Dissertations / Theses on the topic 'Electronic messages'

To see the other types of publications on this topic, follow the link: Electronic messages.

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Electronic messages.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Patel, Malti. "The summarization and categorization of electronic mail messages." Thesis, University of Sheffield, 1990. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.395591.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Samad, Abdus. "Measuring anonymity while sending and receiving multiple messages." Thesis, Wichita State University, 2012. http://hdl.handle.net/10057/5420.

Full text
Abstract:
Anonymity systems are designed in a way that hides the level of communication between senders and receivers of a message, and the goal of an attacker is to find that communication pattern. It is usually very difficult to completely de-anonymize a system if it presents a black box, in which case only a global adversary can observe all messages going in and out of the system and, based on some attack, can infer the feasibility of messages being sent and received by users. This thesis presents a method to calculate the amount of anonymity present in a system after a global adversary has conducted an attack. The base model considered in this thesis considers a black box system, which allows multiple senders to send multiple input messages and multiple receivers to receive multiple output messages. A couple of approaches taken by previous researches have been analyzed and compared to the method given in this thesis, which shows that one of the methods does not consider an attack, while the other method does not cover the full spectrum of the attack plane.
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
3

McLaughlin, Louise A. "The influence of electronic mail on communication patterns among educators /." Thesis, McGill University, 2003. http://digitool.Library.McGill.CA:80/R/?func=dbin-jump-full&object_id=79790.

Full text
Abstract:
In the late 1990s, the Ministere de l'Education du Quebec (MEQ) undertook a reform program that would reframe the educational system. Technology and pedagogy were seen as needing realignment to better meet a student-centered, technology-driven, lifelong learning experience. The New Reform as this new framework is known will be fully implemented by 2008 and educators are its pivotal agents. With Information and Communications Technologies being central to the new reform, this qualitative study looks at educator use of the most widely used Internet application, electronic mail. Very little research has looked at how pervasive electronic mail has become among educators and how it is affecting their multidirectional, multilayered roles as educators. Data originate from respondent electronic mail, a literature review, and the author's personal experience. Outcomes, reached through inductive analysis, reveal that educators continue to experience difficulty manipulating electronic mail technology even though they appreciate its multiple advantages. How electronic mail can facilitate networked communication and educator teamwork to better translate the MEQ's new reform successfully is the focus of this study. Implications derived from the outcomes are discussed in view of enhancing ongoing contributions by Quebec educators.
APA, Harvard, Vancouver, ISO, and other styles
4

Wilcox, Shelby. "The Influence of Social Distance and Attitudes on Processing Health Messages about Electronic Cigarettes on Social Media." The Ohio State University, 2019. http://rave.ohiolink.edu/etdc/view?acc_num=osu1561759035574032.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Keane, Kjrsten. "The Role of Email in Faculty-Student Relationships Toward Understanding Engagement and Retention." Fogler Library, University of Maine, 2007. http://www.library.umaine.edu/theses/pdf/KeaneKV2007.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Cheung, Pak-to Patrick. "A study on combating the problem of unsolicited electronic messages in Hong Kong." Click to view the E-thesis via HKUTO, 2007. http://sunzi.lib.hku.hk/hkuto/record/B38608248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Šiatkutė, Vilma. "Language of English chat room messages as a variety of electronic English." Master's thesis, Lithuanian Academic Libraries Network (LABT), 2008. http://vddb.library.lt/obj/LT-eLABa-0001:E.02~2008~D_20080924_184713-40553.

Full text
Abstract:
Internet English used for online communication influences spoken and written language forms. However, little analysis on the question of electronic English can be found – it is studied in a superficial way in literary sources present. The purpose of this study was to explore the language of English chat room messages as a variety of Electronic English. The objectives of the research included the analysis of chat room English in comparison to speech and writing as well as the study of graphological, morphological, and syntactic features of the language of online communication. Qualitative content analysis, comparative analysis, and descriptive method were chosen for the study. To support the scientific data discussed 1100 of chat room sentences were surveyed and 153 presented as practical examples. The research demonstrated that English used for online communication is a separate mode of language possessing features different from the ones of spoken and written forms of language.
Elektroninė anglų kalba įtakoja sakytinę bei rašytinę kalbos formas. Tačiau informacijos susijusios su internetinės anglų kalbos analize galima rasti vos keliuose šaltiniuose. Šio darbo tikslas yra analizuoti pokalbių svetainėse naudojamą anglų kalbą kaip elektroninės anglų kalbos rūšį. Remiantis darbo tikslu, iškelti uždaviniai analizuoti pokalbių svetainių anglų kalbą lyginant ją su sakytine bei rašytine anglų kalba, tirti grafologinius, morfologinius bei sintaksinius ypatumus pokalbių svetainių anglų kalboje. Atliekant tyrimą naudojama turinio analizė, literatūros analizė bei aprašomasis metodas. Analizuojama 1100 praktinių pavyzdžių, 153 pateikiami kaip empirinis darbo pagrindas. Tyrimo rezultatai parodė, kad elektroninė anglų kalba negali būti laikoma nei sakytine, nei rašytine ir turi būti pripažinta kaip atskiras anglų kalbos porūšis, turintis specifinių bruožų.
APA, Harvard, Vancouver, ISO, and other styles
8

Cheung, Pak-to Patrick, and 張伯陶. "A study on combating the problem of unsolicited electronic messages inHong Kong." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2007. http://hub.hku.hk/bib/B38608248.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Ariel, Idan. "Effect of Electronic Cigarette Messages on Young-Adult Behavioral Dispositions Towards Use." Scholar Commons, 2017. http://scholarcommons.usf.edu/etd/6673.

Full text
Abstract:
Over the last decade, electronic cigarettes (e-cigarettes) have emerged as novel and popular nicotine delivery devices. Although many smokers use e-cigarettes, evidence suggests these products are also growing in popularity among young adult non-smokers. It is therefore important to examine factors that may contribute to onset of electronic cigarette use among young adult non-smokers. Critics and supporters of electronic cigarettes have been disseminating anti and pro e-cigarette messages (respectively) and it is currently unclear what effect, if any, these messages exert on young adult non-smokers. Critics of electronic cigarettes advocate caution towards these products, while supporters of electronic cigarettes argue these products can serve as healthier replacements for conventional cigarettes. The present study sought to investigate the influence of caution and replacement messages on young adult non-smokers’ dispositions towards future e-cigarette use. Two hundred and four young-adult non-smokers participated in a between subjects single session design where they viewed one of three possible audiovisual presentations (a caution message, replacement message or control message). After viewing the presentation, participants completed measures and tasks assessing their likelihood of future e-cigarette use, including willingness and intention to try e-cigarettes, as well as a measure of e-cigarette outcome expectancies. Results indicated the caution message decreased self-reported willingness to use e-cigarettes and was associated with higher negative and lower positive e-cigarette expectancies. The replacement message did not influence self-reported willingness and intention to use e-cigarettes but was associated with decreases in negative e-cigarette expectancies. These findings suggest that public health e-cigarette messages could be developed to simultaneously advocate using e-cigarettes as a smoking alternative and caution against e-cigarette use for individuals not already dependent on nicotine.
APA, Harvard, Vancouver, ISO, and other styles
10

Kwok, Pak Wing Parkson. "Communication strategies for email at work." HKBU Institutional Repository, 2001. http://repository.hkbu.edu.hk/etd_ra/389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
11

Cowan-Sharp, Jessy. "A study of topic and topic change in conversational threads." Thesis, Monterey, California : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Sep/09Sep_Cowan_Sharp.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, September 2009.
Thesis Advisor(s): Martell, Craig H. "September 2009." Description based on title screen as viewed on November 9, 2009. Includes bibliographical references (p. 77). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
12

Khan, Ahsan Ahmad. "Effect of data caching on systemwide anonymity with users sending and receiving multiple messages." Thesis, Wichita State University, 2012. http://hdl.handle.net/10057/5411.

Full text
Abstract:
Data caching is a well-acknowledged method for reducing access times to commonly requested data. Data caching yields considerable results when employed in communication systems that exhibit bidirectional communication, such as web browsing. This technique has been used in anonymous networks to increase the overall anonymity provided by the system. With the increasing number of anonymous networks in place today, the need arises for a metric in order to differentiate the degree of anonymity provided by these systems. This thesis presents a method to compute the degree of anonymity provided by such systems. The model focuses on an anonymous system employing data caching and builds on existing related work in order to allow senders to send multiple messages and receivers to receive multiple messages. A systemwide metric is proposed for measuring the anonymity provided by such systems and is then tested under special conditions. The thesis concludes with an analysis of a pool mix system employing data caching.
Thesis (M.S.)--Wichita State University, College of Engineering, Dept. of Electrical Engineering and Computer Science
APA, Harvard, Vancouver, ISO, and other styles
13

Serenko, Alexander Detlor Brian. "User adoption of interface agents for electronic mail /." *McMaster only, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Beebe, David. "Enterprise vault and discovery accelerator: email archiving and discovery solution implementation and the legal landscape." [Denver, Colo.] : Regis University, 2008. http://165.236.235.140/lib/DBeebe2008.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Jamin, Amanda J. "MailScape -- A visual approach To email management." Worcester, Mass. : Worcester Polytechnic Institute, 2007. http://www.wpi.edu/Pubs/ETD/Available/etd-010607-230351/.

Full text
APA, Harvard, Vancouver, ISO, and other styles
16

Van, Tonder Gert Petrus. "The admissibility and evidential weight of electronic evidence in South African legal proceedings: a comparative perspective." University of the Western Cape, 2013. http://hdl.handle.net/11394/4833.

Full text
Abstract:
Magister Legum - LLM
This research will analyse legislation, case law, law commission papers and reports, as well as academic commentary on electronic evidence in South Africa, Canada and England. A comparative analysis will be conducted in order to determine whether South Africa is adequately regulating electronic evidence in light of international and foreign law.
APA, Harvard, Vancouver, ISO, and other styles
17

Jaliwala, Shabbir Hussain. "Unspoofed a secure email system /." Diss., Online access via UMI:, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Torres, Joy E. "Effects of two applications on the success of e-mail access for an individual with acquired cognitive impairment." abstract and full text PDF (free order & download UNR users only), 2008. http://0-gateway.proquest.com.innopac.library.unr.edu/openurl?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:dissertation&res_dat=xri:pqdiss&rft_dat=xri:pqdiss:1453609.

Full text
APA, Harvard, Vancouver, ISO, and other styles
19

Hall, Scott R. "Automatic text categorization applied to E-mail." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2002. http://library.nps.navy.mil/uhtbin/hyperion-image/02sep%5FHall.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
20

Raje, Archis Vijay. "Analysis of e-mail attachment signatures for potential use by intrusion detection systems." Morgantown, W. Va. : [West Virginia University Libraries], 2004. https://etd.wvu.edu/etd/controller.jsp?moduleName=documentdata&jsp%5FetdId=3395.

Full text
Abstract:
Thesis (M.S.)--West Virginia University, 2004.
Title from document title page. Document formatted into pages; contains ix, 57 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 49-51).
APA, Harvard, Vancouver, ISO, and other styles
21

Sroufe, Paul Dantu Ram. "E-shape analysis." [Denton, Tex.] : University of North Texas, 2009. http://digital.library.unt.edu/ark:/67531/metadc12201.

Full text
APA, Harvard, Vancouver, ISO, and other styles
22

Curtis, Carol E. "The interaction of electronic media and administrators at selected community colleges in Missouri /." free to MU campus, to others for purchase, 2001. http://wwwlib.umi.com/cr/mo/fullcit?p3036818.

Full text
APA, Harvard, Vancouver, ISO, and other styles
23

Rosen, Mark (Mark Abraham) 1980. "E-mail classification in the Haystack framework." Thesis, Massachusetts Institute of Technology, 2003. http://hdl.handle.net/1721.1/87895.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Segerstad, Ylva Hård af. "Use and adaptation of written language to the conditions of computer-mediated communication /." Online version, 2002. http://dds.crl.edu/CRLdelivery.asp?tid=11401.

Full text
APA, Harvard, Vancouver, ISO, and other styles
25

Balakchiev, Milko. "Unique Channel Email System." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804980/.

Full text
Abstract:
Email connects 85% of the world. This paper explores the pattern of information overload encountered by majority of email users and examine what steps key email providers are taking to combat the problem. Besides fighting spam, popular email providers offer very limited tools to reduce the amount of unwanted incoming email. Rather, there has been a trend to expand storage space and aid the organization of email. Storing email is very costly and harmful to the environment. Additionally, information overload can be detrimental to productivity. We propose a simple solution that results in drastic reduction of unwanted mail, also known as graymail.
APA, Harvard, Vancouver, ISO, and other styles
26

Lalla, Himal. "E-mail forensic authorship attribution." Thesis, University of Fort Hare, 2010. http://hdl.handle.net/10353/360.

Full text
Abstract:
E-mails have become the standard for business as well as personal communication. The inherent security risks within e-mail communication present the problem of anonymity. If an author of an e-mail is not known, the digital forensic investigator needs to determine the authorship of the e-mail using a process that has not been standardised in the e-mail forensic field. This research project examines many problems associated with e-mail communication and the digital forensic domain; more specifically e-mail forensic investigations, and the recovery of legally admissible evidence to be presented in a court of law. The Research Methodology utilised a comprehensive literature review in combination with Design Science which results in the development of an artifact through intensive research. The Proposed E-Mail Forensic Methodology is based on the most current digital forensic investigation process and further validation of the process was established via expert reviews. The opinions of the digital forensic experts were an integral portion of the validation process which adds to the credibility of the study. This was performed through the aid of the Delphi technique. This Proposed E-Mail Forensic Methodology adopts a standardised investigation process applied to an e-mail investigation and takes into account the South African perspective by incorporating various checks with the laws and legislation. By following the Proposed E-mail Forensic Methodology, e-mail forensic investigators can produce evidence that is legally admissible in a court of law.
APA, Harvard, Vancouver, ISO, and other styles
27

Andersson, Gustav. "Translation of CAN Bus XML Messages to C Source Code." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-96424.

Full text
Abstract:
The concept of translating source code into other target programming languages is extensively used in a wide area of applications. Danfoss Power Solutions AB, a company located in Älmhult, strives to streamline their way of software development for microcontrollers by implementing this idea. Their proprietary software tool PLUS+1 GUIDE is based on the CAN bus communication network, which allows electronic control units to share data represented in the XML format. Due to compatibility problems, the application in the electronic control units requires this data to be translated into the source code in the low-level C programming language. This thesis project proposes an approach for facilitating this task by implementing a source-to-source compiler that performs the translation with a reduced level of manual user involvement. A literature review was conducted in order to find the existing solutions relevant to our project task. An analysis of the provided XML input files was thereafter performed to clarify a software design suitable for the problem. By using a general XML parser, a solution was then constructed. The implementation resulted in a fully functional source-to-source compiler, producing the generated C code within a time range of 73–85 milliseconds for the input test files of typical size. The feedback received from the domain experts at Danfoss confirms the usability of the proposed solution.
APA, Harvard, Vancouver, ISO, and other styles
28

Zizzi, Samuel J. "Effectiveness of traditional and web-based interventions on utilization of sport psychology services exploring the stages of change /." Morgantown, W. Va. : [West Virginia University Libraries], 2000. http://etd.wvu.edu/templates/showETD.cfm?recnum=1458.

Full text
Abstract:
Thesis (Ed. D.)--West Virginia University, 2000.
Title from document title page. Document formatted into pages; contains vii, 93 p. : ill. (some col.). Includes abstract. Includes bibliographical references (p. 56-62).
APA, Harvard, Vancouver, ISO, and other styles
29

White, Catherine Jane. "The significance of the available media and modes of communication at a television station /." Thesis, Connect to this title online; UW restricted, 2004. http://hdl.handle.net/1773/6184.

Full text
APA, Harvard, Vancouver, ISO, and other styles
30

Kaushik, Saket. "Policy-controlled email services." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2937.

Full text
Abstract:
Thesis (Ph. D.)--George Mason University, 2007.
Title from PDF t.p. (viewed Jan. 18, 2008). Thesis directors: Paul Amman, Duminda Wijesekera. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Vita: p. 198. Includes bibliographical references (p. 189-197). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
31

Chan, Hok Kan Angela Pearl. "The role of e-mail messages in the chain of communication and use of language in e-mails among colleagues in a secondary school setting." HKBU Institutional Repository, 2004. http://repository.hkbu.edu.hk/etd_ra/559.

Full text
APA, Harvard, Vancouver, ISO, and other styles
32

Marsden, Jenny. "Primary prevention of osteoporosis in young British women : a comparison of electronic stage-based tailored messages versus non-tailored intervention." Thesis, University of Glasgow, 2003. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.274776.

Full text
APA, Harvard, Vancouver, ISO, and other styles
33

Mahanamahewa, Sri Warna Prathiba. "Workplace privacy in the internet age : recommendations for a policy framework in Sri Lanka /." [St. Lucia, Qld.], 2005. http://www.library.uq.edu.au/pdfserve.php?image=thesisabs/absthe19351.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
34

Rauscher, François. "Gestion des connaissances et communication médiatisée : traçabilité et structuration des messages professionnels." Thesis, Troyes, 2016. http://www.theses.fr/2016TROY0032/document.

Full text
Abstract:
Même si le capital immatériel représente une part de plus en plus importante de la valeur de nos organisations, il n’est pas toujours possible de stocker, tracer ou capturer les connaissances et les expertises, par exemple dans des projets de taille moyenne. Le courrier électronique est encore largement utilisé dans les projets d’entreprise en particulier entre les équipes géographiquement dispersées. Dans cette étude, nous présentons une nouvelle approche pour détecter les zones à l'intérieur de courriels professionnels où des éléments de connaissances sont susceptibles de se trouver. Nous définissons un contexte étendu en tenant compte non seulement du contenu du courrier électronique et de ses métadonnées, mais également des compétences et des rôles des utilisateurs. Également l’analyse pragmatique linguistique est mêlée aux techniques usuelles du traitement de langage naturel. Après avoir décrit notre méthode KTR et notre modèle, nous l'appliquons à un corpus réel d’entreprise et évaluons les résultats en fonction des algorithmes d’apprentissage, de filtrage et de recherche
Even if intangible capital represents an increasingly important part of the value of our enterprises, it’s not always possible to store, trace or capture knowledge and expertise, for instance in middle sized projects. Email it still widely used in professional projects especially among geographically distributed teams. In this study we present a novel approach to detect zones inside business emails where elements of knowledge are likely to be found. We define an enhanced context taking into account not only the email content and metadata but also the competencies of the users and their roles. Also linguistic pragmatic analysis is added to usual natural language processing techniques. After describing our model and method KTR, we apply it to a real life corpus and evaluate the results based on machine learning, filtering and information retrieval algorithms
APA, Harvard, Vancouver, ISO, and other styles
35

Luwaca, Emmanuel. "Virtualization of a sensor node to enable the simulation of IEC 61850-based sampled value messages." Thesis, Cape Peninsula University of Technology, 2014. http://hdl.handle.net/20.500.11838/1179.

Full text
Abstract:
Thesis submitted in fulfilment of the requirements for the degree Master of Technology: Electrical Engineering in the Faculty of Engineering at the Cape Peninsula University of Technology 2014
The IEC 61850 standard, “Communication networks and systems in substations” was promulgated to accommodate the need for a common communication platform within substations for devices from different vendors. The IEC 61850 standard proposes a substation automation architecture that is Ethernet-based, with a “station-bus” for protection devices within the substation and a “process bus” where raw data from the voltage and current transformers are published onto the data network using a device known as a Merging Unit. To date, most of the standardization efforts were focused at the station bus level where event-triggered messages are exchanged between the substation automation devices, commonly referred to as Intelligent Electronic Devices (IEDs). These messages are known as Generic Object Oriented Substation Event messages. Equipment from vendors to accommodate the “process bus” paradigm, however is still limited at present. The Centre for Substation Automation and Energy Management Systems was established within the Electrical Engineering Department at the Cape Peninsula University of Technology with one of its objectives being the development of equipment either for simulation or real-time purposes in compliance with the IEC 61850 standard. In order to fulfil this long-term objective of the Centre, an in-depth understanding of the IEC 61850 standard is required. This document details the efforts at acquiring the requisite knowledge base in support of the educational objectives of the Centre and the research project implements a simulation of a merging unit which is compliant with the functional behavior as stipulated by the standard. This limited functional implementation (i.e. non-real-time) of the merging unit, is achieved through the development of a virtualized data acquisition node capable of synthetic generation of waveforms, encoding of the data and publishing the data in a format compliant with the IEC 61850-9-2 sampled value message structure. This functional behavior of the virtual sensor node which was implemented has been validated against the behavior of a commercial device and the sampled value message structure is validated against the standard. The temporal behavior of the proposed device is commented upon. This research project forms the basis for future real-time implementation of a merging unit.
APA, Harvard, Vancouver, ISO, and other styles
36

Barnardt, Gerard Louis. "Electronic communication in the workplace : employer vs employee legal rights." Thesis, Stellenbosch : Stellenbosch University, 2004. http://hdl.handle.net/10019.1/49942.

Full text
Abstract:
Thesis (LLM)--University of Stellenbosch, 2004.
ENGLISH ABSTRACT: The monitoring of electronic communication is likely to face all employers sooner or later. The rapid advancement in technology aimed at helping to monitor electronic communication, makes it easier than ever before for employers to monitor the electronic communications of their employees. There are important questions to consider when dealing with the topic of monitoring electronic communication. Examples include "mayan employer legally monitor electronic communications?" and "how does monitoring affect the employee's right to privacy?" This thesis is an attempt to answer these and other related questions by analysing, inter alia, South African legislation, the Constitution and case law, as well as comparing the law as it applies in the United Kingdom and the United States of America. The analysis and conclusion offered in this thesis aim to provide theoretical consideration to academics and practical application for employers that are faced with the reality of monitoring electronic communications.
AFRIKAANSE OPSOMMING: Alle werkgewers sal waarskynlik die een of ander tyd met die monitering van elektroniese kommunikasie gekonfronteer word. Die snelle voortuitgang in tegnologie wat daarop gemik is om te help met die monitering van elektroniese kommunikasie, maak dit vir werkgewers makliker as ooit tevore om sodanige kommunikasies van hulle werknemers te monitor. Daar is egter belangrike vrae wat oorweeg moet word wanneer die onderwerp van monitering van elektroniese kommunikasie ter sprake kom. Voorbeelde hiervan is "mag 'n werknemer regtens elektroniese kommunikasies monitor?" en "hoe raak monitering die werknemer se reg tot privaatheid?" Hierdie tesis is 'n poging om hierdie en ander verwante vrae te beantwoord deur die ontleding van, onder andere, Suid-Afrikaanse wetgewing, die Grondwet en die reg soos deur hofuitsprake ontwikkel, sowel as vergelyking van die reg soos wat dit van toepassing is in die Verenigde Koninkryk en die Verenigde State van Amerika. Die ontleding en gevolgtrekking wat in hierdie tesis aangebied word, is gemik op die verskaffing van teoretiese oorweging aan akademici en praktiese toepassing vir werkgewers wat met die realiteit van die monitering van elektroniese kommunikasies gekonfronteer word.
APA, Harvard, Vancouver, ISO, and other styles
37

Hole, Jeffrey D. "Email overload in academia /." Online version of thesis, 2008. http://hdl.handle.net/1850/8313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
38

Sroufe, Paul. "E‐Shape Analysis." Thesis, University of North Texas, 2009. https://digital.library.unt.edu/ark:/67531/metadc12201/.

Full text
Abstract:
The motivation of this work is to understand E-shape analysis and how it can be applied to various classification tasks. It has a powerful feature to not only look at what information is contained, but rather how that information looks. This new technique gives E-shape analysis the ability to be language independent and to some extent size independent. In this thesis, I present a new mechanism to characterize an email without using content or context called E-shape analysis for email. I explore the applications of the email shape by carrying out a case study; botnet detection and two possible applications: spam filtering and social-context based finger printing. The second part of this thesis takes what I apply E-shape analysis to activity recognition of humans. Using the Android platform and a T-Mobile G1 phone I collect data from the triaxial accelerometer and use it to classify the motion behavior of a subject.
APA, Harvard, Vancouver, ISO, and other styles
39

Kigerl, Alex Conrad. "An Empirical Assessment of the CAN SPAM Act." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/704.

Full text
Abstract:
In January 2004, the United States Congress passed and put into effect the Controlling the Assault of Non-Solicited Pornography and Marketing Act (CAN SPAM). The Act was set forth to regulate bulk commercial email (spam) and set the limits for what was acceptable. Various sources have since investigated and speculated on the efficacy of the CAN SPAM Act, few of which report a desirable outcome for users of electronic mail. Despite the apparent consensus of anti-spam firms and the community of email users that the Act was less than effective, there is little to no research on the efficacy of the Act that utilizes any significant statistical rigor or accepted scientific practices. The present study seeks to determine what, if any, impact the CAN SPAM act had on spam messages, to identify areas of improvement to help fight spam that is both fraudulent and dangerous. The data consisted of 2,071,965 spam emails sent between February 1, 1998 and December 31, 2008. The data were aggregated by month and an interrupted time series design was chosen to assess the impact the CAN SPAM Act had on spam. Analyses revealed that the CAN SPAM Act had no observable impact on the amount of spam sent and received; no impact on two of three CAN SPAM laws complied with among spam emails, the remaining law of which there was a significant decrease in compliance after the Act; and no impact on the number of spam emails sent from within the United States. Implications of these findings and suggestions for policy are discussed.
APA, Harvard, Vancouver, ISO, and other styles
40

Wong, Sai Man. "Versioning of Web Services for the Swedish Public Sector’s secure electronic mail service Mina meddelanden." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-177577.

Full text
Abstract:
Mina meddelanden (English: My Messages) is a secure electronic mail service provided by seven Swedish public authorities, which may be used by the Swedish population to electronically receive mail from the public sector. The IT infrastructure of this mail service is primarily developed and maintained by the Swedish Tax Agency. It is built on Web Services and the principles of Service-Oriented Architecture (SOA). This allows external stakeholders to connect to the system as subsystems: Senders, Postal Services or Mailbox Operators, each designed to either send, mediate or receive mail using Web Services. Used in this way, Web Services allow for a loosely coupled system, however, system upgrades must be deployed in an orderly fashion so as to prevent breakdowns. The main research areas of this literature review, conducted with an iterative search process, include versioning of Web Services, SOA strategies, design patterns and frameworks. Based on the findings of this research, two theoretical approaches are suggested for Mina meddelanden: (i) a gradual change between two strictly controlled versions with a unified repository to store relevant Web service artifacts and documentations, and (ii) more generally to implement an integration platform that includes a service bus to mediate messages to the most suitable version. Mina meddelanden is a government project, and there are strict IT regulations and directives that must be followed. Therefore, the first approach is the most suitable at the time of writing, since there is already a working version of the system that follows these rules. Future implementation of an integration platform requires further study to ensure legal requirements are met.
Mina meddelanden är en säker digital posttjänst som tillhandahålls av sju svenska myndigheter och kan användas av den svenska befolkningen för att ta emot post elektroniskt från den offentliga sektorn. IT-infrastrukturen av denna posttjänst utvecklas och underhålls främst av Skatteverket. Den är byggd på webbtjänster och principerna av en tjänsteorienterad arkitektur (SOA). Detta gör det möjligt för externa aktörer att ansluta till systemet som delsystemen: Avsändare, Förmedlare eller Brevlådeoperatörer som är utformade för att antingen skicka, förmedla eller ta emot e-post med hjälp av webbtjänster. Webbtjänster gör det möjligt för delsystemen att samarbeta med varandra, men uppdateringar utav ett sådant system måste ske på ett metodiskt sätt för att förhindra haverier. Det huvudsakliga undersökningsområdet av denna litteraturstudie, genomfördes med en iterativ sökprocess, omfattas av versionshantering av webbtjänster, SOA strategier, designmallar och ramverk. Baserat på litteraturstudien förslås två teoretiska tillvägagångssätt för Mina meddelanden: (i) en succesiv förändring mellan två strikta och kontrollerade versioner med ett enat förvar för att lagra relevanta webbtjänster artefakter och dokumentationer och (ii) en mer generell lösning att implementera en integrationsplattform som inkluderar en tjänstebuss för att förmedla meddelanden till den mest passande versionen. Mina meddelanden är ett statligt projekt och måste därför följa strikta IT direktiv och riktlinjer, så det första tillvägagångssättet är den bäst kvalificerad i skrivande stund på grund av att det redan finns en fungerande version av systemet som följer dessa regler. Framtida implementationer av en integrationsplattform kräver ytterligare studier för att säkerställa att juridiska krav är uppnådda.
APA, Harvard, Vancouver, ISO, and other styles
41

Le, Grange Andries. "The impact of e-mail utilisation on management effectiveness at Sishen iron ore mine." Thesis, Stellenbosch : University of Stellenbosch, 2009. http://hdl.handle.net/10019.1/5751.

Full text
Abstract:
Thesis (MBA (Business Management))--University of Stellenbosch, 2009.
ENGLISH ABSTRACT: Management make use of e-mail as a tool to enable them to do their daily tasks. E-mail is used as one of the best communication channels by management. Sishen Mine also makes use of e-mail as communication channel. The question however is whether e-mail has a positive or negative impact on management effectiveness. The history of e-mail as well as the reasons for e-mail use have been investigated. The different areas of use of email were discussed. Additional to this, the positive effects experienced by the individual as well as companies when using e-mail were highlighted and discussed. Unfortunately e-mail also has negative influences on the individual and the company and these were also highlighted and discussed. Data was obtained from the Sishen e-mail application in order to analyse the use of e-mail by the employees. The key insight from the e-mail application data was that a small group of employees send and receive the majority of e-mail at Sishen. A survey was sent out to all e-mail users at Sishen in order to determine the influence of e-mail on management effectiveness. The survey data enabled a detailed geographic analysis of the e-mail users at Sishen per department, gender, race, age and years of service as well as the details of the respondents. Analysis of the survey data revealed that e-mail has a positive impact on management effectiveness and that Sishen uses e-mail extensively. However, the data also revealed that e-mail impacts negatively on management effectiveness. The key insight from the survey was the extreme low levels of computer and e-mail training done by management. The lack of sufficient e-mail training was seen as one of the major contributing factors of high levels of frustration with e-mail experienced by management. Recommendations were made to Sishen as a result of the study to enable improvement of management effectiveness through the use of e-mail. Implementation of key recommendations with potential key positive impact was also highlighted.
AFRIKAANSE OPSOMMING: Bestuur gebruik e-pos as 'n gereedskapstuk om uitvoering aan hul take te gee deur middel van die kommunikasiekanaal wat e-pos bied. E-pos leen hom daarna om 'n uitstekende kanaal te wees vir kommunikasie. Sishen Myn gebnuik ook e-pos as 'n kommunikasiekanaal. Die vraag is of die kommunikasiekanaal 'n goeie of slegte invloed het op bestuurseffektiwiteit van die bestuur van die myn. Die geskiedenis van e-pos en die redes vir die gebruik van e-pos is ondersoek. Die verskillende gebruike asook die waarde van e-pos vir die individu en maatskappye is uitgelig. E-pos het ongelukkig ook nadele vir die individu en maatskappye en hierdie nadele is uitgewys en bespreek. Na die toepaslike literatuurstudie is inligting vanaf die e-pos databasis onttrek om die e-pos gebruik van Sishen werknemers te evalueer. Die belangrikste insig vanuit die databasis-ontleding het daarop gedui dat 'n klein hoeveelheid mense die grootste hoeveelheid e-posse binne Sishen stuur en ontvang. 'n Vraelys is tydens 'n meningsopname aan alle e-pos gebruikers binne Sishen uitgestuur om die invloed van e-pos op bestuurseffektiwiteit te bepaal. Vanuit die analise van die vraelys inligting was dit moontlik om geografiese samestelling van die e-pos gebruikers te bepaal. Dit was moontlik om te sien hoeveel werknemers per afdeling, geslag, ras, ouderdom en jare diens e-pos gebruikers is, asook om die besonderhede van die gebruikers vas te stel. Verdere analise van die vraelysinligting het aangedui dat e-pos 'n positiewe uitwerking op bestuurseffektiwiteit het en dat werknemers dit goed gebruik. Ongelukkig het dit ook na vore gekom dat daar genoegsame bewyse is dat daar ook negatiewe invloed op bestuurseffektiwiteit is. Die mees insiggewende was die besonder lae vlakke van rekenaar en e-pos opleiding wat bestuur deurloop het. Dit word gesien as een van die grootste bydraende faktore tot die hoe vlakke van frustrasie wat ervaar word deur bestuur. Vanuit die bevindinge van die vraelys is daar aanbevelings aan Sishen gemaak om sodoende te help om die bestuurseffektiwiteit te bevorder deur die gebruik van e-pos. Die potensiele voordele wat verkry kan word wanneer die aanbevelings implementeer word, is ook aangedui.
APA, Harvard, Vancouver, ISO, and other styles
42

Andre, Edward E. "Investigating information management weaknesses in a local government organisation: A critical hermeneutic ethnographic case study of internet documents from information warfare and legal perspective(s)." Thesis, Edith Cowan University, Research Online, Perth, Western Australia, 2005. https://ro.ecu.edu.au/theses/633.

Full text
Abstract:
In this thesis I develop an approach to analyse and interpret internet documents belonging to a particular organisation in a State of Australia. My intention in the research is to find ways to protect a local government organisation from litigation and other threats due to weaknesses in information management on the internet. Based on Gadamer's (1985) approach to the interpretation of text discourse, this thesis is a critical hermeneutic ethnographic case study of one local government organisation investigating internet docunents from information warfare and legal perspective(s).
APA, Harvard, Vancouver, ISO, and other styles
43

Simon, Nandor Juan. "Development of an electronic message display." Thesis, Cape Technikon, 1993. http://hdl.handle.net/20.500.11838/1143.

Full text
Abstract:
Thesis (Masters Diploma (Electrical Engineering)--Cape Technikon, Cape Town, 1993
In the last decade the advertising industry has developed into an advanced science which increasingly relies on the use of electronic utilities and modern technology. The advent of the microcontroller has made it possible to incorporate electronic intelligence into advertising utilities. This thesis describes the design, development and functioning of a stand alone programmable electronic message display as required by the Electrical Engineering Department of the Cape Technikon.
APA, Harvard, Vancouver, ISO, and other styles
44

Grove, Duncan A. "Performance modelling of message-passing parallel programs." Title page, contents and abstract only, 2003. http://web4.library.adelaide.edu.au/theses/09PH/09phg8832.pdf.

Full text
Abstract:
This dissertation describes a new performance modelling system, called the Performance Evaluating Virtual Parallel Machine (PEVPM). It uses a novel bottom-up approach, where submodels of individual computation and communication events are dynamically constructed from data-dependencies, current contention levels and the performance distributions of low-level operations, which define performance variability in the face of contention.
APA, Harvard, Vancouver, ISO, and other styles
45

Carrier, Sylvain. "Multimedia electronic mail on the X.400 message handling system." Thesis, University of Ottawa (Canada), 1994. http://hdl.handle.net/10393/6947.

Full text
Abstract:
The proliferation of small and large computer networks and workstations has been the supporting platform for the extensive use and growth of electronic mail. As users became accustomed to the usefulness of electronic mail, they also encountered its limitations with regards to multimedia content and interoperability. An approach that provides a multimedia capability to X.400 that has a built-in interoperability with the Internet is suggested. This approach ensures that existing X.400 and Internet electronic mail facilities can be used to transport and exchange multimedia information by using published interoperability documents.
APA, Harvard, Vancouver, ISO, and other styles
46

Ting, Hing-fung. "Examples of time-message tradeoffs in distributed algorithms /." [Hong Kong : University of Hong Kong], 1988. http://sunzi.lib.hku.hk/hkuto/record.jsp?B1234980X.

Full text
APA, Harvard, Vancouver, ISO, and other styles
47

Hilder, Janet Lynn. "The Impact of Textual Display Strategies on Learning from Electronic Presentations." Diss., Virginia Tech, 2019. http://hdl.handle.net/10919/88726.

Full text
Abstract:
An increasing number of students are learning in classrooms that employ electronic presentations designed in PowerPoint and other similar software programs. The design of the slides in such electronic presentations has an impact upon student learning, and ample recommendations are made within the literature as to specific strategies that serve as presumed best practices for the design of those slides that will best facilitate learning. While most of such recommended strategies are well supported by cognitive theory – they are considered to positively impact learning by contributing to decreased cognitive load, leveraged dual coding, and facilitated active processing, for example – many of them are not supported by empirical evidence that they do in fact enhance learning. Some of the recommended best practice strategies unsupported by empirical evidence include the use of progressive disclosure, dimming, and highlighting of text instead of full disclosure of text. Through the development and use of four separate electronic presentations, each of which was designed to employ one of these specific strategies (full disclosure, progressive disclosure, dimming, and highlighting), this study examined the impact of such strategies on student learning. The findings of this study indicate that significant differences are not evident in learning among the four different strategies. As such, this initial foray into the examination of the effectiveness of these four strategies indicates that any of the four strategies may be used with equal impact in the design of electronic presentations by instructors who want to help foster student learning.
Doctor of Philosophy
An increasing number of students are learning in classrooms that employ electronic presentations designed in PowerPoint and other similar software programs. The design of the slides in such electronic presentations has an impact upon student learning, and ample recommendations are made within the literature as to specific strategies that serve as presumed best practices for the design of those slides that will best facilitate learning. While most of such recommended strategies are well supported by cognitive theory, many of them are not supported by empirical evidence that they do in fact enhance learning. Some of the recommended best practice strategies unsupported by empirical evidence include the use of progressive disclosure, dimming, and highlighting of text instead of full disclosure of text. Through the development and use of four separate electronic presentations, each of which was designed to employ one of these specific strategies (full disclosure, progressive disclosure, dimming, and highlighting), this study examined the impact of such strategies on student learning. The findings of this study indicate that significant differences are not evident in learning among the four different strategies. As such, this initial foray into the examination of the effectiveness of these four strategies indicates that any of the four strategies may be used with equal impact in the design of electronic presentations by instructors who want to help foster student learning.
APA, Harvard, Vancouver, ISO, and other styles
48

Jia, Yue. "Resilient and efficient delivery over message oriented middleware." Thesis, Queen Mary, University of London, 2014. http://qmro.qmul.ac.uk/xmlui/handle/123456789/8950.

Full text
Abstract:
The publish/subscribe paradigm is used to support a many-to-many model that allows an efficient dissemination of messages across a distributed system. Message Oriented Middleware (MOM) is a middleware that provides an asynchronous method of passing information between networked applications. MOMs can be based on a publish/subscribe model, which offers a robust paradigm for message delivery. This research is concerned with this specific type of MOM. Recently, systems using MOMs have been used to integrate enterprise systems over geographically distributed areas, like the ones used in financial services, telecommunication applications, transportation and health-care systems. However, the reliability of a MOM system must be verified and consideration given to reachability to all intended destinations typically with to guarantees of delivery. The research in this thesis provides an automated means of checking the (re)configuration of a publish/subscribe MOM system by building a model and using Linear-time Temporal Logic and Computation Tree Logic rules to verify certain constraints. The verification includes the checking of the reachability of different topics, the rules for regulating the working of the system, and checking the configuration and reconfiguration after a failure. The novelty of this work is the creation and the optimization of a symbolic model checker that abstracts the end-to-end network configuration and reconfiguration behaviour and using it to verify reachability and loop detection. In addition a GUI interface, a code generator and a sub-paths detector are implemented to make the system checking more user-friendly and efficient. The research then explores another aspect of reliability. The requirements of mission critical service delivery over a MOM infrastructure is considered and we propose a new way of supporting rapid recovery from failures using pre-calculated routing Abstract tables and coloured flows that can operate across multiple Autonomous System domains. The approach is critically appraised in relation to other published schemes.
APA, Harvard, Vancouver, ISO, and other styles
49

田慶豐 and Hing-fung Ting. "Examples of time-message tradeoffs in distributed algorithms." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 1988. http://hub.hku.hk/bib/B31208393.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Wilkenloh, Christopher Joselane. "Design of a reliable message transaction protocol." Thesis, Georgia Institute of Technology, 1989. http://hdl.handle.net/1853/8307.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography