Academic literature on the topic 'Email'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Email.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Email"

1

Atherton, Helen, Anne-Marie Boylan, Abi Eccles, Joanna Fleming, Clare R. Goyder, and Rebecca L. Morris. "Email Consultations Between Patients and Doctors in Primary Care: Content Analysis." Journal of Medical Internet Research 22, no. 11 (November 9, 2020): e18218. http://dx.doi.org/10.2196/18218.

Full text
Abstract:
Background Increasingly, consultations in health care settings are conducted remotely using a range of communication technologies. Email allows for 2-way text-based communication, occurring asynchronously. Studies have explored the content and nature of email consultations to understand the use, structure, and function of email consultations. Most previous content analyses of email consultations in primary care settings have been conducted in North America, and these have shown that concerns and assumptions about how email consultations work have not been realized. There has not been a UK-based content analysis of email consultations. Objective This study aims to explore and delineate the content of consultations conducted via email in English general practice by conducting a content analysis of email consultations between general practitioners (GPs) and patients. Methods We conducted a content analysis of anonymized email consultations between GPs and patients in 2 general practices in the United Kingdom. We examined the descriptive elements of the correspondence to ascertain when the emails were sent, the number of emails in an email consultation, and the nature of the content. We used a normative approach to analyze the content of the email consultations to explore the use and function of email consultation. Results We obtained 100 email consultations from 85 patients, which totaled 262 individual emails. Most email users were older than 40 years, and over half of the users were male. The email consultations were mostly short and completed in a few days. Emails were mostly sent and received during the day. The emails were mostly clinical in content rather than administrative and covered a wide range of clinical presentations. There were 3 key themes to the use and function of the email consultations: the role of the GP and email consultation, the transactional nature of an email consultation, and the operationalization of an email consultation. Conclusions Most cases where emails are used to have a consultation with a patient in general practice have a shorter consultation, are clinical in nature, and are resolved quickly. GPs approach email consultations using key elements similar to that of the face-to-face consultation; however, using email consultations has the potential to alter the role of the GP, leading them to engage in more administrative tasks than usual. Email consultations were not a replacement for face-to-face consultations.
APA, Harvard, Vancouver, ISO, and other styles
2

Rosário, Albérico Travassos. "E-Mail Marketing." International Journal of Online Marketing 11, no. 4 (October 2021): 63–83. http://dx.doi.org/10.4018/ijom.2021100104.

Full text
Abstract:
Email marketing is a considerable development and includes direct emails, transactional emails, and email newsletters to attract new customers and retain existing ones. This research paper aims to identify and synthesize literature on the effectiveness of email marketing and potential challenges affecting its proper implementation. The research establishes that businesses in the current business environment recognize email marketing's capacity to produce a higher return on investment and generate more sales than traditional marketing channels, such as television. The adoption of permission-based email marketing enables establishing strong relationships between companies and their target audiences, developing emotional, conative, and cognitive responses to the distributed messages. Therefore, salespersons should ensure compliance with legal requirements in email marketing and develop effective strategies of reducing spam emails to avoid negative impressions and increase response rates.
APA, Harvard, Vancouver, ISO, and other styles
3

Riadi, Imam, Sunardi, and Fitriyani Tella Nani. "Analisis Forensik pada Email Menggunakan Metode National Institute of Standards Technology." JISKA (Jurnal Informatika Sunan Kalijaga) 7, no. 2 (May 25, 2022): 83–90. http://dx.doi.org/10.14421/jiska.2022.7.2.83-90.

Full text
Abstract:
Nowadays developments in information technology are growing rapidly, especially in email. Email became one that almost the whole world had. Email is one of the results of developments in information and communication. Email is widely used to exchange information by sending and receiving data, such as document files, pictures, letters, and others. So much for the crimes that often occur in emails. Email crimes that often occur among them are email spoofing. Email spoofing is a forgery that occurs in the header of the email. So, the email is sent as if it were a valid email. Email spoofing is often used in spamming activities. Crimes committed by cybercrime must leave evidence such as IP Address, sender's email, and time of sending the email. This research will do forensics on email spoofing. The research uses the Live Forensics method, where the computer is used in a powered-on state. The research also uses the NIST (National Institute of Standards Technology) research flow. The email that will be analyzed is in the email header section using 3 tools, namely tracer email analyzer, email dossier, and mail header analysis. This analysis will compare and check the accuracy of the email headers using these tools. Emails suspected of email spoofing will be proven using tools. Based on the 'form' received' and 'Message-ID' headers. Based on the results, the tool that meets the value after the analysis is tracer email analysis.
APA, Harvard, Vancouver, ISO, and other styles
4

Sarno, Dawn M., Joanna E. Lewis, Corey J. Bohil, Mindy K. Shoss, and Mark B. Neider. "Who are Phishers luring?: A Demographic Analysis of Those Susceptible to Fake Emails." Proceedings of the Human Factors and Ergonomics Society Annual Meeting 61, no. 1 (September 2017): 1735–39. http://dx.doi.org/10.1177/1541931213601915.

Full text
Abstract:
Previous research has identified several populations that are susceptible to inauthentic emails (e.g., spam). However, these studies utilize retrospective, self-report measures to assess email users’ interactions with limited sets of inauthentic emails. In order to fill this gap in the literature, the present study assessed participants’ likelihood to rate a wide variety of emails as spam, authentic, and dangerous. The results highlighted several key findings, 1) there were no gender differences for the email ratings, there were only differences in experience with email, 2) those who do not regularly email and read other electronic documents were more likely to rate emails as spam, possibly indicating an increase in false positives, and 3) the relationship between age and rating an email as spam indicates that younger users may be more susceptible to spam. Overall, the present study identified demographic characteristics that should be considered when training users to detect inauthentic emails.
APA, Harvard, Vancouver, ISO, and other styles
5

Iswanto, Hery, Erni Seniwati, Yuli Astuti, and Dina Maulina. "Comparison of Algorithms on Machine Learning For Spam Email Classification." IJISTECH (International Journal of Information System and Technology) 5, no. 4 (December 30, 2021): 446. http://dx.doi.org/10.30645/ijistech.v5i4.164.

Full text
Abstract:
The rapid development of email use and the convenience provided make email as the most frequently used means of communication. Along with its development, many parties are abusing the use of email as a means of advertising promotion, phishing and sending other unimportant emails. This information is called spam email. One of the efforts in overcoming the problem of spam emails is by filtering techniques based on the content of the email. In the first study related to the classification of spam emails, the Naïve Bayes method is the most commonly used method. Therefore, in this study researchers will add Random Forest and K-Nearest Neighbor (KNN) methods to make comparisons in order to find which methods have better accuracy in classifying spam emails. Based on the results of the trial, the application of Naïve bayes classification algorithm in the classification of spam emails resulted in accuracy of 83.5%, Random Forest 83.5% and KNN 82.75%
APA, Harvard, Vancouver, ISO, and other styles
6

Ali, Sadia. "An Investigation into Academic Email Practices of Arab Female Undergraduate Students and Their Attitudes Towards Correction of Errors in Their Email Messages." Learning and Teaching in Higher Education: Gulf Perspectives 2, no. 2 (December 1, 2005): 2–10. http://dx.doi.org/10.18538/lthe.v2.n2.02.

Full text
Abstract:
Students’ assignments are often much better in style and organisation than the email messages they send to theirteachers. Some teachers, including myself, often ‘covertly’ correct students’ email messages for style, organisation,content, or correctness. While some students appreciate this extra effort from the teachers, others see it as an inhibitingintrusion. However, I have frequently noticed that students who are corrected repeatedly improve in writing emails. Myresearch concerns both the use of academic email writing and the correction of errors in student emails, and concludesthe following: students usually write only formal emails to their teachers; those instructors who correct email errors do notoffer explicit error correction; and if email writing were taught to the students, it would offer variety in the writing genresstudents currently compose
APA, Harvard, Vancouver, ISO, and other styles
7

Ghaleb Abdulkadhim, Ekhlas, and Muqdad Abdulraheem Hayder. "SURVEY OF E-MAIL CLASSIFICATION: REVIEW AND OPEN ISSUES." Iraqi Journal for Computers and Informatics 46, no. 2 (December 3, 2020): 17–23. http://dx.doi.org/10.25195/ijci.v46i2.274.

Full text
Abstract:
Email is an economical facet of communication, the importance of which is increasing in spite of access to other approaches, such as electronic messaging, social networks, and phone applications. The business arena depends largely on the use of email, which urges the proper management of emails due to disruptive factors such as spams, phishing emails, and multi-folder categorization. The present study aimed to review the studies regarding emails, which were published during 2016-2020, based on the problem description analysis in terms of datasets, applications areas, classification techniques, and feature sets. In addition, other areas involving email classifications were identified and comprehensively reviewed. The results indicated four email application areas, while the open issues and research directions of email classifications were implicated for further investigation.
APA, Harvard, Vancouver, ISO, and other styles
8

Lappin, James, Tom Jackson, Graham Matthews, and Ejovwoke Onojeharho. "The defensible deletion of government email." Records Management Journal 29, no. 1/2 (March 11, 2019): 42–56. http://dx.doi.org/10.1108/rmj-09-2018-0036.

Full text
Abstract:
PurposeTwo rival approaches to email have emerged from information governance thought: the defensible deletion approach, in which emails are routinely deleted from email accounts after a set period of time; and the Capstone approach, in which the email accounts of important government officials are selected for permanent preservation. This paper aims to assess the extent to which the defensible deletion approach, when used in conjunction with efforts to move important emails into corporate records systems, will meet the needs of originating government departments and of wider society.Design/methodology/approachThe paper forms the first stage of a realist evaluation of policy towards UK government email.FindingsThe explanation advanced in this paper predicts that the routine deletion of email from email accounts will work for government departments even where business email is inconsistently or haphazardly captured into records systems, provided officials have access to their own emails for a long enough period to satisfy their individual operational requirements. However the routine deletion of email from email accounts will work for wider society only if and when business email is consistently captured into other systems.Originality/valueThe paper looks at the policy of The National Archives (TNA) towards UK government email and maps it against the approaches present in records management and information governance thought. It argues that TNA’s policy is best characterised as a defensible deletion approach. The paper proposes a realist explanation as to how defensible deletion policies towards email work in a government context.
APA, Harvard, Vancouver, ISO, and other styles
9

Lim, Hajin, Dan Cosley, and Susan R. Fussell. "Understanding Cross-lingual Pragmatic Misunderstandings in Email Communication." Proceedings of the ACM on Human-Computer Interaction 6, CSCW1 (March 30, 2022): 1–32. http://dx.doi.org/10.1145/3512976.

Full text
Abstract:
Communication tools such as email facilitate communication and collaboration between speakers of different languages, who use two primary strategies-English as a common language and machine translation (MT) tools-to help them overcome language barriers. However, each of these communication strategies creates its own challenges for cross-lingual communication. In this paper, we compare how people's interpretations of an email sender's social intention, and their evaluation of the email and the senders, differ when using a common language versus MT in email communication. We conducted an online experiment in which monolingual native English speakers read and rated request emails written by native English speakers, emails written by bilingual Chinese speakers in English, and emails written in Chinese then machine-translated into English. We found that participants interpreted the social intentions of the email sender less accurately for machine-translated emails than for emails written by non-native speakers in English. Participants also rated the senders and emails less positively overall for machine-translated emails compared to emails written by non-native speakers in English. Based on these findings, we suggest design possibilities that could better aid multilingual communication.
APA, Harvard, Vancouver, ISO, and other styles
10

Kachole, Abhinav, Aniket Nagpure, Atharva Wagh, and Prof T. H. Patil. "Email Platform: Spam Detection." International Journal for Research in Applied Science and Engineering Technology 12, no. 4 (April 30, 2024): 1782–89. http://dx.doi.org/10.22214/ijraset.2024.60175.

Full text
Abstract:
Abstract: In practically every industry today, from business to education, emails are used. Ham and spam are the two subcategories of emails. Email spam, often known as junk email or unwelcome email, is a kind of email that can be used to hurt any user by sapping their time and computing resources and stealing important data. Spam emailvolume is rising quickly day by day. Today’s email and IoT service providers face huge and massive challenges with spam identification and filtration. Email filteringis one of the most important and well-known methods among all the methods createdfor identifying and preventing spam. SVM, decision trees, and other machine learning and deep learning approaches have all been applied to this problem. Together with the explosive growth in internet users, email spam has increased substantially in recent years. Individuals are using them for illegal and dishonest purposes, such as fraud, phishing, and distributing malicious links through unsolicited email that can harm our systems and attempt to access your systems. By quickly constructing phone-y/fake profiles and email accounts, spammers prey on those who are ignorant of these scams. They use a real name in their spam emails. As a result, it’s critical to identify spam emails that include fraud. This project will accomplish this by utilizing machine learning methods, and this article will examine the machine learning algorithms, put them to use on our data sets, and select the approach that can detect emailspam with the maximum degree of precision and accuracy.
APA, Harvard, Vancouver, ISO, and other styles

Dissertations / Theses on the topic "Email"

1

Stich, Jean-François. "Email stress and desired email use." Thesis, Lancaster University, 2016. http://eprints.lancs.ac.uk/80611/.

Full text
Abstract:
This thesis is about workplace stress due to email and computer-mediated communication use. Rather than focusing on email-specific constructs such as email overload, email interruptions or email use outside working hours, it draws an overarching construct of ‘email stress’ based on previous theories of traditional workplace stress. This cross-disciplinary approach emphasizes the individually appraised nature of email stress. As a result, the thesis gives a central importance to individuals using email and, more importantly, to their desired email use. The thesis is based on a three-stage multi-method design involving quantitative surveys and qualitative interviews. The results of these studies are part of the four self-sufficient papers composing the thesis. While the papers make their own contributions, they also build on one another to advance the understanding of email stress as being a kind of stress that is individually appraised and that affects workplace well-being. The papers adapt theories of workplace stress, such as Person-Environment Fit and Cybernetics, to the study of email stress, and empirically validate these adaptations. They reveal how email stress can be the result of unfulfilled desires in terms of email use or a reason for desiring fewer emails. As employees do not often have control over their email use, the findings encourage the emergence of a more empathetic organizational culture taking into account individuals’ desires in terms of email use.
APA, Harvard, Vancouver, ISO, and other styles
2

Jackson, Thomas William. "The cost effectiveness of electronic communication." Thesis, Loughborough University, 2001. https://dspace.lboro.ac.uk/2134/7555.

Full text
Abstract:
Electronic communication is becoming an integral part of the communication structure within organisations, but the costs and benefits are not being assessed. Communication by email is usually assumed to be an efficient and effective means of sending messages. However, on analysis the process is seen to be much more complex and much less efficient than is normally assumed. Communication is carried out in many different forms, but the common underlying motive of communication is to improve working practices and to increase productivity. As communication pervades nearly everything we do, even small improvements in the effectiveness and cost of our communication processes can have significant benefits. The aim of this research was to analyse the cost effectiveness of using email and to suggest ways in which the cost effectiveness can be improved. A number of studies have been conducted into the cost effectiveness of email within organisations. The studies were carried out mainly at the Danwood Group, the company sponsoring the author's PhD research. The Danwood Group has just over 500 employees at 19 sites around the UK and its head office is based in Lincoln, where all of the email case studies in this thesis where undertaken. The Danwood Group retails office equipment, predominately photocopiers. Email behaviour was monitored by the use of software at the Danwood Group. This raised a number of questions on the ethical issues of electronic monitoring. This thesis explores these issues and proposes a set of guidelines to allow electronic monitoring within strict professional and ethical guidelines. The Danwood Group studies examined how and when email was used. It was found that, when the company first started using email, over two thirds of messages were non-business-related, though this dropped to less than half in a few months. It was also found that many messages could be delivered in one line of text. A one-line message service was introduced and this was found to save employee time for both senders and receivers of the messages. A costing formula was developed measuring the human cost of operating email messaging. The final study was to determine how long it took employees to recover and return to normal work after an email interruption and this was compared with published data for telephone interrupts. From these results a set of guidelines were developed to enable companies to make the most efficient use of email. The thesis concludes by identifying further areas of research into email usage that would help give a better understanding of methods to enable email to become even more cost effective.
APA, Harvard, Vancouver, ISO, and other styles
3

Holder, Luke. "Effective email filtering /." Leeds : University of Leeds, School of Computer Studies, 2008. http://www.comp.leeds.ac.uk/fyproj/reports/0708/Holder.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ke, Shih Wen. "Automatic email classification." Thesis, University of Sunderland, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.488788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rozentals, Emils. "Email load and stress impact on susceptibility to phishing and scam emails." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85403.

Full text
Abstract:
How does the email load and stress affect the susceptibility to phishing and scam emails? The study was conducted with a Qualitative research approach. Semi-structured interviews were selected for the data gathering. Thematic Analysis was used to analyze Empirical data. This research studied if a high email load affects the likelihood of falling victim to phishing and scam attacks. Research was studied through a theoretical lens of stress, since high email load is subjective for each individual and stress rate can show better how people are perceiving their email load. Findings suggest that high email load for the majority of people in this study, does increase the susceptibility towards phishing and scam emails. Furthermore, those people with higher email load who are processing their emails heuristically evaluated their stress rates higher than those with high email load who are processing their emails systematically. Therefore, the results indicate that there is a relation between high email load, stress and susceptibility to phishing and scam emails. In this study, it was found that majority of respondents described high stress as a factor that played a role in their susceptibility of falling victim to phishing and scam emails.
APA, Harvard, Vancouver, ISO, and other styles
6

Shenoy, Dinesh (Dinesh Arkal). "Measuring effectiveness and value of email advertisements in relationship-oriented email messages." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/42931.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program; and, (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2008.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (p. 63-70).
This thesis explores the value of email advertisements in relationship-based communication by measuring click-through rates. Advertisements were embedded within standard electronic mail messages in a template. The results are discussed in aggregate to better understand this medium and value in an advertising context, but the analysis also breaks down how six factors affect click behavior by recipients. The factors include the impact of a privacy statement, type of organizational recipients, click timing, recent advertisements, advertisement frequency, and advertisement relevance. The results are also analyzed using a chi-squared statistical test to determine whether the individual factor is significant in this analysis. This paper also discusses the privacy implications of advertising in a social-medium with comparisons to social ads using Facebook's Beacon as a benchmark. A discussion of how these results apply in an email environment where anti-SPAM infrastructure is a large part of the overall system is evaluated as well. Results show that internal recipients are an effective target market for relationship messaging and that emails often generate clicks days or weeks after the original message was delivered. The research is very relevant to email and targeted advertising, but also applies in a broader context to social advertising where there is a existing relationship between a sender and recipient.
by Dinesh Shenoy.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
7

Lohr, Frank. "TRIPOLI - Empowered Email Environment." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400407.

Full text
Abstract:
Workshop "Netz- und Service-Infrastrukturen" Der Vortrag im Rahmen des Workshop "Netz- und Service-Infrastrukturen" stellt das Projekt Tripoli vor, zeigt Ziele und Prinzipien der erweiterten Emailumgebung (Empowered Email Environment, Tripple-E) für authentifizierten und zertifizierten Emailverkehr, Ablauf der Kommunikation und zu lösende Probleme auf.
APA, Harvard, Vancouver, ISO, and other styles
8

Kaushik, Saket. "Policy-controlled email services." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2937.

Full text
Abstract:
Thesis (Ph. D.)--George Mason University, 2007.
Title from PDF t.p. (viewed Jan. 18, 2008). Thesis directors: Paul Amman, Duminda Wijesekera. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Vita: p. 198. Includes bibliographical references (p. 189-197). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
9

Smilkov, Daniel. "Understanding email communication patterns." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/91421.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2014.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 45-49).
It has been almost two decades since the beginning of the web. This means that the web is no longer just a technology of the present, but also, a record of our past. Email, one of the original forms of social media, is even older than the web and contains a detailed description of our personal and professional history. This thesis explores the world of email communication by introducing Immersion, a tool build for the purposes to analyze and visualize the information hidden behind the digital traces of email activity, to help us reflect on our actions, learn something new, quantify it, and hopefully make us react and change our behavior. In closing, I look over the email overload problem and work-life balance trends by quantifying general email usage using a large real-world email dataset.
by Daniel Smilkov.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
10

Balakchiev, Milko. "Unique Channel Email System." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804980/.

Full text
Abstract:
Email connects 85% of the world. This paper explores the pattern of information overload encountered by majority of email users and examine what steps key email providers are taking to combat the problem. Besides fighting spam, popular email providers offer very limited tools to reduce the amount of unwanted incoming email. Rather, there has been a trend to expand storage space and aid the organization of email. Storing email is very costly and harmful to the environment. Additionally, information overload can be detrimental to productivity. We propose a simple solution that results in drastic reduction of unwanted mail, also known as graymail.
APA, Harvard, Vancouver, ISO, and other styles

Books on the topic "Email"

1

Courault, Pascal. Email & pub. Rennes: Editions Ouest-France, 1993.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Orman, Hilarie. Encrypted Email. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-21344-6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Mullen, Jeanniey. Email Marketing. New York: John Wiley & Sons, Ltd., 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

Sassaman, Len. Email security. San Francisco, Calif: No Starch Press, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Zhizhong, Dai, ed. Gao ding shang wu email: Business English email. Taibei Shi: Bei ta yu yan chu ban you xian gong si, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Petzold, Arnin, and Helmut Pöschmann. Email und Emailliertechnik. Berlin, Heidelberg: Springer Berlin Heidelberg, 1987. http://dx.doi.org/10.1007/978-3-642-83081-5.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Johnson, Paul. Email survival guide. Brighton, England: Book Guild, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Wood, David. Programming Internet Email. Beijing: O'Reilly, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Wood, David. Programming Internet Email. Sebastopol, CA: O'Reilly, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Wood, David. Programming Internet Email. Cambridge: O'Reilly, 1999.

Find full text
APA, Harvard, Vancouver, ISO, and other styles

Book chapters on the topic "Email"

1

Reddy, Niranjan. "Emails and Email Crime." In Practical Cyber Forensics, 345–78. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-4460-9_11.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Nunes, Emilia. "Email Security." In Trends in Data Protection and Encryption Technologies, 221–25. Cham: Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_36.

Full text
Abstract:
AbstractEmails were not designed with cyber-attack protection in mind, making them an attractive target for cybercriminals. A primary attack vector is phishing, a type of social engineering in which a fraudulent message is sent to trick a person. however, email messages can be secured using cryptography. For example, end-to-end encryption could protect them in transit and at rest. In addition, transport Layer Security is used to protect emails in transit between email servers and clients. Nevertheless, emails may never be as secure as newly designed solutions with solid end-to-end encryption and robust architecture.
APA, Harvard, Vancouver, ISO, and other styles
3

Bechtel, H., W. Bulian, K. Bungardt, K. Gürs, U. Gürs, W. Helling, H. Kyri, et al. "Email." In Landolt-Börnstein, 830–40. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-662-43292-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wallwork, Adrian. "Email." In English for Academic Correspondence and Socializing, 269–81. Boston, MA: Springer US, 2011. http://dx.doi.org/10.1007/978-1-4419-9401-1_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Mark, Gloria. "Email." In Multitasking in the Digital Age, 53–65. Cham: Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-031-02212-8_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Juneau, Josh, and Luciano Manelli. "Email." In Java 17 Recipes, 515–28. Berkeley, CA: Apress, 2022. http://dx.doi.org/10.1007/978-1-4842-7963-2_14.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Rennie, Frank, and Keith Smyth. "Email." In Digital Learning: The Key Concepts, 63. 2nd ed. London: Routledge, 2019. http://dx.doi.org/10.4324/9780429425240-72.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Petzold, Arnin, and Helmut Pöschmann. "Eigenschaften des Emails und des Systems Metall/Email." In Email und Emailliertechnik, 330–66. Berlin, Heidelberg: Springer Berlin Heidelberg, 1987. http://dx.doi.org/10.1007/978-3-642-83081-5_22.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Both, David. "Introducing Email." In Using and Administering Linux: Volume 3, 125–58. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5485-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Both, David. "Email Clients." In Using and Administering Linux: Volume 3, 159–86. Berkeley, CA: Apress, 2019. http://dx.doi.org/10.1007/978-1-4842-5485-1_8.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Email"

1

Wu, Yejun, and Douglas W. Oard. "Indexing emails and email threads for retrieval." In the 28th annual international ACM SIGIR conference. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1076034.1076180.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chen, Zixuan, and Garret Washburn. "A Robust Set of Emailing Applications that Allowaneffective Solution for Bulk Email Sendingandreceiving." In 12th International Conference of Security, Privacy and Trust Management. Academy & Industry Research Collaboration Center, 2024. http://dx.doi.org/10.5121/csit.2024.141111.

Full text
Abstract:
In the current digital age, the capability of a business or workforce team to send out or receive a mass amount of emails is increasingly becoming more important. However, with this becoming more and more of a necessity, the tools to do so are not developing as rapidly. The method this paper seeks to provide as a solution to this problem is the Email Sender and Receiver applications that are described within this paper [1]. The main technologies used to create these Python applications behind the scenes are the Mailgun API, the Gmail API, and the PySimpleGui Python library [2]. One of the challenges that we faced during the development of the Email Sender and Receiver applications was the scheduling of emails for recipients in different timezones, as it is important that the sending of emails be accurate to their time across the globe. Another challenge faced during development was the configuration and maintenance of the Google Project in order to use the Gmail API, as the backend for the Email Receiver application relies on the Gmail API to grab from the user account [3]. To ensure the functionality and efficiency of the Email Sender and Receiver applications, we conducted experiments on both applications to test their limits. For the Email Sender application, an experiment was conducted to see how the size of the email being sent would affect how the application runs, and we found the application to be quite stable. Additionally, for the Email Receiver application, another experiment was conducted to test and see how far into the past we could grab emails and not impact the application. As a result, we found the Gmail API limits how many emails you may grab in one request. To conclude, the Email Sender and Receiver applications are viable tools for companies and individuals alike, as both applications provide an easy-touse bulk email tool that doesn’t compromise on functionality.
APA, Harvard, Vancouver, ISO, and other styles
3

Schneider, Markus, Haya Shulman, and Michael Waidner. "Blocking Email Bombs with Email Glass." In GLOBECOM 2020 - 2020 IEEE Global Communications Conference. IEEE, 2020. http://dx.doi.org/10.1109/globecom42002.2020.9322348.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Wasiak, James, Ben Hicks, Andy Dong, and Linda Newnes. "Engineering Work and Email: An Analysis of the Information Content of Email in a Major Systems Engineering Project." In ASME 2009 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. ASMEDC, 2009. http://dx.doi.org/10.1115/detc2009-86832.

Full text
Abstract:
It is said, though not yet assessed, that a large amount of potentially valuable information may reside in engineering email correspondence. If this is the case, then due consideration must be given to the role of email for record keeping, Product Lifecycle Management and knowledge management. In order to examine this hypothesis, a methodology for assessing the information content of emails, and in particular those associated with engineering projects, has been created. The method is based on a textual analysis approach that is derived from cognitive design research and social psychology and further developed through iterative applications to industrial datasets. The paper describes the development of the approach and its classifications of what the subject of the email is, why the email has been sent, and how its content is expressed. The approach is validated using an email corpus from a software design project. The method is then applied to characterize the content of 800 emails from a large systems engineering project. The key findings from this major study are then presented and discussed with respect to the character of the content, including evidence of engineering work, the project lifecycle, and implications for information and knowledge management.
APA, Harvard, Vancouver, ISO, and other styles
5

Narayan, Rajnikant, and Mr Vinay Kumar. "SPAM EMAIL DETECTION USING DEEP LEARNING MODEL." In Computing for Sustainable Innovation: Shaping Tomorrow’s World. Innovative Research Publication, 2024. http://dx.doi.org/10.55524/csistw.2024.12.1.47.

Full text
Abstract:
The persistent menace of spam emails poses a formidable cybersecurity threat, demanding the implementation of robust classification models for prompt detection and prevention. This research addresses the intricate challenge of classifying spam emails by evaluating diverse machine learning and deep learning models. The focal point of the identified problem lies in the inherent complexity of distinguishing spam emails from legitimate ones, leading to potential security vulnerabilities. Existing models' limitations, particularly in managing false positives and false negatives, underscore the imperative for enhanced techniques. The chosen methodology incorporates conventional machine learning models, such as Random Forest, Multinomial Naive Bayes (MNB), and Support Vector Machine (SVM), in conjunction with the Netcraft dataset. Additionally, deep learning models, including Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM), Convolutional Neural Network (CNN), and Bidirectional LSTM (BiLSTM), are deployed with meticulous hyperparameter tuning. An attention mechanism is introduced to dynamically allocate distinct weights to email headers and bodies based on their significance. The outcomes unveil the consistently superior performance of the Random Forest model, attaining a flawless F1-score of 1.0 for spam email classification. The SVM model also exhibits excellence with impeccable precision and recall across all folds. Nevertheless, the MNB model encounters difficulties in classifying legitimate emails, influencing overall metrics. The deep learning models, especially LSTM, CNN, BiL STM, and RNN, demonstrate exceptional efficacy with remarkably minimal test losses and elevated accuracies, underscoring their prowess in spam email classification tasks.
APA, Harvard, Vancouver, ISO, and other styles
6

Tran, Quang Anh, Minh Tuan Vu, Michael Frater, and Frank Jiang. "Email user ranking based on email networks." In NUMERICAL ANALYSIS AND APPLIED MATHEMATICS ICNAAM 2012: International Conference of Numerical Analysis and Applied Mathematics. AIP, 2012. http://dx.doi.org/10.1063/1.4756451.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Savaliya, Bansi R., and C. George Philip. "Email fraud detection by identifying email sender." In 2017 International Conference on Energy, Communication, Data Analytics and Soft Computing (ICECDS). IEEE, 2017. http://dx.doi.org/10.1109/icecds.2017.8389678.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Bostick, Jim, John Fritz, Kay Sommers, and Jane Hesler. "Email migration." In the 25th annual ACM SIGUCCS conference. New York, New York, USA: ACM Press, 1997. http://dx.doi.org/10.1145/266064.266081.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

McDowell, Luke, Oren Etzioni, Alon Halevy, and Henry Levy. "Semantic email." In the 13th conference. New York, New York, USA: ACM Press, 2004. http://dx.doi.org/10.1145/988672.988706.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Kaushik, Saket, William Winsborough, Duminda Wijesekera, and Paul Ammann. "Email feedback." In the 2005 ACM workshop. New York, New York, USA: ACM Press, 2005. http://dx.doi.org/10.1145/1103576.1103586.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Email"

1

Rada, Gabriel. Can email communication between health professionals improve healthcare? SUPPORT, 2017. http://dx.doi.org/10.30846/1701154.

Full text
Abstract:
The use of email as a medium for business and social communication is increasingly common. Healthcare professionals have been communicating via email since the early 1990s, for varying purposes. However, it is not clear what the impacts of emails in healthcare are when compared to other forms of communicating clinical information.
APA, Harvard, Vancouver, ISO, and other styles
2

Rada, Gabriel. Can email communication between health professionals improve healthcare? SUPPORT, 2017. http://dx.doi.org/10.30846/171501.

Full text
Abstract:
The use of email as a medium for business and social communication is increasingly common. Healthcare professionals have been communicating via email since the early 1990s, for varying purposes. However, it is not clear what the impacts of emails in healthcare are when compared to other forms of communicating clinical information.
APA, Harvard, Vancouver, ISO, and other styles
3

Rose, Scott W., Stephen J. Nightingale, Simson L. Garfinkel, and Ramaswamy Chandramouli. Trustworthy Email. National Institute of Standards and Technology, September 2016. http://dx.doi.org/10.6028/nist.sp.800-177.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Rose, Scott, J. Stephen Nightingale, Simson Garfinkel, and Ramaswamy Chandramouli. Trustworthy email. Gaithersburg, MD: National Institute of Standards and Technology, February 2019. http://dx.doi.org/10.6028/nist.sp.800-177r1.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Yang, A., ed. Internationalized Email Headers. RFC Editor, September 2008. http://dx.doi.org/10.17487/rfc5335.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Yang, A., S. Steele, and N. Freed. Internationalized Email Headers. RFC Editor, February 2012. http://dx.doi.org/10.17487/rfc6532.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Seybold, Patricia. The Killer App: Email. Boston, MA: Patricia Seybold Group, August 2003. http://dx.doi.org/10.1571/psgp8-29-03cc.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Prom, Christopher. Preserving Email (2nd Edition). Digital Preservation Coalition, May 2019. http://dx.doi.org/10.7207/twr19-01.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Kucherawy, M. Email Authentication Status Codes. RFC Editor, September 2014. http://dx.doi.org/10.17487/rfc7372.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Crocker, D. Email Author Header Field. RFC Editor, June 2021. http://dx.doi.org/10.17487/rfc9057.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography