and via
APA, Harvard, Vancouver, ISO, and other styles
10

Brophy, Kenny, and Alison Sheridan, eds. Neolithic Scotland: ScARF Panel Report. Society of Antiquaries of Scotland, 2012. http://dx.doi.org/10.9750/scarf.06.2012.196.

Full text
Abstract:
The main recommendations of the Panel report can be summarised as follows: The Overall Picture: more needs to be understood about the process of acculturation of indigenous communities; about the Atlantic, Breton strand of Neolithisation; about the ‘how and why’ of the spread of Grooved Ware use and its associated practices and traditions; and about reactions to Continental Beaker novelties which appeared from the 25th century. The Detailed Picture: Our understanding of developments in different parts of Scotland is very uneven, with Shetland and the north-west mainland being in particular nee
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!