To see the other types of publications on this topic, follow the link: Email.

Dissertations / Theses on the topic 'Email'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 dissertations / theses for your research on the topic 'Email.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.

1

Stich, Jean-François. "Email stress and desired email use." Thesis, Lancaster University, 2016. http://eprints.lancs.ac.uk/80611/.

Full text
Abstract:
This thesis is about workplace stress due to email and computer-mediated communication use. Rather than focusing on email-specific constructs such as email overload, email interruptions or email use outside working hours, it draws an overarching construct of ‘email stress’ based on previous theories of traditional workplace stress. This cross-disciplinary approach emphasizes the individually appraised nature of email stress. As a result, the thesis gives a central importance to individuals using email and, more importantly, to their desired email use. The thesis is based on a three-stage multi-method design involving quantitative surveys and qualitative interviews. The results of these studies are part of the four self-sufficient papers composing the thesis. While the papers make their own contributions, they also build on one another to advance the understanding of email stress as being a kind of stress that is individually appraised and that affects workplace well-being. The papers adapt theories of workplace stress, such as Person-Environment Fit and Cybernetics, to the study of email stress, and empirically validate these adaptations. They reveal how email stress can be the result of unfulfilled desires in terms of email use or a reason for desiring fewer emails. As employees do not often have control over their email use, the findings encourage the emergence of a more empathetic organizational culture taking into account individuals’ desires in terms of email use.
APA, Harvard, Vancouver, ISO, and other styles
2

Jackson, Thomas William. "The cost effectiveness of electronic communication." Thesis, Loughborough University, 2001. https://dspace.lboro.ac.uk/2134/7555.

Full text
Abstract:
Electronic communication is becoming an integral part of the communication structure within organisations, but the costs and benefits are not being assessed. Communication by email is usually assumed to be an efficient and effective means of sending messages. However, on analysis the process is seen to be much more complex and much less efficient than is normally assumed. Communication is carried out in many different forms, but the common underlying motive of communication is to improve working practices and to increase productivity. As communication pervades nearly everything we do, even small improvements in the effectiveness and cost of our communication processes can have significant benefits. The aim of this research was to analyse the cost effectiveness of using email and to suggest ways in which the cost effectiveness can be improved. A number of studies have been conducted into the cost effectiveness of email within organisations. The studies were carried out mainly at the Danwood Group, the company sponsoring the author's PhD research. The Danwood Group has just over 500 employees at 19 sites around the UK and its head office is based in Lincoln, where all of the email case studies in this thesis where undertaken. The Danwood Group retails office equipment, predominately photocopiers. Email behaviour was monitored by the use of software at the Danwood Group. This raised a number of questions on the ethical issues of electronic monitoring. This thesis explores these issues and proposes a set of guidelines to allow electronic monitoring within strict professional and ethical guidelines. The Danwood Group studies examined how and when email was used. It was found that, when the company first started using email, over two thirds of messages were non-business-related, though this dropped to less than half in a few months. It was also found that many messages could be delivered in one line of text. A one-line message service was introduced and this was found to save employee time for both senders and receivers of the messages. A costing formula was developed measuring the human cost of operating email messaging. The final study was to determine how long it took employees to recover and return to normal work after an email interruption and this was compared with published data for telephone interrupts. From these results a set of guidelines were developed to enable companies to make the most efficient use of email. The thesis concludes by identifying further areas of research into email usage that would help give a better understanding of methods to enable email to become even more cost effective.
APA, Harvard, Vancouver, ISO, and other styles
3

Holder, Luke. "Effective email filtering /." Leeds : University of Leeds, School of Computer Studies, 2008. http://www.comp.leeds.ac.uk/fyproj/reports/0708/Holder.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Ke, Shih Wen. "Automatic email classification." Thesis, University of Sunderland, 2008. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.488788.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rozentals, Emils. "Email load and stress impact on susceptibility to phishing and scam emails." Thesis, Luleå tekniska universitet, Digitala tjänster och system, 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:ltu:diva-85403.

Full text
Abstract:
How does the email load and stress affect the susceptibility to phishing and scam emails? The study was conducted with a Qualitative research approach. Semi-structured interviews were selected for the data gathering. Thematic Analysis was used to analyze Empirical data. This research studied if a high email load affects the likelihood of falling victim to phishing and scam attacks. Research was studied through a theoretical lens of stress, since high email load is subjective for each individual and stress rate can show better how people are perceiving their email load. Findings suggest that high email load for the majority of people in this study, does increase the susceptibility towards phishing and scam emails. Furthermore, those people with higher email load who are processing their emails heuristically evaluated their stress rates higher than those with high email load who are processing their emails systematically. Therefore, the results indicate that there is a relation between high email load, stress and susceptibility to phishing and scam emails. In this study, it was found that majority of respondents described high stress as a factor that played a role in their susceptibility of falling victim to phishing and scam emails.
APA, Harvard, Vancouver, ISO, and other styles
6

Shenoy, Dinesh (Dinesh Arkal). "Measuring effectiveness and value of email advertisements in relationship-oriented email messages." Thesis, Massachusetts Institute of Technology, 2008. http://hdl.handle.net/1721.1/42931.

Full text
Abstract:
Thesis (S.M.)--Massachusetts Institute of Technology, System Design and Management Program; and, (S.M.)--Massachusetts Institute of Technology, Engineering Systems Division, Technology and Policy Program, 2008.
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
Includes bibliographical references (p. 63-70).
This thesis explores the value of email advertisements in relationship-based communication by measuring click-through rates. Advertisements were embedded within standard electronic mail messages in a template. The results are discussed in aggregate to better understand this medium and value in an advertising context, but the analysis also breaks down how six factors affect click behavior by recipients. The factors include the impact of a privacy statement, type of organizational recipients, click timing, recent advertisements, advertisement frequency, and advertisement relevance. The results are also analyzed using a chi-squared statistical test to determine whether the individual factor is significant in this analysis. This paper also discusses the privacy implications of advertising in a social-medium with comparisons to social ads using Facebook's Beacon as a benchmark. A discussion of how these results apply in an email environment where anti-SPAM infrastructure is a large part of the overall system is evaluated as well. Results show that internal recipients are an effective target market for relationship messaging and that emails often generate clicks days or weeks after the original message was delivered. The research is very relevant to email and targeted advertising, but also applies in a broader context to social advertising where there is a existing relationship between a sender and recipient.
by Dinesh Shenoy.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
7

Lohr, Frank. "TRIPOLI - Empowered Email Environment." Universitätsbibliothek Chemnitz, 2004. http://nbn-resolving.de/urn:nbn:de:swb:ch1-200400407.

Full text
Abstract:
Workshop "Netz- und Service-Infrastrukturen" Der Vortrag im Rahmen des Workshop "Netz- und Service-Infrastrukturen" stellt das Projekt Tripoli vor, zeigt Ziele und Prinzipien der erweiterten Emailumgebung (Empowered Email Environment, Tripple-E) für authentifizierten und zertifizierten Emailverkehr, Ablauf der Kommunikation und zu lösende Probleme auf.
APA, Harvard, Vancouver, ISO, and other styles
8

Kaushik, Saket. "Policy-controlled email services." Fairfax, VA : George Mason University, 2007. http://hdl.handle.net/1920/2937.

Full text
Abstract:
Thesis (Ph. D.)--George Mason University, 2007.
Title from PDF t.p. (viewed Jan. 18, 2008). Thesis directors: Paul Amman, Duminda Wijesekera. Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy in Information Technology. Vita: p. 198. Includes bibliographical references (p. 189-197). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
9

Smilkov, Daniel. "Understanding email communication patterns." Thesis, Massachusetts Institute of Technology, 2014. http://hdl.handle.net/1721.1/91421.

Full text
Abstract:
Thesis: S.M., Massachusetts Institute of Technology, School of Architecture and Planning, Program in Media Arts and Sciences, 2014.
Cataloged from PDF version of thesis.
Includes bibliographical references (pages 45-49).
It has been almost two decades since the beginning of the web. This means that the web is no longer just a technology of the present, but also, a record of our past. Email, one of the original forms of social media, is even older than the web and contains a detailed description of our personal and professional history. This thesis explores the world of email communication by introducing Immersion, a tool build for the purposes to analyze and visualize the information hidden behind the digital traces of email activity, to help us reflect on our actions, learn something new, quantify it, and hopefully make us react and change our behavior. In closing, I look over the email overload problem and work-life balance trends by quantifying general email usage using a large real-world email dataset.
by Daniel Smilkov.
S.M.
APA, Harvard, Vancouver, ISO, and other styles
10

Balakchiev, Milko. "Unique Channel Email System." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804980/.

Full text
Abstract:
Email connects 85% of the world. This paper explores the pattern of information overload encountered by majority of email users and examine what steps key email providers are taking to combat the problem. Besides fighting spam, popular email providers offer very limited tools to reduce the amount of unwanted incoming email. Rather, there has been a trend to expand storage space and aid the organization of email. Storing email is very costly and harmful to the environment. Additionally, information overload can be detrimental to productivity. We propose a simple solution that results in drastic reduction of unwanted mail, also known as graymail.
APA, Harvard, Vancouver, ISO, and other styles
11

Hole, Jeffrey D. "Email overload in academia /." Online version of thesis, 2008. http://hdl.handle.net/1850/8313.

Full text
APA, Harvard, Vancouver, ISO, and other styles
12

Nussbaum, Ronald. "Graph-based email prioritization." Diss., Connect to online resource - MSU authorized users, 2008.

Find full text
Abstract:
Thesis (M.S.)--Michigan State University. Computer Science and Engineering, 2008.
Title from PDF t.p. (viewed on July 29, 2009) Includes bibliographical references (p. 45-47). Also issued in print.
APA, Harvard, Vancouver, ISO, and other styles
13

Wardle, Adelia, Brian Baroni, Linda Cook, Marian Keitelman, and Steven Miller. "Are you managing your email -- or is email managing you? An analysis of email among personnel within Army Project Management Offices." Monterey, California. Naval Postgraduate School, 2005. http://hdl.handle.net/10945/9962.

Full text
Abstract:
Joint Applied Project
Based on a class project that developed leadership communication competencies for seven levels of Army civilians, email was found to be the most prevalent means of communication, regardless of leadership level. Additionally, there was a widespread perception that email communication needs to be improved. This thesis seeks to explore the clarity, efficiency and effectiveness of email among personnel within Army project management offices. This study included four phases: 1) a review of the relevant literature, 2) a log of email received by five project officer's in the US Army Project Management Office, 3) a questionnaire to gather data about email usage in the Project Management Office, and 4) a thematic analysis of a sample of problematic emails. The findings suggest that an overwhelming volume of email, perception that email responses must be expeditious, and the prevalence of enabling technology, contribute most significantly to email overload. Recommendations include the proposal to initiate corporate email policy and training, thus standardizing best practices and regulating email usage.
APA, Harvard, Vancouver, ISO, and other styles
14

Willis, Dianne. "Ubiquitous email : towards a model of email use in an HE educational setting." Thesis, University of York, 2007. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.441471.

Full text
APA, Harvard, Vancouver, ISO, and other styles
15

Kour, Jawdat, and Hasan Ahmed. "Email attacks : Investigation about the vulnerability of the Swedish organizations against email threats." Thesis, Linnéuniversitetet, Institutionen för datavetenskap och medieteknik (DM), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-97020.

Full text
Abstract:
Email is an essential form of communication for organizations. Nevertheless, with so much popularity came many challenges. These emails usually carry sensitive data that might cause significant harm if they get compromised. Besides, spam and phishing emails that continually reach the employees’ inbox masquerading as a trusted entity due to the lack of authentication mechanisms are also considered a significant threat for organizations today. Such threats are phishing using email domain forgery attack, redirecting emails to a mail server that is under the attacker’s control, and connection eavesdropping. The research aimed to investigate the vulnerability of approximately 2000 organizations within Sweden against those attacks. Toward that end, the quantity and quality of the following email security mechanisms SPF, DKIM, DMARC, STARTTLS, DNSSEC, and DANE were examined through a case study. Also, the adoption of these mechanisms was investigated, whether it varies based on different factors such as organization size, sector, and location. The research findings indicated that the average adoption rate by the tested organizations was approximately 50%. Furthermore, the result demonstrated that there were no differences in the adopted mechanisms based on the studied factors that the results were quite similar among the tested groups. It concluded that there is a lack of protection mechanisms, which made the majority of the tested organizations vulnerable to different types of email attacks.
APA, Harvard, Vancouver, ISO, and other styles
16

Tsipenyuk, Gregory. "Evaluation of decentralized email architecture and social network analysis based on email attachment sharing." Thesis, University of Cambridge, 2018. https://www.repository.cam.ac.uk/handle/1810/273963.

Full text
Abstract:
Present day email is provided by centralized services running in the cloud. The services transparently connect users behind middleboxes and provide backup, redundancy, and high availability at the expense of user privacy. In present day mobile environments, users can access and modify email from multiple devices with updates reconciled on the central server. Prioritizing updates is difficult and may be undesirable. Moreover, legacy email protocols do not provide optimal email synchronization and access. Recent phenomena of the Internet of Things (IoT) will see the number of interconnected devices grow to 27 billion by 2021. In the first part of my dissertation I am proposing a decentralized email architecture which takes advantage of user's a IoT devices to maintain a complete email history. This addresses the email reconciliation issue and places data under user control. I replace legacy email protocols with a synchronization protocol to achieve eventual consistency of email and optimize bandwidth and energy usage. The architecture is evaluated on a Raspberry Pi computer. There is an extensive body of research on Social Network Analysis (SNA) based on email archives. Typically, the analyzed network reflects either communication between users or a relationship between the email and the information found in the email's header and the body. This approach discards either all or some email attachments that cannot be converted to text; for instance, images. Yet attachments may use up to 90% of an email archive size. In the second part of my dissertation I suggest extracting the network from email attachments shared between users. I hypothesize that the network extracted from shared email attachments might provide more insight into the social structure of the email archive. I evaluate communication and shared email attachments networks by analyzing common centrality measures and classication and clustering algorithms. I further demonstrate how the analysis of the shared attachments network can be used to optimize the proposed decentralized email architecture.
APA, Harvard, Vancouver, ISO, and other styles
17

Hong, Kristyne. "Email Me Back: Examining Mental Health Provider Biases through Email Return Rates and Responsiveness." Scholarship @ Claremont, 2018. http://scholarship.claremont.edu/cmc_theses/1955.

Full text
Abstract:
Although many studies have examined patient barriers to care, few studies have examined mental health therapist biases toward prospective patients. The purpose of this study is to address this gap in the literature by examining therapist biases toward simulated-patients’ race, ability to pay for treatment, and diagnosis. A total of 725 therapists (176 male, 549 female) practicing in Chicago, Illinois were sent emails from simulated-patients requesting a therapy appointment. Therapists were stratified and randomized into different simulated-patient conditions, including race (i.e., White, African American, or Latino/a American), gender (i.e., male or female), ability to pay (i.e., able to pay full fee out of pocket for treatment or unable to pay full fee out of pocket for treatment and asked if the therapist took a sliding scale), and diagnosis (i.e., depression, schizophrenia, or borderline personality disorder (BPD)). Therapist email return rates were determined after a 2-week window, and the responsiveness of their messages was coded. The overall email return rate was 78.76% (n = 571). Results indicate that race and diagnosis are significant predictors of receiving an email response, such that non-White patients are less likely to receive a response than White patients, and patients diagnosed with schizophrenia or BPD are less likely to receive a response than those with depression. Further analyses conclude non-White patients, patients unable to pay full fee for treatment, and patients with schizophrenia or BPD are more likely to be declined for services and not receive a response than White patients, patients able to pay full fee for treatment, and patients with depression.
APA, Harvard, Vancouver, ISO, and other styles
18

Fiati-Kumasenu, Albert. "Extracting Customer Sentiments from Email Support Tickets : A case for email support ticket prioritisation." Thesis, Blekinge Tekniska Högskola, Institutionen för datavetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-18853.

Full text
Abstract:
Background Daily, companies generate enormous amounts of customer support tickets which are grouped and placed in specialised queues, based on some characteristics, from where they are resolved by the customer support personnel (CSP) on a first-in-first-out basis. Given that these tickets require different levels of urgency, a logical next step to improving the effectiveness of the CSPs is to prioritise the tickets based on business policies. Among the several heuristics that can be used in prioritising tickets is sentiment polarity. Objectives This study investigates how machine learning methods and natural language techniques can be leveraged to automatically predict the sentiment polarity of customer support tickets using. Methods Using a formal experiment, the study examines how well Support Vector Machine (SVM), Naive Bayes (NB) and Logistic Regression (LR) based sentiment polarity prediction models built for the product and movie reviews, can be used to make sentiment predictions on email support tickets. Due to the limited size of annotated email support tickets, Valence Aware Dictionary and sEntiment Reasoner (VADER) and cluster ensemble - using k-means, affinity propagation and spectral clustering, is investigated for making sentiment polarity prediction. Results Compared to NB and LR, SVM performs better, scoring an average f1-score of .71 whereas NB scores least with a .62 f1-score. SVM, combined with the presence vector, outperformed the frequency and TF-IDF vectors with an f1-score of .73 while NB records an f1-score of .63. Given an average f1-score of .23, the models transferred from the movie and product reviews performed inadequately even when compared with a dummy classifier with an f1-score average of .55. Finally, the cluster ensemble method outperformed VADER with an f1-score of .61 and .53 respectively. Conclusions Given the results, SVM, combined with a presence vector of bigrams and trigrams is a candidate solution for extracting sentiments from email support tickets. Additionally, transferring sentiment models from the movie and product reviews domain to the email support tickets is not possible. Finally, given that there exists a limited dataset for conducting sentiment analysis studies in the Swedish and the customer support context, a cluster ensemble is recommended as a sample selection method for generating annotated data.
APA, Harvard, Vancouver, ISO, and other styles
19

Elsayed, Tamer Mohamed. "Identity resolution in email collections." College Park, Md.: University of Maryland, 2009. http://hdl.handle.net/1903/9618.

Full text
Abstract:
Thesis (Ph. D.) -- University of Maryland, College Park, 2009.
Thesis research directed by: Dept. of Computer Science. Title from t.p. of PDF. Includes bibliographical references. Published by UMI Dissertation Services, Ann Arbor, Mich. Also available in paper.
APA, Harvard, Vancouver, ISO, and other styles
20

Dandolu, Rajesekhar R. "Excel Sheet Based Semantic Email." TopSCHOLAR®, 2004. http://digitalcommons.wku.edu/theses/1101.

Full text
Abstract:
EXCEL SHEET BASED SEMANTIC EMAIL Rajesekhar R, Dandolu December 10, 2004. 47 Pages Directed by: Dr. Guangming Xing Department of Computer Science Western Kentucky University The Semantic Web is an extension of the current web in which information is given well-defined meaning, better enabling computers and people to work in cooperation. The Semantic Web envisions a portion of the World-Wide Web in which the underlying data is machine understandable and can thus be exploited for improved querying, aggregation, and interaction. Excel Sheet Based Semantic Email is a type of Semantic Web application, which deals with the understanding of emails received and performing corresponding actions according to the schema specified in the email. The user can compose an email structure and specify all the semantic actions and necessary information related to a particular schema. The emails received are processed according to the schema format to which they belong and corresponding semantic actions are taken. In this project, Semantic Email is implemented by encoding the information in Excel Sheets. It could be reengineered to support heterogeneous semantic actions based on the particular application. The project can be enhanced providing a web interface, apart from the email system that is currently used as the way of communication. The clients can directly use the web page,
APA, Harvard, Vancouver, ISO, and other styles
21

Pitla, Sruthi Bhushan. "Organizational Search in Email Systems." TopSCHOLAR®, 2012. http://digitalcommons.wku.edu/theses/1161.

Full text
Abstract:
The storage space for emails has been increasing at a rapid pace day by day. Email systems still serve as very important data repositories for many users to store different kinds of information which they use in their daily activities. Due to the rapidly increasing volume of email data, there is a need to maintain the data in a most efficient way. It is also very important to provide intuitive and flexible search utilities to provide better access to the information in the email repositories, especially in an enterprise or organizational setting. In order to implement the functionality, we are presenting a tool name TESO. TESO is a tool for email searching using organizational information. This tool is designed to improve the relevancy of the email search by integrating the data from email servers and organizational information from directory services and other resources. We implement this functionality as an add-on for the Mozilla Thunderbird framework, which is an open source email client system developed by the Mozilla Foundation. The results are evaluated using the SQLite and the XML data. This work will serve as a handy tool in the area of existing information integration and keyword search on relational databases techniques and also helps in efficient access of XML information.
APA, Harvard, Vancouver, ISO, and other styles
22

Jaliwala, Shabbir Hussain. "Unspoofed a secure email system /." Diss., Online access via UMI:, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

Helyar, George. "TrustMessage : an alternative to email /." Leeds : University of Leeds, School of Computer Studies, 2008. http://www.comp.leeds.ac.uk/fyproj/reports/0708/Helyar.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
24

Zhou, Xiaodong. "Discovering and summarizing email conversations." Thesis, University of British Columbia, 2008. http://hdl.handle.net/2429/337.

Full text
Abstract:
With the ever increasing popularity of emails, it is very common nowadays that people discuss specific issues, events or tasks among a group of people by emails. Those discussions can be viewed as conversations via emails and are valuable for the user as a personal information repository. For instance, in 10 minutes before a meeting, a user may want to quickly go through a previous discussion via emails that is going to be discussed in the meeting soon. In this case, rather than reading each individual email one by one, it is preferable to read a concise summary of the previous discussion with major information summarized. In this thesis, we study the problem of discovering and summarizing email conversations. We believe that our work can greatly support users with their email folders. However, the characteristics of email conversations, e.g., lack of synchronization, conversational structure and informal writing style, make this task particularly challenging. In this thesis, we tackle this task by considering the following aspects: discovering emails in one conversation, capturing the conversation structure and summarizing the email conversation. We first study how to discover all emails belonging to one conversation. Specifically, we study the hidden email problem, which is important for email summarization and other applications but has not been studied before. We propose a framework to discover and regenerate hidden emails. The empirical evaluation shows that this framework is accurate and scalable to large folders. Second, we build a fragment quotation graph to capture email conversations. The hidden emails belonging to each conversation are also included into the corresponding graph. Based on the quotation graph, we develop a novel email conversation summarizer, ClueWordSummarizer. The comparison with a state-of-the-art email summarizer as well as with a popular multi-document summarizer shows that ClueWordSummarizer obtains a higher accuracy in most cases. Furthermore, to address the characteristics of email conversations, we study several ways to improve the ClueWordSummarizer by considering more lexical features. The experiments show that many of those improvements can significantly increase the accuracy especially the subjective words and phrases.
APA, Harvard, Vancouver, ISO, and other styles
25

Belakovskiy, Igor L. (Igor Leonidovich) 1979. "ROOS : a structured email server." Thesis, Massachusetts Institute of Technology, 2002. http://hdl.handle.net/1721.1/87195.

Full text
Abstract:
Thesis (M.Eng.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer Science, 2002.
Includes bibliographical references (p. 81-83).
by Igor L. Belakovskiy.
M.Eng.
APA, Harvard, Vancouver, ISO, and other styles
26

Khosravi-Bardsirpour, Hamid. "Extracting pragmatic content from Email." Thesis, University of Sheffield, 1999. http://etheses.whiterose.ac.uk/10219/.

Full text
Abstract:
This research presents results concerning the large scale automatic extraction of pragmatic content from Email, by a system based on a phrase matching approach to Speech Act detection combined with the empirical detection of Speech Act patterns in corpora. The results show that most Speech Acts that occur in such a corpus can be recognized by the approach. This investigation is supported by the analysis of a corpus consisting of 1000 Emails. We describe experimental work to sort a substantial sample of Emails based on their function, which is to say, whether they contain a statement of fact, a request for the recipient to do something, or ask a question. This could be highly desirable functionality for the overburdened Email user, especially if combined with other, more traditional, measures of content relevance and filters based on desirable and undesirable mail sources. We have attempted to apply an lE engine to the extraction of message content located in the message, in part by the use of speech-act detection criteria, e. g. for what it is to be a request for action, under the many possible surface forms that can be used to express that in English, so as to locate the action requested as well as the fact it is a request. The work may have potential practical uses, but here we describe it as the challenge of adapting an IE engine to a somewhat different, task: that of message function detection. The major contributions are: Defining Request Speech Act types. The Request Speech Act is one of the most important functions of an utterance to be recognised, in order to find out the gist of a message. The present work has concentrated on three sub-types of Requests: Requests for Information, Action, and Permission. An algorithm to recognise Speech Acts Patterns found frequently in a domain, together with linguistic rules, make it possible to recognise most of the examples of Requests in the corpus. The results of the evaluation of the system are encouraging and suggest that, in order to avoid long-response time systems, a fast and friendly system is the right approach to implement.
APA, Harvard, Vancouver, ISO, and other styles
27

Cameron, Nancy G. "Email: From “To” to “Send"." Digital Commons @ East Tennessee State University, 2010. https://dc.etsu.edu/etsu-works/7071.

Full text
APA, Harvard, Vancouver, ISO, and other styles
28

Cameron, Nancy G. "Email: From “To” to “Send." Digital Commons @ East Tennessee State University, 2007. https://dc.etsu.edu/etsu-works/7078.

Full text
APA, Harvard, Vancouver, ISO, and other styles
29

Segeberg, Ryan B. "EASEmail: Easy Accessible Secure Email." BYU ScholarsArchive, 2009. https://scholarsarchive.byu.edu/etd/2135.

Full text
Abstract:
Traditional email encryption methods are difficult to set up, as they require senders to obtain a message recipient's public key before a secure communication can be sent. Easy Accessible Secure Email (EASEmail) addresses the key establishment and exchange issues of encrypted email by using a lightweight symmetric key server. Users can send a secure email without establishing or exchanging keys with the recipient in advance. With usability as its primary goal, EASEmail strives to bring usable secure email communication to the masses.
APA, Harvard, Vancouver, ISO, and other styles
30

Murphy, Margaret. "Towards a Practical Approach for Assessing Politeness in Intercultural Email Communication." Thesis, Griffith University, 2006. http://hdl.handle.net/10072/366384.

Full text
Abstract:
Though relatively new, email is becoming increasingly prevalent in both our personal and professional lives. Yet the underlying processes of email communication are often poorly understood, especially as far as politeness is concerned. deprived of the wealth of prosodic and non-verbal features which can add supplementary support to politeness, email presents many communication challenges to users. Differing cultural discourse styles create differing ways to embed politeness within the language. Uncertainty remains over expectations of politeness as well as appropriate ways to incorporate it in email language. No guidelines currently exist which can offer a politeness protocol for our email messages.
Thesis (PhD Doctorate)
Doctor of Philosophy (PhD)
School of Cognition, Language and Special Education
Arts, Education and Law
Full Text
APA, Harvard, Vancouver, ISO, and other styles
31

Hanrahan, Benjamin Vincent. "Getting Lost in Email: How and Why Users Spend More Time in Email than Intended." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/51204.

Full text
Abstract:
Email has become deeply embedded in many users' daily lives. To investigate how email features in users lives, particularly how users attend to email and get lost within it, I ran five studies that probed how users determined relevancy of messages, logged interactions with email, gathered diary entries related to individual sessions, and investigated the gratifications sought from email use. For the first study, I performed an exploratory experiment in the laboratory to determine how participants assessed the importance of individual emails (N=10). The next investigation I undertook involved three different studies, which I detail individually: a survey on email usage (N=54); a two-week study of email usage (N=20); and finally, the application of Attentional Network Test (N=9). My final study was to validate my findings around the reasons for attending to email, this was done through deploying a survey that followed the Uses and Gratification Theory tradition (N=52) In my studies I found that the majority of attentional effort is around reading email and participating in conversations, as opposed to email management. I also found that participants attended to email primarily based on notifications, instead of the number of unread messages in their inbox. I present my results through answering several research questions, and leverage Conversation Analysis (CA), particularly conversation openings, to explicate several problematic aspects around email use. My findings point to inefficiencies in email as a communication medium, mainly, around how summons are (or are not) issued. This results in an increased burden on email users to maintain engagement and determine (or construct) the appropriate moment for interruption. My findings have several implications: email triage does not seem to be problematic for the participants in my studies, somewhat in contrast to previous research; much of the problem around email, particularly emph{getting lost in email} is in managing the tension between promptly responding to messages while limiting engagement with email; due to the social nature of the problems with email, modifications to the email client are limited in their potential effectiveness to prevent getting lost and reduce email related anxiety.
Ph. D.
APA, Harvard, Vancouver, ISO, and other styles
32

Samuelsson, Karolina. "HEJO MAIL : HTML och CSS för email." Thesis, Linnaeus University, School of Computer Science, Physics and Mathematics, 2010. http://urn.kb.se/resolve?urn=urn:nbn:se:lnu:diva-6655.

Full text
Abstract:

HEJO MAIL – HTML och CSS för email” handlar precis som titeln antyder om användandet av HTML och CSS för att utforma e-postmeddelanden och är en undersökning över vilka standarder som finns eller åtminstone borde finnas. Viktiga fraser vid informationssökningen har varit ”Html Email”, ”Email Standards” och ”Email Programming”. Resultatet är tänkt att appliceras på HEJO MAIL, som är en applikation för utskick av nyhets- och informationsbrev som idag inte fungerar fullt ut.

Resultatet är något förvånande då standarder specifikt för email saknas och har ersatts med rekommendationer, resultatet innefattar en sammanställning av rekommendationer från tre olika källor som valts ut. Dessa rekommendationer har även testats för att verifiera att det faktiskt fungerar med hjälp av 11 stycken testmail. Diskussionen innehåller ett förslag på en praktisk lösning med modultänk för HEJO MAIL samt ett försök att sammanfatta arbetet och återknyta till frågeställningarna.


"HEJO MAIL - HTML and CSS for email" is like the title suggests a thesis about the use of HTML and CSS to design electronic mail and what standards there are to be applied, or at least should be. Key phrases in the search for information have been "HTML Email", "Email Standards" and "Email Programming". The results are intended to be applied on HEJO MAIL, which is an application for sending news and information letters via email that is not working properly.

The result is somewhat surprising since standards specific for email do not exist and have been replaced with general recommendations, the result consists of a compilation of recommendations from three different sources that have been selected. These recommendations have also been tested to verify that they are actually functioning by the creation of 11 emails for testing. The discussion part of the thesis includes a suggestion of a practical solution with modular structure for HEJO MAIL and an attempt to summarize the work and the questions of issue.

APA, Harvard, Vancouver, ISO, and other styles
33

Harrison, Sandra M. "The discourse structure of Email discussions." Thesis, Birmingham City University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.272143.

Full text
Abstract:
The purpose of this work is (1) to investigate the discourse structure of email discussions, and (2) to investigate the suitability of Conversation Analysis (CA) and Discourse Analysis (DA) for the analysis of email discussion data. The study uses naturally occurring email discussion data from publicly available archives. Radio and newspaper discussion data are used for companson. The discourse map is developed to represent mUlti-party multi-topic asynchronous discussions. Tum-taking is investigated using CA, and a set of rules proposed for tum-taking in email discussions: the main difference from spoken conversation is the absence of priority for speaker selection, such that any speaker can self-select at any time. Utterance pairs are also investigated using CA, focusing on openings and closings and on question/answer pairs. Openings and closings are varied and optional, and do not occur in pairs. Questions and answers often occur in paired structures. Strategies for linking utterances in the absence of adjacency are identified. To investigate longer sequences, selected whole discussion threads are analysed using the exchange rank taken from the DA framework. Email-specific features include multiple responses to one initiate, and single messages responding to more than one earlier message. Additionally, multiple initiates and/or responses can be found in a single email message. Repair in email discussions does not need to deal with troubles arising from real-time spoken interaction, but all four types of self- and other-initiated self- and otherrepair are found, as well as refusal to repair. Finally, the elements of a model for the investigation of the discourse of email discussions are presented and the methods of analysis evaluated. CA provides a flexible approach which leads to the illumination of major aspects of the data. The use ofDA presents problems, some of which are inherent in the framework, and some of which spring from the complexity of turns in email discussions. A major influence on the structure of email discussions is that they are managed locally and interactionally by the participants themselves.
APA, Harvard, Vancouver, ISO, and other styles
34

Slack, Andrew A. "Digital authentication for official bulk email." Thesis, Monterey, California. Naval Postgraduate School, 2009. http://hdl.handle.net/10945/4902.

Full text
Abstract:
Approved for public release, distribution unlimited
Approved for public release, distribution unlimited
Official bulk email is an efficient tool for disseminating information to a wide audience. Its inherent efficiency, captive audience, and trust provide a dangerous attack vector for adversaries utilizing fraudulent email. Digital authentication can provide a layer of defense to official bulk email that, combined with other defensive countermeasures, will greatly reduce its vulnerabilities. The Department of Defense mandates that official emails, which contain hyperlinks, attachments, or instructions to recipients, must contain a digital signature, authenticating the source of the email, and ensuring the integrity of its contents. This policy, though used at some military installations, is not being applied to official bulk email at others due to administrative roadblocks in obtaining role-based certificates, and implementing an authentication policy with legacy email systems. This thesis identified administrative roadblocks in deploying digital authentication solutions within the Department of Defense, explored different technology options of a digital authentication solution for official bulk email, created a proof of concept solution using a Python proxy server and S/MIME, and looked at the most popular mail user agents to see how they interpret S/MIME digital signatures. Applying digital authentication to official bulk email will close a potentially critical vulnerability in the defense of DoD networks.
APA, Harvard, Vancouver, ISO, and other styles
35

Nonnecke, Robert Blair. "Lurking in email-based discussion lists." Thesis, London South Bank University, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.425629.

Full text
APA, Harvard, Vancouver, ISO, and other styles
36

Edwards, Kirstie. "Email communications in team writing projects." Thesis, Sheffield Hallam University, 2006. http://shura.shu.ac.uk/19600/.

Full text
Abstract:
Nystrand's social interactive model of writing (1989) describes composing as a social construct between the reader and writer. Although many researchers are debating whether the language of computer mediated communication (CMC) veers towards written or spoken discourse, or has developed a style of its own (e.g. Baron 1998, 2001; Ferrara et al. 1991; Harrison 2000a; Yates 1996), genre now plays an important role in fixity of documents in a digital medium (Yates and Sumner 1997). I therefore analysed the adaptations in linguistic 'style' of email writing as a non intrusive means to study social-interactive behaviour in networked team writing projects. Based on the premise that socio-emotional communications benefit team performance (Argyle 1994; Barker et al. 2000; Hyland 1998; Panteli 2004), I tested the concept that social interactive adaptations in email writing describe the social-task balance on projects and are reflected in the social interactivity applied to the team writing of the document. Communication markers and writing influences were extracted from email content analysis to compare academic and commercial writing projects. Evaluating documents with Sless's social desirability model (2004) showed a parallelism between the social-task balance described by team emails and social desirability of the final documents. Further studies are required to prove this concept. Social interactive adaptations demonstrated in socio-emotional behaviour in the emails of the academic project were also demonstrated in the final document. Higher pro-social behaviour was represented in Dutch emails in the academic project, and in English emails in the commercial project. Face to face contact influenced pro-social CMC behaviour and perceptions of behaviour. The methodology provides a standard, unintrusive tool for monitoring the social dimensions of projects to identify and correct problem areas, and to research multiple contexts and inform more broadly on professional practice. Relating the social-task dimensions to document evaluations is the first step towards a causal model, to understand how team culture can influence virtual team writing. The merging of personal and professional email styles predicted by Danet (2001a) is already apparent in communications from the academic context. Findings suggest that to encourage informal exchange of ideas and improve socio-emotional relations, professional email communications would benefit from a more conversational style.
APA, Harvard, Vancouver, ISO, and other styles
37

Castronuovo, John Robert. "Swedish NLP Solutions for Email Classification." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-277858.

Full text
Abstract:
Assigning categories to text communications is a common task of Natural Language Processing (NLP). In 2018, a new deep learning language repre- sentation model, Bidirectional Encoder Representations from Transformers (BERT), was developed which can make inferences from text without task specific architecture. This research investigated whether or not a version of this new model could be used to accurately classify emails as well as, or better than a classical machine learning model such as a Support Vector Machine (SVM). In this thesis project, a BERT model was developed by solely pre- training on the Swedish language (svBERT) and investigated whether it could surpass a multilingual BERT (mBERT) model’s performance on a Swedish email classification task. Specifically, BERT was used in a classification task for customer emails. Fourteen email categories were defined by the client. All emails were in the Swedish language. Three different SVMs and four different BERT models were all created for this task. The best F1 score for the three classical machine learning models (standard or hybrid) and the four deep learn- ing models was determined. The best machine learning model was a hybrid SVM using fastText with an F1 score of 84.33%. The best deep learning model, mPreBERT, achieved an F1 score of 85.16%. These results show that deep learning models can improve upon the accuracy of classical machine learning models and suggest that more extensive pre-training with a Swedish text corpus will markedly improve accuracy.
Att tilldela kategorier till textkommunikation är en grundläggande uppgift för Natural Language Processing (NLP). Under 2018 utvecklades ett nytt sätt att skapa en språkrepresentationsmodell, Bidirectional Encoder Representations from Transformers (BERT), som kan dra slutsatser från en text utan någon uppgiftsspecifik arkitektur. Mitt examensarbete undersökte om en version av denna modell kan klassificera e-postmeddelanden bättre än en klassisk maski- ninlärningsmodell, till exempel en Support Vector Machine (SVM). I projektet utvecklades också en BERT-modell enbart förtränad på svenska (svBERT) som jämfördes med en flerspråkig BERT-modell (prestanda) på en svensk e-klassificeringsuppgift. I studien användes BERT i en klassificeringsuppgift för kundmeddelanden. Fjorton e-postkategorier definierades av klienten. Alla e-postmeddelanden var på svenska. Jag implementerade 3 olika SVMer och 4 olika BERT-modeller för den här uppgiften. Den bästa F1-poängen för de tre klassiska maskininlärningsmodellerna (standard eller hybrid) och de fyra djupa inlärningsmodellerna bestämdes. Den bästa maskininlärningsmodellen var en hybrid SVM med fastText med en F1-poäng på 84,33%. Den bästa djupa inlärningsmodellen, mPreBERT, uppnådde en F1-poäng på 85,16%. Resulta- ten visar att djupa inlärningsmodeller kan förbättra noggrannheten i klassiska maskininlärningsmodeller och troliggör att mer omfattande förutbildning med ett svensk textkorpus markant kommer att förbättra noggrannheten.
APA, Harvard, Vancouver, ISO, and other styles
38

Shanahan, Daniel Patrick. "Intentional Information Fragmentation in Email Management." Thesis, Virginia Tech, 2012. http://hdl.handle.net/10919/35078.

Full text
Abstract:
Personal Information Management (PIM) studies the practice of storing, organizing, and retrieving information by an individual in support of their roles and tasks (Bergman, et al., 2004). One important problem in PIM is information fragmentation (IF) â the condition of having data in different formats, distributed across multiple locations, manipulated by different applications, and residing in a generally disconnected manner (Tungare, 2007). IF can conflict with the PIM ideal that users should have access to the right information at the right time, in the right place, in the right form, and of sufficient completeness and quality to perform the task at hand (Bergman, et al., 2004). It is typically assumed that IF is unintentional, and occurs as a result of the many applications and devices we use to do our daily work. It is further assumed that IF is â badâ or has negative consequences. In this thesis, I study when IF occurs intentionally. Intentional IF (IIF) refers to the fragmentation in PIM that occurs when a person fragments his or her own personal data purposefully. Although research into the problem of IF has been growing quickly in the past decade, IIF has not been investigated in the literature. Prior studies have portrayed IF as a problematic type of information management. Email is a common context in which IF is found. While IF in email may be unintentional, such as when required by an employer, it is also likely to be intentional, as is the case when users use separate email accounts for different purposes. To further the research in this field, this project investigated the phenomenon of IIF in email by conducting and analyzing data from an online survey. In addition to finding the extent of IIF in email, the survey addressed what motivates the participant to purposely fragment their email as well as the advantages and disadvantages in doing so. My study is the first that has explored intentional fragmentation of information. The findings of this study show that IIF exists in email usage, revealing that IIF occurs across a userâ s devices and also across a userâ s multiple email accounts. The two most common motivations for IIF are to keep information separated by the userâ s social roles (work, school, personal communications, etc.), and to filter out extraneous information in order to simplify their information management. These results show that in addition to the negative consequences of IF there also exists positive uses of IF, that is helpful for some users.
Master of Science
APA, Harvard, Vancouver, ISO, and other styles
39

Kaňka, Miroslav. "Efektivita email marketingu u elektronických obchodů." Master's thesis, Vysoká škola ekonomická v Praze, 2009. http://www.nusl.cz/ntk/nusl-85199.

Full text
Abstract:
The work can be considered objective factors influencing the efficiency of call email marketing for e-commerce and on the basis of data from e-shop adidasmania.cz analyze their effectiveness. The work offers an insight into email marketing from all sides. It's use of e-commerce, legal and technical perspective solution. In addition to a detailed presentation of the e-shop are adidasmania.cz analyzed the data from Google Analytics. Based on these data, evaluated the effectiveness of individual factors. For most variable factors is proved their effectiveness and impact on the recommended next steps in the creation of emailing.
APA, Harvard, Vancouver, ISO, and other styles
40

Pour, Lukas. "Email marketingová strategie pro vzdělávací portál." Master's thesis, Vysoká škola ekonomická v Praze, 2015. http://www.nusl.cz/ntk/nusl-201681.

Full text
Abstract:
Communication with the customer plays a crucial role in today's internet marketing. In case we do not communicate with the customer or we let his attention towards our product or service fade away, than the investment into gaining him has not been well used. Email marketing itself is a very good instrument for maintaining and building the relationship with the customer. However, a great number of entrepreneurs and companies does not know how to work with email marketing and they send email just the same way as they would invite their colleagues for a meeting or simply just scan a discount flier. The first part of the master thesis therefore focuses on the definition of email marketing itself and of the features by which emails affect the customers. It than presents the ways how to maintain the customer, how to pamper them by e.g. content marketing and it shows the current trends and possibilities of automatization. The second part of the master thesis than presents and uses email marketing not only as one of the very strong instruments of direct marketing but also as one of the ways to support online education, which has been gaining a lot of popularity both in the Czech Republic and abroad. The thesis shows the possibilities how to use email marketing to promote an education website that is being created concurrently with this thesis and how to teach its visitors. The practical part shows how to set up the path of the customer and the email marketing strategy in order to change the visitors of the website into loyal customers. All that with the highest possible automatization of the process.
APA, Harvard, Vancouver, ISO, and other styles
41

Kwok, Pak Wing Parkson. "Communication strategies for email at work." HKBU Institutional Repository, 2001. http://repository.hkbu.edu.hk/etd_ra/389.

Full text
APA, Harvard, Vancouver, ISO, and other styles
42

Slack, Andrew A. "Digital authentication for offical bulk email." Monterey, Calif. : Naval Postgraduate School, 2009. http://edocs.nps.edu/npspubs/scholarly/theses/2009/Mar/09Mar%5FSlack.pdf.

Full text
Abstract:
Thesis (M.S. in Computer Science)--Naval Postgraduate School, March 2009.
Thesis Advisor(s): Garfinkel, Simson L. "March 2009." Description based on title screen as viewed on April 24, 2009. Author(s) subject terms: Digital Authentication, S/MIME, Official bulk email, phishing. Includes bibliographical references (p. 55-57). Also available in print.
APA, Harvard, Vancouver, ISO, and other styles
43

Andersson, Petter. "Building a scalable email response system." Thesis, KTH, Skolan för elektroteknik och datavetenskap (EECS), 2020. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-272127.

Full text
Abstract:
This thesis concerns the task of designing and building a system around a natural-language understanding (NLU) bot to help automate email communication, using cloud computing technology. Focus lies on a serverless environment within the Amazon Web Services (AWS) infrastructure. Unique email addresses were employed to easily keep track of email threads connected to specific requests, and a storage solution was developed in Amazon Simple Storage Service (S3) to store inbound attachments connected to each procurement request. The NLU bot was trained on existing email data and deployed to classify inbound email content. The classification was then used by the system to determine adequate responses. Templates were used for outgoing emails, which required a large amount of data in order to be useful. The thesis initially sought to develop a fully automated system but that goal was modified to require human approval of outgoing emails to closely monitor the accuracy of the NLU as well as to give a user-friendly experience. This decision resulted in a system that required more time and work from the user but that provided better reliability and accuracy. Improvements of the template matching mechanics would provide better template suggestions for outgoing email and is a main focus for future work. In hindsight, more resources were required for adapting and training the NLU bot in order for it to produce better classifications, which would have made it possible to more fully test the capabilities of the system.
Den här rapporten behandlar design och uppbyggnad av ett system kring en språkteknologisk applikation för att automatisera e-postkommunikation med hjälp av molntekniker. Fokus ligger på en serverlös miljö inom Amazon Web Services (AWS) infrastruktur. Unika e-postadresser användes för att enkelt kunna hålla uppsikt över olika e-posttrådar kopplade till olika upphandlingsfall. En lagringslösning utvecklades i Amazon Simple Storage Service (S3) för att spara inkomna bilagor kopplade till varje sådant fall. Den språkteknologiska applikationen tränades på existerande e-postdata och användes för att klassificera innehållet i inkommen e-post. Klassifikationen användes sedan av systemet för att välja ut adekvata svar. För utgående e-post användes mallar, vilket krävde en stor mängd data för att den skulle vara användbar. Examensarbetet hade initialt som mål att utveckla ett helt automatiserat system, men det målet ändrades under arbetets gång till att kräva godkännande från en människa för utskick av utgående e-post. Detta gjordes för att bättre kunna kontrollera hur bra de valda svaren blev samt för att ge en bättre användarupplevelse. Beslutet resulterade i ett system som krävde att användaren lade ner mer tid och arbete men som gjorde reliabiliteten och precisionen bättre. Förbättringar för matchningen mellan e-postinnehåll och mallar skulle ge bättre svarsförslag för utgående e-post och är ett huvudfokusför det fortsatta utvecklingsarbetet. I efterhand kan konstateras att mer resurser krävdes för att anpassa och träna den språkteknologiska applikationen för att den skulle kunna producera bättre klassifikationer, vilket kunde ha möjliggjort en mer komplett testning av systemet.
APA, Harvard, Vancouver, ISO, and other styles
44

Burgess, Anthony Keith. "Effective means of improving email communication." Thesis, Loughborough University, 2006. https://dspace.lboro.ac.uk/2134/34655.

Full text
Abstract:
Email communication has become an integral part of the communication structure within organisations, but the problems it can cause are rarely assessed. The defects associated with email, which are related to both the quantity and the quality of email need to be understood by employees for them to become more effective users of email. Email training within organisations tends to focus on how to use email as a software package, without looking at when it is appropriate to use email and how to get your message across effectively. This thesis first explores email defects and how they impact on organisations.
APA, Harvard, Vancouver, ISO, and other styles
45

Mustonen, B. (Benjamin). "Phishing in email and instant messaging." Bachelor's thesis, University of Oulu, 2019. http://jultika.oulu.fi/Record/nbnfioulu-201905181856.

Full text
Abstract:
Abstract. Phishing is a constantly evolving threat in the world of information security that affects everyone, no matter if you’re a retail worker or the head of IT in a large organisation. Because of this, this thesis aims to give the reader a good overview of what phishing is, and due to its prevalence in email and instant messaging, focuses on educating the reader on common signs and techniques used in phishing in the aforementioned forms of communication. The chosen research method is literature review, as it is the ideal choice for presenting an overview of a larger subject. As a result of the research, many common phishing signs and techniques in both email and instant messaging are presented. Some of these signs include strange senders, fake domain names and spellings mistakes. With this thesis, anyone looking to improve their understanding about phishing can do so in a way that is easy to understand. Some suggestions for future research are also presented based on this thesis’ shortcomings, namely the lack of studies on phishing in instant messaging.
APA, Harvard, Vancouver, ISO, and other styles
46

Stalnecker, Zoe. "Email, Colors and Fonts: Responses to How Email Advertising Influences Consumer Buying Behavior and Judgment of Appeal." Scholarship @ Claremont, 2014. http://scholarship.claremont.edu/scripps_theses/455.

Full text
Abstract:
This study examined how various combinations of colors and fonts in email advertisements affect a consumer’s likelihood of purchasing a product and her judgment of appeal. It further examined overall perceptions of email advertisements. The study conducted a survey containing eighteen simulated emails that was distributed over Amazon MTurk. A total of 116 participants in the United States took the survey. Results showed that most participants preferred a yellow foreground to orange and purple, and a blue background to red and green. Findings also revealed that Georgia font style was consistently preferred over Onyx font style. Results showed that emails comprising of a blue background, yellow foreground and Georgia font style were especially significant in influencing consumers to purchase a product and were the most appealing.
APA, Harvard, Vancouver, ISO, and other styles
47

Amin, Sandra, and Amanda Bengtsson. "You’ve got email! A study about attitudes toward email advertising, based on the components cognition, affection and behavior." Thesis, Malmö högskola, Fakulteten för teknik och samhälle (TS), 2017. http://urn.kb.se/resolve?urn=urn:nbn:se:mau:diva-20719.

Full text
Abstract:
Sending email is a very common activity among Swedish consumers nowadays. Email advertising has become a big part of the email usage - both permission-based and unwanted. The purpose of this study was to identify Swedish consumers’ total attitude towards permission- based email advertising, based on the three components cognition, affection and behavior. After identifying the attitude, correlation between the components was examined. The result was used to try Prensky’s generation theory regarding digital natives and digital immigrants, to investigate if it can be useful in the subject email advertising. A quantitative method was used, by publishing a survey on Facebook, which got totally 187 useful responses. The result showed an overall negative attitude and a high correlation between cognition and affection. A medium high correlation between cognition and behavior, and affection and behavior was found. The results partly showed a difference between digital natives and digital immigrants attitude towards email advertising. In the survey a division of four age groups, instead of two, was made. Results from the four groups showed a mix of positive and negative responses, which indicates that Prensky’s generation theory is too general, and cannot be used within email advertising.
APA, Harvard, Vancouver, ISO, and other styles
48

Olsen, Linnéa. "Can Chatbot technologies answer work email needs? : A case study on work email needs in an accounting firm." Thesis, Karlstads universitet, Handelshögskolan (from 2013), 2021. http://urn.kb.se/resolve?urn=urn:nbn:se:kau:diva-85013.

Full text
Abstract:
Work email is one of the organisations most critical tool today. It`s have become a standard way to communicate internally and externally. It can also affect our well-being. Email overload has become a well-known issue for many people. With interviews, follow up interviews, and a workshop, three persons from an accounting firm prioritise pre-define emails needs. And identified several other email needs that were added to the priority list. A thematic analysis and summarizing of a Likert scale was conducted to identify underlying work email needs and work email needs that are not apparent. Three work email needs were selected and using scenario-based methods and the elements of PACT to investigating how the characteristics of a chatbot can help solve the identified work email overload issue? The result shows that email overload is percept different from individual to individual. The choice of how email is handled and email activities indicate how email overload feeling is experienced. The result shows a need to get a sense of the email content quickly, fast collect financial information and information from Swedish authorities, and repetitive, time-consuming tasks. Suggestions on how this problem can be solved have been put forward for many years, and how to use machine learning to help reduce email overload. However, many of these proposed solutions have not yet been implemented on a full scale. One conclusion may be that since email overload is not experienced in the same way, individuals have different needs - One solution does not fit all. With the help of the character of a chatbot, many problems can be solved. And with a technological character of a chatbot that can learn individuals' email patterns, suggest email task to the user and performing tasks to reducing the email overload perception. Using keyword for email intents to get a sense of the email content faster and produce quick links where to find information about the identified subject. And to work preventive give the user remainder and perform repetitive tasks on specific dates.
APA, Harvard, Vancouver, ISO, and other styles
49

Liao, Lijun. "Secure email communication with XML-based technologies." Berlin Bochum Dülmen London Paris Europ. Univ.-Verl, 2009. http://d-nb.info/1000311201/04.

Full text
APA, Harvard, Vancouver, ISO, and other styles
50

Mandic, Mirko. "Visualizing rhythms of intimacy in email communication." Texas A&M University, 2004. http://hdl.handle.net/1969.1/3108.

Full text
Abstract:
Email has developed into one of the most extensively used computer applications. Email interfaces, on the other hand, have gone through very few transformations since their inception. As the growing volumes of email data accumulate in users' email boxes, these interfaces fail to provide effective message handling and browsing support. Saved email messages provide not only a vast and pulsating record of one's electronic past, but also a potential source of valuable insights into the structure and dynamics of one's social network. In this thesis, we introduce a visualization approach to email that draws upon email’s inherently personal character and uses intimacy as a key parameter. We have developed faMailiar, a novel email interface that visualizes email in a chronological manner through two alternative, calendar-like views that present email activity on different time granularity scales. Visual mappings of email data and support for filtering help the user see rhythms and patterns in her social interactions. Zooming, panning and implicit semantic zooming facilitate navigation across large email collections. This thesis also describes our iterative, human-centered design method. Two user studies have been performed at different stages of the process, and we explain their purpose, results and implications.
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography