Academic literature on the topic 'Emails'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Emails.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Emails"

1

Singh, Kuldeep, Palvi Aggarwal, Prashanth Rajivan, and Cleotilde Gonzalez. "What makes phishing emails hard for humans to detect?" Proceedings of the Human Factors and Ergonomics Society Annual Meeting 64, no. 1 (2020): 431–35. http://dx.doi.org/10.1177/1071181320641097.

Full text
Abstract:
This research investigates the email features that make a phishing email difficult to detect by humans. We use an existing data set of phishing and ham emails and expand that data set by collecting annotations of the features that make the emails phishing. Using the new, annotated data set, we perform cluster analyses to identify the categories of emails and their attributes. We then analyze the accuracy of detection in each category. Our results indicate that the similarity of the features of phishing emails to benign emails, play a critical role in the accuracy of detection. The phishing ema
APA, Harvard, Vancouver, ISO, and other styles
2

Lüthje, Corinna, and Franziska Thiele. "Communication floods – Emails in scholarly communication." Studies in Communication and Media 9, no. 3 (2020): 367–93. http://dx.doi.org/10.5771/2192-4007-2020-3-367.

Full text
Abstract:
The aim of this study is to display the current email usage among academics and the email‘s influence on the field of science by analyzing qualitative interviews and media diaries with 55 German-speaking academics. Emails pose a particular challenge for separating work and personal spheres. Mobile media such as tablets and smartphones reinforce the penetrating effects of emails. Our results show that scholars hardly engage in a temporal and spatial separation of the spheres when accessing work emails. This is one of the reasons why emails contribute to a perception of information overload and
APA, Harvard, Vancouver, ISO, and other styles
3

Mackintosh, Patrick, Luke Brantley, Alexander Hansen, et al. "Maximizing Clicks in Email Marketing Campaigns for a Retail Company." International Journal of Applied Industrial Engineering 4, no. 2 (2017): 33–46. http://dx.doi.org/10.4018/ijaie.2017070103.

Full text
Abstract:
Retailers rely on strong marketing programs to make sales in a competitive environment. One of the biggest sectors of marketing is email loyalty programs. The industry uses Click Through Rate to measure the effectiveness of an email marketing campaign. Click Through Rate measures the ratio between emails sent to customers and the number of customers that open and click on the email's link. The purpose of this analysis is to define the relationship between the rate of emails sent and the amount of emails opened, opened and clicked, sent to spam, and unsubscribed. The authors' 800 million record
APA, Harvard, Vancouver, ISO, and other styles
4

Julysa C. Cardona. "Real or Reel: A Comparative Analysis of Authentic and Phishing Emails." Journal of English Language Teaching and Applied Linguistics 7, no. 1 (2025): 159–72. https://doi.org/10.32996/jeltal.2025.7.1.15.

Full text
Abstract:
Although technology can be used for good reasons, the same can be exploited by cybercriminals for malicious intents and activities like phishing attacks. The use of phishing emails in such crimes makes it riveting to understand language's role in such a deceptive undertaking. Hence, this qualitative work comparatively analyzed the language correctness and deviations, illocutionary speech acts, and persuasion principles of phishing and authentic emails to draw the line that separates the genuine from the copycat. The results reveal that although phishing emails commit more types of language dev
APA, Harvard, Vancouver, ISO, and other styles
5

Eze, Chibuike Samuel, and Lior Shamir. "Analysis and Prevention of AI-Based Phishing Email Attacks." Electronics 13, no. 10 (2024): 1839. http://dx.doi.org/10.3390/electronics13101839.

Full text
Abstract:
Phishing email attacks are among the most common and most harmful cybersecurity attacks. With the emergence of generative AI, phishing attacks can be based on emails generated automatically, making it more difficult to detect them. That is, instead of a single email format sent to a large number of recipients, generative AI can be used to send each potential victim a different email, making it more difficult for cybersecurity systems to identify the scam email before it reaches the recipient. Here, we describe a corpus of AI-generated phishing emails. We also use different machine learning too
APA, Harvard, Vancouver, ISO, and other styles
6

T. Vacalares, Sophomore, Brian Paul E. Sta. Ana, and Daryl Q. Dranto. "Bank Emails: The Language of Legit and Scam." International Journal of Research and Review 11, no. 7 (2024): 192–203. http://dx.doi.org/10.52403/ijrr.20240721.

Full text
Abstract:
Amidst the pandemic, the surge in unsolicited scam emails has made internet technology a significant concern. Distinguishing between scams and authentic/legit emails has become increasingly difficult. This research aimed to identify typical characteristics and language patterns found in emails. It also aimed to identify the common linguistics and technical features of the scams and legitimate bank emails. Two legitimate emails and two scam or fraudulent emails from different banks in the Philippines (i.e., LandBank and BDO). A qualitative method was used to analyze and interpret the language f
APA, Harvard, Vancouver, ISO, and other styles
7

Lim, Hajin, Dan Cosley, and Susan R. Fussell. "Understanding Cross-lingual Pragmatic Misunderstandings in Email Communication." Proceedings of the ACM on Human-Computer Interaction 6, CSCW1 (2022): 1–32. http://dx.doi.org/10.1145/3512976.

Full text
Abstract:
Communication tools such as email facilitate communication and collaboration between speakers of different languages, who use two primary strategies-English as a common language and machine translation (MT) tools-to help them overcome language barriers. However, each of these communication strategies creates its own challenges for cross-lingual communication. In this paper, we compare how people's interpretations of an email sender's social intention, and their evaluation of the email and the senders, differ when using a common language versus MT in email communication. We conducted an online
APA, Harvard, Vancouver, ISO, and other styles
8

Harjot, Kaur* Er. Prince Verma. "SURVEY ON E-MAIL SPAM DETECTION USING SUPERVISED APPROACH WITH FEATURE SELECTION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 4 (2017): 120–28. https://doi.org/10.5281/zenodo.496096.

Full text
Abstract:
Electronic Mail (E-mail) has established a significant place in information user’s life. Mails are used as a major and important mode of information sharing because emails are faster and effective way of communication. Email plays its important role of communication in both personal and professional aspects of one’s life. The rapid increase in the number of account holders from last few decades and the increase in the volume of mails have generated various serious issues too. Emails are categorized into ham and spam emails. From past decades spam emails are spreading at tremendous rate. These
APA, Harvard, Vancouver, ISO, and other styles
9

Sarno, Dawn M., Joanna E. Lewis, Corey J. Bohil, Mindy K. Shoss, and Mark B. Neider. "Who are Phishers luring?: A Demographic Analysis of Those Susceptible to Fake Emails." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (2017): 1735–39. http://dx.doi.org/10.1177/1541931213601915.

Full text
Abstract:
Previous research has identified several populations that are susceptible to inauthentic emails (e.g., spam). However, these studies utilize retrospective, self-report measures to assess email users’ interactions with limited sets of inauthentic emails. In order to fill this gap in the literature, the present study assessed participants’ likelihood to rate a wide variety of emails as spam, authentic, and dangerous. The results highlighted several key findings, 1) there were no gender differences for the email ratings, there were only differences in experience with email, 2) those who do not re
APA, Harvard, Vancouver, ISO, and other styles
10

Ben Amor, Imen Aribi. "Email as a mode of communication among Tunisian postgraduate students." International Journal of Learning and Teaching 9, no. 3 (2017): 388–409. http://dx.doi.org/10.18844/ijlt.v9i3.2381.

Full text
Abstract:
Abstract
 
 Emails have great potential in facilitating academic communication. However, writing effective academic emails depends on many factors including students’ knowledge, experiences and perceptions about emails. According to Brown and Levinson (1987), people use certain politeness strategies to enhance face between themselves and their interlocutors. Yet, the underlying processes of email communication may be poorly understood, especially as far as politeness is concerned. This study seeks to examine the perceptions, practices and attitudes of 38 postgraduateTunisian students
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Emails"

1

Andla, Christoffer. "Detecting Spam Emails." Thesis, KTH, Skolan för elektro- och systemteknik (EES), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-200517.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Rozentals, Emils. "Email load and stress impact on susceptibility to phishing and scam emails." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85403.

Full text
Abstract:
How does the email load and stress affect the susceptibility to phishing and scam emails? The study was conducted with a Qualitative research approach. Semi-structured interviews were selected for the data gathering. Thematic Analysis was used to analyze Empirical data. This research studied if a high email load affects the likelihood of falling victim to phishing and scam attacks. Research was studied through a theoretical lens of stress, since high email load is subjective for each individual and stress rate can show better how people are perceiving their email load. Findings suggest that hi
APA, Harvard, Vancouver, ISO, and other styles
3

Lingaas, Türk Jakob. "Comparing the relative efficacy of phishing emails." Thesis, Högskolan i Halmstad, Akademin för informationsteknologi, 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:hh:diva-42392.

Full text
Abstract:
This study aimed to examine if there was a difference in how likely a victim is to click on a phishing email’s links based on the content of the email, the tone and language used and the structure of the code. This likelihood also includes the email’s ability to bypass spam filters.  Method: The method used to examine this was a simulated phishing attack. Six different phishing templates were created and sent out via the Gophish framework to target groups of students (from Halmstad University), from a randomized pool of 20.000 users. The phishing emails contained a link to a landing page (host
APA, Harvard, Vancouver, ISO, and other styles
4

Valieri, Simona, and Nicola Marin. "The optimization of transactional emails in a marketing perspective : Incomedia case." Thesis, Uppsala universitet, Företagsekonomiska institutionen, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-179794.

Full text
Abstract:
Aim:  Optimize the usage of transactional emails, going beyond their communicative nature and combining it with marketing purposes. The project has been developed in collaboration with Incomedia, Italian software developer and vendor. Objective: Understand how Incomedia can exploit the benefits of transactional emails in a marketing perspective in order to increase the sales of its software. Limitation: The specificity of the topic, strictly related to Incomedia’s activities, products and consumers. Limits of time and variables tested with the A/B experiment. Theory/Methodology : It helped us
APA, Harvard, Vancouver, ISO, and other styles
5

Jackson, Thomas William. "The cost effectiveness of electronic communication." Thesis, Loughborough University, 2001. https://dspace.lboro.ac.uk/2134/7555.

Full text
Abstract:
Electronic communication is becoming an integral part of the communication structure within organisations, but the costs and benefits are not being assessed. Communication by email is usually assumed to be an efficient and effective means of sending messages. However, on analysis the process is seen to be much more complex and much less efficient than is normally assumed. Communication is carried out in many different forms, but the common underlying motive of communication is to improve working practices and to increase productivity. As communication pervades nearly everything we do, even sma
APA, Harvard, Vancouver, ISO, and other styles
6

Pettersson, Lena. "Writing Business Emails in English as a Lingua Franca - how informal can you be? : An analysis of formality in BELF emails." Thesis, Stockholms universitet, Engelska institutionen, 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:su:diva-118100.

Full text
Abstract:
As a result of globalisation, the number of companies working globally is increasing at an unprecedented pace. Consequently, the need to communicate with people from other countries is getting bigger. In such intercultural communication, a common language must be used to interact. The language of choice is most often English, which is the business lingua franca (BELF) today. Furthermore, email has become the obvious choice of medium when interacting with foreign business associates. The present study was conducted through intensive and extensive analyses, investigating BELF emails written by 2
APA, Harvard, Vancouver, ISO, and other styles
7

Stout, Benjamin C. "Do Booster Emails Improve Learning Transfer Among Parenting Professionals?" DigitalCommons@USU, 2019. https://digitalcommons.usu.edu/etd/7414.

Full text
Abstract:
Parenting professionals play a key role in helping parents have a positive influence on their children, which is why it is important to ensure that professionals have and use research-based information and materials. Using data from 96 parenting professionals from Utah and Missouri, who completed a 4-hour Strong Parents, Stable Children training, we examined the effects (at 2-months post training) of reflective reminder emails on parenting professionals’ utilization and learning transfer of training materials. Results from independent samples t tests show that participants who received “booste
APA, Harvard, Vancouver, ISO, and other styles
8

Forsman, Kristoffer, and Arvid Horned. "SINCE THE BEGINNING OF THIS INTERVIEW I HAVE MANAGED FOUR EMAILS : A qualitative study of email management for information workers." Thesis, Umeå universitet, Institutionen för informatik, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:umu:diva-160964.

Full text
Abstract:
As a result of the rapid development of technology and the implementation of it in work environments, productivity and profit can increase for an organization. Email has led to much shorter ways of communication but there are also less positive aspects of technology. Technostress, information overload and email overload are all three effects of this new ubiquitous digital era. We ask how individual information workers manage and reply to incoming email, to extend our knowledge regarding the effects of email overload on information workers, and to identify their coping strategies in their work
APA, Harvard, Vancouver, ISO, and other styles
9

Alseadoon, Ibrahim Mohammed A. "The impact of users' characteristics on their ability to detect phishing emails." Thesis, Queensland University of Technology, 2014. https://eprints.qut.edu.au/72873/1/Ibrahim%20Mohammed%20A_Alseadoon_Thesis.pdf.

Full text
Abstract:
We investigate how email users' characteristics influence their response to phishing emails. A user generally goes through three stages of behaviour upon receiving a phishing email: suspicion of the legitimacy of the email, confirmation of its legitimacy and response by either performing the action requested in the phishing email or not. Using a mixed method approach combining experiments, surveys and semi-structured interviews, we found that a user's behaviour at each stage varies with their personal characteristics such as personality traits and ability to perceive information in an email be
APA, Harvard, Vancouver, ISO, and other styles
10

Al, Jlailaty Diana. "Mining Business Process Information from Emails Logs for Process Models Discovery." Thesis, Paris Sciences et Lettres (ComUE), 2019. http://www.theses.fr/2019PSLED028.

Full text
Abstract:
Les informations échangées dans les textes des courriels sont généralement concernées par des événements complexes ou des processus métier dans lesquels les entités qui échangent des courriels collaborent pour atteindre les objectifs finaux des processus. Ainsi, le flux d’informations dans les courriels envoyés et reçus constitue une partie essentielle, les activités métier de l’entreprise. L’extraction d’informations sur les processus métier à partir des courriels peut aider à améliorer la gestion des courriels pour les utilisateurs. Il peut également être utilisé pour tr
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Emails"

1

Ganeri, Anita. Letters and emails. Raintree, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chapman, Rebecca. English for emails. Oxford University Press, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Neto, Amaro Moraes e. Silva. Emails indesejados à luz do direito. Editora Quartier Latin do Brasil, 2002.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Gewirtz, David. Where have all the emails gone? Zatz, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Abou, Olivier. Le PC: Internet et les emails. Micro Application, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Ganeri, Anita. I can write letters and emails. Raintree, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

and, Claire LePage. Emails. Blurb, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Qiu, Jade. Emails. Blurb, 2015.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Sumerfield, J. S. JS. Education Emails. Independently Published, 2019.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Dickens, Ken. grave emails. CreateSpace Independent Publishing Platform, 2018.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Emails"

1

Reddy, Niranjan. "Emails and Email Crime." In Practical Cyber Forensics. Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4460-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Wallwork, Adrian. "Emails." In English for Academic Research: Vocabulary Exercises. Springer US, 2012. http://dx.doi.org/10.1007/978-1-4614-4268-4_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Wallwork, Adrian. "Emails." In English for Academic Research: Vocabulary Exercises. Springer Nature Switzerland, 2024. http://dx.doi.org/10.1007/978-3-031-53171-2_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sarrion, Eric. "Creating Emails." In ChatGPT for Beginners. Apress, 2023. http://dx.doi.org/10.1007/978-1-4842-9804-6_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Thomson, Bob. "Handling emails." In Management from A to Z and back again. Routledge, 2025. https://doi.org/10.4324/9781041056188-51.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yajima, Masanori, Daiki Chiba, Yoshiro Yoneya, and Tatsuya Mori. "A First Look at Brand Indicators for Message Identification (BIMI)." In Passive and Active Measurement. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-28486-1_20.

Full text
Abstract:
AbstractAs promising approaches to thwarting the damage caused by phishing emails, DNS-based email security mechanisms, such as the Sender Policy Framework (SPF), Domain-based Message Authentication, Reporting & Conformance (DMARC) and DNS-based Authentication of Named Entities (DANE), have been proposed and widely adopted. Nevertheless, the number of victims of phishing emails continues to increase, suggesting that there should be a mechanism for supporting end-users in correctly distinguishing such emails from legitimate emails. To address this problem, the standardization of Brand Indic
APA, Harvard, Vancouver, ISO, and other styles
7

Nunes, Emilia. "Email Security." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_36.

Full text
Abstract:
AbstractEmails were not designed with cyber-attack protection in mind, making them an attractive target for cybercriminals. A primary attack vector is phishing, a type of social engineering in which a fraudulent message is sent to trick a person. however, email messages can be secured using cryptography. For example, end-to-end encryption could protect them in transit and at rest. In addition, transport Layer Security is used to protect emails in transit between email servers and clients. Nevertheless, emails may never be as secure as newly designed solutions with solid end-to-end encryption a
APA, Harvard, Vancouver, ISO, and other styles
8

Petzold, Arnin, and Helmut Pöschmann. "Auftragen des Emails." In Email und Emailliertechnik. Springer Berlin Heidelberg, 1987. http://dx.doi.org/10.1007/978-3-642-83081-5_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Rose, Jean. "Letters and Emails." In The Mature Student’s Guide to Writing. Macmillan Education UK, 2012. http://dx.doi.org/10.1007/978-1-137-26557-9_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Pitt, Christopher. "Queues, Logging, Emails." In Pro PHP 8 MVC. Apress, 2021. http://dx.doi.org/10.1007/978-1-4842-6957-2_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Emails"

1

Gupta, Aditya, Akshay Kumar Mishra, and Kavita Arora. "Detecting Phishing Emails Using Natural Language Processing." In 2025 International Conference on Pervasive Computational Technologies (ICPCT). IEEE, 2025. https://doi.org/10.1109/icpct64145.2025.10941056.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Dumitras, Andrei, Cristinel Mihai Mocan, and Ciprian Oprisa. "A Feature Engineering Approach for Detecting Phishing Emails." In 2024 IEEE 20th International Conference on Intelligent Computer Communication and Processing (ICCP). IEEE, 2024. https://doi.org/10.1109/iccp63557.2024.10793001.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Boulila, Elyssa, Marc Dacier, Siva Prem Vengadessa Peroumal, Nicolas Veys, and Simone Aonzo. "A Closer Look At Modern Evasive Phishing Emails." In 2025 55th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN). IEEE, 2025. https://doi.org/10.1109/dsn64029.2025.00066.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Huang, Ximin, Fangli Ren, Weize Zhang, et al. "What Makes an Email Insecure: A Fine-Grained Risk Assessment Scheme for Phishing Emails Targeting Attack Vectors." In 2025 28th International Conference on Computer Supported Cooperative Work in Design (CSCWD). IEEE, 2025. https://doi.org/10.1109/cscwd64889.2025.11033386.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Wu, Yejun, and Douglas W. Oard. "Indexing emails and email threads for retrieval." In the 28th annual international ACM SIGIR conference. ACM Press, 2005. http://dx.doi.org/10.1145/1076034.1076180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Chen, Zixuan, and Garret Washburn. "A Robust Set of Emailing Applications that Allowaneffective Solution for Bulk Email Sendingandreceiving." In 12th International Conference of Security, Privacy and Trust Management. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.141111.

Full text
Abstract:
In the current digital age, the capability of a business or workforce team to send out or receive a mass amount of emails is increasingly becoming more important. However, with this becoming more and more of a necessity, the tools to do so are not developing as rapidly. The method this paper seeks to provide as a solution to this problem is the Email Sender and Receiver applications that are described within this paper [1]. The main technologies used to create these Python applications behind the scenes are the Mailgun API, the Gmail API, and the PySimpleGui Python library [2]. One of the chal
APA, Harvard, Vancouver, ISO, and other styles
7

Vishnu, M. S., Dhruv Damle, Debanshu Bhaumik, and Debashish Sahu. "Semantic emails." In the 25th Australian Computer-Human Interaction Conference. ACM Press, 2013. http://dx.doi.org/10.1145/2541016.2541101.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Narayan, Rajnikant, and Mr Vinay Kumar. "SPAM EMAIL DETECTION USING DEEP LEARNING MODEL." In Computing for Sustainable Innovation: Shaping Tomorrow’s World. Innovative Research Publication, 2024. http://dx.doi.org/10.55524/csistw.2024.12.1.47.

Full text
Abstract:
The persistent menace of spam emails poses a formidable cybersecurity threat, demanding the implementation of robust classification models for prompt detection and prevention. This research addresses the intricate challenge of classifying spam emails by evaluating diverse machine learning and deep learning models. The focal point of the identified problem lies in the inherent complexity of distinguishing spam emails from legitimate ones, leading to potential security vulnerabilities. Existing models' limitations, particularly in managing false positives and false negatives, underscore the impe
APA, Harvard, Vancouver, ISO, and other styles
9

Voghoei, Sahar, Navid Hashemi Tonekaboni, Delaram Yazdansepas, Saber Soleymani, Abolfazl Farahani, and Hamid R. Arabnia. "Personalized Feedback Emails." In ACM SE '20: 2020 ACM Southeast Conference. ACM, 2020. http://dx.doi.org/10.1145/3374135.3385274.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Laclavík, Michal, Štefan Dlugolinský, Martin Šeleng, Marek Ciglan, and Ladislav Hluchý. "Emails as graph." In the 21st international conference companion. ACM Press, 2012. http://dx.doi.org/10.1145/2187980.2188210.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Emails"

1

Rada, Gabriel. Can email communication between health professionals improve healthcare? SUPPORT, 2017. http://dx.doi.org/10.30846/1701154.

Full text
Abstract:
The use of email as a medium for business and social communication is increasingly common. Healthcare professionals have been communicating via email since the early 1990s, for varying purposes. However, it is not clear what the impacts of emails in healthcare are when compared to other forms of communicating clinical information.
APA, Harvard, Vancouver, ISO, and other styles
2

Rada, Gabriel. Can email communication between health professionals improve healthcare? SUPPORT, 2017. http://dx.doi.org/10.30846/171501.

Full text
Abstract:
The use of email as a medium for business and social communication is increasingly common. Healthcare professionals have been communicating via email since the early 1990s, for varying purposes. However, it is not clear what the impacts of emails in healthcare are when compared to other forms of communicating clinical information.
APA, Harvard, Vancouver, ISO, and other styles
3

Fette, Ian, Norman Sadeh, and Anthony Tomasic. Learning to Detect Phishing Emails. Defense Technical Information Center, 2006. http://dx.doi.org/10.21236/ada456046.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Keefer, Philip, Benjamin Roseth, and Julieth Santamaria. General Skills Training for Public Employees Experimental: Evidence on Cybersecurity Training in Argentina. Inter-American Development Bank, 2024. http://dx.doi.org/10.18235/0013202.

Full text
Abstract:
Cyberattacks have risen to become one of the most critical global risks. Despite increasing investments to combat cyberattacks, there remains a significant, often unnoticed vulnerability: employees. Previous literature reveals that over two-thirds of cyberattacks within organizations result from employee negligence. While strengthening cybersecurity through employee training is essential, traditional methods often fall short. In this study, we tested different approaches to reduce risk exposure to phishing, one of the most common types of cyberattacks, focusing on a sector and context unaddres
APA, Harvard, Vancouver, ISO, and other styles
5

González, María P., and Carlos Scartascini. Research Insights: How Can the Full Potential of Telemedicine Be Unlocked? Inter-American Development Bank, 2023. http://dx.doi.org/10.18235/0005266.

Full text
Abstract:
An intervention in Argentina that sent periodic emails to households about available telemedicine services effectively increased the adoption of and demand for telemedicine. Patients who were part of the intervention were significantly more likely to use telemedicine services. The number of virtual consultations by the group that received the email intervention was six times larger than those of the control group after eight months. The study found that the intervention had lasting effects, suggesting that getting patients to try telemedicine for the first time can lead to continued use over t
APA, Harvard, Vancouver, ISO, and other styles
6

Wu, Ling, Tao Zhang, Yao Wang, et al. Polymorphisms and premature ovarian insufficiency and failure: A comprehensive meta-analysis update, subgroup, ranking, and network analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2022. http://dx.doi.org/10.37766/inplasy2022.1.0052.

Full text
Abstract:
Review question / Objective: Early identification of women potentially who develop POI and POF is essential for early screening and treatment to improve clinical outcomes. We aim to conduct a comprehensive meta-analysis update, subgroup, ranking and network analysis for all available genetic polymorphism and associated with the POI and POF risk. Information sources: Six electronic databases will be included such as PubMed, Web of Science, Embase, MEDLINE, WANFANG DATA, CNKI. Will contact with authors by emails when necessary.
APA, Harvard, Vancouver, ISO, and other styles
7

Trachunthong, Deondara, Suchintana Chumseng, Worrayot Darasawang, and Mathuros Tipayamongkholgul. Risk Factors and National Burden of Selected Noncommunicable Diseases in People Living with HIV: Systematic Review, Meta-Analysis and, Disability-Adjusted Life Years protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2022. http://dx.doi.org/10.37766/inplasy2022.9.0018.

Full text
Abstract:
Review question / Objective: 1. Are the prevalence/incidence of four major groups of NCDs including MetS, DM, CVD, and CKD different among adults with and without HIV infection? 2. Are there relationships between HIV status, ART (ART use, short and long-term effects of ART), traditional risk factors (BMI), and the development of four major NCDs? 3. Does the trend of NCDs burden attributable to HIV in Thailand increase according to the time? Information sources: 1. Electronic databases: the following databases will be searched: PubMed/Medline, Scopus, Embase, Cochrane Library Thai journals onli
APA, Harvard, Vancouver, ISO, and other styles
8

Molla-Esparza, Cristian, Natalia Gandía Carbonell, María Isabel Gómez Núñez, and Laura Badenes Ribera. Prevalence of sex under the influence of drugs among young adults: a systematic review and meta-analysis protocol. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2021. http://dx.doi.org/10.37766/inplasy2021.10.0077.

Full text
Abstract:
Review question / Objective: The objective of this systematic review and meta-analysis is to examine the prevalence of engaging in sex under the influence of drugs among young adults. Condition being studied: The prevalence of sex under the influence of drugs in young adults. Information sources: Published and unpublished literature will be systematically searched via three electronic databases: ISI Web of Science (WoS Core Collection); Scopus; and Psychological Information (PsycInfo). A grey literature search will also be performed via the Google and Google Scholar search engines, in order to
APA, Harvard, Vancouver, ISO, and other styles
9

Trombetta, Martin, Nicolás Ajzenman, Tamara Vinacur, and Maria Laura Basabe. Aumentando la retención estudiantil a través de campañas de emails: resultados de una intervención realizada en la Universidad de Buenos Aires (UBA) en 2024. Inter-American Development Bank, 2025. https://doi.org/10.18235/0013586.

Full text
Abstract:
En 2024, el Banco Interamericano de Desarrollo (BID) y la Universidad de Buenos Aires (UBA) llevaron a cabo una intervención experimental con el objetivo de reducir la deserción estudiantil en el programa de educación a distancia UBA XXI. La estrategia consistió en una campaña de sensibilización vía correo electrónico dirigida a estudiantes de tres materias del Ciclo Básico Común. Los mensajes se centraron en el abordaje de sesgos cognitivos, como el sesgo del presente y el sesgo de status quo, y destacaron información clave sobre los exámenes y los beneficios económicos de completar los estud
APA, Harvard, Vancouver, ISO, and other styles
10

Donti, Olyvia, Andreas Konrad, Ioli Panidi, Petros Dinas, and Gregory Bogdanis. Is there a window of opportunity for flexibility development in youth? A systematic review with meta-analysis. INPLASY - International Platform of Registered Systematic Review and Meta-analysis Protocols, 2021. http://dx.doi.org/10.37766/inplasy2021.9.0032.

Full text
Abstract:
Review question / Objective: To examine if there is a difference in the effect of stretching training on flexibility during childhood (6-11 years of age) and adolescence (12-18 years of age). Condition being studied: We are going to examine whether there is a greater response to stretching training (i.e. ‘window of opportunity’) during childhood, compared with adolescence. Information sources: Two review team members will independently screen the titles and abstracts of the retrieved publications to select the eligible publications. One review team member will act as a referee in case of disag
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!