Academic literature on the topic 'Email'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Email.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Email"
Atherton, Helen, Anne-Marie Boylan, Abi Eccles, Joanna Fleming, Clare R. Goyder, and Rebecca L. Morris. "Email Consultations Between Patients and Doctors in Primary Care: Content Analysis." Journal of Medical Internet Research 22, no. 11 (November 9, 2020): e18218. http://dx.doi.org/10.2196/18218.
Full textRosário, Albérico Travassos. "E-Mail Marketing." International Journal of Online Marketing 11, no. 4 (October 2021): 63–83. http://dx.doi.org/10.4018/ijom.2021100104.
Full textRiadi, Imam, Sunardi, and Fitriyani Tella Nani. "Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 2 (May 25, 2022): 83–90. http://dx.doi.org/10.14421/jiska.2022.7.2.83-90.
Full textSarno, Dawn M., Joanna E. Lewis, Corey J. Bohil, Mindy K. Shoss, and Mark B. Neider. "Who are Phishers luring?: A Demographic Analysis of Those Susceptible to Fake Emails." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 1735–39. http://dx.doi.org/10.1177/1541931213601915.
Full textIswanto, Hery, Erni Seniwati, Yuli Astuti, and Dina Maulina. "Comparison of Algorithms on Machine Learning For Spam Email Classification." IJISTECH (International Journal of Information System and Technology) 5, no. 4 (December 30, 2021): 446. http://dx.doi.org/10.30645/ijistech.v5i4.164.
Full textAli, Sadia. "An Investigation into Academic Email Practices of Arab Female Undergraduate Students and Their Attitudes Towards Correction of Errors in Their Email Messages." Learning and Teaching in Higher Education: Gulf Perspectives 2, no. 2 (December 1, 2005): 2–10. http://dx.doi.org/10.18538/lthe.v2.n2.02.
Full textGhaleb Abdulkadhim, Ekhlas, and Muqdad Abdulraheem Hayder. "SURVEY OF E-MAIL CLASSIFICATION: REVIEW AND OPEN ISSUES." Iraqi Journal for Computers and Informatics 46, no. 2 (December 3, 2020): 17–23. http://dx.doi.org/10.25195/ijci.v46i2.274.
Full textLappin, James, Tom Jackson, Graham Matthews, and Ejovwoke Onojeharho. "The defensible deletion of government email." Records Management Journal 29, no. 1/2 (March 11, 2019): 42–56. http://dx.doi.org/10.1108/rmj-09-2018-0036.
Full textLim, Hajin, Dan Cosley, and Susan R. Fussell. "Understanding Cross-lingual Pragmatic Misunderstandings in Email Communication." Proceedings of the ACM on Human-Computer Interaction 6, CSCW1 (March 30, 2022): 1–32. http://dx.doi.org/10.1145/3512976.
Full textKachole, Abhinav, Aniket Nagpure, Atharva Wagh, and Prof T. H. Patil. "Email Platform: Spam Detection." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 1782–89. http://dx.doi.org/10.22214/ijraset.2024.60175.
Full textDissertations / Theses on the topic "Email"
Stich, Jean-François. "Email stress and desired email use." Thesis, Lancaster University, 2016. http://eprints.lancs.ac.uk/80611/.
Full textJackson, Thomas William. "The cost effectiveness of electronic communication." Thesis, Loughborough University, 2001. https://dspace.lboro.ac.uk/2134/7555.
Full textHolder, Luke. "Effective email filtering /." Leeds : University of Leeds, School of Computer Studies, 2008. http://www.comp.leeds.ac.uk/fyproj/reports/0708/Holder.pdf.
Full textKe, Shih Wen. "Automatic email classification." Thesis, University of Sunderland, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.488788.
Full textRozentals, Emils. "Email load and stress impact on susceptibility to phishing and scam emails." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85403.
Full textShenoy, Dinesh (Dinesh Arkal). "Measuring effectiveness and value of email advertisements in relationship-oriented email messages." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/42931.
Full textThis electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (p. 63-70).
This thesis explores the value of email advertisements in relationship-based communication by measuring click-through rates. Advertisements were embedded within standard electronic mail messages in a template. The results are discussed in aggregate to better understand this medium and value in an advertising context, but the analysis also breaks down how six factors affect click behavior by recipients. The factors include the impact of a privacy statement, type of organizational recipients, click timing, recent advertisements, advertisement frequency, and advertisement relevance. The results are also analyzed using a chi-squared statistical test to determine whether the individual factor is significant in this analysis. This paper also discusses the privacy implications of advertising in a social-medium with comparisons to social ads using Facebook's Beacon as a benchmark. A discussion of how these results apply in an email environment where anti-SPAM infrastructure is a large part of the overall system is evaluated as well. Results show that internal recipients are an effective target market for relationship messaging and that emails often generate clicks days or weeks after the original message was delivered. The research is very relevant to email and targeted advertising, but also applies in a broader context to social advertising where there is a existing relationship between a sender and recipient.
by Dinesh Shenoy.
S.M.
Lohr, Frank. "TRIPOLI - Empowered Email Environment." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400407.
Full textKaushik, Saket. "Policy-controlled email services." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2937.
Full textTitle from PDF t.p. (viewed Jan. 18, 2008). Thesis directors: Paul Amman, Duminda Wijesekera. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Vita: p. 198. Includes bibliographical references (p. 189-197). Also available in print.
Smilkov, Daniel. "Understanding email communication patterns." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/91421.
Full textCataloged from PDF version of thesis.
Includes bibliographical references (pages 45-49).
It has been almost two decades since the beginning of the web. This means that the web is no longer just a technology of the present, but also, a record of our past. Email, one of the original forms of social media, is even older than the web and contains a detailed description of our personal and professional history. This thesis explores the world of email communication by introducing Immersion, a tool build for the purposes to analyze and visualize the information hidden behind the digital traces of email activity, to help us reflect on our actions, learn something new, quantify it, and hopefully make us react and change our behavior. In closing, I look over the email overload problem and work-life balance trends by quantifying general email usage using a large real-world email dataset.
by Daniel Smilkov.
S.M.
Balakchiev, Milko. "Unique Channel Email System." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804980/.
Full textBooks on the topic "Email"
Courault, Pascal. Email & pub. Rennes: Editions Ouest-France, 1993.
Find full textOrman, Hilarie. Encrypted Email. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6.
Full textMullen, Jeanniey. Email Marketing. New York: John Wiley & Sons, Ltd., 2008.
Find full textSassaman, Len. Email security. San Francisco, Calif: No Starch Press, 2000.
Find full textZhizhong, Dai, ed. Gao ding shang wu email: Business English email. Taibei Shi: Bei ta yu yan chu ban you xian gong si, 2007.
Find full textPetzold, Arnin, and Helmut Pöschmann. Email und Emailliertechnik. Berlin, Heidelberg: Springer Berlin Heidelberg, 1987. http://dx.doi.org/10.1007/978-3-642-83081-5.
Full textJohnson, Paul. Email survival guide. Brighton, England: Book Guild, 2007.
Find full textWood, David. Programming Internet Email. Beijing: O'Reilly, 1999.
Find full textWood, David. Programming Internet Email. Sebastopol, CA: O'Reilly, 1999.
Find full textWood, David. Programming Internet Email. Cambridge: O'Reilly, 1999.
Find full textBook chapters on the topic "Email"
Reddy, Niranjan. "Emails and Email Crime." In Practical Cyber Forensics, 345–78. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4460-9_11.
Full textNunes, Emilia. "Email Security." In Trends in Data Protection and Encryption Technologies, 221–25. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_36.
Full textBechtel, H., W. Bulian, K. Bungardt, K. Gürs, U. Gürs, W. Helling, H. Kyri, et al. "Email." In Landolt-Börnstein, 830–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-662-43292-1_7.
Full textWallwork, Adrian. "Email." In English for Academic Correspondence and Socializing, 269–81. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9401-1_22.
Full textMark, Gloria. "Email." In Multitasking in the Digital Age, 53–65. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-031-02212-8_6.
Full textJuneau, Josh, and Luciano Manelli. "Email." In Java 17 Recipes, 515–28. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7963-2_14.
Full textRennie, Frank, and Keith Smyth. "Email." In Digital Learning: The Key Concepts, 63. 2nd ed. London: Routledge, 2019. http://dx.doi.org/10.4324/9780429425240-72.
Full textPetzold, Arnin, and Helmut Pöschmann. "Eigenschaften des Emails und des Systems Metall/Email." In Email und Emailliertechnik, 330–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 1987. http://dx.doi.org/10.1007/978-3-642-83081-5_22.
Full textBoth, David. "Introducing Email." In Using and Administering Linux: Volume 3, 125–58. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5485-1_7.
Full textBoth, David. "Email Clients." In Using and Administering Linux: Volume 3, 159–86. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5485-1_8.
Full textConference papers on the topic "Email"
Wu, Yejun, and Douglas W. Oard. "Indexing emails and email threads for retrieval." In the 28th annual international ACM SIGIR conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1076034.1076180.
Full textChen, Zixuan, and Garret Washburn. "A Robust Set of Emailing Applications that Allowaneffective Solution for Bulk Email Sendingandreceiving." In 12th International Conference of Security, Privacy and Trust Management. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.141111.
Full textSchneider, Markus, Haya Shulman, and Michael Waidner. "Blocking Email Bombs with Email Glass." In GLOBECOM 2020 - 2020 IEEE Global Communications Conference. IEEE, 2020. http://dx.doi.org/10.1109/globecom42002.2020.9322348.
Full textWasiak, James, Ben Hicks, Andy Dong, and Linda Newnes. "Engineering Work and Email: An Analysis of the Information Content of Email in a Major Systems Engineering Project." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-86832.
Full textNarayan, Rajnikant, and Mr Vinay Kumar. "SPAM EMAIL DETECTION USING DEEP LEARNING MODEL." In Computing for Sustainable Innovation: Shaping Tomorrow’s World. Innovative Research Publication, 2024. http://dx.doi.org/10.55524/csistw.2024.12.1.47.
Full textTran, Quang Anh, Minh Tuan Vu, Michael Frater, and Frank Jiang. "Email user ranking based on email networks." In NUMERICAL ANALYSIS AND APPLIED MATHEMATICS ICNAAM 2012: International Conference of Numerical Analysis and Applied Mathematics. AIP, 2012. http://dx.doi.org/10.1063/1.4756451.
Full textSavaliya, Bansi R., and C. George Philip. "Email fraud detection by identifying email sender." In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). IEEE, 2017. http://dx.doi.org/10.1109/icecds.2017.8389678.
Full textBostick, Jim, John Fritz, Kay Sommers, and Jane Hesler. "Email migration." In the 25th annual ACM SIGUCCS conference. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/266064.266081.
Full textMcDowell, Luke, Oren Etzioni, Alon Halevy, and Henry Levy. "Semantic email." In the 13th conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/988672.988706.
Full textKaushik, Saket, William Winsborough, Duminda Wijesekera, and Paul Ammann. "Email feedback." In the 2005 ACM workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1103576.1103586.
Full textReports on the topic "Email"
Rada, Gabriel. Can email communication between health professionals improve healthcare? SUPPORT, 2017. http://dx.doi.org/10.30846/1701154.
Full textRada, Gabriel. Can email communication between health professionals improve healthcare? SUPPORT, 2017. http://dx.doi.org/10.30846/171501.
Full textRose, Scott W., Stephen J. Nightingale, Simson L. Garfinkel, and Ramaswamy Chandramouli. Trustworthy Email. National Institute of Standards and Technology, September 2016. http://dx.doi.org/10.6028/nist.sp.800-177.
Full textRose, Scott, J. Stephen Nightingale, Simson Garfinkel, and Ramaswamy Chandramouli. Trustworthy email. Gaithersburg, MD: National Institute of Standards and Technology, February 2019. http://dx.doi.org/10.6028/nist.sp.800-177r1.
Full textYang, A., ed. Internationalized Email Headers. RFC Editor, September 2008. http://dx.doi.org/10.17487/rfc5335.
Full textYang, A., S. Steele, and N. Freed. Internationalized Email Headers. RFC Editor, February 2012. http://dx.doi.org/10.17487/rfc6532.
Full textSeybold, Patricia. The Killer App: Email. Boston, MA: Patricia Seybold Group, August 2003. http://dx.doi.org/10.1571/psgp8-29-03cc.
Full textProm, Christopher. Preserving Email (2nd Edition). Digital Preservation Coalition, May 2019. http://dx.doi.org/10.7207/twr19-01.
Full textKucherawy, M. Email Authentication Status Codes. RFC Editor, September 2014. http://dx.doi.org/10.17487/rfc7372.
Full textCrocker, D. Email Author Header Field. RFC Editor, June 2021. http://dx.doi.org/10.17487/rfc9057.
Full text