Academic literature on the topic 'E-mail technology'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'E-mail technology.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "E-mail technology"
Scharff, Virginia. "E-Mail Exchange: Appropriate Technology." Perspecta 29 (1998): 34. http://dx.doi.org/10.2307/1567215.
Full textAnderson, J. "New Technology Briefing: Video e-mail — The next generation of e-mail marketing?" Interactive Marketing 4, no. 3 (January 1, 2003): 281–84. http://dx.doi.org/10.1057/palgrave.im.4340190.
Full textTrollinger, Gayle, and Rachel Slavkin. "Purposeful E-Mail as Stage 3 Technology." TEACHING Exceptional Children 32, no. 1 (September 1999): 10–15. http://dx.doi.org/10.1177/004005999903200102.
Full textReinking, Liqing Tao, David. "ISSUES IN TECHNOLOGY: E-MAIL AND LITERACY EDUCATION." Reading & Writing Quarterly 16, no. 2 (April 2000): 169–74. http://dx.doi.org/10.1080/105735600278024.
Full textRanchhod, Ashok, and Fan Zhou. "Comparing respondents of e‐mail and mail surveys: understanding the implications of technology." Marketing Intelligence & Planning 19, no. 4 (July 1, 2001): 254–62. http://dx.doi.org/10.1108/eum0000000005556.
Full textDay, James. "E-mail: A New Management Parameter." Journal of Contemporary Dental Practice 2, no. 2 (2001): 36–41. http://dx.doi.org/10.5005/jcdp-2-2-36.
Full textOlsen, Merritt J., and Matthew M. Frazier. "Cultivating on-line donor relationships through e-mail technology." New Directions for Philanthropic Fundraising 2001, no. 33 (2001): 59–72. http://dx.doi.org/10.1002/pf.3304.
Full textHowes, Colleen M., and Mark R. Mailloux. "Comparing Two Survey Research Approaches: E-Mail and Web-Based Technology versus Traditional Mail." Journal of Marketing for Higher Education 11, no. 4 (December 2001): 51–66. http://dx.doi.org/10.1300/j050v11n04_04.
Full textStevens, Gary. "New Technology Briefing: Best practice technology options for optimal e-mail marketing." Interactive Marketing 6, no. 1 (July 1, 2004): 62–70. http://dx.doi.org/10.1057/palgrave.im.4340269.
Full textFan, Li Ping. "Gender Differences in E-Mail Communication." Advanced Materials Research 225-226 (April 2011): 346–49. http://dx.doi.org/10.4028/www.scientific.net/amr.225-226.346.
Full textDissertations / Theses on the topic "E-mail technology"
Goméz, Villanueva Daniel. "Secure E-mail System for Cloud Portals : Master Thesis in Information and Communication Systems Security." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-108080.
Full textBell, Thomas. "The Effects of Task-Based Documentation Versus Online Help Menu Documentation on the Acceptance of Information Technology." Thesis, University of North Texas, 1999. https://digital.library.unt.edu/ark:/67531/metadc2195/.
Full textNtsiko, Blondie Bonisa Blossom. "The use of e-mail among students and lecturers at Nelson Mandela Metropolitan University: a guide reasearch report." Thesis, Nelson Mandela Metropolitan University, 2011. http://hdl.handle.net/10948/d1015970.
Full textNyland, Robert Scott. "The Gratification Niches of Internet Social Networking, E-mail, and Face-to-face Communication." Diss., CLICK HERE for online access, 2007. http://contentdm.lib.byu.edu/ETD/image/etd2151.pdf.
Full textFerrier, J. D., and edu au jillj@deakin edu au mikewood@deakin edu au wildol@deakin edu au kimg@deakin. "AN INVESTIGATION INTO THE DIFFUSION OF INNOVATION IN TECHNICAL AND FURTHER EDUCATION: IMPLEMENTING E-MAIL THROUGH ACTION RESEARCH." Deakin University. School of Education, 1998. http://tux.lib.deakin.edu.au./adt-VDU/public/adt-VDU20041208.155904.
Full textAlgestam, Sara, and Ertuğrul Kılıçaslan. "Fulfilling customer demand Customer requirements and demands on e-commerce." Thesis, Högskolan i Borås, Institutionen Ingenjörshögskolan, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:hb:diva-20264.
Full textFrehner, Carmen. "E-Mail - SMS - MMS : the linguistic creativity of asynchronous discourse in the New Media Age /." Bern [u.a.] : Lang, 2008. http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&doc_number=016392581&line_number=0004&func_code=DB_RECORDS&service_type=MEDIA.
Full textNell, Jenny. "E-post och internkommunikation : en studie av upplevelser kring användandet av ny kommunikationsteknik." Thesis, Uppsala University, Media and Communication, 2007. http://urn.kb.se/resolve?urn=urn:nbn:se:uu:diva-106503.
Full textPurpose/aim: To investigate individual experiences of how a new communication technology, e-mail, influences a) the structure of the internal communication – does it for example make networking any easier? – and b) the form of the persons everyday language.
Material/method: A theoretical framework gathered through a literature study and empirical data gathered through interviews with two persons.
Main results: Differences and similarities exist between the experiences studied in this paper. The most unexpected result is that the system of e-mail does not seem to be able to create new channels of communication. If anything, it reinforces the structure that already exist. An aspect of decisive importance is the original rules and norms concerning internal communication within the organization.
Brost, Ludvig, Daniel Ludwiszewski, and Ted Oskarsson. "Personlig anpassning vid e-postmarknadsföring : Framställningens och kundrelationens betydelse." Thesis, Jönköping University, JIBS, Business Informatics, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:hj:diva-123.
Full textBakgrund: Företag som huvudsakligen agerar med Internet som kontaktkanal möter sällan eller aldrig sina kunder fysiskt, vilket leder till ett behov av att komplettera frånvaron av fysisk kontakt med andra former av kommunikation. Som lösning på detta problem har företag börjat tillämpa personligt anpassad e-postmarknadsföring vid kontakt med konsumenter för att bättre tillgodose kunders behov av relevant information. Samtidigt som personlig anpassning ger möjligheten att erbjuda kunden mervärde och öka kundens lojalitet kan också kunden uppfatta tekniken som falsk och konstruerad. Otillräcklig kunskap om konsumenters värderingar i frågor som berör personlig anpassning av e-post kan leda till att företag får svårt att knyta sig till potentiella kunder samt behålla befintliga kunder.
Syfte: Syftet med uppsatsen är att undersöka till vilken grad e-handelskonsumenter föredrar personligt anpassade e-postutskick, hur e-postutskick bör framställas samt vilken betydelse konsumentens relation till företaget har. Detta ska resultera i rekommendationer till företag som genom personlig anpassning vill utveckla sin e-handelsstrategi.
Metod: För att kunna bekräfta eller förkasta de uppsatta hypoteserna tar uppsatsen ett hypotetiskt deduktivt angreppssätt. En kvantitativ enkätundersökning används för att samla in empirisk data vilken har analyserats statistiskt med hjälp av t-test. Undersökningens population omfattar ett e-handelsföretags kunder.
Resultat: Uppsatsens empiriska studie visar att e-handelskonsumenter av manligt kön föredrar personligt anpassade e-postutskick framför opersonliga e postutskick. I allmänhet uppfattas personlig anpassning som relevanshö-jande teknik, särskilt om den personliga anpassningen är genuin och om konsumenten tidigare uttryckligen angett sitt intresse för e-postutskicket. I uppsatsen studeras våra resultat närmare för att identifiera i vilka situationer som e-handlarnas värderingar skiljer sig åt. Företag bör beakta att kunden är mer öppen för personlig anpassning av e postutskick när denne har kontroll över hur företaget tillämpar den personliga anpassningen. Demografiska faktorer som utbildningsnivå och till viss del geografisk lokalisering har ock-så betydelse för hur personlig anpassning uppfattas.
Background: Companies that primarily act with Internet as channel of contact meet their customers in real life very rarely or never, which creates a need to complement the absence of physical contact with other forms of communication. As a solution to this problem companies have begun to implement personalized e-mail marketing in order to better satisfy customers’ need for relevant information. Still, as personalization gives the possibility to offer the customer added value while increasing the customer loyalty, the technology can also be perceived as deceitful and artificial. Insufficient knowledge regarding the customers’ perception of issues that concern personalization can result in difficulties for companies to attract new and retain existing customers.
Purpose: The purpose of the thesis is to study to what extent e-consumers prefer personalized e-mail marketing, how e-mail campaigns should be created and what significance the relation has between consumers and companies. This is expected to result in recommendations to e-tailors that want to develop their business through the use of personalization in their e-mail marketing efforts.
Method: In order to be able to verify or to falsify the set hypotheses, the research takes a hypothetical deductive approach. A quantitative survey has been used to collect the empirical data which has been statistically analyzed with the use of t-tests. The research population consists of the customers of an e-tailor.
Conclusions: The empirical study shows that male e-consumers prefer personalized e mail marketing more than non-personalized e-mail marketing. Personalization is in general perceived as a technique to increase the level of relevance of the e-mail, thus being looked upon as added value, especially when the technique is genuine and if the consumer explicitly has given his or hers area of interest for the e-mail campaigns. In the thesis the research results are studied closer in order to investigate in which situations opinions part. Companies should also consider that customers are more open towards personalized e-mail marketing when she or he has control over how the companies apply personalization. Demographic factors such as level of education and to a certain extent geographical location also have an impact on how personalization is perceived.
Cederlund, Maria, and Anna-Karin Häggström. "Brytningstid i Internkommunikationen? : vilken roll har Intranät och e-post i organisationers kommunikation?" Thesis, Linköping University, Department of Management and Economics, 2000. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-564.
Full textHaving a functioning internal communication is necessary for the survival and existence of every company. Traditional communication channels are for example meetings, noteboards and personnel newspapers. During the last ten years we have witnessed an explosion of new channels, who are based on information technology. IT is a natural part in new IT-companies, like Framfab and Icon Medialab, but what role does IT have in a large, manufacturing company with a long history? The purpose with this thesis is to investigate how IT has influenced the internal communication in a company. With this thesis we want to contribute to a developed understanding of communication within companies and discuss what role IT can play for internal communication in the future. We have chosen to study Akzo Nobel and have interviewed employees in different business units to investigate their view on communication and the influence of IT. We found that IT has had a relatively great impact on the internal communication and that the new technology often work as a complement to the traditional communication channels. We believe that IT will lead to an increased amount of written communication and that the communication will be detached from persons. There is a risk that the amount of information will increase and that this will make it harder for the individual to find relevant information. For IT to be an efficient channel for companies in the future, we believe that companies must educate employees regarding technology, pedagogic and written presentation.
Books on the topic "E-mail technology"
Morris, Steve. Perfect E-mail. London: Random House Group Limited, 2001.
Find full textMiller, Samantha. E-Mail Etiquette. New York: Grand Central Publishing, 2001.
Find full textBlum, Richard. Open Source E-mail Security. Upper Saddle River: Pearson Education, 2003.
Find full textInternational Conference on Mail Technology--Evolution to e-revolution. International Conference on Mail Technology: Evolution to e-revolution. Bury St. Edmunds, England: Professional Engineering, 2001.
Find full textVermittlungskulturen im Wandel: Brief, E-Mail, SMS. Frankfurt am Main: Lang, 2003.
Find full textThe e-policy handbook: Designing and implementing effective e-mail, Internet, and software policies. New York: AMACOM, 2001.
Find full textWright, Benjamin. The law of electronic commerce: EDI, FAX, and E-mail: technology, proof, and liability. Boston: Little, Brown, 1991.
Find full textThe law of electronic commerce: EDI, E-mail, and Internet : technology, proof, and liability. 2nd ed. Boston: Little, Brown, 1995.
Find full textFlynn, Nancy. The e-Policy Handbook. New York: AMACOM Books, 2009.
Find full textE-mail etiquette: Do's, don'ts, and disaster tales from People magazine's internet manners expert. New York, NY: Warner Books, 2001.
Find full textBook chapters on the topic "E-mail technology"
Asscher, Lodewijk F., and Sjo Anne Hoogcarspel. "Harvesting E-Mail Addresses." In Information Technology and Law Series, 67–80. The Hague: T.M.C. Asser Press, 2006. http://dx.doi.org/10.1007/978-90-6704-711-1_4.
Full textHorowitz, Renee B., and Marian G. Barchilon. "Stylistic Guidelines for E-Mail." In Writing and Speaking in the Technology Professions, 433–38. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119134633.ch70.
Full textEdenius, Mats. "Discourse on E-Mail in Use." In IFIP Advances in Information and Communication Technology, 73–89. Boston, MA: Springer US, 2003. http://dx.doi.org/10.1007/978-0-387-35634-1_5.
Full textTak, Gaurav Kumar, and Gaurav Ojha. "Awareness Based Approach against E-Mail Attacks." In Advances in Computing and Information Technology, 699–708. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-31513-8_71.
Full textChociey, Patricia A. "“Who's Reading My E-Mail?”: A Study of Professionals' E-Mail Usage and Privacy Perceptions in the Workplace." In Writing and Speaking in the Technology Professions, 439–45. Hoboken, NJ, USA: John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781119134633.ch71.
Full textBuckner, Kathy, and Mark Gillham. "Using E-Mail for Social and Domestic Purposes." In IFIP Advances in Information and Communication Technology, 87–97. Boston, MA: Springer US, 2000. http://dx.doi.org/10.1007/978-0-387-35511-5_6.
Full textJiang, Tao, Wonil Kim, Kyungsuk Lhee, and Manpyo Hong. "E-mail Worm Detection Using the Analysis of Behavior." In Distributed Computing and Internet Technology, 348–56. Berlin, Heidelberg: Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11604655_40.
Full textQing, Jinjian, Ruilong Mao, Rongfang Bie, and Xiao-Zhi Gao. "An AIS-Based E-mail Classification Method." In Emerging Intelligent Computing Technology and Applications. With Aspects of Artificial Intelligence, 492–99. Berlin, Heidelberg: Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-04020-7_52.
Full textWolf, Catherine G., Larry Koved, and Edward Kunzinger. "Ubiquitous Mail: Speech and Graphical User Interfaces to an Integrated Voice/E-Mail Mailbox." In IFIP Advances in Information and Communication Technology, 247–52. Boston, MA: Springer US, 1995. http://dx.doi.org/10.1007/978-1-5041-2896-4_42.
Full textRomm, C. T., and Nava Pliskin. "The office tyrant: abuse of power through e-mail." In Information Systems and Technology in the International Office of the Future, 271–86. Boston, MA: Springer US, 1996. http://dx.doi.org/10.1007/978-0-387-35085-1_19.
Full textConference papers on the topic "E-mail technology"
Jadhav, Anita B., and Madhuri Rao. "E-mail filtering." In ICWET '10: International Conference and Workshop on Emerging Trends in Technology. New York, NY, USA: ACM, 2010. http://dx.doi.org/10.1145/1741906.1742152.
Full text"General conference e-mail." In 2009 15th International Symposium for Design and Technology of Electronics Packages (SIITME). IEEE, 2009. http://dx.doi.org/10.1109/siitme.2009.5407392.
Full textAlRashid, Hussah, Rasheed AlZahrani, and Eyas ElQawasmeh. "Reverse of e-mail spam filtering algorithms to maintain e-mail deliverability." In 2014 Fourth International Conference on Digital Information and Communication Technology and its Applications (DICTAP). IEEE, 2014. http://dx.doi.org/10.1109/dictap.2014.6821699.
Full textTsai, Yihjia, Wen-Fa Huang, Cheng-Chin Lin, and Ping-Nan Hsiao. "Spectrum of E-mail Network." In The 9th International Conference on Advanced Communication Technology. IEEE, 2007. http://dx.doi.org/10.1109/icact.2007.358763.
Full textChoudhari, Sudeep, and Suman Das. "Spam E-mail Identification Using Blockchain Technology." In 2021 International Conference on Communication, Control and Information Sciences (ICCISc). IEEE, 2021. http://dx.doi.org/10.1109/iccisc52257.2021.9485018.
Full textSureswaran, R., Hussein Al Bazar, O. Abouabdalla, Ahmad M. Manasrah, and Homam El-Taj. "Active e-mail system SMTP protocol monitoring algorithm." In Multimedia Technology (IC-BNMT). IEEE, 2009. http://dx.doi.org/10.1109/icbnmt.2009.5348490.
Full textCormier, Jennifer P. "A Paradigm Shift in E-mail Treatment?" In 2006 IEEE International Symposium on Technology and Society. IEEE, 2006. http://dx.doi.org/10.1109/istas.2006.4375880.
Full textHusni, Emir, and Agus Wibowo. "E-mail system for Delay Tolerant Network." In 2012 International Conference on System Engineering and Technology (ICSET). IEEE, 2012. http://dx.doi.org/10.1109/icsengt.2012.6339285.
Full textGupta, Surekha, Emmanuel S. Pilli, Preeti Mishra, Sumit Pundir, and R. C. Joshi. "Forensic analysis of E-mail address spoofing." In 2014 5th International Conference- Confluence The Next Generation Information Technology Summit. IEEE, 2014. http://dx.doi.org/10.1109/confluence.2014.6949302.
Full textTsuzaki, Yoshiharu, Ryosuke Matsumoto, Daisuke Kotani, Shuichi Miyazaki, and Yasuo Okabe. "A Mail Transfer System Selectively Restricting a Huge Amount of E-Mails." In 2013 International Conference on Signal-Image Technology & Internet-Based Systems (SITIS). IEEE, 2013. http://dx.doi.org/10.1109/sitis.2013.146.
Full text