Journal articles on the topic 'Electronic mail systems – Zimbabwe'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Electronic mail systems – Zimbabwe.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Gold, Eric. "Envoys in electronic mail systems." ACM SIGOIS Bulletin 7, no. 2-3 (1986): 2–10. http://dx.doi.org/10.1145/15847.15848.
Full textSng, Y. N., C. Quek, and S. Foo. "Security in computational electronic mail systems." Information Services & Use 17, no. 4 (1997): 283–94. http://dx.doi.org/10.3233/isu-1997-17409.
Full textFoo, Schubert, Peng Chor Leong, and Yee Nam Sng. "Improving security in computational electronic mail systems." Information Management & Computer Security 5, no. 3 (1997): 102–10. http://dx.doi.org/10.1108/09685229710175783.
Full textMatta, Khalil F., and Naji E. Boutros. "Barriers to electronic mail systems in developing countries." Information Society 6, no. 1-2 (1989): 59–68. http://dx.doi.org/10.1080/01972243.1989.9960069.
Full textSafayenj, Frank, Eric Lee, and James Macgregor. "An empirical investigation of two electronic mail systems." Behaviour & Information Technology 7, no. 4 (1988): 361–72. http://dx.doi.org/10.1080/01449298808901883.
Full textAkin, Omer, and D. Radha Rao. "Efficient computer-user interface in electronic mail systems." International Journal of Man-Machine Studies 22, no. 6 (1985): 589–611. http://dx.doi.org/10.1016/s0020-7373(85)80010-9.
Full textPrasad, K. V. K. K. "On the user interfaces for electronic mail systems." Telematics and Informatics 7, no. 2 (1990): 145–49. http://dx.doi.org/10.1016/0736-5853(90)90006-e.
Full textArmitage, Richard, David Hutchison, and Stephen J. Muir. "Electronic mail and Unix." Data Processing 28, no. 9 (1986): 461–69. http://dx.doi.org/10.1016/0011-684x(86)90313-8.
Full textMcGee, Jenny, and Chuck Cummings. "Selecting an Electronic Mail System." Library Hi Tech 3, no. 4 (1985): 81–85. http://dx.doi.org/10.1108/eb047623.
Full textMallon, Rebecca, and Charles Oppenheim. "Style used in electronic mail." Aslib Proceedings 54, no. 1 (2002): 8–22. http://dx.doi.org/10.1108/00012530210697482.
Full textCurran, Kevin, and Michelle Casey. "Expressing emotion in electronic mail." Kybernetes 35, no. 5 (2006): 616–31. http://dx.doi.org/10.1108/03684920610662368.
Full textSah, Subhrajyoti Ranjan, and Sunil Gavaskar J. "Electronic Mail Classification System Based on Machine Learning approach." Computational Intelligence and Machine Learning 1, no. 1 (2020): 23–30. http://dx.doi.org/10.36647/ciml/01.01.a003.
Full textJones, Russell. "Greater acceptance of electronic mail." Data Processing 27, no. 8 (1985): 7–9. http://dx.doi.org/10.1016/0011-684x(85)90228-x.
Full textJones, Russell. "Electronic mail at British Gas." Data Processing 28, no. 9 (1986): 476–78. http://dx.doi.org/10.1016/0011-684x(86)90315-1.
Full textKawasaki, Jodee L. "Choosing an Electronic Mail System." Journal of Agricultural & Food Information 1, no. 2 (1993): 125–30. http://dx.doi.org/10.1300/j108v01n02_17.
Full textMunyoka, Willard. "Electronic government adoption in voluntary environments – a case study of Zimbabwe." Information Development 36, no. 3 (2019): 414–37. http://dx.doi.org/10.1177/0266666919864713.
Full textDoss, Erini, and Michael C. Loui. "Ethics and the privacy of electronic mail." Information Society 11, no. 3 (1995): 223–35. http://dx.doi.org/10.1080/01972243.1995.9960194.
Full textDubrovsky, Vitaly. "Real-Time Computer-Mediated Conferencing versus Electronic Mail." Proceedings of the Human Factors Society Annual Meeting 29, no. 4 (1985): 380–84. http://dx.doi.org/10.1177/154193128502900415.
Full textTrzaskowski, Jan. "Unsolicited Communication in Social Media." European Business Law Review 25, Issue 3 (2014): 389–406. http://dx.doi.org/10.54648/eulr2014016.
Full textMutsagondo, Samson. "Keeping to your lane." Journal of the South African Society of Archivists 56 (November 30, 2023): 122–33. http://dx.doi.org/10.4314/jsasa.v56i.8.
Full textBURTON, PAUL F. "ELECTRONIC MAIL AS AN ACADEMIC DISCUSSION FORUM." Journal of Documentation 50, no. 2 (1994): 99–110. http://dx.doi.org/10.1108/eb026926.
Full textDeng, Robert H., Li Gong, Aurel A. Lazar, and Weiguo Wang. "Practical protocols for certified electronic mail." Journal of Network and Systems Management 4, no. 3 (1996): 279–97. http://dx.doi.org/10.1007/bf02139147.
Full textSaxby, Stephen. "Electronic monitoring poses E-mail dilemma." Network Security 1995, no. 1 (1995): 17–18. http://dx.doi.org/10.1016/s1353-4858(98)90076-9.
Full textISHIJIMA, Dai. "Anti-Spam Techniques for Administrators of E-mail Systems." Journal of The Institute of Electrical Engineers of Japan 128, no. 4 (2008): 219–22. http://dx.doi.org/10.1541/ieejjournal.128.219.
Full textVerkhova, G. V., N. P. Metkin, and A. S. Yastrebov. "Parametric Optimization of Multilevel Hierarchical Systems of Mail Communication." Telecommunications and Radio Engineering 62, no. 4 (2004): 383–95. http://dx.doi.org/10.1615/telecomradeng.v62.i4.70.
Full textVerkhova, G. V., N. P. Metkin, and A. S. Yastrebov. "Parametric Optimization of Multilevel Hierarchical Systems of Mail Communication." Telecommunications and Radio Engineering 62, no. 1-6 (2004): 383–95. http://dx.doi.org/10.1615/telecomradeng.v62.i4.80.
Full textWeiming Hu. "Design and implementation of a gateway between two electronic mail systems." IEEE Communications Magazine 24, no. 6 (1986): 18–23. http://dx.doi.org/10.1109/mcom.1986.1093104.
Full textKozík, Tomáš, and Jozefína Slivová. "Netiquette in Electronic Communication." International Journal of Engineering Pedagogy (iJEP) 4, no. 3 (2014): 67. http://dx.doi.org/10.3991/ijep.v4i3.3570.
Full textRudy, I. A. "A critical review of research on electronic mail." European Journal of Information Systems 4, no. 4 (1996): 198–213. http://dx.doi.org/10.1057/ejis.1996.2.
Full textGlausiusz, Josie A., and Penelope A. Yates-Mercer. "Some impacts of electronic mail on information services." Journal of Information Science 16, no. 4 (1990): 249–56. http://dx.doi.org/10.1177/016555159001600405.
Full textJames, Kedrick. "Mobility and Literacy: Development of the Public Network Concept." Language and Literacy 14, no. 2 (2012): 6. http://dx.doi.org/10.20360/g2zc7m.
Full textChen, Hsing-Chung, Cheng-Ying Yang, Hui-Kai Su, Ching-Chuan Wei, and Chao-Ching Lee. "A secure e-mail protocol using ID-based FNS multicast mechanism." Computer Science and Information Systems 11, no. 3 (2014): 1091–112. http://dx.doi.org/10.2298/csis130924066c.
Full textHIGA, KUNIHIKO, MILAM W. AIKEN, and OLIVIA R. LIU SHENG. "STRUCTURED DESIGN OF A KNOWLEDGE-BASED MESSAGE DISSEMINATION SYSTEM." International Journal of Software Engineering and Knowledge Engineering 04, no. 01 (1994): 61–80. http://dx.doi.org/10.1142/s0218194094000040.
Full textHansen, Nancy E., and John Gladfelter. "Teaching Graduate Psychology Seminars Using Electronic Mail: Creative Distance Education." Teaching of Psychology 23, no. 4 (1996): 252–56. http://dx.doi.org/10.1207/s15328023top2304_16.
Full textLatreche, Abdelkrim, and Kadda Benyahia. "A New Bio-Inspired Method for Spam Image-Based Emails Filtering." International Journal of Organizational and Collective Intelligence 11, no. 2 (2021): 29–50. http://dx.doi.org/10.4018/ijoci.2021040102.
Full textNaudé, Annelie, and H. J. Groenewald. "ELEKTRONIESE POS AS REKENAARBEMIDDELDE KOMMUNIKASIE." Communicare: Journal for Communication Studies in Africa 15, no. 1 (2022): 45–67. http://dx.doi.org/10.36615/jcsa.v15i1.1914.
Full textThabani, Nyoni. "TOWARDS A CASHLESS ZIMBABWE: AN EMPIRICAL ANALYSIS." International Journal of Marketing & Financial Management 6, no. 1 (2018): 32–44. https://doi.org/10.5281/zenodo.10816909.
Full textBikson, T. K., and S. A. Law. "Electronic mail use at the World Bank: Messages from users." Information Society 9, no. 2 (1993): 89–124. http://dx.doi.org/10.1080/01972243.1993.9960135.
Full textDzomira, Shewangu. "Electronic fraud (cyber fraud) risk in the banking industry Zimbabwe." Risk Governance and Control: Financial Markets and Institutions 4, no. 2 (2014): 17–27. http://dx.doi.org/10.22495/rgcv4i2art2.
Full textBeasley, J. E. "OR-Library: Distributing Test Problems by Electronic Mail." Journal of the Operational Research Society 41, no. 11 (1990): 1069. http://dx.doi.org/10.2307/2582903.
Full textBeasley, J. E. "OR-Library: Distributing Test Problems by Electronic Mail." Journal of the Operational Research Society 41, no. 11 (1990): 1069–72. http://dx.doi.org/10.1057/jors.1990.166.
Full textOkolica, Carol, and Concetta M. Stewart. "Voice Mail and Academics: Creating a Virtual Office." Journal of Educational Technology Systems 22, no. 2 (1993): 113–21. http://dx.doi.org/10.2190/uvr2-06wk-7qkm-rcr5.
Full textZokaee, Shiva, and Mostafa Ghazizadeh . "Electronic Payment Systems Evaluation: A Case Study in Iran." Information Management and Business Review 4, no. 3 (2012): 120–27. http://dx.doi.org/10.22610/imbr.v4i3.972.
Full textRau, Pei-Luen P., and G. Salvendy. "Ergonomics of electronic mail address systems: related literature review and survey of users." Ergonomics 44, no. 4 (2001): 382–401. http://dx.doi.org/10.1080/00140130010011341.
Full textChen, Hsing‐Chung. "Secure multicast key protocol for electronic mail systems with providing perfect forward secrecy." Security and Communication Networks 6, no. 1 (2012): 100–107. http://dx.doi.org/10.1002/sec.536.
Full textHoffman, Robert. "Powerful, personal: electronic mail and the L2 writing process." ReCALL 6, no. 2 (1994): 53–62. http://dx.doi.org/10.1017/s0958344000003244.
Full textPenrose, John M., and Douglas Muller. "The Effects Of Computer-Mediated Communication Systems On Writing." Journal of Applied Business Research (JABR) 4, no. 1 (2011): 113. http://dx.doi.org/10.19030/jabr.v4i1.6451.
Full textTauber, Arne. "Requirements and Properties of Qualified Electronic Delivery Systems in eGovernment." International Journal of E-Adoption 2, no. 1 (2010): 45–58. http://dx.doi.org/10.4018/jea.2010010104.
Full textAdams, Dennis A., Peter A. Todd, and R. Ryan Nelson. "A comparative evaluation of the impact of electronic and voice mail on organizational communication." Information & Management 24, no. 1 (1993): 9–21. http://dx.doi.org/10.1016/0378-7206(93)90043-s.
Full textHnini, Ghizlane, Jamal Riffi, Mohamed Adnane Mahraz, Ali Yahyaouy, and Hamid Tairi. "Attention Mechanism and Support Vector Machine for Image-Based E-Mail Spam Filtering." Big Data and Cognitive Computing 7, no. 2 (2023): 87. http://dx.doi.org/10.3390/bdcc7020087.
Full text