Academic literature on the topic 'Mail receiving and forwarding'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Mail receiving and forwarding.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Mail receiving and forwarding"

1

S.Shetty, Bharati, and Suresha . "Survey on Energy Efficient Routing Protocols by Clustering and Load balancing in Wireless Sensor Networks." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 153. http://dx.doi.org/10.14419/ijet.v7i3.12.15907.

Full text
Abstract:
Wireless Sensor Network (WSN) is consisting of nodes which deployed to sense the physical environment. In WSN there is excessive growth in performance evaluation and analysis techniques, because of fast development in Information and Communication Technologies (ICT). The main resource problem in WSN is the energy of sensor nodes. There is need of routing protocol which consumes less energy during communication. A reliable and robust routing protocol which limits the excess energy consumed by nodes during forwarding and receiving messages results in energy efficiency protocol. This survey work provides the advantages, drawbacks and comparison of five energy efficient routing protocols.
APA, Harvard, Vancouver, ISO, and other styles
2

Burki, Abid A., and Shirin Aslam. "The Role of Digital Technology and Regulations in the Diffusion of Mobile Phones in Asia." Pakistan Development Review 39, no. 4II (December 1, 2000): 741–50. http://dx.doi.org/10.30541/v39i4iipp.741-750.

Full text
Abstract:
More and more people are using mobile (cellular) phones and the world is increasingly becoming unwired due to diffusion of this technology. The cellular technology is present in most Asian countries since 1980s. However, its diffusion process in these countries has largely been affected by technological developments, i.e., transition from analogue to digital, and regulations. The nature of regulations relate to spectrum licensing and the number of competitors allowed by respective governments. These regulatory decisions may explain the current structure of mobile phone industry in most of these countries. The popularity of cellular communication lies in its appealing advantage as compared with the fixed networks. The most important feature of a cellular phone is its portability in that the call is made to a person and not to a place. In developed countries, the features available on mobile handsets (such as caller line identification, voice mail, call forwarding, call waiting and the facility of receiving and transmitting short text messages) are available free of charge. However, these cell phone facilities are very costly in developing countries as compared with their fixed networks. The regulatory licensing structure prevailing in these countries partly explains this price differential. In effect there has been wide diversity in the speed of introduction of mobile phones and their diffusion across developing countries, which has not been explored. Gruber and Verboven (1998) has recently examined diffusion of cell phones in the European Union. However, this is a neglected area of research in developing countries.
APA, Harvard, Vancouver, ISO, and other styles
3

José-Cabezudo, Rebeca San, and Carmen Camarero-Izquierdo. "Determinants of Opening-Forwarding E-Mail Messages." Journal of Advertising 41, no. 2 (July 2012): 97–112. http://dx.doi.org/10.2753/joa0091-3367410207.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Darma, I. Wayan Panca Eka, I. Made Minggu Widyantara, and Ni Made Sukaryati Karma. "Peran Lembaga Pusat Pelaporan dan Analisis dalam Penaggulangan Tindak Pidana Money Laundring." Jurnal Preferensi Hukum 1, no. 2 (September 15, 2020): 159–64. http://dx.doi.org/10.22225/jph.1.2.2354.159-164.

Full text
Abstract:
The duties, authorities, functions and criminal acts of money laundering in Indonesia are regulated in Law No. 8 of 2010 concerning the Prevention and Eradication of Criminal Acts of Money laundering. This study examines two issues: the role of the PPATK agency in combating money laundering after the enactment of Law No. 8 of 2010 concerning the Prevention and Eradication of Money laundering and criminal sanctions against perpetrators of criminal acts of money laundering in Indonesia. This research uses normative legal method, a process of finding legal rules, legal principles, and legal doctrines in order to answer the legal issues under study from the perspective of statutory regulations. PPATK is an independent agency that has 3 main roles in the prevention and eradication of money laundering, namely: receiving reports on suspicious financial transactions, analysing the reports received from reporting parties, and forwarding the results of report analysis to the authorised party. Article 2 paragraph 1 jo Article 18 of Law Number 31 of 1999 concerning Criminal Acts of Corruption as amended into Law Number 31 of 2001 concerning the Amendment to Law Number 31 of 1999 jo Article 55 paragraph 1 of the Criminal Code. Subsidiarily Article 3 jo Article 18 Law Number 31 of 1999 concerning Eradication of Corruption Crime as amended to Law Number 20 of 2001 concerning the Amendment to Law Number 31 of 1999 jo Article 55 paragraph 1 of the Criminal Code. Secondly, Article 3 paragraph (1) letter g of Law Number 25 of 2003 concerning the Amendment to Law Number 15 of 2002 concerning the Criminal Acts of Money laundering jo Article 55 paragraph (1) of the Criminal Code.
APA, Harvard, Vancouver, ISO, and other styles
5

Barrense-Dias, Yara, Christina Akre, Diane Auderset, Brigitte Leeners, Davide Morselli, and Joan-Carles Surís. "Non-consensual sexting: characteristics and motives of youths who share received-intimate content without consent." Sexual Health 17, no. 3 (2020): 270. http://dx.doi.org/10.1071/sh19201.

Full text
Abstract:
Background One of the possible negative consequences of sexting is the non-consensual sharing of received-intimate content. This study aimed to determine the characteristics and motives of youths who shared received-intimate images without consent. Methods: Data were obtained from a self-administrated Swiss survey on sexual behaviours among young adults (aged 24–26 years). Out of the 7142 participants, 5175 responded to the question ‘Have you ever shared (forwarding or showing) a sexy photograph/video of someone else (known or unknown) without consent’?; 85% had never shared (Never), 6% had shared once (Once) and 9% had shared several times (Several). Data are presented as relative risk ratios with 95% confidence intervals. Results: Participants who had shared received-intimate content without consent had higher odds of being male [2.73 (2.14–3.47)], foreign-born [1.45 (1.04–2.03)], reporting a non-heterosexual orientation [1.46 (1.10–1.93)], having sent one’s own intimate image [1.76 (1.32–2.34)] and receiving a shared-intimate image of someone unknown [4.56 (3.28–6.36)] or known [2.76 (1.52–5.01)] compared with participants who had never shared. The main reported motivations were for fun (62%), showing off (30%) and failure to realise what they were doing (9%). Conclusions: Given the reported motivations, it appears crucial to remind youths of the seriousness of non-consensual sharing. Although females may also be perpetrators, the behaviour was more prevalent among males. Prevention and education need to consider a broad range of young people in their scenarios. Even if a particular focus on understanding and preventing males’ perpetration must be considered, overall perpetration, including female’s, must be discussed.
APA, Harvard, Vancouver, ISO, and other styles
6

Sharma, Rishi Raj, and Balpreet Kaur. "E-mail viral marketing: modeling the determinants of creation of “viral infection”." Management Decision 58, no. 1 (January 13, 2020): 112–28. http://dx.doi.org/10.1108/md-03-2017-0215.

Full text
Abstract:
Purpose The purpose of this paper is to identify factors influencing the opening and forwarding of commercial e-mails received directly from companies to further promote products via sharing by consumers to create viral infection. Design/methodology/approach The study is descriptive in nature and carried out in the country, India. A structural equation modeling technique was used to test the hypothesized relationships among the constructs pertaining to opening and forwarding of commercial e-mails. Findings The results indicate that mail opening intentions of the recipients are influenced by the perceived value of e-mail content and their positive relation with the sender, increasing the probability of further forwarding. However, relationships among consumers have a significant effect on intentions to forward the commercial e-mails. E-mails that arouse positive emotions in the minds of the receivers are forwarded. The study significantly contributes to literature with the findings that not only positive emotions additionally content leads to high arousal through positive emotions leading to viral infection. Practical implications The study has implications for marketers who are in the business of promoting their products through e-mails, need to redesign the message content to engender positivity and generate viral infection, which is the ultimate goal of viral marketing. Originality/value This study explains factors behind the creation of “viral infection” specifically with regard to commercial e-mails targeted to individuals with high networking potential.
APA, Harvard, Vancouver, ISO, and other styles
7

Rahman, Jumadil Abdul. "Rancang Bangun Sistem Informasi Surat Di Majelis Pendidikan Dasar Dan Menengah Pimpinan Wilayah Muhammadiyah Daerah Istimewa Yogyakarta Menggunakan Metode Extreme Programming." JISKA (Jurnal Informatika Sunan Kalijaga) 3, no. 2 (June 11, 2019): 95. http://dx.doi.org/10.14421/jiska.2018.32-04.

Full text
Abstract:
Correspondence is one activity that can not be separated from an organization, because the mail is one of the important communication media in the organization and communication with other organizations.High-intensity correspondence activities need to have a good management, so that the information conveyed can be delivered properly and safely. This management can also make letters well documented.System development in this research using Extreme Programming method. This method was chosen because the development is still done on a small scale. In addition, this method has a simple process, fast and precise because prioritizing the communication aspects between clients with developers. The built-in information system has features for receiving incoming mail, sending outgoing mail, sending and receiving mail dispositions, and sending and receiving memos. With this system can be effecient mail management and make it easy to manage the data letter itself. Keywords : Agile Process, Letter, Extreme Programming, PHP, Information System
APA, Harvard, Vancouver, ISO, and other styles
8

Choi, Kelvin, Julia Cen Chen, Andy S. L. Tan, Samir Soneji, and Meghan B. Moran. "Receipt of tobacco direct mail/email discount coupons and trajectories of cigarette smoking behaviours in a nationally representative longitudinal cohort of US adults." Tobacco Control 28, no. 3 (June 19, 2018): 282–88. http://dx.doi.org/10.1136/tobaccocontrol-2018-054363.

Full text
Abstract:
BackgroundWe assessed whether receipt of coupons—via direct mail or e-mail—was prospectively related to trajectories of smoking behaviours.MethodsData were from a cohort of US adults (n=26 447) who participated in wave 1 (2013–2014) and wave 2 (2014–2015) of the Population Assessment of Tobacco and Health Study. Participants reported receipt of tobacco direct mail/email coupons in the past 6 months in wave 1 and their smoking status in both waves. Weighted multiple logistic regressions were used to examine demographic correlates of receiving tobacco direct mail/email coupons at wave 1 and to examine the prospective effect of receiving tobacco coupons on trajectories of smoking behaviours.FindingsAt wave 1, 10.7% of never smokers, 13.9% of experimental smokers, 37.1% of current smokers and 16.5% of former smokers reported receiving tobacco direct mail/email coupons. Lower education and higher poverty adults and non-Hispanic white current smokers were more likely to have received these coupons (p<0.05). Receiving tobacco direct mail/email coupons at wave 1 was associated with increased odds of smoking initiation among never smokers (adjusted odds ratio (AOR)=2.28, 95% CI 1.36 to 3.83), becoming established smokers among experimenters (AOR=1.62, 95% CI 1.29 to 2.04), becoming daily smokers among non-daily smokers (AOR=1.56, 95% CI 1.23 to 1.99) and smoking relapse among former smokers between waves (AOR=1.91, 95% CI 1.39 to 2.65). Receiving these coupons at wave 1 was associated with reduced odds of smoking cessation ≥6 months among current smokers (AOR=0.71, 95% CI 0.58 to 0.88).ConclusionsTobacco direct mail/email coupons encourage and sustain smoking and disproportionately affect lower socioeconomic populations.
APA, Harvard, Vancouver, ISO, and other styles
9

CHEN, GUANING, CHIH-WEI YI, MIN-TE SUN, FANG-CHU LIU, and WEI-CHI LAN. "MINIMUM LOCAL DISK COVER SETS FOR BROADCASTING IN HETEROGENEOUS MULTIHOP WIRELESS NETWORKS." International Journal of Foundations of Computer Science 23, no. 05 (August 2012): 1147–72. http://dx.doi.org/10.1142/s0129054112500165.

Full text
Abstract:
The concept of forwarding sets is widely adopted in many broadcast protocols for wireless multihop networks to alleviate the broadcast storm problem. In these protocols, after receiving a broadcast message, each node that is requested to relay the message instructs a subset of its 1-hop neighbors, a.k.a. the forwarding set, to further relay it. In this paper, we propose to use the Minimum Local Disk Cover Set (MLDCS) as the forwarding set in heterogeneous multihop wireless networks, where nodes may have different transmission ranges.We show that the minimum local disk cover set of a node in heterogeneous networks is equivalent to its skyline set, and then we propose a divide-and-conquer algorithm with the optimal time complexity to compute the skyline set locally and statelessly. Moreover, unlike other forwarding heuristics, the proposed algorithm requires only 1-hop neighbor information. This helps to reduce the forwarding set formation latency and thus will be more suitable for environments with a frequently changed network topology, such as vehicular ad hoc networks.
APA, Harvard, Vancouver, ISO, and other styles
10

Tanjung, Dion, Seunggyu Byeon, Junhwan Huh, Dong Hyun Kim, and Jong Deok Kim. "Opportunistic and On-Demand Network Coding-Based Solutions for LPWAN Forwarding." Sensors 20, no. 20 (October 13, 2020): 5792. http://dx.doi.org/10.3390/s20205792.

Full text
Abstract:
The single-hop star-of-stars topology in low-power and wide-area networks (LPWAN) exhibits reliability and substandard coverage issues, especially in urban areas where line-of-sight (LoS) communication is difficult to achieve. Moreover, LPWAN trade-off the data rate to achieve longer coverage, preventing other end-devices from using the time resource. Locating other gateways is uneconomical as it requires infrastructure, such as the internet and a power connection. In this study, we propose a forwarding scheme with a relay to increase LPWAN coverage and reliability while not degrading the network’s capacity. A relay tends to incur unnecessary forwarding that degrades the network capacity unless proper countermeasure is prepared. Our works, namely opportunistic and on-demand network coding (OODC), minimize unnecessary forwarding and make good use of multiple-receiving relays. Network coding is also applied in the relay for better transmission efficiency and reliability simultaneously. Because network coding occurs header overhead, we perform a header compression technique to counter it. According to our simulation result, our method shows better reliability than fixed path forwarding. In an adaptive data rate settings, the OODC achieves a 92% packet delivery ratio (PDR), whereas a fixed-path forwarding only achieves an 84% PDR.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Mail receiving and forwarding"

1

HUI-CHING, LEE, and 李惠晴. "A Study on Forwarding Behaviors Among E-mail Users." Thesis, 2001. http://ndltd.ncl.edu.tw/handle/y572t6.

Full text
Abstract:
碩士
淡江大學
大眾傳播學系
89
As the electronic mail has become more and more popular in the internet age, forwarded mails become the important mails among these e-mails. Many e-mail users forward mails to others in cyberspace. Responding to the above phenomena, this study aims to explore e-mail users’ forwarding behaviors. This study first reviews the related literatures to explore which variables influence forwarding behaviors. What is people’s attitude toward forwarding mails among e-mail users? What are their motives? What types of messages are forwarded? How frequent are their forwarding behaviors? We also try to understand the relationships among variables like demographic characteristics, values, communication features, forwarding attitude, forwarding motivation, and forwarding behaviors. After a pilot study, the study adopts internet survey to collect data, exam all hypothesis and find out email users’ forwarding behaviors. Besides, this study further interviews people to explain the conclusion deeply. The study finds three main attitude dimensions toward forwarding mails among e-mail users: passive-optimistic attitude, pessimistic-doubtful attitude, and negative-critic attitude. Principal component analysis in this study identifies three motivations for forwarding behavior: sharing information, social-entertainment, and passive factor. The study finds the universality and particularity of forwarding behaviors. Among all statistically significant variables, passive-optimistic attitude and social-entertainment attitude are the most influential variables in affecting forwarding behaviors. Synthesizing all the following aspects, demographic variables, values, communication features, forward attitudes and forward motivations, most of these variables have some correlation with forwarding behaviors. The study finds that demographic variables have influences on the content types of forwarding mails, the frequency and quantity of forwarding mails. For example, women tend to forward soft information, elders tend to forward assistant and enterprise information, users with higher education and lower income forward mails less frequently, and the quantity of forwarding mail is small. We also find that value is the most influential variables in affecting the content types of forwarding mails. Users with stronger communication features forward mails more frequently. As to the internet use experience, the more time one uses internet, the more possibility he will forward mails to others. Variables like the frequency of e-mail use, the quantity and frequency of received forwarding mails all have predictive ability to forwarding behaviors. Besides, forwarding behaviors and replying behaviors have some correlation.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Mail receiving and forwarding"

1

How to use mail drops for privacy and profit. Port Townsend, Wash: Loompanics Unlimited, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

L, C. W. Mail drops: How to use them, and how to detect if someone else is using them. [California]: C.W.L. Inc., 1985.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Luger, Jack. How to use mail drops for profit, privacy, and self-protection. 2nd ed. Port Townsend, Wash: Loompanics Unlimited, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Luger, Jack. How to use mail drops for profit, privacy, and self-protection. 2nd ed. Port Townsend, Wash: Breakout Productions, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rowe, Kenneth. The postal history and markings of the forwarding agents. Louisville, Ky: Leonard H. Hartmann, 1996.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Reduction, United States Congress House Committee on Small Business Subcommittee on Regulatory Reform and Paperwork. United States Postal Service's regulations regarding commercial mail receiving agencies (CMRAs): Hearing before the Subcommittee on Regulatory Reform and Paperwork Reduction of the Committee on Small Business, House of Representatives, One Hundred Sixth Congress, first session, Washington, DC, October 19, 1999. Washington: U.S. G.P.O., 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

United States. Congress. Senate. Committee on Governmental Affairs. Reforming postal procurement and contracting: Eagle Air hub example : hearing before the Committee on Governmental Affairs, United States Senate, One Hundred Second Congress, second session, September 24, 1992. Washington: U.S. G.P.O., 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Office, General Accounting. USPS site acquisition. Washington, D.C: The Office, 1992.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

A, Vixie Paul, ed. Sendmail: Theory and practice. Boston: Digital Press, 1995.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Office, General Accounting. Postal procurement: An assessment of postal purchasing practices : report to congressional requesters. Washington, D.C: The Office, 1988.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Mail receiving and forwarding"

1

Hart-Davis, Guy. "Sending and Receiving E-mail." In Office 2010 Made Simple, 619–40. Berkeley, CA: Apress, 2011. http://dx.doi.org/10.1007/978-1-4302-3576-7_26.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Gamble, Adam, Cloves Carneiro, and Rida Al Barazi. "Sending and Receiving E-Mail." In Beginning Rails 4, 203–17. Berkeley, CA: Apress, 2013. http://dx.doi.org/10.1007/978-1-4302-6035-6_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Sending and Receiving Mail." In Beginning Rails, 229–43. Berkeley, CA: Apress, 2007. http://dx.doi.org/10.1007/978-1-4302-0319-3_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

"Sending and Receiving E-Mail." In Beginning Rails 3, 215–32. Berkeley, CA: Apress, 2010. http://dx.doi.org/10.1007/978-1-4302-2434-1_9.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

"Sending and Receiving E-mail." In Beginning Zend Framework, 227–52. Berkeley, CA: Apress, 2009. http://dx.doi.org/10.1007/978-1-4302-1826-5_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Katakis, Ioannis, Grigorios Tsoumakas, and Ioannis Vlahavas. "E-mail Mining." In Web Data Management Practices, 220–43. IGI Global, 2007. http://dx.doi.org/10.4018/978-1-59904-228-2.ch010.

Full text
Abstract:
Email has met tremendous popularity over the past few years. People are sending and receiving many messages per day, communicating with partners and friends, or exchanging files and information. Unfortunately, the phenomenon of email overload has grown over the past years becoming a personal headache for users and a financial issue for companies. In this chapter, we will discuss how disciplines like Machine Learning and Data Mining can contribute to the solution of the problem by constructing intelligent techniques which automate email managing tasks and what advantages they hold over other conventional solutions. We will also discuss the particularity of email data and what special treatment it requires. Some interesting email mining applications like mail categorization, summarization, automatic answering and spam filtering will be also presented.
APA, Harvard, Vancouver, ISO, and other styles
7

Miller, Melissa A. "Tone and Attitude in E-Mail Communications and the Online Classroom." In Building Online Communities in Higher Education Institutions, 201–15. IGI Global, 2014. http://dx.doi.org/10.4018/978-1-4666-5178-4.ch011.

Full text
Abstract:
In the online classroom, e-mail has emerged as a predominant communication method between students and faculty. As such, despite many benefits of e-mail, including ease of use, familiarity of the technology, and rapid response times, there are numerous challenges faculty face when sending and receiving e-mail correspondence with students. This chapter addresses several of the challenges presented to faculty, including lack of cues such as body language, inflection, and other sensory stimuli. The author of the chapter discusses ways to overcome these challenges including appropriate tone and attitude in the faculty member’s e-mails, which help mitigate the challenges the medium presents. The chapter concludes with discussion supporting use of electronic communication for students and faculty, especially when written effectively and purposefully.
APA, Harvard, Vancouver, ISO, and other styles
8

Pournelle, Jerry. "The Ten Worst E-mail Mistakes." In 1001 Computer Words You Need to Know. Oxford University Press, 2004. http://dx.doi.org/10.1093/oso/9780195167757.003.0010.

Full text
Abstract:
Anyone who uses e-mail should avoid the following mistakes: Giving confidential information in an unsecured e-mail. Your credit card number, for instance, can easily be sent throughout the world. It’s best to send credit-card information only through secure Web sites. See “How to Shop Safely Online” on p.143. Opening attachments from strangers. Never open an e-mail that has an attachment that is vague or says “Check this out!” A virus may spread by invading the contact list on a computer and sending itself to every e-mail address on the list. Opening unsolicited e-mail without first scanning for viruses. There are several free anti-virus programs available, and they should be updated regularly. Hitting “reply” to an unsolicited e-mail when asking to be taken off the sender’s list. By hitting “reply” you may be opening up your account to a deluge of spam. Hitting “reply all” when only the sender needs a response. Does everyone really need to know your reply? Think before you reply, especially if the e-mail was sent to a very large group. Forwarding hoaxes or jokes. Most people get too much e-mail, and they would prefer a real note from you, not a hoary joke or, worse, a scaremongering urban legend or false charity scam. If something sounds too good (or too shocking) to be true, it probably is. Check the web for information before you send something on; www.snopes.com is a great site for checking stories. Sending an e-mail without a signature. It’s helpful to include at least your name and e-mail address at the bottom of your message, especially if you are e-mailing someone for the first time. Don’t use a vCard (virtual business card). It may be mistaken for a virus. Sending an e-mail without spell-checking it. Most e-mail systems spell-check as you type or have a “spell-check before sending” setting. Sending large files or pictures. Don’t clog up your recipient’s mailbox—ask before sending big files. Sending e-mail without a “subject” line or with a vague subject line. Be specific.A subject that reads “Looking forward to dinner Saturday!” will get more attention than one that reads “hi” or “see you soon?” A blank subject line may get no attention at all.
APA, Harvard, Vancouver, ISO, and other styles
9

Chen, Lei, Wen-Chen Hu, Ming Yang, and Lei Zhang. "Applied Cryptography in E-mail Services and Web Services." In Applied Cryptography for Cyber Security and Defense, 130–45. IGI Global, 2011. http://dx.doi.org/10.4018/978-1-61520-783-1.ch005.

Full text
Abstract:
E-mail services are the method of sending and receiving electronic messages over communication networks. Web services on the other hand provide a channel of accessing interlinked hypermeida via the World Wide Web. As these two methods of network communications turn into the most popular services over the Internet, applied cryptography and secure authentication protocols become indispensable in securing confidential data over public networks. In this chapter, we first review a number of cryptographic ciphers widely used in secure communication protocols. We then discuss and compare the popular trust system Web of Trust, the certificate standard X.509, and the standard for public key systems Public Key Infrastructure (PKI). Two secure e-mail standards, OpenPGP and S/MIME, are examined and compared. The de facto standard cryptographic protocol for e-commerce, Secure Socket Layer (SSL) / Transport Layer Security (TLS), and XML Security Standards for secure web services are also discussed.
APA, Harvard, Vancouver, ISO, and other styles
10

Ono, Akinori, and Mai Kikumori. "Consumer Adoption of PC-Based/Mobile-Based Electronic Word-of-Mouth." In Encyclopedia of Information Science and Technology, Fourth Edition, 6019–30. IGI Global, 2018. http://dx.doi.org/10.4018/978-1-5225-2255-3.ch523.

Full text
Abstract:
Electronic word of mouth (eWOM) on products and services is getting more important in consumer behavior as well as marketing communication. Regarding the issue, marketing and consumer scholars have conducted research on eWOM message senders and recipients. Focusing on eWOM receiving behavior, this chapter presents academic knowledge regarding how recipients evaluate mobile e-WOM messages and how he/she behaves as a consequence. There are two kinds of eWOM, i.e., PC-based eWOM and mobile-based eWOM (mWOM). Moreover, two types of messages can be identified in each kind of eWOM—viral messages from marketers via friends and relatives, and eWOM reviews on products and services from anonymous senders. Prior studies on viral marketing can be further divided into two research streams; research that have constructed and tested causal models explaining why consumers participate in viral marketing, and research that have focused on illustrating comprehensively a multi-stage cognitive and behavioral customer journey towards receiving, using, and forwarding viral marketing messages.
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Mail receiving and forwarding"

1

Pareek, Gaurav, and Purushothama B. R. "Proxy visible re-encryption scheme with application to e-mail forwarding." In SIN '17: Security of Information and Networks. New York, NY, USA: ACM, 2017. http://dx.doi.org/10.1145/3136825.3136906.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Seike, Takumi, Yong Jin, Nariyoshi Yamai, Kiyohiko Okayama, Keita Kawano, and Motonori Nakamura. "A Solution for Mail Forwarding Problem of SPF by Tracing Recipient Addresses." In 2010 10th IEEE/IPSJ International Symposium on Applications and the Internet (SAINT). IEEE, 2010. http://dx.doi.org/10.1109/saint.2010.22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ichimura, Satoshi, and Yutaka Matsushita. "A pilot card-based hypermedia integrated with a layered architecture-based OODB and an object-forwarding mail system." In the 1992 ACM annual conference. New York, New York, USA: ACM Press, 1992. http://dx.doi.org/10.1145/131214.131268.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Meško, Gorazd, Kaja Prislan, and Rok Hacin. "Varnost uporabnikov kibernetskega prostora: analiza zaznav med prebivalci v urbanih in ruralnih okoljih." In Varnost v ruralnih in urbanih okoljih: konferenčni zbornik. Univerzitetna založba Univerze v Mariboru, 2020. http://dx.doi.org/10.18690/978-961-286-404-0.12.

Full text
Abstract:
The paper focuses on the comparison of safety and security of cyberspace users in urban and rural environments. The study involved 1,158 participants from 100 municipalities across Slovenia. Findings showed that residents of urban and rural settings were most frequently victimized with the following threats: 1) pop-up windows that required re-entering of the user name and password to obtain users’ data, 2) receiving a fake email with the infected attachment, and 3) fake online advertising. Residents in both environments highlighted that they feel most vulnerable to receiving a fake e-mail with the infected attachment. Moreover, they expose this threat and extortion with their own sexually explicit materials as those that would cause them the most harm.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography