Academic literature on the topic 'Emails APIs'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Emails APIs.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Emails APIs"

1

Kannan, Lucky, and Jebakumar R. "Public Sender Score System (S3) by ESPs for Email Spam Mitigation with Score Management in Mobile Application." International Journal of Interactive Mobile Technologies (iJIM) 14, no. 17 (October 13, 2020): 204. http://dx.doi.org/10.3991/ijim.v14i17.16609.

Full text
Abstract:
Many businesses use email as a medium for advertising and they use emails to communicate with their customers. In the email world, the most common issue that remains unresolved even now is spamming or in other terms unsolicited bulk email. Currently, there is no common way to regulate the practices of an email sender. This proposed system is to formulate a protocol common for all the ESPs or inbox providers and a centralized system that will easily find the spammers and block them. By this method, the Email Service Providers (ESPs) or Inbox Providers need not wait for the sender behaviour and then take actions on the sender or sender domain or sender IP address. Instead, they can get the sender history of reputation from blockchain where the ESPs or Inbox Provider provides a score based on the emails they have received from the sender. The ESPs can get the Public Sender Score(S3) from the mobile application or web application which provides the score management user interface and APIs. The email marketers can also monitor their score through the application.
APA, Harvard, Vancouver, ISO, and other styles
2

Halevi, Gali, and Samantha Walsh. "Faculty Attitudes Towards Article Processing Charges for Open Access Articles." Publishing Research Quarterly 37, no. 3 (July 6, 2021): 384–98. http://dx.doi.org/10.1007/s12109-021-09820-x.

Full text
Abstract:
AbstractArticle Processing Charges (APCs) are significant charges for publishing Open Access (OA), and have no accepted standards for authors to source the funds or negotiate the charges. While there is a growing body of literature exploring academic authors’ perceptions of OA publishing, there is little data on how authors pay for APCs. The aim of this study was to examine how authors prepare for and fund APCs, as well as their perceptions of these charges. In early 2021 the authors deployed a survey to Icahn School of Medicine at Mount Sinai faculty members via email. The survey was completed by 310 faculty, representing 10.6% of the active researcher population. Our findings show that about 50% of respondents include anticipated APC costs in grant applications, and that 16% of faculty will pay APCs using personal funds. Questions evaluating perception of APCs show that while the majority of respondents support the concept of Open Access, most believe that charges are too high and should not fall on authors.
APA, Harvard, Vancouver, ISO, and other styles
3

Wang, Jun, Shulan Li, and Bingshu He. "Chinese physicians’ attitudes toward eco-directed sustainable prescribing from the perspective of ecopharmacovigilance: a cross-sectional study." BMJ Open 10, no. 6 (June 2020): e035502. http://dx.doi.org/10.1136/bmjopen-2019-035502.

Full text
Abstract:
IntroductionEco-directed sustainable prescribing (EDSP) is an effective upstream way to reduce the environmental footprints of active pharmaceutical ingredients (APIs), a kind of emerging contaminants, from the patients’ excretion. EDSP is one of the key steps in the programme of ecopharmacovigilance (EPV), a drug administration route on API pollution.ObjectiveTo assess the attitudes of physicians prescribing medicines regarding EDSP from the perspective of EPV.DesignA cross-sectional study conducted from March 2019 to June 2019.Setting5 government general hospitals in Hubei province, China.Participants405 physicians were randomly selected and 262 valid questionnaires were obtained.Outcome measuresA self-developed questionnaire, which inquired about the participant characteristics, perceptions and attitudes toward API pollution, EPV and EDSP from an EPV perspective, was emailed to collect data from physicians.ResultsMost physicians agreed the existence of APIs in environment, worried about the potential environmental and ecological risks of API residues, supported the effectiveness and necessity of EDSP under an EPV perspective in decreasing environmental exposure of excreted APIs, and showed their willingness to participate in the EDSP practices. Nevertheless, no respondent identified the environmental impacts as the aspects regarding medicines affecting his(her) prescription decision, none was satisfied with knowledge on EDSP and showed confidence toward EDSP. The most important barrier to the effective implementation of EDSP was identified as ‘poor awareness of EDSP and EPV‘. Most responding physicians (97%) reported that they held the wait-and-see or conservative attitudes towards EDSP practice. The biggest concerns in low-dose prescribing and prescribing of drugs possessing environment-friendly excretion profiles, two EDSP approaches, were the possible negative impact on therapeutic outcomes and too complicated and professional drug evaluation process, respectively.ConclusionsChinese physicians had positive attitudes towards EDSP from the perspective of EPV. However, their environmental consciousness during prescribing and the related education were insufficient.
APA, Harvard, Vancouver, ISO, and other styles
4

Deng Qi-Xiang, Jia Zhen, Xie Meng-Shu, and Chen Yan-Fei. "Study of directed networks-based Email virus propagation model and its concussion attractor." Acta Physica Sinica 62, no. 2 (2013): 020203. http://dx.doi.org/10.7498/aps.62.020203.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Ferry, Eugene, John O Raw, and Kevin Curran. "Security evaluation of the OAuth 2.0 framework." Information & Computer Security 23, no. 1 (March 9, 2015): 73–101. http://dx.doi.org/10.1108/ics-12-2013-0089.

Full text
Abstract:
Purpose – The interoperability of cloud data between web applications and mobile devices has vastly improved over recent years. The popularity of social media, smartphones and cloud-based web services have contributed to the level of integration that can be achieved between applications. This paper investigates the potential security issues of OAuth, an authorisation framework for granting third-party applications revocable access to user data. OAuth has rapidly become an interim de facto standard for protecting access to web API data. Vendors have implemented OAuth before the open standard was officially published. To evaluate whether the OAuth 2.0 specification is truly ready for industry application, an entire OAuth client server environment was developed and validated against the speciation threat model. The research also included the analysis of the security features of several popular OAuth integrated websites and comparing those to the threat model. High-impacting exploits leading to account hijacking were identified with a number of major online publications. It is hypothesised that the OAuth 2.0 specification can be a secure authorisation mechanism when implemented correctly. Design/methodology/approach – To analyse the security of OAuth implementations in industry a list of the 50 most popular websites in Ireland was retrieved from the statistical website Alexa (Noureddine and Bashroush, 2011). Each site was analysed to identify if it utilised OAuth. Out of the 50 sites, 21 were identified with OAuth support. Each vulnerability in the threat model was then tested against each OAuth-enabled site. To test the robustness of the OAuth framework, an entire OAuth environment was required. The proposed solution would compose of three parts: a client application, an authorisation server and a resource server. The client application needed to consume OAuth-enabled services. The authorisation server had to manage access to the resource server. The resource server had to expose data from the database based on the authorisation the user would be given from the authorisation server. It was decided that the client application would consume emails from Google’s Gmail API. The authorisation and resource server were modelled around a basic task-tracking web application. The client application would also consume task data from the developed resource server. The client application would also support Single Sign On for Google and Facebook, as well as a developed identity provider “MyTasks”. The authorisation server delegated authorisation to the client application and stored cryptography information for each access grant. The resource server validated the supplied access token via public cryptography and returned the requested data. Findings – Two sites out of the 21 were found to be susceptible to some form of attack, meaning that 10.5 per cent were vulnerable. In total, 18 per cent of the world’s 50 most popular sites were in the list of 21 OAuth-enabled sites. The OAuth 2.0 specification is still very much in its infancy, but when implemented correctly, it can provide a relatively secure and interoperable authentication delegation mechanism. The IETF are currently addressing issues and expansions in their working drafts. Once a strict level of conformity is achieved between vendors and vulnerabilities are mitigated, it is likely that the framework will change the way we access data on the web and other devices. Originality/value – OAuth is flexible, in that it offers extensions to support varying situations and existing technologies. A disadvantage of this flexibility is that new extensions typically bring new security exploits. Members of the IETF OAuth Working Group are constantly refining the draft specifications and are identifying new threats to the expanding functionality. OAuth provides a flexible authentication mechanism to protect and delegate access to APIs. It solves the password re-use across multiple accounts problem and stops the user from having to disclose their credentials to third parties. Filtering access to information by scope and giving the user the option to revoke access at any point gives the user control of their data. OAuth does raise security concerns, such as defying phishing education, but there are always going to be security issues with any authentication technology. Although several high impacting vulnerabilities were identified in industry, the developed solution proves the predicted hypothesis that a secure OAuth environment can be built when implemented correctly. Developers must conform to the defined specification and are responsible for validating their implementation against the given threat model. OAuth is an evolving authorisation framework. It is still in its infancy, and much work needs to be done in the specification to achieve stricter validation and vendor conformity. Vendor implementations need to become better aligned in order to provider a rich and truly interoperable authorisation mechanism. Once these issues are resolved, OAuth will be on track for becoming the definitive authentication standard on the web.
APA, Harvard, Vancouver, ISO, and other styles
6

Showalter, T. N., K. A. Teti, K. A. Foley, S. W. Keith, E. J. Trabulsi, A. Dicker, C. D. Lallas, L. Pizzi, and L. G. Gomella. "Do urologists and radiation oncologists agree on adjuvant radiation therapy for prostate cancer? A web-based patterns-of-care survey." Journal of Clinical Oncology 29, no. 7_suppl (March 1, 2011): 76. http://dx.doi.org/10.1200/jco.2011.29.7_suppl.76.

Full text
Abstract:
76 Background: Three randomized trials support adjuvant radiation therapy (ART) over observation after radical prostatectomy (RP) for prostate cancer (PC) patients with adverse pathologic features (APFs), but many clinicians instead favor early salvage RT (SRT) for a rising PSA. We conducted a web-based survey of U.S. radiation oncologists (RO) and urologists (U) regarding ART and SRT. Methods: We designed a web-based survey to evaluate beliefs about post-RP RT and treatment policies. Survey invitations were e-mailed to SUO members and a list of 926 RO ASTRO members with an interest in PC. One email was sent to limit message burden. Only those responses at least 50% complete were included in the analysis. Differences in ART recommendation rates were evaluated by chi square test. Results: Responses were received from 231 RO and 101 U, resulting in 302 analyzable responses (88 U, 214 RO). 79% of U and 32% of RO respondents were academic physicians. ART was recommended based on APF alone (78% RO, 44% U), based on APF plus Gleason score or PSA (14% RO, 35% U), only for detectable PSA (7% RO, 14% U), or never (2% RO, 7% U). When asked the effect of ART on outcomes, most respondents replied “improves survival” (71% RO, 63% U) or “improves biochemical control but not survival” (29% RO, 30% U), but 9% of U replied “delays PSA recurrence, but no durable benefit” or “no improvement in any outcomes” (versus 0% RO). A recommendation for ART based on APFs alone was made for: seminal vesicle invasion (SVI) (76% RO, 59% U; p=0.003), extracapsular extension (ECE) (70% RO, 32% U; p<0.001), positive surgical margin (PSM) (91% RO, 48% U; p<0.002). For patients with Gleason score 8-10 PC, ART was recommended for: SVI (75% RO, 56% U; p=0.001), ECE (73% RO, 45% U; p<0.001), PSM (93% RO, 74% U; p<0.001). Reported PSA threshold for SRT was: any detectable (36% RO, 23% U), 0.2-0.3 (50% RO, 36% U), 0.4-0.5 (9% RO, 30% U), 0.6-0.8 (3% RO, 10% U) ng/mL, or higher (1% RO, 1% U). Conclusions: Despite similar rates of belief that ART improves survival or biochemical control, U were less likely than RO to recommend ART based solely on APFs after RP. Upcoming results of clinical trials of ART versus SRT may provide consensus for decisions in this setting. No significant financial relationships to disclose.
APA, Harvard, Vancouver, ISO, and other styles
7

Danielienė, Renata. "e-Guardian testavimo sistemos ypatumai ir testų rezultatų analizė." Informacijos mokslai 66 (January 1, 2013): 123–34. http://dx.doi.org/10.15388/im.2013.0.2062.

Full text
Abstract:
Pastaruoju metu kompiuteriai ir įvairūs mobilieji įrenginiai yra naudojami namuose, darbe, mokykloje ir pan. Dauguma gyventojų turi prieigą prie interneto, ieško informacijos, ją skelbia, bendrina, siunčiasi įvairius failus ir naudojasi kitomis e-paslaugomis. Tačiau internetu naudojasi ne tik geranoriškai nusiteikę žmonės, e. erdvėje slypi ir įvairių pavojų – internetiniai nusikaltimai, apgavystės, virusai ir pan. Apie interneto pranašumus ir trūkumus privalo žinoti kiekvienas kompiuterio vartotojas nepriklausomai nuo amžiaus. Tam tikslui buvo sukurta e. saugumo programa e-Guardian. Straipsnyje aprašomos dvi e-Guardian versijos, skirtos tėvams ir mokytojams. Taip pat pateikiamas e-Guardian testų konstravimo būdas, naudojamas automatizuotoje testavimo sistemoje. Straipsnyje pateikiami e-Guardian v.2 žvalgomojo testavimo, atlikto Lietuvoje ir Latvijoje, rezultatai. Aprašomi testavimo sistemos projektavimo etapai, ypatumai ir pateikiamos e-Guardian testo tobulinimo rekomendacijos.Pagrindiniai žodžiai: e. saugumas, kompiuterinis testavimas, testavimo sistema, e-Guardian.Features of e-Guardian testing system and analysis of test results Renata Danielienė SummaryThe advantages of the Internet are well known as well as the importance of Internet usage for communication (email, instant messages), for exchange of shared information in the Intranet, on clouds. Social networks are used for communication and advertisement. Many people share their personal information on the Internet with a good intention. But people, and especially teachers, must know when use of the Internet is an advantage and when it becomes dangerous. For this purpose, two e-safety programmes were created and approved by ECDL Foundation for IT professionals and teachers.In this paper, there are presented the method of e-Guardian test construction and the features of the e-Guardian testing system, pilot testing results are analyzed, the design of testing the system and recommendations for improving the e-Guardian test are described.1pt; line-height: 115%; font-family: Calibri, sans-serif;">
APA, Harvard, Vancouver, ISO, and other styles
8

Michelbertas, Mykolas. "Romėniškų monetų radinys Centrinėje Lietuvoje." Archaeologia Lituana 15 (January 1, 2015): 40–46. http://dx.doi.org/10.15388/archlit.2014.15.4886.

Full text
Abstract:
2008 m. pavasarį Kulautuvoje (Kauno r.) statybų metu ka­sant griovį buvo suardytas griautinis kapas. Šio kapo įkapes sudaro žalvarinė antkaklė šaukštiniu galu, šešios žalvarinės trikampio pjūvio apyrankės ir 12 romėniškų monetų. Džiu­gu, kad aptikti daiktai pateko į Lietuvos nacionalinį muziejų Vilniuje. Šaukštinė antkaklė turi apskrito pjūvio lankelį, puoštą keturiais profiliuotais žiedais (1:1 pav.). Ant lankelio yra užkabinta grandelė su dviejų grandinėlių liekanomis. Ši antkaklė priklauso II šaukštinių antkaklių, kurios Lietuvos teritorijoje plačiausiai nešiotos C2–C3 periodais, grupei. Įdomu, kad Centrinėje Lietuvoje pavienės šaukštinės ant­kaklės turi ant lankelio užkabintas grandinėles, prie kurių kartais prikabinami lazdeliniai smeigtukai (Seredžius, Jur­barko r., kapas Nr. 47). Tokių antkaklių rasta vaikų kapuose. Trikampio pjūvio apyrankės yra puoštos skersiniais bei išilginiais grioveliais, rantelių eilėmis (1:2–7 pav.). Dalis apyrankių yra aplaužytos, deformuotos. Visos šios apy­rankės priklauso trikampio pjūvio apyrankių I grupei. Šios grupės apyrankės Lietuvos teritorijoje pasirodė C1a periodo pabaigoje, tačiau daugiausia naudotos C1b–C3 perioduose. Minėti daiktai (antkaklė ir apyrankės) rodo, kad Kulau­tuvoje buvo suardytas vaiko (greičiausiai, mergaitės) kapas. Įdomiausias kapo radinys – romėniškos monetos. Tai yra pirmasis romėniškų monetų radinys Centrinės Lietuvos kapinynuose. Gaila, bet monetos iš Kulautuvos kapo yra blogai iš­likusios, kai kurios jų stipriai korodavusios, neįskaito­mos. Tiksliai datuotos yra 7 monetos. Tai Antonino Pijaus (138–161 m.) dupondijus (2:1 pav.), du Faustinos I (miru­si 141 m.) sestercijai, kaldinti po jos mirties (2:2–3 pav.), du Komodo (177–192 m.) sestercijai (2:4–5 pav.), Lucilos (mirusi 183 m.) sestercijus (2:6 pav.), Julijos Mamėjos (mi­rusi 235 m.) sestercijus (2:7 pav.). Kitos monetos – sester­cijai sunkiai nustatomos. Dalį jų sąlyginai galima skirti An­toninų valdymo laikotarpiui (2:9–10 pav.). Surasti papuošalai ir monetos leidžia kalbėti apie Ku­lautuvos vaiko kapo chronologiją. Vėlyviausia gerai išliku­si moneta yra Julijos Mamėjos, todėl realiausia kapo data yra C1b periodo pabaiga, t. y. III a. vidurys. Kaip minėta, Kulautuvos kape surastos monetos yra pirmasis tokio pobūdžio radinys Centrinėje Lietuvoje, kai kartu rasta kitų romėniško importo daiktų (žalvarinis indas, sparninės ir A69 tipo segės, stiklo ir emalio karolių apvaros). Iš viso Lietuvos teritorijoje yra žinoma 40 laidojimo paminklų, kuriuose rasta romėniškų monetų (3 pav.). Dau­giausia paminklų su monetomis kapuose yra Vakarų Lietu­ voje – čia žinomi 27 kapinynai su monetomis kapuose. Ne­muno žemupio teritorijoje žinomi 5 kapinynai, Žemaitijoje ir Šiaurės Lietuvoje – 5 pilkapynai, Užnemunėje – 2 lai­dojimo paminklai su romėniškomis monetomis ir 1 pamin­klas Centrinėje Lietuvoje (Kulautuva). Vakarų Lietuvoje dauguma kapų su romėniškomis monetomis yra palyginti siaurame pajūrio ruože, nutolusiame nuo jūros kranto iki 25–90 km. Šiek tiek toliau nuo jūros yra nutolę Nemuno žemupio kapinynai – iki 40–65 km. Matyt, paprotys dėti monetas į kapus šiame regione paplito dėl kultūrinių-preky­binių ryšių viena pagrindinių to meto komunikacijos arteri­jų – Nemuno upe. Šiuo keliu su importo daiktais paprotys dėti romėniškas monetas į kapus atkeliavo į Užnemunę ir Centrinę Lietuvą. Žemaitiją ir Šiaurės Lietuvą paprotys ga­lėjo pasiekti palaikant ryšius Nemuno intakais – Dubysa, Nevėžiu. Kai kurie laidojimo paminklai pilkapynų teritori­joje nuo jūros yra nutolę apie 155 km (Vaitiekūnai, Radvi­liškio r.). Neatmestina galimybė, kad papročio dėti į kapus monetas paplitimui galėjo turėti įtakos ir gyventojų iš pajū­rio migracija į kitus dab. Lietuvos regionus. Monetos kapuose priklauso laikotarpiui nuo Nerono (54–68 m.) iki Treboniano Galo (251–253 m.). Antoninų monetos į kapus dėtos daugiausia 180–220 m., Severų mo­netos – 210–240 m. Absoliuti dauguma kapuose rastų ro­mėniškų monetų yra sestercijai, retai pasitaiko dupondijų, antoninianų, asų. Monetų kiekis atskiruose kapuose yra skirtingas. Dau­gumoje kapų aptikta nuo 1 iki 3 monetų, retesni kapai, ku­riuose rasta nuo 4 iki 10 monetų. Yra kapų, kuriuose rasta 13 monetų (Vaitiekūnai, kapas Nr. 13), 21 moneta (Aukšt­kiemiai, Klaipėdos r., kapas Nr. 369), 26 monetos (Lazdi­ninkai, Kretingos r., kapas Nr. 66). Prie kapų su dideliu mo­netų skaičiumi tenka skirti ir aptariamą Kulautuvos kapą. Monetų padėtis kapuose mirusiojo atžvilgiu yra įvairi. Pavyzdžiui, Vakarų Lietuvoje absoliuti dauguma monetų aptinkamos mirusiojo galvūgalyje, tačiau yra kapų, ku­riuose monetos aptinkamos krūtinės srityje arba prie šonų. Dviejuose kapuose romėniškos monetos aptiktos odiniame arba medžiaginiame (audekliniame) maišelyje. Monetų radinius kapuose sunku interpretuoti. Dalis mo­netų mirusiųjų galvūgalyje yra įdėtos į beržo tošies dėžutes kartu su kitais daiktais – įkapėmis. Šiuo atveju monetas ga­lima vertinti kaip mirusiojo turtą, dėtą į kapą ar karstą. Turime atmesti versijas, kad romėniškos monetos į ka­pus buvo dėtos kaip amuletai arba kaip spalvotųjų metalų žaliava. Pavienes monetas kapuose reikėtų traktuoti kaip piniginius vienetus. Monetų piniginę funkciją liudytų ir tai, kad dalis jų rasta mirusiųjų juosmens srityje odiniuose arba medžiaginiuose maišeliuose (piniginėse?). P. K. Tacitas ,,Germanijoje“ rašė, kad romėnai išmokė germanus imti pi­nigus. II a.–III a. pirmoje pusėje, vykstant intensyviai pre­kybai su romėnais, matyt, ir baltai (vakarų baltai) išmoko imti pinigus ir jais naudotis. Paprotys dėti romėniškas monetas į kapus vakarinių baltų gentyse buvo plačiai paplitęs. Monetų rasta prūsų genčių, Lietuvos, Vakarų Latvijos, Mozūrijos kapinynuose. Šis paprotys paplito dėl tiesioginės romėniškų Padunojės provincijų įtakos ir kalba apie romėnų įtaką baltų dvasinei kultūrai.
APA, Harvard, Vancouver, ISO, and other styles
9

Virse, Ingrīda Līga. "Neįprastas kario kapas Mazkatuži kapinyne." Archaeologia Lituana 14 (January 1, 2013): 111–19. http://dx.doi.org/10.15388/archlit.2013.0.2638.

Full text
Abstract:
Mazkatuži kapinynas (Rucavos seniūnija) yra nuodugniau­siai ištirtas ir mažiausiai žinomas archeologinis senojo ge­ležies amžiaus paminklas Kuršo pietvakariuose. Mazkatuži radavietė yra Šventosios upės dešiniajame krante, maždaug 15 km nuo Baltijos jūros pakrantės. Ji reprezentuoja nurody­ to meto kuršių materialinę kultūrą ir laidoseną. Pietvakarinė Kuršo dalis liečiasi su Vakarų Lietuvos griautinių kapų su akmenų vainikais kultūra ir sudaro šios kultūros šiauriausią­ją periferiją. Šis regionas nuo centrinės dalies skiriasi kai ku­riais laidosenos ritualo ypatumais. Svarbiausi jų yra akmenų vainikų nebuvimas (dažniau aptinkami atskiri akmenys arba jų eilės) ir žemi sampilai virš kapų (Kapsēde, Mazkatuži). 1942 metais, kasinėjant Mazkatuži kapinyną, ant vienos kalvos (pasak E. Wahle’s, tai kalva numeris IV) po apdegu­sių akmenų ir medžio degėsių sluoksniu buvo atrastas ka­rio kapas su žirgu (2, 5 pav.). Žirgas gulėjo tame pačiame lygyje kaip ir palaidotas karys. Šalia žirgo griaučių likučių rasti dvidaliai žąslai su šoniniais žiedais, į daugybę dalių suskilusi geležinė žirgo gerklės plokštelė, žalvarinė žirgo nosies plokštelė – plona plokštelė be papuošimų su ąselėmis šonuose ir viename gale, kuri odiniu dirželiu buvo pritvirtin­ta prie keturkampio skirstytuvo. Pusrutulio formos kniedės gali būti laikomos puošiamuoju elementu (6 pav.). Šitokios kamanos būdingos Dollkeimo-Kovrovo kultūrai (skirtingai nuo Mazkatuži kapinyne rastų apynasrių Dollkeimo-Kovro­vo kultūros žąslai leidžia žirgo liežuviui laisvai judėti). Mazkatuži kapinyno 23 kape rasta daug įkapių, išdėlio­tų kuršiams tipiška tvarka. Galvūgalyje guli miniatiūrinis molinis indelis, siauraašmenis kirvis su skyle kote, durklas, ieties antgaliai, yla ir kaltas (7, 8 pav.). Ieties antgalių for­ma įprasta aptariamam laikotarpiui, kuršiams neįprastas tik įdėtų į kapą iečių kiekis – keturios. Neįprastas yra ir siau­raašmenis kirvis. Papuošalai – antkaklė buoželiniais galais, dvi arba trys laiptelinės segės (V grupė pagal M. Michel­bertą) – rasti taip, kaip jie buvo nešioti. Kapo viduryje rasti šalia vienas kito galąstuvai, du pentinai su spygliais lankelio priekyje ir viena sagtis, kurie buvo įdėti į kapą galbūt kaip papildomas inventorius (5, 7:5–7, 8:1, 8) pav. Mazkatuži kario kapo datavimą palengvina šešios romė­niškos žalvarinės monetos trijuose kapuose (11, 12, 21 ka­pai), trys iš jų buvo nustatytos: Hadrianas (117–138), Faus­tina Filija (apie 130–175), Markas Aurelijus (161–180). Tai leidžia mums datuoti po IV kalva esančius kapus B2/C1 periodu. Mazkatuži kapinyno kario kapas labai panašus į Dollkei­mo-Kovrovo kultūros kapus. Šis kapas pateikia papildomos informacijos ir rodo, kokie intensyvūs senajame geležies amžiuje buvo ryšiai. Jie neapsiribojo vien prekių mainais, tai patvirtina santykinai didelis romėniškųjų žalvarinių mo­netų kiekis (Mazkatuži kapinyne rastos 29 tokios monetos), stiklo ir emalio karoliai, be to, kai kurių papuošalų ar ginklų formos. Buvus abipusę įtaką rodo ir laidosena, pavyzdžiui, žirgo laidosena, galbūt ir akmenų dėjimas virš kapų arba skydų įdėjimas į kapą. Galbūt kai kuriais atvejais negalima atmesti fizinio Rytų Prūsijos gyventojų buvimo vėlesnėse Kuršo srityse. Iš vokiečių k. vertė Saulius Lapinskas...Kriegergrab aus dem Grдberfeld MazkatužiIngrīda Līga Virse...
APA, Harvard, Vancouver, ISO, and other styles
10

Vaska, Baiba. "Geležies amžiaus romėniškojo laikotarpio papuošalai Latvijoje, dekoruoti ažūriniu ornamentu." Archaeologia Lituana 14 (January 1, 2013): 88–110. http://dx.doi.org/10.15388/archlit.2013.0.2639.

Full text
Abstract:
Ankstyvasis geležies amžius arba romėniškasis laikotar­pis – įdomiausias laikotarpis baltiškojo ornamento stiliaus studijoms. Ornamentuoti ažūriniais motyvais papuošalai – puošniausia romėniškojo laikotarpio papuošalų grupė, nuo­lat sulaukianti tyrėjų dėmesio. Tačiau Latvijos teritorijoje aptiktų papuošalų kiauraraščio ornamento išsamioms studi­joms nebuvo skiriama pakankamai dėmesio. Latvijos teritorijoje rasta nedaug papuošalų, dekoruotų ažūriniu ornamentu. Ir tik keli jų visiškai išlikę. Išlikusius papuošalus galima būtų suskirstyti į tokias grupes: 1. Antkaklės su kabučiais, tvirtinamais prie paties antkaklės lanko; išlikęs antkaklės fragmentas rastas Kurše (pav. 1). 2. Antkaklės su kabučiais, pritvirtintais pusmėnu­lio formos grandinėlių laikikliais; Latvijos teritorijoje tokia antkaklė rasta Saukas Razbuki kapinyne (pav. 2). 3. Krūtinės papuošalai, kuriuos sudaro keletas grandinėlių eilių su lai­kikliais, kurie smeigtuku tvirtinami prie drabužių. Latvijos teritorijoje vienas toks papuošalo fragmentas rastas Saukas Razbuki (pav. 4,1). 4. Krūtinės papuošalas, padarytas iš ažūrinių plokštelių. Tai – Kalnaziverti aptiktas papuošalas. Be to, šiai grupei skirtini ir atskiri grandinėlių laikikliai bei skirstikliai, kabutis iš Mūkukalns, taip pat greičiausiai dir­žo sagties fragmentas iš Asotės piliakalnio (pav. 4:2–10). 5. Rateliniai smeigtukai. Šių dviejų tipų smeigtukų randama palyginti nemažai. 6. Rozetiniai smeigtukai iš Maskatuži ka­pinyno pietiniame Kurše (pav. 6). 7. Apskritų segių aptikta tarand tipo kapuose šiaurinėje Latvijoje. Šios segės gali būti suskirstytos į keturias chronologines grupes (pav. 6–14). Kompleksiniai papuošalai, sudaryti iš kelių elementų, ku­rie formuoja ažūrinį ornamentą, pasižymi skirtingomis plokš­telių formomis. Šios plokštelės būna stačiakampio ar trikam­pio formos. Kalnazīverti aptiktas krūtinės papuošalas sudary­tas iš trijų skirtingų formų plokštelių: stačiakampio formos, trikampio formos ir labai siaurų pailgo stačiakampio formos plokštelių (pav. 3). Vyrauja rombo formos ornamentas, kurį sudaro įžambiai susikertančios linijos ar persikertančios banguotos linijos (pav. 2, 3). Lygiagrečios puslankio formos linijos jungiamos tarpusavyje trumpais vertikaliais brūkšneliais. Pasitaiko pa­vienių zigzago ar žuvies žvyno formos motyvų ir dažnai – iš dalies susiklojančių apskritimų motyvas, būdingas daugeliui visoje Latvijos teritorijoje aptinkamų papuošalų. Išskirtines­nis būtų įgaubtašonio rombo motyvas. Šis motyvas būdin­gas rateliniams smeigtukams (pav. 3, 4, 5). Galima teigti, kad apskritimo bei įgaubtašonio rombo motyvai, atsiradę kaip pavieniai puošybos elementai, vėliau plačiai paplito. Apskritoms plokštelėms būdinga dekoravimo kompozi­cija, pabrėžianti plokštelės centrą. Pasitaiko ne tik rato, bet ir žvaigždės ar sūkurio motyvas. Svastikai būdingos kelios formos. Pirmoji – ištiesintais peteliais. Taip dekoruota dide­lė emaliu puošta apskrita segė iš Trikata (pav. 10:1) ir segė iš Viduramžių kapinyno Siksäla kapinyne Estijoje. Analo­giškas motyvas aptinkamas ant apskritų bei trikampių segių iš Dniepro vidurupio regiono. Latvijos medžiagoje svastiką banguotais peteliais galima pamatyti ant pusmėnulio formos grandinėlių laikiklio, pritvirtinto prie antkaklės iš Saukas Razbuki (pav. 2:6). Analogišką svastiką, kurios peteliai tar­si transformuojasi į sūkurio formą, matome stačiakampėje plokštelėje iš Andulių ir segėje iš Pangėsų (Lietuva). Sūku­rio motyvas, kurį galima būtų traktuoti kaip vieną iš svasti­kos atmainų, aptinkamas ant apskritų segių iš Šiaurės Latvi­jos tarand tipo kapų (pav. 11) ir vienoje išskirtinio dekoro segėje iš Lazdininkų. Rato motyvas – saulės simbolis – pa­sirodo ant apskritų segių bei ratelinių smeigtukų, grandi­nėlių laikiklių bei kabučių (pav. 12). Stulpelių (baliustra­dos) motyvas dažnai siejamas su rato motyvu ir stilizuotu pavidalu ant apskritų segių ir ratelinių smeigtukų galvučių. Rozetės motyvas, papildytas koncentriniais apskritimais ir kombinuotas su rato bei stulpelių (baliustrados) motyvu, bū­dingas pietinei Kuršo ir Pajūrio kultūrai Lietuvoje (pav. 6). Žvaigždės motyvui atstovauja išlikęs dekoruotas segės, datuojamos IV a., fragmentas, surastas dabarinės Latvijos teritorijoje Trikātas Libirti (pav. 14:1). Lietuvos teritorijoje analogiškai dekoruota segė aptikta Aukštakiemio kapinyne. Prūsiškųjų diržo sagčių stiliui būdingos vingiuotos linijos, iš pradžių pastebimos papuošalų, aptariamų šiame straipsny­je, ornamentikoje (pav. 15), bet vėliau ilgiau išlieka Vidurio Dniepro kultūros papuošalų dekoravime. Galimybės suteikti daugiau duomenų apie papuošalų or­namentavimą yra ribotos. Galima manyti, kad šis raidos laikotarpis buvo trumpas ir kyla klausimas, ar prašmatnūs kiauraraščiai krūtinės pa­puošalai tebebuvo gaminami IV amžiuje. Kaip matome, papuošalų proporcijos ir ornamentika glaudžiai susijusios su Romos imperijos provincijų, ypač Panonijos, juvelyrikos tradicijomis. Kai kurie dekoro elementai sietini su Saulės kultu, kuris buvo paplitęs Romos imperijoje. Taip pat aptinkama anksty­vajai krikščionybei būdingų simbolių. Tai kryžiaus formos segės (pav. 6) ir kabučiai. Iš anglų k. vertė Violeta Vasiliauskienė...Ornamentation on Roman Iron Age jewellery in Latvia made in openwork techniqueBaiba Vaska...
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Emails APIs"

1

Olsen, Linnéa. "Can Chatbot technologies answer work email needs? : A case study on work email needs in an accounting firm." Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-85013.

Full text
Abstract:
Work email is one of the organisations most critical tool today. It`s have become a standard way to communicate internally and externally. It can also affect our well-being. Email overload has become a well-known issue for many people. With interviews, follow up interviews, and a workshop, three persons from an accounting firm prioritise pre-define emails needs. And identified several other email needs that were added to the priority list. A thematic analysis and summarizing of a Likert scale was conducted to identify underlying work email needs and work email needs that are not apparent. Three work email needs were selected and using scenario-based methods and the elements of PACT to investigating how the characteristics of a chatbot can help solve the identified work email overload issue? The result shows that email overload is percept different from individual to individual. The choice of how email is handled and email activities indicate how email overload feeling is experienced. The result shows a need to get a sense of the email content quickly, fast collect financial information and information from Swedish authorities, and repetitive, time-consuming tasks. Suggestions on how this problem can be solved have been put forward for many years, and how to use machine learning to help reduce email overload. However, many of these proposed solutions have not yet been implemented on a full scale. One conclusion may be that since email overload is not experienced in the same way, individuals have different needs - One solution does not fit all. With the help of the character of a chatbot, many problems can be solved. And with a technological character of a chatbot that can learn individuals' email patterns, suggest email task to the user and performing tasks to reducing the email overload perception. Using keyword for email intents to get a sense of the email content faster and produce quick links where to find information about the identified subject. And to work preventive give the user remainder and perform repetitive tasks on specific dates.
APA, Harvard, Vancouver, ISO, and other styles
2

Yang, Mien-Chieh, and 楊綿傑. "The Analysis of Government Agency''s Email Box System: A Case of Presidential Office Email Box in Taiwan." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/36405509950883348499.

Full text
Abstract:
碩士
淡江大學
公共行政學系公共政策碩士班
98
Under the wave of democratization, the development of information and communication technology had created a digital society. The new public administration considered the government should treat citizens like as customers and particularly focus on efficiency and response. By digital devices, the interaction between citizens and government is not limited by time and space anymore; the electoral system makes politicians not only pay more attention to the feelings and opinions of citizens, but also deal with the problems and responds to the questions immediately. The most common way of the interaction is Government Agency''s Email Box System, whether the executive administration or local government, they all attach a great importance on this part. The presidential office email box is one of the symbolic channels of communication. But there are few related researches about Government Agency''s Email Box System, not to mention exploring the case of presidential office email box. This article focuses on the presidential office email box and divide into three points as follows: the system, the members, and the processes of replying letters. They could help readers to know the operation and function of presidential office email box. Moreover, this article compares the differences between the presidential office email box, the premier’s e-mailbox, and Taipei city mayor’s e-mailbox. Qualitative methods are used in this research. To construct the shape of presidential office email box by participant observation, analyzing documents, and depth interview to provide the basis for comparing three email boxes, and make clear about the operation and find out some problems. The main findings are following: (1) There are five functions of presidential office email box: gravamen, consultation, Accusation, recommendation, and Complaint. (2) The most important thing is to improve the whole equipment and process of the presidential office email box. Recruiting the volunteers to cope with the letters is an excellent method to learn. The system to save the knowledge of replying the letters of the presidential office email box is doing excellently, but the pipelines of report the policy knowledge still lacked.
APA, Harvard, Vancouver, ISO, and other styles
3

Bassoli, Daniel Dias Galvão. "Retalho omnicanal : segmentação de clientes que compraram em lojas físicas após serem acionados por email marketing." Master's thesis, 2017. http://hdl.handle.net/10362/26965.

Full text
Abstract:
Dissertation presented as the partial requirement for obtaining a Master's degree in Information Management, specialization in Knowledge Management and Business Intelligence
Há uma tendência no Retalho Europeu e Mundial para a implementação da estratégia Omnicanal, ou seja, vários canais sendo usados de forma convergente e complementar, tanto para as comunicações de marketing como para otimizar atividades operacionais. Tendo em vista que a estratégia Omnicanal é decorrência direta do avanço técnico e da disseminação das Tecnologias da Informação, principalmente no contexto do Cloud Computing e do Big Data, torna-se então viável que, a partir da imensa disponibilidade dos dados para a recolha, inerente a este ambiente digital, todos os esforços e atividades que utilizam estas Tecnologias possam ser mensuradas, não apenas com indicadores de performance mas com quaisquer outros indicadores que façam sentido para o negócio. Dentro da estratégia Omnicanal do Retalho esta possibilidade permite analisar por exemplo a influência que um canal possa ter tido na conversão em vendas dentro de uma campanha e mapear a composição dos grupos de clientes que chegaram à conversão. Devido à natureza digital da estratégia, este tipo de análise é comum às campanhas das lojas online. Quando se trata das lojas físicas, no entanto, este tipo de análise ainda não está disseminada. A partir da Análise de Clusters de clientes de uma rede Retalhista multinacional que, dentro de uma campanha foram acionados por um canal digital (Email Marketing), e chegaram à conversão nas lojas físicas, foi proposto um modelo para a segmentação de clientes para a estratégia Omnicanal.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Emails APIs"

1

Grieve, Gregory Price, and Daniel Veidlinger. Buddhism and Media Technologies. Edited by Michael Jerryson. Oxford University Press, 2016. http://dx.doi.org/10.1093/oxfordhb/9780199362387.013.25.

Full text
Abstract:
Buddhism is flourishing on the Internet and digital media. However, the form and usage patterns of Buddhist media technologies have varied considerably from the earliest oral texts to the latest online versions of the Buddhist canon. Do such media transformations merely transmit the old dharma in a new bottle, or do they change Buddhism’s message? Are these changes to be welcomed or shunned? This chapter explores how various media technologies tend to promote particular aspects of Buddhism, and also how different Buddhist worldviews shape how these media are used. First, it sketches a short genealogy of Buddhist media technologies. Second, it concentrates on contemporary digital media, briefly describing Buddhist bulletin boards, email lists, websites, computer apps, virtual worlds, and video games. Third, the chapter explains digital media’s procedural, participatory, encyclopedic, and spatial affordances. Finally, it illuminates how digital media affordances are shaped by the technological worldview of convert Buddhism.
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Emails APIs"

1

Williams, Tom. "Adventure playgrounds and me: bringing the past into the auto-ethnographic present." In Practice-based Research in Children's Play. Policy Press, 2017. http://dx.doi.org/10.1332/policypress/9781447330035.003.0004.

Full text
Abstract:
This is a personal study aimed at exploring why adventure playgrounds (APGs) have had such a fascination for the author for over 40 years. It weaves a critical and narrative ethnography with an affect-based auto-ethnography, resulting in various voices (author as researcher, narrator, participant) and approaches. The research involved an immersion in the author’s own history with APGs aided by a process of mutual recollection via email with five participants who shared that history; (re)visiting APGs in London, Copenhagen and Berlin; and a process of observation and reflection. This performative and auto-ethnographical approach aims to contribute something new to articulating the significance of APGs. Four themes emerged from this iterative and intuitive process: the mindful audacity of APGs, APGs as places of drama and unspoken narratives, APGs as spaces that are alive in many ways, and the hope that arises from this process of sensemaking. The interplay between these themes offers a socio-cultural view of APGs as symbolic places of heterodoxic and cultural possibility, at odds with a developmental and progressive view of children’s lives.
APA, Harvard, Vancouver, ISO, and other styles
2

Sen, Devjani, and Rukhsana Ahmed. "Ethical Ambiguities in the Privacy Policies of Mobile Health and Fitness Applications." In Encyclopedia of Information Science and Technology, Fourth Edition, 6083–93. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2255-3.ch528.

Full text
Abstract:
Personal Applications (apps) collect all sorts of personal information like name, email address, age, height, weight and in some cases detailed health information. When using such apps, many users trustfully log everything from diet to sleep patterns. Studies suggest that many applications do not have a privacy policy, or users do not have access to an app's permissions before s/he downloads it to the mobile device. This raises questions regarding the ethics around sharing personal data gathered from health and fitness apps to third parties. Despite the important role of informed consent in the creation of health and fitness mobile applications, the intersection of ethics and sharing of personal information is understudied and is an often-ignored topic during the creation of mobile applications. After reviewing the online privacy policies of four mobile health and fitness apps, this chapter concludes with a set of recommendations when designing privacy policies to share personal information collected from health and fitness apps.
APA, Harvard, Vancouver, ISO, and other styles
3

Walikar, Gyanappa A. "Mobile Applications Used for Human Rights." In Mobile Devices and Smart Gadgets in Human Rights, 171–82. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-6939-8.ch008.

Full text
Abstract:
A mobile application is a computer program or application developed to run on a small handheld mobile device such as mobile phones, smartphones, PDAs, and so on. Such devices are sold with several apps bundled as pre-installed software, such as a web browser, email client, calendar, mapping program, and an app for buying music or other media or more apps. Apps that are not preinstalled are usually available through distribution platforms called app stores such as the Apple App Store, Google Play, Windows Phone Store, and BlackBerry App World, etc. Usage of mobile apps has become increasingly prevalent across mobile phone users in the world. A recent study reported that during the previous quarter, more mobile subscribers used apps than browsed the web on their devices. Thus, a mobile application can aid in the prosecution of human rights violations, atrocities, human trafficking, and child laboring. In this chapter, authors provide a comprehensive study, design patterns, usage of several mobile applications designed for protecting human rights.
APA, Harvard, Vancouver, ISO, and other styles
4

Sen, Devjani, and Rukhsana Ahmed. "Ethical Ambiguities in the Privacy Policies of Mobile Health and Fitness Applications." In Advances in Computer and Electrical Engineering, 877–88. IGI Global, 2019. http://dx.doi.org/10.4018/978-1-5225-7598-6.ch063.

Full text
Abstract:
Personal applications (apps) collect all sorts of personal information like name, email address, age, height, weight, and in some cases, detailed health information. When using such apps, many users trustfully log everything from diet to sleep patterns. Studies suggest that many applications do not have a privacy policy, or users do not have access to an app's permissions before s/he downloads it to the mobile device. This raises questions regarding the ethics around sharing personal data gathered from health and fitness apps to third parties. Despite the important role of informed consent in the creation of health and fitness mobile applications, the intersection of ethics and sharing of personal information is understudied and is an often-ignored topic during the creation of mobile applications. After reviewing the online privacy policies of four mobile health and fitness apps, this chapter concludes with a set of recommendations when designing privacy policies to share personal information collected from health and fitness apps.
APA, Harvard, Vancouver, ISO, and other styles
5

Torres, Kylie, Andrew Stevenson, and Justin Hicks. "Case Study." In Privacy Concerns Surrounding Personal Information Sharing on Health and Fitness Mobile Apps, 145–62. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3487-8.ch006.

Full text
Abstract:
Under Armour purchased a fitness app, MyFitnessPal, that suffered a data breach shortly after Under Armour acquired the app. This breach made customers usernames, emails, and passwords available and for sale on the dark web. Under Armour informed its users of the breach and handled the crisis in the way they saw fit. During the investigation, it was found that Under Armour used a weaker encryption algorithm than it should have to encrypt customers' sensitive information. The company is currently in a lawsuit over the breach with one MyFitnessPal user.
APA, Harvard, Vancouver, ISO, and other styles
6

Schraeder, Terry L. "Digital Communication." In Physician Communication, 55–112. Oxford University Press, 2019. http://dx.doi.org/10.1093/med/9780190882440.003.0002.

Full text
Abstract:
There are few aspects of society, including clinical medicine, still untouched by digital communication and the Internet. It would seem that the important and intimate conversations in a doctor’s office or at the bedside should be one of the last refuges to provide private and exclusive face-to-face discourse between two humans, free of the distraction and distance of the computer. But that is changing. From computers in the exam room to electronic medical records, to email exchanges with patients and medical apps, computers are ever present in the delivery of healthcare. Of course, information technology has revolutionized medicine, and the advantages for patients and physicians are numerous. Through patient portals, patients can now look at their lab results, learn more about their diagnosis, and ask relevant questions; physicians can respond quickly to emailed questions; and patients can inform themselves about surgery by watching online videos. Apps monitor physiological data points; robots deliver medications and perform surgery; and artificial intelligence plays a bigger role in the analysis of complex healthcare data. Many physicians have jumped on board with social media, where they can have a variety of professional and personal interactions. It seems that those in medicine have readily adapted to the electronic universe. But how has it affected physicians’ behavior, expectations for access and processing of information, and most important, relationships with their patients? This chapter explores those topics and takes a closer look at the different ways in which medical professionals are communicating and interacting in the digital universe.
APA, Harvard, Vancouver, ISO, and other styles
7

Al-Hamdani, Wasim A. "Cryptography in E-Mail and Web Services." In Applied Cryptography for Cyber Security and Defense, 79–129. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch004.

Full text
Abstract:
Cryptography has been used since ancient times in many different shapes and forms to protect messages from being intercepted. However, since 1976, cryptography started to be part of protected public communication when e-mail became commonly used by the public. Webmail (or Web-based e-mail) is an e-mail service intended to be primarily accessed via a web browser, as opposed to through an e-mail client, such as Microsoft Outlook, Mozilla‘s Thunderbird Mail. Very popular webmail providers include Gmail, Yahoo! Mail, Hotmail and AOL. Web based email has its advantages, especially for people who travel. Email can be collected by simply visiting a website, negating the need for an email client, or to logon from home. Wherever a public terminal with Internet access exists one can check, sends and receive email quickly and easily. Another advantage of web based email is that it provides an alternate address allowing user to reserve his/her ISP address for personal use. If someone would like to subscribe to a newsletter, enter a drawing, register at a website, participate in chats, or send feedback to a site, a web based email address is the perfect answer. It will keep non-personal mail on a server for you to check when you wish, rather than filling up your private email box. Web service is defined as “a software system designed to support interoperable machine-to-machine interaction over a network”. Web services are frequently just Internet application programming interfaces (API) that can be accessed over a network, such as the Internet, and executed on a remote system hosting the requested services. Other approaches with nearly the same functionality as web services are Object Management Group‘s (OMG) Common Object Request Broker Architecture (CORBA), Microsoft‘s Distributed Component Object Model (DCOM) or SUN‘s Java/Remote Method Invocation (RMI). Integrating Encryption with web service could be performing in many ways such as: XML Encryption and XML Signature. In this article we present client and Web-based E-mail, next generation E-mail and secure E-mail, followed by cryptography in web service and the last part is the future of web service security. The article start with the integration of cryptography with E-mail client and web base then the integration of cryptography and web service is presented. At the end of the major two sections: e-mail service and web service there is a general prospect vision of encryption future for e-mail service and web service. This section presents our view for the cryptography integration with the second generation of e-mail and web service.
APA, Harvard, Vancouver, ISO, and other styles
8

Pulkkis, Göran, Kaj J. Grahn, and Peik Åström. "Network Security Software." In Current Security Management & Ethical Issues of Information Technology, 1–41. IGI Global, 2003. http://dx.doi.org/10.4018/978-1-93177-743-8.ch001.

Full text
Abstract:
This chapter is a topical overview of network security software and related skills needed by network users, IT professionals, and network security specialists. Covered topics are protection against viruses and other malicious programs, firewall software, cryptographic software standards like IPSec and TLS/SSL, cryptographic network applications like Virtual Private Networks, secure Web, secure email, Secure Electronic Transaction, Secure Shell, secure network management, secure DNS and smartcard applications, as well as security administration software like intrusion detectors, port scanners, password crackers and management of network security software management. Tools and API’s for security software development are presented. A four-level network security software skill taxonomy is proposed and implications of this taxonomy on network security education is outlined. University and polytechnic level network security education is surveyed and the need for inclusion of network security software development skills in such education is pointed out.
APA, Harvard, Vancouver, ISO, and other styles
9

Ali, Mohammed Banu. "Multi-Perspectives of Cloud Computing Service Adoption Quality and Risks in Higher Education." In Handbook of Research on Modern Educational Technologies, Applications, and Management, 1–19. IGI Global, 2021. http://dx.doi.org/10.4018/978-1-7998-3476-2.ch001.

Full text
Abstract:
Universities worldwide are starting to turn to cloud computing. The quality characteristics, which include access to a wider network of computing resources, pay-as-you-go services, self-services, agile services, and resource centralisation provide a convincing argument for HEIs to adopt cloud services. However, the risks leading to non-adoption range from security issues to a lack of cloud vendor support. The findings suggest that security, privacy, and trust are the key determinants to non-adoption as stakeholders felt that the cloud cannot fully guarantee the safeguarding of sensitive information. Key determinants to cloud adoption include improving relationships between students and teachers via collaborative tools and proposing cloud apps for mobile devices for accessing virtual learning materials and email securely off-campus. In conclusion, university stakeholders are still unconvinced about adopting cloud services, but future advances of the cloud may help to steer their decision to adopt this innovative technology given its overwhelming potential.
APA, Harvard, Vancouver, ISO, and other styles
10

Shelly, Marita. "Digital Death." In Legal Regulations, Implications, and Issues Surrounding Digital Data, 23–40. IGI Global, 2020. http://dx.doi.org/10.4018/978-1-7998-3130-3.ch002.

Full text
Abstract:
An increasing use of social media platforms and other mobile applications (apps) has led to the creation, purchase, storage, and use of online information and data including personal or financial information, email communications, photographs, or videos. The purposes of this chapter are to discuss digital property and to determine whether under estate planning and administration law digital property can be inherited like other real and personal property. This chapter will examine relevant legislation in Australia, United States (US), and other jurisdictions including Canada, as well as legal cases that have discussed the issue of accessing or transferring digital property held by service providers such as Facebook. It will also discuss examples of service providers' terms of use and whether these terms allow for digital property to be accessed by a third party. It will conclude with recommendations about how an individual can manage their digital property as part of their will or estate.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Emails APIs"

1

Fu, X., S. H. Hong, N. S. Nikolov, X. Shen, Y. Wu, and K. Xu. "Visualization and analysis of email networks." In Asia-Pacific Symposium on Visualisation 2007. IEEE, 2007. http://dx.doi.org/10.1109/apvis.2007.329302.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Muelder, C., and K. L. Ma. "Visualization of sanitized email logs for spam analysis." In Asia-Pacific Symposium on Visualisation 2007. IEEE, 2007. http://dx.doi.org/10.1109/apvis.2007.329303.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Exploring the Development of a Framework for Informal E-mentoring of Online Health Education Students: A Formative Evaluation [Research in Progress]." In InSITE 2019: Informing Science + IT Education Conferences: Jerusalem. Informing Science Institute, 2019. http://dx.doi.org/10.28945/4156.

Full text
Abstract:
Aim/Purpose: The purpose of this pilot case study is to provide details on developing a framework for e-mentoring graduate level online health education students as an added component of an online health education course. Background: E-mentoring gives faculty the opportunity to share professional knowledge with students and impart practical experiences. In addition, faculty can show how the course content is teaching skills applicable to student’s personal and professional goals. There is an abundance of research and professional literature that includes mentoring of graduate students, but this literature base has not shown a development in a theory and models used in e-mentoring. As yet, however, literature dealing with e-mentoring the future health educator is scarce or nonexistent even though technology such as mobile apps, email, listservs, chat groups and conferencing could enhance the e-mentoring process. Methodology: The framework is described in the context of a curriculum development and a program planning model. Following the steps designed in this framework, mentees are guided through a course that begins with setting goals and ends with an evaluation process. The steps are similar to what health educator’s use in the program planning process, which is also a component of building a community program. The model uses both psychosocial variables that help build identity and coaching functions as a guide and to obtain measurements. Contribution: The study ends with a mix of evaluations that include the formative and sum-mative evaluations. A formative evaluation is conducted throughout the pro-cess. A summative evaluation will be conducted at the end to gain feedback. For the summative evaluation, constructs from the mentoring scale will be used. Findings: This case study was prepared to serve as a basis for discussion rather than to illustrate either effective or ineffective e-mentoring process for health educators.
APA, Harvard, Vancouver, ISO, and other styles
4

Dewey, Barbara I. "The Open Landscape Environment as The Expanse." In Charleston Library Conference. Purdue Univeristy, 2020. http://dx.doi.org/10.5703/1288284317150.

Full text
Abstract:
Building on the 2019 ACRL/SPARC Forum on Collective Reinvestment in Open Infrastructure, this program will explore how libraries can make different commitments to fund content created by open infrastructures. Library collections increasingly promote and reflect such open content and many have chosen to contribute to funding those products. There is not one formula or roadmap to underwrite the publishing and distribution costs of these open resources. There are many variables and considerations as some open content corresponds to serials and others are books or monographs. Open access content is increasingly found in nearly all subject areas, as scholarly publishing models have evolved. Open access does not come without a price to create, maintain and preserve the outputs. Libraries are reconsidering whether they want to commit so much to purchase materials or subscription-based products, when it is unclear what the anticipated use of any materials will be over time. Planning and opportunities for new and more flexible decisions concerning adjustments to and expenditures of the materials budget are under exploration by libraries. There are many options to invest in creating more content to be released as open access. Such options include contributing financially from the Library collections or materials budget to subsidizing or covering APCs, engaging in a more “library as publisher” model hosting journals, publishing books, creating OERs, and offsetting other expenses that ultimately drive a more intensive open infrastructure. Library leaders and partners will share their ideas about trying different approaches to contribute to more open publishing initiatives and explore whether efforts in deploying current book and serial costs to offset opportunities to build a wider and more open infrastructure is on the horizon. This analysis should incorporate the costs of analytical tools necessary to the use of such content in today’s research. Questions will be solicited ahead of time to reflect audience’s interest in such a rethinking of the library collections budget. Please email Julia Gelfand at with your questions.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography