Academic literature on the topic 'E-mail use'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'E-mail use.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "E-mail use"

1

Parker, Charles. "E‐mail use and abuse." Work Study 48, no. 7 (December 1999): 257–60. http://dx.doi.org/10.1108/00438029910294135.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Stark-Wroblewski, Kimberly, Jessica K. Edelbaum, and Joseph J. Ryan. "Senior Citizens Who Use E-mail." Educational Gerontology 33, no. 4 (March 19, 2007): 293–307. http://dx.doi.org/10.1080/03601270701198877.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hurst, Mark. "E-mail and ease of use." Interactions 11, no. 2 (March 2004): 55–56. http://dx.doi.org/10.1145/971258.971276.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zayyan, Sanaa, David Dodwell, and William D. Dodwell. "Medical e-mail: use with care." British Journal of Hospital Medicine 74, no. 2 (February 2013): 114. http://dx.doi.org/10.12968/hmed.2013.74.2.114.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

PEIRCE, B. "E-mail etiquette: Tips for effective use." Journal of WOCN 26, no. 6 (November 1999): 288–89. http://dx.doi.org/10.1016/s1071-5754(99)90062-1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Kuppersmith, R. B., C. Holsinger, and H. A. Jenkins. "The Use of E-mail by Otolaryngologists." Archives of Otolaryngology - Head and Neck Surgery 122, no. 9 (September 1, 1996): 921–22. http://dx.doi.org/10.1001/archotol.1996.01890210005001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Bergren, Martha Dewey. "The Facts About E-mail." Journal of School Nursing 17, no. 5 (October 2001): 274–77. http://dx.doi.org/10.1177/10598405010170050701.

Full text
Abstract:
The use of E-mail in the school setting has become a standard method of communication. E-mail can increase the efficiency of communicating with parents and students. Privacy and security considerations regarding the use of E-mail to transmit health information must be addressed. This article outlines regulations and the best practices for using E-mail in the school health office.
APA, Harvard, Vancouver, ISO, and other styles
8

Hemalatha, M., Sriharsha Katta, R. Sai Santosh, and Priyanka Priyanka. "E-MAIL SPAM DETECTION." International Journal of Computer Science and Mobile Computing 11, no. 1 (January 30, 2022): 36–44. http://dx.doi.org/10.47760/ijcsmc.2022.v11i01.006.

Full text
Abstract:
E-mail is the most important form of communication. Used for a wide range of people including individuals and organizations. But these people using this e-mail they find it difficult to use because of spam mail. These spam emails are also called unsolicited bulk mail or junk mail. Spam emails are available randomly sent messages to people by anonymous users. Sites are trying to steal yours personal, electronic and financial information. An increase in spam emails leads to crime of theft of sensitive information, reduced productivity. Spam detection is dirty. The line between spam and non-spam messages is blurred, and the condition changes over time. From various attempts to automate spam detection, machine learning has so far proven to be the most effective and popular method of email providers. While we still see spam emails, a quick look at the trash folder will show how many spam is removed from our inbox daily due to machine learning algorithms. It is estimated that 40% of emails are spam mail. These spam wastes time, storage the space and width of the communication band. There are a few ways to receive spam emails but spam senders make it difficult for you to send users from a random sender address or by adding special characters at the beginning or end of the email. There are several machine learning methods for filtering spam emails including Naïve Bayes classifier, Vector support equipment, Neural Networks, Close Neighbour, Rough Sets and Random Forests. In this project we use the Naïve Bayes classifier to identify spam mail. The vast majority of people depend on what is available email or messages sent by a stranger. Possibly anyone can leave an email or message provide gold the opportunity for spam senders to write a spam message about us different interests. Spam fills in the inbox with a number of funny things mails. Slow down our internet speed. Theft useful information such as our details on our contact list. Identifying these people who post spam and spam content can be a a hot topic for research and strenuous activities. Email Spam is functionality of mass mailings. From the cost of Spam is heavily censored by the recipient, it is a successful post proper advertising. Spam email is a form of commercial advertising economically viable because email can be costly effective sender method. With this proposed model some message may be declared spam or not use Bayes' theorem and Naive Bayes’ Classifier and IP addresses of sender is usually found.
APA, Harvard, Vancouver, ISO, and other styles
9

Wang, Jingguo, Rui Chen, Tejaswini Herath, and H. Raghav Rao. "Visual e-mail authentication and identification services: An investigation of the effects on e-mail use." Decision Support Systems 48, no. 1 (December 2009): 92–102. http://dx.doi.org/10.1016/j.dss.2009.06.012.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Downes, P. K. "E-mail: how do you use the program?" British Dental Journal 185, no. 5 (September 1998): 213–17. http://dx.doi.org/10.1038/sj.bdj.4809777.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "E-mail use"

1

Ito, Miwa. "Work Group Identification and Communication Competence in the Use of E-mail." Thesis, North Dakota State University, 2014. https://hdl.handle.net/10365/27603.

Full text
Abstract:
Among the various communication technologies that are used in organizations, e-mail has been a dominant communication medium in the modern workplace. The purpose of the current study is to examine how individuals' work group identification influences their perceptions of e-mail use in organizations based on social identity theory. This project examines how individuals' work group identification predicts their perception of an organizational worker's communication competence. Independent-samples t test and multiple regression analysis were adopted to examine the hypotheses and research question. Data was collected using an online questionnaire to report participant perception of communicator competence in hypothetical e-mails, in regard to high-flaming/low-flaming messages and from an ingroup/outgroup member. Participants consisted of 211 people who have more than one year of work experience and use their individual e-mail accounts for communicating with other employees in the same organization. The findings indicated that participants perceived a higher level of conversational effectiveness in an e-mail with a low-flaming message from an ingroup member. Work group identification, sex, and age predicted perceived communication competence in an e-mail with a low-flaming message from an ingroup member, while work group identification (only for conversational appropriateness) and sex negatively predicted perceived communication competence in an e-mail with a high-flaming message from an outgroup member. This empirical research contributes to the development of innovative approaches to workplace e-mail communication studies.
APA, Harvard, Vancouver, ISO, and other styles
2

Raje, Archis Vijay. "Analysis of e-mail attachment signatures for potential use by intrusion detection systems." Morgantown, W. Va. : [West Virginia University Libraries], 2004. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3395.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2004.
Title from document title page. Document formatted into pages; contains ix, 57 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 49-51).
APA, Harvard, Vancouver, ISO, and other styles
3

Wasiak, James Oliver. "A content based approach for investigating the role and use of email in engineering design projects." Thesis, University of Bath, 2010. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.518136.

Full text
Abstract:
The use of email as a communication and information sharing medium in large, complex, globally distributed engineering projects is widespread; yet there exists little understanding of the content of the emails exchanged and the implications of this content on the design project, design records and contracts. The importance of these issues is underlined by the fact that email records can now be required as evidence in legal disputes. It follows that the overall aim of this research is to assess the role and use of email in engineering design projects. A state-of-the-art review of literature pertaining to email is reported, along with a review of information and communication processes in engineering design projects. The primary contribution of this thesis is the creation of a content based approach for analysing the role and use of email in engineering design projects. This centres on the development and application of a coding scheme to email text, identifying what subject matter an email relates to, why it was sent, and how its content is expressed. Results are then analysed with respect to the frequencies of each code and other variables, including how coding varies between different senders and throughout the project duration. The second key contribution of this thesis is the analysis of emails and content in an engineering setting by applying the aforementioned approach to two case studies. The major case study concerned a large, complex, globally distributed, multimillion pound systems engineering project, from which 16 000 emails were obtained. It was found that emails are mainly used to transfer information but also to support management functions. Emails facilitate design work but little of this takes place explicitly in the email content. Characteristics of a project affect the subject matter or emails but have little effect on why they are sent. User roles and personal preferences also influence email use. If was found that the purposes for sending emails varied over the duration of a project; it was further determined that these changes could be used to identify project progress and design activity. Implications of the findings are identified in relation to: information management, knowledge management, project management, collaboration and email practice. Significantly, emails do contain potentially important design information and because these often support decisions made elsewhere, emails should be integrated with wider records. More consideration and training should be given to the use of project standards for email use and guidelines for composition. Changes in email use over the project duration could be a potential tool for project managers to identify design progress and possible issues in a project.
APA, Harvard, Vancouver, ISO, and other styles
4

Chan, Hok Kan Angela Pearl. "The role of e-mail messages in the chain of communication and use of language in e-mails among colleagues in a secondary school setting." HKBU Institutional Repository, 2004. http://repository.hkbu.edu.hk/etd_ra/559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Carter, Micheal T. "Factors Affecting Use of E-mail by Public School Principals of the Central Appalachian Region." Digital Commons @ East Tennessee State University, 1997. https://dc.etsu.edu/etd/2890.

Full text
Abstract:
The purposes of this study were to determine the factors that influence the use of e-mail by principals, the purposes for which e-mail messages were sent and received, and the impact of experience and training in the areas of computers and e-mail. A survey was sent to a stratified random sample of 620 elementary, middle/junior high, and high school principals of the Central Appalachian Region. Respondents were asked to provide data regarding demographics, accessibility to hardware and software, computer and e-mail experience and training, uses of e-mail, and items that influence e-mail use. Eleven research questions and 10 hypotheses were addressed. Data analysis included descriptive statistics, chi-square, ANOVA, multiple regression, and factor analysis. At the.05 level of significance eight null hypotheses were retained and two rejected. Factor analysis identified four factors for e-mail users and five factors for non-users. E-mail was used by 59.7% of respondents. There was no relationship between level of use and gender, age, highest degree earned, or total years of educational experience. The predictors of e-mail use were computer experience, accessibility to resources, and training. Keyboarding skills and use of e-mail by superiors, fellow principals, and teachers were not indicators of e-mail use. Principals primarily use e-mail for administrative tasks and secondarily for accessing and retrieving information. Training is essential to the effective implementation and use of e-mail. There were six primary training methods for computers and e-mail. Factor analysis revealed that e-mail users have hardware and software resources, training, support, and encouragement to use e-mail to obtain educationally beneficial and appropriate information. Non-users were not comfortable with the technology. Principals must be cognizant of e-mail's capabilities and potential ramifications upon the educational community and provide the role model for the use of technology. E-mail has the potential to break down barriers of geographical isolation and instill a sense of community. If future educational leaders are to be prepared to meet the challenges of an information age, colleges of education need to provide instruction in the use of computers and e-mail.
APA, Harvard, Vancouver, ISO, and other styles
6

Loftus, Craig. "Improving the use and reuse of email in the context of an engineering company." Thesis, University of Bath, 2014. https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.655715.

Full text
Abstract:
The use, reuse and manipulation of information has become a key factor in the success of any organisation in an increasingly competitive and global business environment. Ensuring that employees are able to access (or are provided with) the right information in a timely manner is one of the key challenges facing organisations. Amongst the dominant communication methods email fills an important role in facilitating distributed communication and it is seen as a key target for improvement. Email is being used extensively and increasingly as a significant (and often dominant) method for communication within engineering organisations and projects and there exists significant opportunity and requirement to improve the use and reuse of email. This thesis contributes a rich understanding of the practise and perception of email use and reuse developed through a comprehensive review of the literature and three investigative studies: a study of the content of emails exchanged during an engineering project, a survey of practising engineers describing the role of email in supporting communication in projects and engineers perception of email, and a investigation of the information about the relationships between engineers participating in a project as represented by their exchanges of email. The second main contribution is a set of scenarios that were developed to summarise the understanding developed in the investigative studies, and form a core set of contextualised problems that can be used to communicate the research to industry and around which an holistic proposal is described to improve engineers use and reuse of email. The final contribution is an approach for supporting engineers in interpreting emails by the provision of additional contextual information, mitigating a core problem identified during the course of the research for which a well established information management solution does not already exist.
APA, Harvard, Vancouver, ISO, and other styles
7

McConnell, Justin W. "You've got mail the study of the attorney-client privilege and the use of electronic mail." Honors in the Major Thesis, University of Central Florida, 2011. http://digital.library.ucf.edu/cdm/ref/collection/ETH/id/470.

Full text
Abstract:
The prolific use of the internet and electronic mail within the legal profession presents novel challenges to the application of the attorney-client privilege; especially, in regards to protecting intended confidential communications relayed through e-mail. This thesis addresses the question of whether an attorney in Florida, through electronic mail use, can waive his client's right to the protections of the attorney-client privilege. After a review of current case law, law review articles, statutes, and texts, this thesis concluded that an attorney's communication through e-mail warrants a reasonable expectation of privacy, permitting the attorney to speak in reasonable confidence to clients through the web. However, attorneys, ethically, should consider the strong repercussions for using such a potentially transparent medium for communication. By examining the relationship between current law, the application of the attorney-client privilege, and a reasonable expectation of privacy, this study provides a comprehensive analysis for attorneys concerned with electronic mail usage. Lastly, this thesis provides attorneys with best practices for their electronic mail communications.
B.A. and B.S.
Bachelors
Health and Public Affairs
Legal Studies
APA, Harvard, Vancouver, ISO, and other styles
8

Ntsiko, Blondie Bonisa Blossom. "The use of e-mail among students and lecturers at Nelson Mandela Metropolitan University: a guide reasearch report." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/d1015970.

Full text
Abstract:
This research seeks to determine the impact of the use of e-mail between lecturers and students at the NMMU. New students at universities, and especially first year undergraduates, can sometimes have difficulties in addressing their concerns, questions and ideas about their courses and are faced with the difficulty of adapting to a new lifestyle and the university environment. Interactivity and feedback are key contributors to providing an effective learning environment for such students. Lecturers provide the main source for university students to discover what is expected of them to identify the key learning goals related to a course, from a lecturer (Braxton, Milem & Sullivan, 2000:569). The increase in student numbers in Higher Education over the last decade has been dramatic, placing greater pressures on academic staff in terms of contacting students. As computer technology becomes both more prevalent and more intrusive, its use and misuse are increasingly falling under the critical scrutiny of academic researchers. If traditional educational methods are supported, such support must be flexible enough to accommodate technology, but as a means, not an end. The research of e-mail impact between students and lecturers is still very new and is open for additional study (Braxton, et al. 2000:590).
APA, Harvard, Vancouver, ISO, and other styles
9

Funenga, Sofia Afonso. "Developing writing skills in English language teaching through the use of blogs and e-mail at primary school level." Master's thesis, Faculdade de Ciências Sociais e Humanas, Universidade Nova de Lisboa, 2012. http://hdl.handle.net/10362/7394.

Full text
Abstract:
Trabalho de Projeto apresentado para cumprimento dos requisitos necessários à obtenção do grau de Mestre em Teaching English as a Second / Foreign Language
Hoje em dia, os alunos do 1º ciclo do ensino básico têm um acesso facilitado a computadores e a diversos recursos na internet, como blogs, e-mail, Twiducate, que podem ser usados para promover a aprendizagem do inglês como segunda língua e para desenvolver as competências de escrita numa língua estrangeira. Este action research pretende responder à questão Pode o uso de blogs e e-mail melhorar as competências de escrita dos alunos do 1º ciclo? Para desenvolver este action research foi concebido um Workshop de escrita com oito meses de duração, envolvendo dezanove alunos do 1º ciclo, com oito e nove anos de idade. Foram formados grupos de três e quatro alunos e foram desenvolvidas atividades de escrita, com recurso a computadores Magalhães, em grupo e utilizando a metodologia de process writing. Os alunos tiveram acesso ao Twiducate e ao e-mail, e foi criado um blog para cada grupo para que os alunos pudessem publicar todos os seus rascunhos, bem como partilhar textos com os seus colegas e escrever comentários sobre os rascunhos. Foi possível concluir que o uso de blogs e do e-mail proporcionou aos alunos verdadeiros objetivos para escrever, interlocutores autênticos e feedbacks genuínos, o que ajudou a alterar a atitude dos alunos face às atividades de escrita e a melhorar o conteúdo e a linguagem dos textos. As conclusões deste action research sugerem que ferramentas disponíveis online, como blogs, e-mail e o Twiducate, podem ser usadas em sala de aula, nomeadamente desde o 1º ciclo, para promover diferentes oportunidades de aprendizagem, para desenvolver a interatividade e para fomentar um processo de aprendizagem ativo e independente.
APA, Harvard, Vancouver, ISO, and other styles
10

Zuk, Lee. "Will the use of a third-party privacy seal (lock) in an e-mail advertisements result in a higher likelihood of consumers disclosing their private information?" Diss., University of Pretoria, 2015. http://hdl.handle.net/2263/52356.

Full text
Abstract:
One of the commodities in the commercial world has become access to data, specifically personal information. The Internet has rapidly expanded a company s ability to access consumers and individuals personal information, however consumers privacy-concerns regarding the disclosure of their personal information have continued to increase. Using an e-mail marketing campaign, this research explored the impact of using third-party privacy seal (lock) as signals to facilitate consumers disclosing private information. The study employed a live experimental randomised two-group post-test only design, whereby an e-mail advertisement, identical in design except for the image of a third party seal (lock) placed on the non-control group s e-mail. The test explored whether the e-mail advertisement containing the third-party privacy signal (lock) had an impact on whether or not the recipient behaved in a certain way in comparison to the e-mail advertisement that did not contain a lock. The results showed no real significant difference of the third-party seal (lock) on the consumer s preparedness to disclose personal information. Whilst the lock may be used as a trust symbol it is not enough, within the online advertising context, to entice disclosure of personal information. To remain competitive, companies will need to reassess their advertising strategies and further research will need to identify high value signals to encourage consumer disclosure.
Mini Dissertation (MBA)--University of Pretoria, 2015.
vn2016
Gordon Institute of Business Science (GIBS)
MBA
Unrestricted
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "E-mail use"

1

Macdonald, Lynda A. C. Tolley's managing e-mail and Internet use. Croydon, Surrey, U.K: Tolley, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Congress, Trades Union. Use of the Internet and e-mail: Briefing for unions. [London]: TUC, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Terstegge, Jeroen. Goed werken in netwerken: Regels voor controle op e-mail en internetgebruik van werknemers. 2nd ed. Den Haag: College Bescherming Persoonsgegevens, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Stuur, Addo. Internet and e-mail for seniors: With Windows XP : for everyone who wants to learn to use the Internet at a later age. Netherlands: Visual Steps, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Perfect phrases for business letters: Hundreds of ready-to-use phrases for writing effective business letters, memos, e-mail, and more. New York: McGraw-Hill, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

name, No. On-line rights for employees in the information society: Use of monitoring of e-mail and Internet at work: Brussels, 13-14 November 2000: proceedings of the Conference organized by: the Royal Flemish Academy of Belgium for Science and the Arts [...]. The Hague: Kluwer Law International, 2001.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Grasselli, Oraci Maria. Internet, correio eletrônico e intimidade do trabalhador. São Paulo, SP, Brasil: LTr 75, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Rosenberg, Marshall B. Enseigner avec bienveillance: Instaurer une entente mutuelle entre e le ves et enseignants. Gene ve: Jouvence, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Hogg, Clare. Internet and E-Mail Use and Abuse. Beekman Books Inc, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

McKinnon, Wayne R. Wayne McKinnon's Complete Guide to E-mail: How to effectively use and not be abused by e-mail. Ryshell Books, 1998.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "E-mail use"

1

Edenius, Mats. "Discourse on E-Mail in Use." In IFIP Advances in Information and Communication Technology, 73–89. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35634-1_5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

King, Nancy J. "E-Mail and Internet Use Policies." In Handbook of Computer Networks, 689–713. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch44.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Freire, Maximina M. "14. Professional knowledge landscape: A metaphor to conceive of e-mail practices in business settings." In Confronting Metaphor in Use, 287–310. Amsterdam: John Benjamins Publishing Company, 2008. http://dx.doi.org/10.1075/pbns.173.19fre.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Romm, Celia T., and Nava Pliskin. "The Group Dynamics of Telecooperation: The Use of E-mail During the Israeli Academics Strike." In Telekooperation in Unternehmen, 225–41. Wiesbaden: Gabler Verlag, 1997. http://dx.doi.org/10.1007/978-3-322-85187-1_13.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Heiser, Robert S., and Nancy T. Frontczak. "The use and Effectiveness of E-Mail as a Method of Communication in Marketing Education." In Developments in Marketing Science: Proceedings of the Academy of Marketing Science, 104–8. Cham: Springer International Publishing, 2014. http://dx.doi.org/10.1007/978-3-319-13141-2_43.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Borg, Anton, Jim Ahlstrand, and Martin Boldt. "Improving Corporate Support by Predicting Customer e-Mail Response Time: Experimental Evaluation and a Practical Use Case." In Enterprise Information Systems, 100–121. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-75418-1_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Collins, Emily I. M., Anna L. Cox, and Ruby Wootton. "Out of Work, Out of Mind?" In Multigenerational Online Behavior and Media Use, 963–74. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7909-0.ch052.

Full text
Abstract:
Smartphones are now ubiquitous and valuable in many professions and yet have also been blamed for creating an ‘always on' culture, blurring boundaries between work and home. Research has shown that checking e-mails out-of-hours via computer makes workers feel more overloaded with work but also increases their sense of coping. A total of 94 participants completed a survey exploring whether the same pattern would emerge for accessing e-mail on smartphones, showing that those who use smartphones for work e-mail experienced lower levels of overload, but not coping, and push notifications were associated with greater use of smartphones for e-mail. However, there were no significant correlations between coping or overload and e-mail use or quantity, suggesting that lower overload is not due to the ability to processes or read more e-mails outside of work.
APA, Harvard, Vancouver, ISO, and other styles
8

Al-Hamdani, Wasim A. "E-Mail, Web Service and Cryptography." In Applied Cryptography for Cyber Security and Defense, 52–78. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch003.

Full text
Abstract:
Cryptography is the study and practice of protecting information and has been used since ancient times in many different shapes and forms to protect messages from being intercepted. However, since 1976, when data encryption was selected as an official Federal Information Processing Standard (FIPS) for the United States, cryptography has gained large attention and a great amount of application and use. Furthermore, cryptography started to be part of protected public communication when e-mail became commonly used by the public. There are many electronic services. Some are based on web interaction and others are used as independent servers, called e-mail hosting services, which is an Internet hosting service that runs e-mail servers. Encrypting e-mail messages as they traverse the Internet is not the only reason to understand or use various cryptographic methods. Every time one checks his/her e-mail, the password is being sent over the wire. Many Internet service providers or corporate environments use no encryption on their mail servers and the passwords used to check mail are submitted to the network in clear text (with no encryption). When a password is put into clear text on a wire, it can easily be intercepted. Encrypting email will keep all but the most dedicated hackers from intercepting and reading a private communications. Using a personal email certificate one can digitally sign an email so that recipients can verify that it’s really from the sender as well as encrypt the messages so that only the intended recipients can view it. Web service is defined as “a software system designed to support interoperable machine-to-machine interaction over a network” and e-mail is “communicate electronically on the computer”. This chapter focus on introduce three topics: E-mail structure and organization, web service types, their organization and cryptography algorithms which integrated in the E-mail and web services to provide high level of security. The main issue in this article is to build the general foundation through Definitions, history, cryptography algorithms symmetric and asymmetric, hash algorithms, digital signature, suite B and general principle to introduce the use of cryptography in the E-mailand web service
APA, Harvard, Vancouver, ISO, and other styles
9

Corry, David J., and Kim E. Nutz. "Employee E-Mail and Internet Use: Canadian Legal Issues." In Information Technology and the World of Work, 229–51. Routledge, 2017. http://dx.doi.org/10.4324/9780203788554-14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

McManus, Denise Johnson, and Houston Hume Carr. "E-Mail as a Strategic Tool in Organizations." In Encyclopedia of Information Science and Technology, First Edition, 1030–33. IGI Global, 2005. http://dx.doi.org/10.4018/978-1-59140-553-5.ch182.

Full text
Abstract:
During the past decade, strategic information technology (IT) applications, such as electronic mail (e-mail), have been used to gain competitive advantage over rivals or prevent rivals from gaining a competitive advantage. The use of e-mail has been considered a component of overall business strategy, and its application depends more on understanding unique business opportunities than on competitive benefits from technological features that are easily duplicated. Since the first message was sent in 1971 by Ray Tomlinson, e-mail has emerged as an important technological requirement in business. E-mail is as common as the U.S. postal mail in the twentieth century. Businesses, schools, and universities are insisting that employees and students have an e-mail account to check updates or download information concerning business tasks or class activities. Given the widespread acceptance and use of this technology, the strategic value of e-mail within an organization should be apparent.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "E-mail use"

1

Sobotta, Nikolai, and Markus Hummel. "A Capacity Perspective on E-mail Overload: How E-mail Use Contributes to Information Overload." In 2015 48th Hawaii International Conference on System Sciences (HICSS). IEEE, 2015. http://dx.doi.org/10.1109/hicss.2015.89.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Laclavik, Michal, Stefan Dlugolinsky, Marcel Kvassay, and Ladislav Hluchy. "Use of E-mail Social Networks for Enterprise Benefit." In 2010 IEEE/ACM International Conference on Web Intelligence-Intelligent Agent Technology (WI-IAT). IEEE, 2010. http://dx.doi.org/10.1109/wi-iat.2010.126.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

de Brito, Alexandre, Rosa Maria Matienzo, Sergio Goes Oliveira, Cristiano Vasconcellos Ferreira, and Aline Craide. "Use of E-Mail in Global Virtual Team: a Field Research." In 21st SAE Brasil International Congress and Exhibition. 400 Commonwealth Drive, Warrendale, PA, United States: SAE International, 2012. http://dx.doi.org/10.4271/2012-36-0364.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mohamed, Shafinah Farvin Packeer, Ku Ruhana Ku-Mahamud, Razamin Ramli, and Kamarudin Abdullah. "Perceptions and use of e-mail among Universiti Utara Malaysia staff: A pilot study." In THE 2ND INTERNATIONAL CONFERENCE ON APPLIED SCIENCE AND TECHNOLOGY 2017 (ICAST’17). Author(s), 2017. http://dx.doi.org/10.1063/1.5005426.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yamin, Mohamed, and Yvonne Lee. "Level of acceptance and factors influencing students' intention to use UCSI University's e-mail system." In 2010 International Conference on User Science and Engineering (i-USEr 2010). IEEE, 2010. http://dx.doi.org/10.1109/iuser.2010.5716717.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Pretorius, Laurette, and Andries Barnard. "E-mail and Misinformation: A South African Case Study." In InSITE 2004: Informing Science + IT Education Conference. Informing Science Institute, 2004. http://dx.doi.org/10.28945/2741.

Full text
Abstract:
In this paper certain ethical and social issues, insights and lessons learnt surrounding the spread of misinformation resulting from a hoax e-mail sent in South Africa on September 11 2001, linking South Africans to the World Trade Center disaster in New York are considered. A case study, based on the South African newspaper press coverage that this incident received, is discussed. The factual contents are provided in the form a time line, followed by the grouping of stakeholders and a list of stakeholder comments of an ethical, a social or legal nature. Subsequently, various ethical perspectives are explored, different approaches to ethical analysis are employed and an ethical conclusion regarding this incident is reached. This is followed by a brief investigation of the perceived divergence of the ethical and legal perspectives. We conclude this paper by expressing the hope that this case study, and the analysis thereof, would assist South African computing instructors in sensitizing their students to computer ethics issues related to misinformation, the use of e-mail and the Internet.
APA, Harvard, Vancouver, ISO, and other styles
7

Obradović, Maja, Slavko Alčaković, and Ognjen Pavlović. "Effective Use of E-Mail Marketing on Example of Small And Medium-Sized Enterprises in Serbia." In Sinteza 2018. Belgrade, Serbia: Singidunum University, 2018. http://dx.doi.org/10.15308/sinteza-2018-79-84.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Steele, L., J. Dhaliwal, M. Watson, R. Klaber, and M. Coren. "G376(P) Use of a paediatric e-mail account service in optimising community management and outpatient referrals." In Royal College of Paediatrics and Child Health, Abstracts of the Annual Conference, 24–26 May 2017, ICC, Birmingham. BMJ Publishing Group Ltd and Royal College of Paediatrics and Child Health, 2017. http://dx.doi.org/10.1136/archdischild-2017-313087.369.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kaur, Simarjeet, Meenakshi Bansal, and Ashok Kumar Bathla. "A Comparitive Study of E-Mail Spam Detection using Various Machine Learning Techniques." In International Conference on Women Researchers in Electronics and Computing. AIJR Publisher, 2021. http://dx.doi.org/10.21467/proceedings.114.56.

Full text
Abstract:
Due to the rise in the use of messaging and mailing services, spam detection tasks are of much greater importance than before. In such a set of communications, efficient classification is a comparatively onerous job. For an addressee or any email that the user does not want to have in his inbox, spam can be defined as redundant or trash email. After pre-processing and feature extraction, various machine learning algorithms were applied to a Spam base dataset from the UCI Machine Learning repository in order to classify incoming emails into two categories: spam and non-spam. The outcomes of various algorithms have been compared. This paper used random forest, naive bayes, support vector machine (SVM), logistic regression, and the k nearest (KNN) machine learning algorithm to successfully classify email spam messages. The main goal of this study is to improve the prediction accuracy of spam email filters.
APA, Harvard, Vancouver, ISO, and other styles
10

Amorim, Antonio Carlos Oliveira, Daniel Kobayashi Imori, Sérgio Takeo Kofuji, and Vidal Zapparoli Melo. "Análise Estatística do Trafego de E-Mail para o Projeto de um Cluster de Alto Desempenho." In Workshop em Sistemas Computacionais de Alto Desempenho. Sociedade Brasileira de Computação, 2005. http://dx.doi.org/10.5753/wscad.2005.18971.

Full text
Abstract:
This paper shows an e-mail statistical analysis and the behavior of its users based on real servers utilization. The work is related to an specification project, under development in lnstitute for Technological Research (IPT-Brasil), for a high scalability and availability e-mail service ( above 100.000 users). The statistical results are a important step to the system performance evaluation, allowing an implementation of realistic workload simulations. The data collected are related in three categories: the amount of messages per user, the time interval between messages and the size of each message. The time intervals and the size of messages are calculate in accordance to a model thats use probability density functions fitting the real data, scaled to desired quantity of users. To carry through the simulations, Java applications will be implemented to generate messages with the results that best fits the realistic workload. The work intends to simulare the requisitions generated by the users, to measure the system capacity according the servers quantity and performance, to characterize servers utilization pattems and users behavior in arder to determine the restrictive performance factors.
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "E-mail use"

1

SECRETARY OF THE AIR FORCE WASHINGTON DC. Electronic Mail (E-Mail) Management and Use. Fort Belvoir, VA: Defense Technical Information Center, March 1999. http://dx.doi.org/10.21236/ada404978.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wong, M., and W. Schlitt. Sender Policy Framework (SPF) for Authorizing Use of Domains in E-Mail, Version 1. RFC Editor, April 2006. http://dx.doi.org/10.17487/rfc4408.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Huizer, E. Multimedia E-mail (MIME) User Agent Checklist. RFC Editor, August 1995. http://dx.doi.org/10.17487/rfc1820.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huizer, E. Multimedia E-mail (MIME) User Agent Checklist. RFC Editor, August 1995. http://dx.doi.org/10.17487/rfc1844.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Chorna, Olha V., Vita A. Hamaniuk, and Aleksandr D. Uchitel. Use of YouTube on lessons of practical course of German language as the first and second language at the pedagogical university. [б. в.], September 2019. http://dx.doi.org/10.31812/123456789/3253.

Full text
Abstract:
Integration of ICT significantly increases the possibilities of the educational process and extends the boundaries of the educational sphere as a whole. Publicly available resources, such as e-mail, blogs, forums, online applications, video hosting sites, can serve as the basis for building open learning and education. Informational educational technologies of learning foreign languages are in the focus of this study. The article represents the results of theoretical analysis of content on the subject of its personal- and didactic-definite orientation, as well as some aspects of the practical use of commonly used YouTube video materials in the process of teaching German as the first or second foreign language in higher education, namely at the pedagogical university. Taking into account the practical experience of using the materials of several relevant thematic YouTube channels with a fairly wide constant audience, a concise didactic analysis of their product is presented and recommendations on converting video content into methodological material in the framework of practical course of German language by future teachers are offered. Due to the suggested recommendations, the following tasks can be solved: enrichment of the vocabulary; semantization of phraseological units, constant figures of speech, cliché; development of pronunciation skills; expansion of linguistic competence; improving listening and speaking skills; increasing motivation to learn, etc.
APA, Harvard, Vancouver, ISO, and other styles
6

Lytvynova, Svitlana H. Хмаро орієнтоване навчальне середовище загальноосвітнього навчального закладу. [б. в.], August 2018. http://dx.doi.org/10.31812/0564/2451.

Full text
Abstract:
Research goals: to outline the state of secondary education to implement a cloud-oriented learning environment (COLE), establishing research objectives: to determine the readiness of students to the introduction of COLE, to develop a conceptual framework of cooperation in COLE at the level of the institution, identify the actors interact COLE. The object of research supports the learning environment secondary schools; subject – a cloud-oriented learning environment of secondary schools. Research methods used: analysis of statistics and publications. Experimental research and conducted in secondary schools Obolon district of Kyiv. Intermediate results: the architecture of COLE 44 secondary schools of the district, introduced more than 10 thousand accounts established electronic interaction between teachers and students by e-mail Outlook. Currently under development cloud storage (SkyDrive) training materials teachers practiced the skills of teamwork and planning tools calendars. The main conclusions and recommendations. Implementation of COLE at secondary schools provides endless opportunities both teacher and student, in fact created conditions for innovation and learning. Without a doubt we can say that for the future of Honshu, for full use must have a quality Internet, motivated teachers. For subjects of the educational process, the conditions of access to learning materials anywhere, anytime, and it activates the cognitive and creative activity of students that will improve key indicators of learning.
APA, Harvard, Vancouver, ISO, and other styles
7

Eyers, Victoria, Iwan Parry, and Mohammed Zaid. In-Depth Investigation of E-Scooter Performance. TRL, December 2022. http://dx.doi.org/10.58446/hkxd9791.

Full text
Abstract:
E-scooter use is increasing, and with it, the number of collisions involving e-scooters. The rapid rate of uptake of devices has resulted in a gap in the reference data available for collision investigators to make use of in reconstructing collisions, data which is commonly available for other collision types. The main aim of this study was to consider the capabilities of privately owned devices likely to be encountered in ‘real world’ collision scenarios and examine whether manufacturer-published data is realistic. Common characteristics and observations relevant to collision investigations were also recorded. A sample of donated, used devices was tested to determine the acceleration, deceleration and peak speed characteristics of different types of device
APA, Harvard, Vancouver, ISO, and other styles
8

Chagas, Viktor, and Luiza de Mello Stefano. TikTok e Polarização Política no Brasil. Laboratório de Pesquisa em Comunicação, Culturas Políticas e Economia da Colaboração (coLAB), July 2022. http://dx.doi.org/10.56465/ddoslab.2022.001.

Full text
Abstract:
Este relatório se baseia em uma amostra composta por 23.139 vídeos publicados por 264 perfis de políticos no TikTok. Os dados coletados se referem ao período entre outubro de 2018 e março de 2022, quando se encerrou o prazo de desincompatibilização de cargos, segundo o calendário do Tribunal Superior Eleitoral (TSE). O estudo procura avaliar como os políticos utilizam e incorporam o TikTok em suas respectivas estratégias de comunicação política, que tipo de conteúdo produzem, e que resultados concretos, em termos de alcance e engajamento, eles obtêm. Muito se comenta a respeito das diferenças de apropriação de plataformas digitais por políticos de esquerda e de direita. O estudo procura abordar também essa distinção, apresentando dados empíricos que sustentam que o campo conservador-reacionário tem empregado mais e melhor o TikTok para alcançar maior visibilidade e despertar mais engajamento do público. Analisar como direita e esquerda utilizam o TikTok pode elucidar uma série de aspectos relacionados às estratégias de adoção de plataformas digitais por atores políticos. Entre os principais resultados alcançados por este estudo, destacam-se: (a) Políticos de esquerda tendem a publicar menos no TikTok do que políticos de centro e de direita; (b) Políticos de esquerda tendem a ter um número inferior de seguidores e baixos índices de engajamento, se comparados aos políticos da direita; (c) Políticos de esquerda tendem a assumir uma postura mais “dialógica” em comparação com os políticos de direita, que geralmente se caracterizam por uma postura mais “materialista”, ou seja, preferem acumular mais seguidores do que seguir outros usuários; (d) Políticos de esquerda tendem a receber menor quantidade de visualizações nos conteúdos que publicam; (e) Políticos de esquerda tendem a valorizar mais conteúdos de natureza estritamente política, ao passo que políticos de direita fazem uso de uma retórica mais voltada para o entretenimento e o humor, desviando-se frequentemente de pautas públicas; (e) Há quase duas vezes mais políticos de direita no TikTok em relação ao número de políticos de esquerda; (f) Políticos de direita tendem a utilizar mais trilhas sonoras para dublagens e aproveitar melhor as affordances da plataforma para alcançar maior alcance e engajamento; (g) Políticos de direita articulam melhor suas bases de seguidores, já que tendem a ter um número maior de visualizações em seus conteúdos quando dispõem de uma base maior de seguidores; (h) Políticos de direita tendem estatisticamente a acumular mais seguidores e a receber mais curtidas em seus vídeos, ao passo que políticos de esquerda sofrem uma tendência inversa; (i) Políticos de direita não parecem fazer muito investimento para receber mais curtidas em seus conteúdos. Por outro lado, eles costumam acumular um número bastante superior de visualizações, o que pode sugerir um papel ativo da filtragem algorítmica e do sistema de recomendações do TikTok ao indicar tais conteúdos aos usuários; (j) Tiririca é líder absoluto em diferentes métricas de engajamento da plataforma. Seu perfil, porém, não apresenta qualquer referência à sua atuação como deputado federal e se concentra na trajetória enquanto humorista.
APA, Harvard, Vancouver, ISO, and other styles
9

Agrela, Fabiano de Abreu. Narcisismo patológico: A epidemia culturalmente aceita. CPAH REDAÇÃO, February 2023. http://dx.doi.org/10.56238/cpahciencia-004.

Full text
Abstract:
Uma doença que afeta o convívio social e é estimulada no Brasil pelo alto uso de eletrônicos e níveis de ansiedade. Epidemias geralmente geram muito debate e comoção, em especial quando seu país é mais propício a ela, no entanto, não é o que se nota no Brasil com o narcisismo patológico, uma doença destrutiva que é levada “na esportiva”. Narcisismo patológico e a sociedade brasileira O narcisismo é um desvio de personalidade que gera uma auto-valorização extrema, ego inflado e capacidade de manipular terceiros a fim de obter reconhecimento para si, geralmente considerada apenas como um traço de personalidade, ele pode ser, na verdade, uma doença que afeta gravemente o convívio social e afeta principalmente o Brasil. O Brasil possui um ambiente oportuno para a instalação da patologia, a sociedade brasileira é a mais ansiosa do mundo e a que mais passa tempo em frente às telas. A ansiedade leva a sensações de pendências que coloca o sujeito em questão, em uma atmosfera negativa de ameaça, podendo fazer com que desenvolva uma insegurança em relação à opinião dos outros, já o uso de eletrônicos estimula a reação numa recompensa instantânea do cérebro, o que pode servir de válvula de escape para quem sofre de ansiedade, entretanto, pode tornar-se viciante, acionando um gatilho interminável de dor e prazer. Perigos da normalização do narcisismo Pela convenção social de que se trata apenas de uma característica pessoal, o diagnóstico é difícil e a demora pode moldar o cérebro e acarretar em comportamentos que tornam-se culturais e desenvolvem a patologia. O comportamento moderno na rotina de redes sociais, mascara o narcisismo patológico, tornando-o uma epidemia, normalizada pela aceitação, a cultura atual, de precisar ser visto, chamar a atenção, aparecer sempre e não ter a percepção saudável dos limites cria uma exposição negativa e provoca adoecimento emocional. Estamos falando de uma doença que formata um cérebro e um DNA, que futuramente será transmitido de geração a geração, se enraizando cada vez mais em comportamentos culturalmente aceitos, porém trazendo consequências sérias para o futuro da humanidade estimulando psicopatologias futuras que se tornaram epidêmicas.
APA, Harvard, Vancouver, ISO, and other styles
10

Diaz, Fernando, and Denison Oliveira. Novo sonômetro Brüel & Kjær Modelo 2245: O novo sonômetro da Brüel & Kjær tem inovações para todos os tipos de usuários, de consultores a pesquisadores. William D’Andrea Fonseca, July 2020. http://dx.doi.org/10.55753/aev.v35e52.41.

Full text
Abstract:
Há mais de 60 anos a Brüel & Kjær inventou o primeiro sonômetro portátil do mundo. Todos os sonômetros B&K são desenvolvidos para Classe 1 de precisão, facilidade de uso e flexibilidade sem precedentes. O novo sonômetro B&K 2245 é uma solução de uso intuitivo para medições de ruído. O instrumento é acompanhado de uma variedade de aplicativos, cada um customizado para fornecer funcionalidades para as suas tarefas específicas de medição e/ou análise.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography