WorldWideScience

Sample records for 301-619-4934 fax e-mail

  1. E-mail marketing

    Jurnečková, Jana

    2014-01-01

    The thesis deals with e-mail marketing. It focuses on identifying factors that affect the behavior of users of e-mail and newsletter subscribers. It evaluates the role of e-mail marketing as a part of communication mix of companies and e-shops, current trends, e-mail campaigns, e-mail marketing software provider. To study the behavior of users of e-mail and newsletter subscribers a questionnaire survey was conducted on a sample of 610 respondents and in-depth interviews (n = 30). Content anal...

  2. E-mail marketing

    Tůmová, Kateřina

    2012-01-01

    The aim of this work is to specify the e-mail marketing and in the practical application to evaluate the pros and cons of e-mail marketing as a tool of targeted marketing communication.Based on personal interviews with representatives of the company was described their existing e-mail marketing.Through the survey it was found, how customers perceive the company's e-mail marketing.Based on the survey, changes were proposed at the end of the thesis.

  3. E-mail: Outlook Express

    Zainul Bakri

    2012-10-01

    Full Text Available Salah satu layanan Internet yang sangat penting adalah electronic mail atau sering hanya disebut sebagai e-mail. Untuk menggunakan e-mail, diperlukan piranti lunak khusus supaya pengguna dapat mengirim dan menerima e-mail. Jenis piranti lunak e-mail diantaranya adalah Outlook Express yang merupakan satu paket yang didistribusikan bersama Internet Explorer versi 4. Piranti lunak ini dijalankan pada PC yang mempunyai sistem operasi Windows 95 atau 98. Jenis piranti lunak e-mail yang lain adalah Eudora, Pegasus dan sebagainya. Bahkan ada yang diintegrasikan dengan Web Browser (alat untuk menelusuri situs Web misalnya IE,dan Netscape.Sebagai layaknya pelayanan pos, maka setiap pengguna e-mail mempunyai alamat tertentu yang tidak mungkin dipunyai oleh pengguna lainnya diseluruh dunia. Untuk keperluan pendistribusian, maka e-mail mempunyai semacam kantor pos yang ditempatkan dalam sebuah komputer server (mail server atau sering disebut sebagai host. 

  4. Business e-mail communication

    Bengin Senka

    2015-01-01

    Full Text Available This paper presents a discourse analysis in the business e-mail communication with the aim of determining formal and informal linquistic characteristics. Researched corpus has been based on 148 e-mails exchanged between a manager employed in a marketing agency and his clients. The research is based on Speech Act Theory and Theory of Politeness. It has been found that the analyzed business e-mail correspondence is mostly characterized as informal, even with the characteristics of colloquial communication, unlike the expected characteristics of formal business style.

  5. DETEKSI E-MAIL PALSU DENGAN MEMPERGUNAKAN HEADER E-MAIL

    Muhammad Didik Rochmad Wahyudi

    2009-01-01

    E-mail is a medium of communication to send and receive messages. As one of the media that is most commonly used to exchange information, e-mail is vulnerable to security threats. One of the security threat to e-mail is the aspect of the authenticity of e-mail received. Habits of users who receive e-mail read directly and trust where it came from the e-mail and any contents of the e-mail. E-mail that was sent using certain technique, can manipulate the original e-mail. Recipient of e-mail wil...

  6. Narrative E-Mail-Supervision

    Elisabeth Goebel-Krayer

    2007-09-01

    Full Text Available Online-Beratung In der Praxis der E-Mail-Supervision taucht immer wieder die Frage nach einer geeigneten Methode auf. Wie kann aufgrund des lediglich zur Verfügung stehenden Textes ein Antwortschreiben verfasst werden, das doch beratenden Charakter haben soll? Mit der narrativen E-Mail-Supervision wird nicht nur eine Methode vorgestellt, mit der es möglich ist, anhand des Textes die Sicht der SupervisandInnen zu rekonstruieren. Narrative E-Mail-Supervision ermöglicht es darüber hinaus, das berufliche Handeln in besonderer Weise zu reflektieren. Die SupervisandInnen werden mit Hilfe offener Fragestellungen dazu angeregt, von ihrem beruflichen Alltag Erzählungen aufzuschreiben. Dieses erzählende Schreiben wiederum führt dazu, dass die SupervisandInnen Situationen erneut erleben und aus der gegenwärtigen Perspektive ihr Handeln (neu bewerten. Die SupervisandInnen werden im Schreiben sich selbst zu SupervisorInnen.

  7. Netiquette: e-mail for group practices.

    O'Brien, Jennifer A

    2007-01-01

    E-mail is a relatively new tool in business and communication, and it has unique nuances. Effective use of e-mail and its features can enhance performance, interaction, even morale. Misuse of e-mail can be a legal liability and damage relationships within your practice. This article provides a guide to optimizing the use of e-mail within your practice. PMID:17425016

  8. Long E-mails and Internet Connections

    Merciadri, Luca

    2009-01-01

    Fetching e-mails is a daily task. However, when an e-mail size overcomes a given threshold, e-mail communication becomes more difficult, because slow. This is principally due to the outgoing speed of cheap Internet connections. We propose here a mechanism which limits this problem.

  9. Management and Archiving e-mail Messages in Governmental Organization

    Ashraf Mohamed A.Mohsen

    2006-06-01

    Full Text Available The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  10. Management and Archiving e-mail Messages in Governmental Organization

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  11. E-Mail in International Negotiation

    Bülow, Anne Marie

    2009-01-01

    This paper investigates the advantages and disadvantages of the use of e-mail to obtain agreement between two parties with overlapping but also conflicting interests. The literature on Media Richness suggests that e-mail is too lean to facilitate agreement; but all supporting evidence stems from homogenous populations. This paper, however, starts from the hypothesis that in connection with lingua franca interaction, the text format provides advantages for parties that need to think how to phr...

  12. Troubleshooting Requests e-mail Confirmation

    TS Department

    2004-01-01

    In an ongoing effort to improve quality of the repair requests, a new e-mail confirmation automatic system will be implemented starting from the 21st October. All repair requests transmitted to the TCR (72201) or the FM Helpdesk (77777) will be confirmed in an e-mail to the requestor, provided that the latter has a valid e-mail address in the HR database. The e-mail will contain a reference number, a brief description of the problem, the location and a contact where more information can be obtained. A second e-mail will be sent when the processing of the repair request is finished. We hope that this initiative will improve the transparency and quality of our service. Helpdesk Troubleshooting Requests (reminder) We remind you that all the repair requests and other communication concerning the CERN machine buildings have to be transmitted to the TCR via 72201, whereas the ones concerning tertiary buildings are handled directly by the FM helpdesk under the phone number 77777, i.e. problems on systems and equ...

  13. E-mail security a pocket guide

    Furnell, Steven

    2010-01-01

    This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.

  14. Who Owns Your E-mail?

    Panepinto, Joe

    1995-01-01

    Examines recent findings that could influence the use of e-mail on university campuses. National privacy legislation and the inviolability of student records are discussed. It is concluded that more effective safeguards are necessary, and that the current steps are inadequate for the protection of students' rights. (Author/LRW)

  15. E-mail to SMS service change

    IT Department

    2010-01-01

    If you have a CERN e-mail account, you have probably already used one of the popular services that CERN’s IT Department offers to CERN users: the mail2SMS service. It allows any CERN e-mail account holder to send short messages (SMS) free of charge to CERN GSM phone numbers. Further to recent negotiations with our GSM operator, this service has been extended. It is now possible to send short messages free of charge to any Swiss mobile number. This extension of service aims at replacing the similar service that was made available by SWITCH(1) to CERN users (address: mobilenumber@sms.switch.ch). Because of repeated abuse, this service will be definitively stopped for CERN users on 15th January 2010. Please keep in mind that CERN’s e-mail to SMS service still has some restrictions: messages can only be sent from CERN mail accounts, and not from personal ones, such as GMAIL, MSN, Yahoo; the maximum length of the message is 160 characters (standard maximum SMS length); and only Swiss mobile...

  16. Fluctuation in e-mail sizes weakens power-law correlations in e-mail flow

    Matsubara, Yoshitsugu; Tadaki, Shin-ichi

    2013-01-01

    Power-law correlations have been observed in packet flow over the Internet. The possible origin of these correlations includes demand for Internet services. We observe the demand for e-mail services in an organization, and analyze correlations in the flow and the sequence of send requests using a Detrended Fluctuation Analysis (DFA). The correlation in the flow is found to be weaker than that in the send requests. Four types of artificial flow are constructed to investigate the effects of fluctuations in e-mail sizes. As a result, we find that the correlation in the flow originates from that in the sequence of send requests. The strength of the power-law correlation decreases as a function of the ratio of the standard deviation of e-mail sizes to their average.

  17. How to Use E-Mails for Business

    N.J.Stirk

    2004-01-01

    @@ E-mail is a quick and convenient way of communicating. It is faster than a letter and often more convenient than a telephone call. You are probably used to exchanging e-mail with friends using highly informal language.In this article you will learn more about the form and language of e-mail in professional contexts.

  18. Teleradiology applications with DICOM-e-mail

    Weisser, G.; Ruggiero, S.; Runa, A. [University Hospital Mannheim, Department of Clinical Radiology, Mannheim (Germany); Engelmann, U. [German Cancer Research Center, Division of Medical and Biological Informatics, Heidelberg (Germany); Schroeter, A. [CHILI GmbH, Heidelberg (Germany); Baur, S. [Curagita AG, Heidelberg (Germany); Walz, M. [Medical Office for Quality Assurance in Radiology, Hessen (Germany)

    2007-05-15

    For the connection of several partners to a Dicom-e-mail based teleradiology network concepts were developed to allow the integration of different teleradiology applications. The organisational and technical needs for such an integration were analysed. More than 60 institutions including 23 hospitals in the Rhein-Neckar-Region, Germany were connected. The needed functionality was grouped in six teleradiology applications (emergency consultation, tele-guided examinations, expert consultations, cooperative work, scientific cooperations and homework with on call services) and their technical and organisational needs according to availability, speed of transfer, workflow definitions and data security needs was analysed. For the local integration of teleradiology services the setup and workflow is presented for a standalone teleradiology workstation and a server based teleradiology gateway. The line type needed for different groups of applications and users is defined. The security concept and fallback strategies are laid out, potential security problems and sources of errors are discussed. The specialties for the emergency teleradiology application are presented. The DICOM-e-mail protocol is a flexible and powerful protocol that can be used for a variety of teleradiology applications. It can meet the conditions for emergency applications but is limited if synchronous applications like teleconferences are needed. (orig.)

  19. Teleradiology applications with DICOM-e-mail.

    Weisser, G; Engelmann, U; Ruggiero, S; Runa, A; Schröter, A; Baur, S; Walz, M

    2007-05-01

    For the connection of several partners to a Dicom-e-mail based teleradiology network concepts were developed to allow the integration of different teleradiology applications. The organisational and technical needs for such an integration were analysed. More than 60 institutions including 23 hospitals in the Rhein-Neckar-Region, Germany were connected. The needed functionality was grouped in six teleradiology applications (emergency consultation, tele-guided examinations, expert consultations, cooperative work, scientific cooperations and homework with on call services) and their technical and organisational needs according to availability, speed of transfer, workflow definitions and data security needs was analysed. For the local integration of teleradiology services the setup and workflow is presented for a standalone teleradiology workstation and a server based teleradiology gateway. The line type needed for different groups of applications and users is defined. The security concept and fallback strategies are laid out, potential security problems and sources of errors are discussed. The specialties for the emergency teleradiology application are presented. The DICOM-e-mail protocol is a flexible and powerful protocol that can be used for a variety of teleradiology applications. It can meet the conditions for emergency applications but is limited if synchronous applications like teleconferences are needed. PMID:17031452

  20. Teleradiology applications with DICOM-e-mail

    For the connection of several partners to a Dicom-e-mail based teleradiology network concepts were developed to allow the integration of different teleradiology applications. The organisational and technical needs for such an integration were analysed. More than 60 institutions including 23 hospitals in the Rhein-Neckar-Region, Germany were connected. The needed functionality was grouped in six teleradiology applications (emergency consultation, tele-guided examinations, expert consultations, cooperative work, scientific cooperations and homework with on call services) and their technical and organisational needs according to availability, speed of transfer, workflow definitions and data security needs was analysed. For the local integration of teleradiology services the setup and workflow is presented for a standalone teleradiology workstation and a server based teleradiology gateway. The line type needed for different groups of applications and users is defined. The security concept and fallback strategies are laid out, potential security problems and sources of errors are discussed. The specialties for the emergency teleradiology application are presented. The DICOM-e-mail protocol is a flexible and powerful protocol that can be used for a variety of teleradiology applications. It can meet the conditions for emergency applications but is limited if synchronous applications like teleconferences are needed. (orig.)

  1. Techniques and Tools for Forensic Investigation of E-mail

    M. Tariq Banday

    2011-12-01

    Full Text Available E-mail has emerged as the most important application on Internet for communication of messages, delivery of documents and carrying out of transactions and is used not only from computers but many other electronic gadgets like mobile phones. Over a period of year’s e-mail protocols have been secured through several security extensions and producers, however, cybercriminals continue to misuse it for illegitimate purposes by sending spam, phishing e-mails, distributing child pornography, and hate emails besides propagating viruses, worms, hoaxes and Trojan horses. Further, Internet infrastructure misuse through denial of service, waste of storage space and computational resources are costing everyInternet user directly or indirectly. It is thus essential to identify and eliminate users and machines misusing e-mail service. E-mail forensic analysis is used to study the source and content of e-mail message as evidence, identifying the actual sender, recipient and date and time it was sent, etc. to collect credible evidence to bring criminals to justice. This paper is an attempt to illustrate e-mail architecture from forensics perspective. It describes roles and responsibilities of different e-mail actors and components, itemizes meta-data contained in e-mail headers, and lists protocols and ports used in it. It further describes various tools and techniques currently employed to carry out forensic investigation of an e-mail message.

  2. Fluctuation in e-mail sizes weakens power-law correlations in e-mail flow

    Matsubara, Yoshitsugu; Hieida, Yasuhiro; Tadaki, Shin-ichi

    2013-01-01

    Power-law correlations have been observed in packet flow over the Internet. The possible origin of these correlations includes demand for Internet services. We observe the demand for e-mail services in an organization, and analyze correlations in the flow and the sequence of send requests using a Detrended Fluctuation Analysis (DFA). The correlation in the flow is found to be weaker than that in the send requests. Four types of artificial flow are constructed to investigate the effects of flu...

  3. The Discourse of all.department e-mails

    Pogner, Karl-Heinz; Søderberg, Anne-Marie

    2001-01-01

    which social relations are expressed and constructed in the e-mail discourse and how the organizational world of the department is represented in the all.department e-mails. Our analyses of the e-mails show that the managerial voices are dominant as well as the perception of e-mail communication...... as a tool of information transmission. However, a few e-mails sent by employees without specific organizational functions differ significantly from the `managerial' mails. In these mails employee voices articulate a latent and unfulfilled need for a community and a forum for dialogue. The usage of the all.......department e-mail communication is also related to the ongoing change of managing university departments in Denmark....

  4. Techniques and Tools for Forensic Investigation of E-mail

    M. Tariq Banday

    2011-01-01

    E-mail has emerged as the most important application on Internet for communication of messages, delivery of documents and carrying out of transactions and is used not only from computers but many other electronic gadgets like mobile phones. Over a period of year’s e-mail protocols have been secured through several security extensions and producers, however, cybercriminals continue to misuse it for illegitimate purposes by sending spam, phishing e-mails, distributing child pornography, and ha...

  5. E-MAIL USAGE BEHAVIOR AT WORK: THE PORTUGUESE CASE

    Rui Filipe Cerqueira Quaresma; Sílvia Paula Rosa da Silva; Cristina Galamba Marreiros

    2013-01-01

    E-mail is one of the most used information and communication technologies by organizations. This technology has an enormous potential to transform the way organizations and their processes work. E-mail can speed-up processes and transaction, facilitate information exchange, improve quality, increase employees speed and productivity, and strengthen the relationship with stakeholders. The present paper analysis e-mail usage behavior at work, through empirical data collected in Portugal. The maj...

  6. ssignment's assessment and management of university students via e- mail

    Mostafa Ghaderi

    2013-12-01

    Full Text Available E-mail is one of online teaching means that has prospered recently in universities. That is to say that there is a short term background of using E-mail for assignments’ management and assessment. In this study, I investigated different dimensions of E- mail applicability and usefulness for assessing assignments and its strength and weaknesses among fresh students. For this intention, I based my case study on 158 students in three courses and one professor during a semester. By monitoring case studies and observing self-report checklists I investigated the behaviours of students and their E-mails. The results showed that speed of transmission and giving feedback is much higher than the other current methods. Possibility of electronic search for assignments, giving feedback to students without time and place restriction, group feedbacks and guidance, and reinforcement of teaching – learning in informal times are advantages of using E-mail as a tool for assignment management. However, using E- mail has some limitations, too. Restricting communication to writing, prolonged individual feedbacks, repetitive E- mails, misunderstanding and technical problems among novice students are weaknesses of using e- mail for assessing assignments. At the end I’ll offer some recommendations to make E- mail an effective means for assignments’ assessment.

  7. E-MAIL USAGE BEHAVIOR AT WORK: THE PORTUGUESE CASE

    Rui Filipe Cerqueira Quaresma

    2013-04-01

    Full Text Available E-mail is one of the most used information and communication technologies by organizations. This technology has an enormous potential to transform the way organizations and their processes work. E-mail can speed-up processes and transaction, facilitate information exchange, improve quality, increase employees speed and productivity, and strengthen the relationship with stakeholders. The present paper analysis e-mail usage behavior at work, through empirical data collected in Portugal. The majority of users reveal adequate e-mail usage behavior, in spite of some situations that might prove to be problematic to organizations.

  8. E-Mail at Work: Is it Really Private?

    Rosenblum, Cindy

    This paper examines the controversy of e-mail privacy in the workplace. Once an employee uses an e-mail system that belongs to the employer, according to recent case law, their privacy rights are forfeited. Employers will now have to start creating policies to safeguard themselves from expensive litigation, and employees will have to be more…

  9. Teacher Talk on E-Mail. Current Conversations.

    Whitaker, Elaine; Hill, Elaine

    1996-01-01

    A high school and a university teacher converse via e-mail concerning their cooperative project in electronic literacy. The conversation highlights the frustrations of system crashes, student successes and failures, and the beginning of one teacher's dissertation. References to technology include experiences with e-mail, an LCD panel, and closed…

  10. Technology Corner: Analysing E-mail Headers For Forensic Investigation

    M. Tariq Banday

    2011-06-01

    Full Text Available Electronic Mail (E-Mail, which is one of the most widely used applications of Internet, has become a global communication infrastructure service.  However, security loopholes in it enable cybercriminals to misuse it by forging its headers or by sending it anonymously for illegitimate purposes, leading to e-mail forgeries. E-mail messages include transit handling envelope and trace information in the form of structured fields which are not stripped after messages are delivered, leaving a detailed record of e-mail transactions.  A detailed header analysis can be used to map the networks traversed by messages, including information on the messaging software and patching policies of clients and gateways, etc. Cyber forensic e-mail analysis is employed to collect credible evidence to bring criminals to justice. This paper projects the need for e-mail forensic investigation and lists various methods and tools used for its realization. A detailed header analysis of a multiple tactic spoofed e-mail message is carried out in this paper. It also discusses various possibilities for detection of spoofed headers and identification of its originator. Further, difficulties that may be faced by investigators during forensic investigation of an e-mail message have been discussed along with their possible solutions.

  11. Save our inboxes! Use e-mail wisely

    Achintya Rao

    2013-01-01

    At CERN, with collaborators all over the world, e-mail is inevitably the primary means of communication: we use it for everything from coordinating projects to organising lunches. But e-mail can also be one of the most inefficient means of communication we have! Here's how to fix it.   Let’s get straight to the point: we receive too many e-mails. Think about all the e-mails that you deleted without a second thought. Think about the times you’ve unnecessarily been in CC. Take a look at the unread e-mails sitting in your inbox at this very moment, ones that you have no intention of ever looking at. You can, however, tame this overload with a few simple measures and turn e-mail into an important communication and productivity tool. Many recommendations for improving e-mail etiquette suggest an abrasive approach riddled with bullet points. In a vastly multi-cultural setting such as CERN, however this approach may fail. So, here are a few dos and don’ts based o...

  12. Consumers and Computer Software Advertisements in Spam E - mail

    Joshua Fogel

    2012-08-01

    Full Text Available Spam e - mail inundates inboxes. Little is known about consumer responses to spam e - mail advertising computer software products. We conducted a study among 200 college students to determine variables associated both with opening/reading spam e mail about computer software products and w ith purchasing these items. With regard to opening/reading, we found that increasing age (OR:1.22, 95% CI:1.02, 1.47; p=0.03, previously responding to fraudulent e - mail (OR:2.91, 95% CI:1.31, 6.46; p=0.01, and wanting to learn more information online ab out computer software (OR:1.72, 95% CI:1.12, 2.64; p=0.01 had significant associations. With regard to purchasing, we found that wanting to learn more information online about computer software had a significant association (OR:2.47, 95% CI:1.32, 4.60; p= 0.01 and previously responding to fraudulent e - mail approached significance (OR:2.55, 95% CI:0.99, 6.58; p=0.052. E thical e - mail advertisers would benefit when advertising computer software products to include in the e - mail relevant information about l e arn ing more information online about computer so ftware. This can encourage the recipient to click - through and purchase the advertised computer software product.

  13. Toward Parameterisation of E-mail Mediated Communication

    Mirta Galesic; Josip Stepanic

    2003-01-01

    E-mail mediated communication rapidly intensifies, both in quantity and quality and so does the need to understand its psycho-social context. In this article we formulated a model of psycho-social elements of the process of receiving an e-mail. The corresponding technique starts by recognising the relevant states of a human receiver and a received e-mail. The states are parameterised, paying special attention to the description of receiver's emotional states, as the event of receiving is more...

  14. E-mail Interaction in Foreign Language Learning

    任艳

    2007-01-01

    E-mail has been implemented in foreign langnage learning and teaching for many years.It is widely approved that language learners'communicative competence and intereuhural competence can be developed through e-mail interaction in spite of the problems and difficulties existing in the process of designing and carrying out ofan e-mail project.Hence,more and more language teachers from different countries are trying to search for the possibilities of integrating email interaction in their teaching context so as to improve the language-learning environment.

  15. IntegraTUM Teilprojekt E-Mail: Rezentralisierung von E-Mail-Services

    Diehn, Max; Haarer, Ado; Schreiner, Alexander; Storz, Michael

    Das Teilprojekt E-Mail hatte ursprünglich die Aufgabe einen zentralen Mailservice mit verteilter Administration der Mailadressen für die TUM aufzubauen und diesen durch Anti-Spam- und Anti-Viren-Maßnahmen zu schützen. Auf diesen Mailservice sollten sowohl die am LRZ gehosteten Maildomains als auch die vielen lokal betriebenen Mailserver - soweit von deren Betreibern gewünscht - migriert werden. Neben einigen Rückschlägen und Hindernissen kam es im Laufe des Projektes auch zu einer Änderung der Anforderungen, sodass zum Ende des Projektes statt eines reinen Mailsystems ein Doppelsystem mit "shared SMTP address space" bestehend aus einem klassischen Message-Store mit POP/IMAP-Zugriff auf Basis von Postfix + Dovecot und einem Groupware-System auf Basis von Microsoft Exchange in Produktion ging, wobei jeder Mitarbeiter und Student der TUM wählen kann, auf welchem der beiden Systeme sich seine Mailbox befindet.

  16. Servicii de referinţe prin e-mail

    Coravu, Robert

    2000-01-01

    Among the digital reference services category, e-mail reference services have known the most rapid spreading inside the library world. This study analyses the main aspects of e-mail reference services (service parameters, elements of a query form, the characteristics of electronic messages sent during the reference process). Also, the advantages and disadvantages of this reference services are presented, suggesting a few strategies for rising their efficiency.

  17. Machine Learning Methods for Spam E-Mail Classification

    W. A. Awad; S. M. Elseuofi

    2011-01-01

    The increasing volume of unsolicited bulk e-mail (also known as spam) has generated a need for reliable anti-spam filters. Machine learning techniques now days used to automatically filter the spam e-mail in avery successful rate. In this paper we review some of the most popular machine learning methods (Bayesian classification, k-NN, ANNs, SVMs, Artificial immune system and Rough sets) and of their applicability to the problem of spam Email classification. Descriptions of the algorithms are ...

  18. Discourse strategies in professional e-mail negotiation

    Jensen, Astrid

    2009-01-01

    The purpose of this article is to report on some of the preliminary results of an on-going study on the use of discourse strategies in e-mail negotiation. The analysis aims at showing how relations between the participants develop through the use of specific discourse strategies in their e......-mail communication which covers a period of three months, during which the relationship progresses from initial contact to on-going business. Drawing on Hyland's (2005) concept of metadiscourse combined with Charles' (1996) categories of ‘old and new relationship negotiations', this study provides insights...... into naturally occurring language in an e-mail communication between a Danish Company and its business contact in Taiwan. During the three-month period observed, the frequency in use of interpersonal strategies converges as the relationship progresses towards a more contextually stable and more personalised...

  19. BEWARE OF OPENING ATTACHMENTS IN E-MAIL

    2000-01-01

    Following the recent e-mail viruses you are asked to be cautious when opening e-mail attachments on your PC. Attachments that are apparently harmless might hide active content producing nasty effects as soon as they are opened. Some of these so called 'Trojan horses' can conceal themselves in very attractive pictures and funny slide shows.On the PC Windows infrastructure, CERN runs software to protect users from known viruses, but new ones can sometimes arrive before our software recognises them. They can enter your system when you open an attachment. To remove them it may be necessary to re-install the Windows software on your PC.

  20. Machine Learning Methods for Spam E-Mail Classification

    W.A. Awad

    2011-02-01

    Full Text Available The increasing volume of unsolicited bulk e-mail (also known as spam has generated a need for reliable anti-spam filters. Machine learning techniques now days used to automatically filter the spam e-mail in avery successful rate. In this paper we review some of the most popular machine learning methods (Bayesian classification, k-NN, ANNs, SVMs, Artificial immune system and Rough sets and of their applicability to the problem of spam Email classification. Descriptions of the algorithms are presented,and the comparison of their performance on the SpamAssassin spam corpus is presented.

  1. Hesitative introduction of E-mail consultations in general practice.

    Verheij, R.; Ton, C.; Tates, K.

    2008-01-01

    Introduction: The Dutch Council for Public Health and Health Care reported in 2005 that 70% of internet users would want to have the opportunity to consult their own general practitioner by e-mail [1]. Since January 1, 2006, general practitioners in the Netherlands are reimbursed 4.50 euro for e-mail consultations, on the condition that it does not concern a new health problem and that it substitutes for a normal practice consultation. In this presentation we will investigate how many doctors...

  2. Detecting Threat E-mails using Bayesian Approach

    Banday, M Tariq; Jan, Tariq R; Shah, Nisar A

    2011-01-01

    Fraud and terrorism have a close connect in terms of the processes that enables and promote them. In the era of Internet, its various services that include Web, e-mail, social networks, blogs, instant messaging, chats, etc. are used in terrorism not only for communication but also for i) creation of ideology, ii) resource gathering, iii) recruitment, indoctrination and training, iv) creation of terror network, and v) information gathering. A major challenge for law enforcement and intelligence agencies is efficient and accurate gathering of relevant and growing volume of crime data. This paper reports on use of established Na\\"ive Bayesian filter for classification of threat e-mails. Efficiency in filtering threat e-mail by use of three different Na\\"ive Bayesian filter approaches i.e. single keywords, weighted multiple keywords and weighted multiple keywords with keyword context matching are evaluated on a threat e-mail corpus created by extracting data from sources that are very close to terrorism.

  3. SPAM: Beware of e-mails asking for passwords

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake e-mails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake e-mail message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, but future cases may still occur. Users need to be vigilant regarding any requests for passwords or personal data. Fake e-mails should be immediately deleted. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN IT Department

  4. Keypals--E-mail Leads to New Friends.

    Durost, Dennis D.; Hutchinson, Sue L.

    1997-01-01

    Describes the Keypal Project, a project in which e-mail was introduced in two kindergarten classes with the intent to enrich children's literacy and communication skills and foster long-distance relationships. Found the project had great learning potential and was easily incorporated into constructivist programs which emphasize active learning.…

  5. E-Mail as a Resource in Teacher Education.

    Maarof, Nooreiny

    Use of electronic mail (e-mail) as a resource in a Universiti Kebangsaen Malaysia (UKM) English-as-a-Second-Language (ESL) teacher education course in 1997-98 is described. The second-year undergraduate course, "The Teaching of Reading Skills in an ESL Context," enrolled 115 students with a range of experience with computers. One course project…

  6. Ratsuchende von E-Mail-Beratungsdiensten: Entwurf einer Typologie

    Marc Weinhardt

    2010-04-01

    Full Text Available KlientInnen von vier nach dem Prinzip der maximalen Variation ausgewählten E-Mail- Beratungsdiensten wurden mit einem standardisierten Onlinefragebogen zur Internetnutzung, der nachgesuchten Beratung, ihres Persönlichkeitsprofils und soziodemographischen Hintergrundvariablen befragt. Mit Hilfe von Faktoren- und Clusteranalyse konnten vier Gruppen von Ratsuchenden isoliert werden, die sich zu vier KliententInnentypen verdichten lassen.

  7. Detecting Threat E-mails using Bayesian Approach

    Banday, M. Tariq; Qadri, Jameel A.; Tariq .R. Jan; Shah, Nisar A.

    2011-01-01

    Fraud and terrorism have a close connect in terms of the processes that enables and promote them. In the era of Internet, its various services that include Web, e-mail, social networks, blogs, instant messaging, chats, etc. are used in terrorism not only for communication but also for i) creation of ideology, ii) resource gathering, iii) recruitment, indoctrination and training, iv) creation of terror network, and v) information gathering. A major challenge for law enforcement and intelligenc...

  8. PARTIAL IMAGE SPAM E-MAIL DETECTION USING OCR

    V. Sathiya*1 M.Divakar#2 T.S. Sumi*3

    2011-06-01

    Full Text Available Even though there a number of inbuilt E-mail filtering software associated with every e-mailservice providers like Gmail, Yahoo mail they identify only text spam and image spam. As a result they could not detect the mix image spam. So this paper concentrates on identifying and avoiding partial image spam whenever it is received to our email inbox by an unknown source across the Internet.

  9. Analyzing E-mail communication of prospective learners

    Anurag SAXENA

    2005-10-01

    Full Text Available Analyzing E-mail communication of prospective learners Vibha JOSHIAnurag SAXENA Reader School of Management IGNOU, New Delhi, INDIA ABSTRACT Today, computer has replaced all means of communication significantly. E-mail is the most popular means of communication through computers. It has vanished the boundaries between the cities, countries and continents. Earlier Studies that used this medium, had shown evidence of higher quality of responses and also significant cost savings feature of this method (mainly for convenience of dispatch for research purposes. In this communication, an attempt has been made to utilize email responses of prospective learners in education discipline based programs offered through open learning system. The inception of this study is linked to the creation of website (http://www.ignou.ac.in/ and availability of information related to all activated and prospective programs of studies, various school of studies, faculty email addresses and faculty vis-à-vis program coordinator in the University. The present study analyzed 65 email responses received from July 2002 to till date by the researcher on her email ID. These respondents got the email ID from the University website and due to their eagerness to attain qualifications in the field of education/guidance/educational management, sent an e-mail to the program coordinator(s. These email responses were analyzed in order to visualize the learner profiles and viability of the ongoing as well as prospective programs of studies. This paper tries to analyze the e-mail responses of the people who either by surfing IGNOU’s website or from other sources came to know about the various programs of studies offered by the School of Education. The study validates that there is an amount of hidden information even in the curiosity of the learners.

  10. E-mail Classification using Social Network Information

    Borg, Anton; Lavesson, Niklas

    2012-01-01

    A majority of E-mail is suspected to be spam. Traditional spam detection fails to differentiate between user needs and evolving social relationships. Online Social Networks (OSNs) contain more and more social information, contributed by users. OSN information may be used to improve spam detection. This paper presents a method that can use several social networks for detecting spam and a set of metrics for representing OSN data. The paper investigates the impact of using social network data ex...

  11. Report on Climate Change E-mails Exonerates Scientists

    Showstack, Randy

    2010-07-01

    A new report commissioned by the University of East Anglia (UEA) has largely exonerated climate scientists from the university's Climatic Research Unit (CRU) who wrote a number of controversial e-mail messages that were made public without authorization in November 2009. Critics have argued that the e-mails indicate that scientists had tampered with scientific data—including data related to land station temperatures and temperature reconstructions from tree ring analysis—subverted the peer review process, misused the Intergovernmental Panel on Climate Change (IPCC) process, and withheld data from critics. At a 7 July news conference to release the “Independent climate change e-mails review,” report chair Muir Russell said, “Climate science is a matter of such global importance that the highest standards of honesty, rigor, and openness are needed in its conduct. On the specific allegations made against the behavior of CRU scientists, we find that their rigor and honesty as scientists are not in doubt.” He continued, “In addition, we do not find that their behavior has prejudiced the balance of advice given to policy makers. In particular, we did not find any evidence of behavior that might undermine the conclusions of the IPCC assessments.” Russell is chair of the Judicial Appointments Board for Scotland and formerly was principal and vice-chancellor of the University of Glasgow, in Scotland.

  12. Research on an E-mail Encryption Protocol Based on Quantum Teleportation

    Shufen, Xiao; Yumin, Dong; Hongyang, Ma; Libo, Chen

    2016-07-01

    With the rapid development of information technology (IT), E-mail has become an important communication tool between human beings. Meanwhile, E-mail safety becomes increasingly important because of its universal applications. In order to overcome shortages of classical E-mail encryption, an E-mail encryption protocol based on quantum teleportation was proposed. It makes quantum encryption of E-mails during sending and receiving processes by taking advantages of entanglement and nonclonability of quantum, thus ensuring safety and reliability of E-mail transmission.

  13. Demonstration of an E-mailed Worksite Nutrition Intervention Program

    Gladys Block

    2004-10-01

    Full Text Available Introduction Dietary fat and low fruit and vegetable intake are linked to many chronic diseases, and U.S. population intake does not meet recommendations. Interventions are needed that incorporate effective behavior-change principles and that can be delivered inexpensively to large segments of the population. Methods Employees at a corporate worksite were invited to participate in a program, delivered entirely by e-mail, to reduce dietary fat and increase fruit and vegetable intake. Behavior-change principles underlying the intervention included tailoring to the participant’s dietary lifestyle, baseline assessment and feedback about dietary intake, family participation, and goal setting. Assessment, tailoring, and delivery was fully automated. The program was delivered weekly to participants’ e-mail inboxes for 12 weeks. Each e-mail included information on nutrition or on the relationship between diet and health, dietary tips tailored to the individual, and small goals to try for the next week. In this nonrandomized pilot study, we assessed technical feasibility, acceptability to employees, improvement in Stage of Change, increase in fruit and vegetable consumption, and decrease in fat intake. Results Approximately one third (n = 84 of employees who were offered the 12-week program signed up for it, and satisfaction was high. There was significant improvement in Stage of Change: 74% of those not already at the top had forward movement (P < .001. In addition, results suggest significant increase in fruit and vegetable consumption (0.73 times/day, P < .001 and significant decrease in intake of fat sources (-0.39 times/day, P < .001. Conclusion This inexpensive program is feasible and appears to be effective. A randomized controlled trial is needed.

  14. Consumers with Sexual Performance Problems and Spam E - mail for Sexual Performance Products

    Joshua Fogel; Sam Shlivko

    2009-01-01

    Spam e - mail on sexual health topics arrive in e - mail inboxes. We study consumer responses to spam e - mail that advertise sexual performance products. Participants (n=200) with and without sexual performance problems were asked if they received, opened, and bought products from spam e - mail about sexual performance produ cts in the past year. Comparisons were performed between those with and without sexual performance problems. Psycho...

  15. An AIS-Based E-mail Classification Method

    Qing, Jinjian; Mao, Ruilong; Bie, Rongfang; Gao, Xiao-Zhi

    This paper proposes a new e-mail classification method based on the Artificial Immune System (AIS), which is endowed with good diversity and self-adaptive ability by using the immune learning, immune memory, and immune recognition. In our method, the features of spam and non-spam extracted from the training sets are combined together, and the number of false positives (non-spam messages that are incorrectly classified as spam) can be reduced. The experimental results demonstrate that this method is effective in reducing the false rate.

  16. Communicative In-Betweens of E-mail Communication

    Hansen, Ejvind

    2009-01-01

    In this paper I seek to deconstruct internet-based communication. I highlight Derrida’s focus on the margins and in-betweens of communication, and relate it to the genre of e-mail. I argue (i) that the silence between the dialogic turns becomes more marked, while (ii) the separation of present...... and previous statements becomes less marked. The visibility of the silence between the turns (i) can be a resource for increased awareness of how communicative exchanges are shaped by self-arrangements and -presentations. The dissolution of the separation between present and previous statements (ii) can...

  17. Unsolicited Commercial E-mails : A study of the consumer’s perceptions about unsolicited commercial e-mails and the implications it has for Internet user groups

    Trasobares, Mario; Tretjakova, Anna

    2010-01-01

    The rapid development of Internet technologies has led to the emergence of new communication means. E-mail has become a new powerful tool used by millions with the main purpose of exchanging information. Considering its large scope, marketers have been using the e-mail as an important direct marketing force and it has become a popular choice for many companies. The e-mail has therefore constituted a new form of on-line marketing coined “E-mail marketing”. However, the increasing use of the e-...

  18. The Application of E-Mail to College English Teaching in China

    Wang, Guofeng

    2010-01-01

    With the development of information technology in the past 10 years, e-mail has been widely used in the field of English teaching. This paper, based on an analysis of the ways of using e-mail in college English teaching in China, probes the feasibility and the benefits of application of e-mail to college English teaching.

  19. The Role of E-mail in Organizational Communication

    Lecturer Ph.D. Niculina Vârgolici

    2008-12-01

    Full Text Available The present article aims to briefly describe the advantages of the e-mail communication,the constraints of such communication means, as well as a set of rules which should be complied with inorder to ensure efficient organizational communication. The fact that communication is such a universal,normal, daily and natural can make us forget sometimes about its particular complexity. Every moment,people communicate with one another, meaning they exchange information, and for this they use variousmeans. Electronic message is an invention which makes our life easier, shatters distances and inhibitions,helps us rediscover and open ourselves to others, casts loneliness away, can bring us closer, but also can setus apart, because it has its rules and traps, of which we should be aware. We consider that nowadays knowingthe e-mail related conduit refers to more than simply avoiding long messages written in caps lock, assuch can really make a difference between profit and loss. Communication is indispensable, but we shouldcompare and view any information we receive and send with a critical sight.

  20. Ombuds' corner: Code of Conduct and e-mails

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Luke* holds a key position in the coordination of a large project. He is also a recognized expert in modeling complicated structures. Because of his expertise in the field, he receives a considerable number of e-mails every day which he has trouble responding to in addition to his responsibilities of management and development. Constantly interrupted, he tends to answer his emails quickly, sometimes even in an instinctive way, which leads to somewhat laconic messages. One day he receives an e-mail from Dave* challenging some of the decisions taken by the project’s management. Luke agrees with Dave’s remarks, which seem justified given his own expertise of the su...

  1. A novel approach against E-mail attacks derived from user-awareness based techniques

    Ojha, Gaurav; Tak, Gaurav Kumar

    2012-01-01

    A large part of modern day communications are carried out through the medium of E-mails, especially corporate communications. More and more people are using E-mail for personal uses too. Companies also send notifications to their customers in E-mail. In fact, in the Multinational business scenario E-mail is the most convenient and sought-after method of communication. Important features of E-mail such as its speed, reliability, efficient storage options and a large number of added facilities ...

  2. A Detection Method of FAQ Matching Inquiry E-mails by Automatic Generation of Characteristic Word Groups from Past Inquiry E-mails

    Sakumichi, Yuki; Akiyoshi, Masanori; Samejima, Masaki; Oka, Hironori

    This paper discusses how to detect the inquiry e-mails corresponding to pre-defined FAQs (Frequently Asked Questions). Web-based interactions such as order and registration form on a Web page are usually provided with their FAQ pages for helping a user. However, most users submit their inquiry e-mails without checking such pages. This causes a help desk operator to process lots of e-mails even if some contents match FAQs. Automatic detecting of such e-mails is proposed based on SVM (Support Vector Machine) and specific Jaccard coefficient based on positive and negative already-received inquiry e-mails. Experimental results show its effectiveness, and we also discuss future work to improve our method.

  3. E-mail security: mail clients must use encrypted protocols

    2006-01-01

    In the coming weeks, users of mail clients other than Outlook (e.g. Pine, Mozilla, Mac Mail, etc.) may receive an e-mail from Mail-service@cern.ch with instructions to update the security settings of their mail client. The aim of this campaign is to enforce the use of encrypted and authenticated mail protocols in order to prevent the propagation of viruses and protect passwords from theft. As a first step, from 6 June 2006 onwards, access to mail servers from outside CERN will require a securely configured mail client as described in the help page http://cern.ch/mmmservices/Help/?kbid=191040. On this page most users will also find tools that will update their mail client settings automatically. Note that Outlook clients and WebMail access are not affected. The Mail Team

  4. FAX

    Burgoyne, Greig

    2014-01-01

    Greig Burgoyne was an invited artist for this international touring show organised by The Drawing Centre, New York. Artists included David Blandy, Paul Buck, Heman Chong, Jacob Dahl Jurgenson, Marko Mäetamm, Jacopo Miliani, Sladjan Nedeljkovic, Clunie Reid, Martha Rosler, Josef Strau, and Richard Wentworth. The exhibition was guest curated by João Ribas, in collaboration with Carl Slater, and co-organised by The Drawing Center, and Independent Curators International (ICI), New York. ...

  5. E-mail netiquette for the medical practice employee: 50 do's and don'ts.

    Hills, Laura

    2011-01-01

    E-mail has at one and the same time become a primary communication tool for many medical practice employees and a source of untold frustration, misunderstandings, and stress. This article provides a total of 50 rules (25 do's and 25 don'ts) for e-mail netiquette to help medical practice employees use e-mail more effectively. It offers suggestions about the optimal format of e-mails, tips for writing concise e-mail texts, and guidance about the most pressing e-mail privacy and confidentiality concerns. Medical practice employees can use the practical tips presented in this article to help them save time and use their medical practices' e-mail system more productively and effectively. This article also offers suggestions for creating and using a medical practice e-mail disclaimer statement. It describes the six legal threats a disclaimer statement can prevent and the typical content for such disclaimers. Finally, this article includes guidance about creating and implementing a medical practice e-mail policy and provides an outline of typical e-mail policy content. PMID:22111286

  6. THE DEVELOPMENT OF E-MAIL LITERACY: FROM WRITING TO PEERS TO WRITING TO AUTHORITY FIGURES

    Chi-Fen Emily Chen

    2006-05-01

    Full Text Available Though e-mail has become a common interpersonal communication medium, it does not mean that this medium is used without difficulty. While people can write e-mails to peers in any manner they like, writing e-mails to authority figures requires higher pragmatic competence and critical language awareness of how discourse shapes and reflects power asymmetry in an institutional context. For L2 learners, the challenge of composing this type of e-mail can be greater due not only to their limited linguistic ability but also their unfamiliarity with the target culture's norms and values. To provide a deeper understanding of how an L2 learner develops e-mail literacy in the target language environment, this paper presents a longitudinal case study of a Taiwanese graduate student’s e-mail practice in English during her studies at a U.S. university for two and a half years. Using a critical discourse analysis approach, the study reveals the complexity of an L2 learner’s evolving e-mail practice and struggle for appropriateness, particularly in her e-mail communication with professors. Her development of e-mail literacy is discussed in relation to her evolving understanding of the e-mail medium, changing performance of student identity, increasing knowledge of student-professor interaction and realization of culture-specific politeness.

  7. E-mail Communication in the Management of Gastroenterology Patients: A Review

    Ian Plener; Andrew Hayward; Fred Saibil

    2014-01-01

    E-mail correspondence between physicians and patients can be a useful tool to improve communication efficiency, provide economic and ecological benefits, improve therapeutic interventions and adherence, and enhance self-management. The model of self-management in chronic disease has become an integral component of North American and British medicine. From a practical standpoint, the use of e-mail between physicians and patients can complement the self-management model.E-mail communication has...

  8. Digitale Kommunikation: Der Einfluss intramedialer Kontextinformationen auf den Aufwand im E-Mail-Management

    Heueis, Rainer

    2010-01-01

    An increasing appearance of E-Mails in corporations has led to augmented complaints whilst processing such E-Mails. This ‘E-Mail overload’ is experienced as a burden by those employees, since their individual timings, their psychic and their cognitive abilities and capacities are utilized. This burden, which is more or less an unsolicited additional work, is considered as the main reason for the research work done in this dissertation. The thesis addresses this issue wi...

  9. Consumers with Sexual Performance Problems and Spam E - mail for Sexual Performance Products

    Joshua Fogel

    2009-05-01

    Full Text Available Spam e - mail on sexual health topics arrive in e - mail inboxes. We study consumer responses to spam e - mail that advertise sexual performance products. Participants (n=200 with and without sexual performance problems were asked if they received, opened, and bought products from spam e - mail about sexual performance produ cts in the past year. Comparisons were performed between those with and without sexual performance problems. Psychological factors of self esteem and perceived stress were measured. Those with sexual performance problems had significantly greater percent ages than those without sexual performance problems for receiving (100.0% versus 73.5%, p=0.024, opening (66.7% versus 11.4%, p<0.001, and purchasing products (46.7% versus 5.4%, p<0.001 from spam e - mail. In the multivariate logistic regression analyse s adjusting for demographics, psychological factors, and attitudes, those with sexual performance problems were significantly associated with opening (OR: 8.33, 95% CI: 1.95, 35.71, and purchasing products (OR: 7.98, 95% CI: 1.74, 36.73 from spam e - mail. Spam e - mail about sexual performance products are opened and purchased from, especially among those with sexual performance problems. There is a need for e - mail marketing and advertising of sexual performance products that meet ethical standards for e - mail delivery to consumers

  10. Implementation of Personalized E-Mail Prioritization-A Content Based Social Network Analysis

    K. Harini; UPPE.NANAJI

    2011-01-01

    Now a Day’s, Email is one of the most prevalent personal and business communication tool, but it exhibits some significant drawbacks. One of the drawback of this is the portion of e-mail is that spam, has increased dramatically in the past few years. A recent study showed that 52 percent of e-mail users say spam has made them less trusting of e-mail, and 25 percent say that the volume of spam has reduced their e-mail use. This crisis has prompted proposals for a broad spectrum of potential so...

  11. Securing E-mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

    Andri Zakariya

    2012-08-01

    Full Text Available One of the most popular internet services is electronic mail (e-mail. By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.

  12. Composing Effective and Efficient E-mails: A Primer for Pharmacy Practitioners.

    Summerfield, Marc R; Feemster, Agnes Ann

    2015-09-01

    This primer describes the purpose and importance of e-mail as a key communication medium in the workplace. It emphasizes clarity as a primary modality to enhance efficiency and effectiveness. Finally, the primer reviews elements of grammar, punctuation, and style that contribute to each e-mail's ability to meet language standards, enhance the writer's image, and successfully transmit information. PMID:26715801

  13. Con Artists Attack Colleges with Fake Help-Desk E-Mail

    Young, Jeffrey R.

    2008-01-01

    An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…

  14. The style of academic e-mails and conventional letters: contrastive analysis of four conversational routines

    Clyde Ancarno

    2005-04-01

    Full Text Available This paper presents the results of a corpus-based study which investigates the genre of academic email and more specifically its pragmatic dimension. Four conversational routines (thank yous, apologies, requests, offers are analysed and compared in two channels: academic e-mails and conventional print letters. In addition, data from both native and non-native speakers of English is considered, which sheds light on some of the differences found in the academic e-mail writing of learners of English. The findings indicate that academic e-mail is a relatively formal type of correspondence which is still largely influenced, as is to be expected, by the genre of the academic letter, and that as a genre, academic e-mail is in the process of formation or semi-formation. Finally, native speakers of English are found to be more informal than non-native speakers of English in academic e-mails.

  15. An Online Model on Evolving Phishing E-mail Detection and Classification Method

    Loai Bani Melhiml

    2011-01-01

    Full Text Available Phishing e-mails pose a serious threat to electronic commerce as they are used broadly to defraud both individuals and financial organizations on the Internet. Criminals lure online users into revealing their passwords or account numbers by sending e-mails as if they come legitimately from financial organizations; these users in turn update and/or provide their account and billing information. In the current study, propose a novel concept that adapts the Evolving Clustering Method for Classification (ECMC to build new model called the Phishing Evolving Clustering Method (PECM. PECM functions are based on the level of similarity between two groups of features of phishing e-mails. PECM model proved highly effective in terms of classifying e-mails into phishing e-mails or ham e-mails in online mode, speed and use of a one-pass algorithm. PECM also proved its capability to classify e-mail by decreasing the level of false positive and false negative rates while increasing the level of accuracy to 99.7%. The model was built to work in online mode and can learn continuously without consuming too much memory because it works on a one-pass algorithm. Therefore, data are accessed one time from the memory and then the rule is created depending on the evolution of the profile if the characteristics of the phishing e-mail have been changed. PECM is a clustering-based learning model that adaptive Evolving Clustering Method to distinguish between phishing e-mails and ham e-mails in online mode.

  16. Teleradiology with DICOM e-mail: recommendations of rate at GIT; Teleradiologie mit DICOM E-mail: Empfehlungen der rate at GIT

    Mildenberger, P.; Kaemmerer, M.; Klos, G.; Schuetze, B. [Klinik und Poliklinik fuer Radiologie, Johannes Gutenberg-Univ. Mainz (Germany); Engelmann, U. [Deutsches Krebsforschungszentrum, Abt. Medizinische und Biologische Informatik, Heidelberg (Germany); Ruggiero, S.; Runa, A.; Weisser, G. [Inst. fuer Klinische Radiologie, Universitaetsklinikum Mannheim (Germany); Schroeter, A. [CHILI GmbH, Heidelberg (Germany); Walz, M. [TUeV Industrie Service GmbH, TUeV-SUeD-Gruppe, Aerztliche Stelle fuer Qualitaetssicherung in der Radiologie, Eschborn (Germany)

    2005-05-01

    E-mail is ideal for ad-hoc connections in teleradiology. The DICOM standard offers the possibility to append DICOM data types as a MIME attachment to any e-mail, thus ensuring the transmission of the original DICOM data. Nevertheless, there are additional requirements (e.g. protection of data privacy) which must be obeyed. Because of the lack of given standards which would grant interoperability as well as manufacturer independence, teleradiology has not been established in Germany until today. Therefore, the IT-Team (Arbeitsgemeinschaft fuer Informationstechnologie, rate at GIT) of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) set up an initiative to standardise telemedicine by using e-mail. Its members agreed that an e-mail-based variant would be the most practicable way to a communication solution - as easy to implement as to use. In their opinion, e-mail represents the smallest common denominator for a safe data interchange that would fulfill the legal advantages for telemedicine in Germany. (orig.)

  17. E-mail-marketing – a new tool of communication policy institutions of higher education

    Svitlana Semenyuk

    2015-05-01

    Full Text Available Article concerns the theoretical concept of formation and development e-mail-of marketing in the educational marketing particular analyzed approaches to the content of the concept «e-mail-marketing", determines the essence his nature and benefits of other means of communication. Determined that the e-mail-marketingis an inexpensive, but simultaneously quite effective and financially viable tool for promotingof educational services to market and necessity of its use in communication activities of higher education. The basic components of e-mail-marketing: customer needs (potential university entrants, higher education opportunities existing satisfy the needs of university entrants, explore the possibilities of higher education competitors. Proved that the instrument is-mail-marketing is the e-mail-sending. It's inexpensive and fairly simple variant push-technology, which today is widely use because pure commercial sending gives effect without major financial investments. The article deals with methods of forming database of e-mail addresses of applicants and requirements for e-mails.

  18. Investigating e-mail overload in the South African banking industry

    E. Burger

    2007-11-01

    Full Text Available The information workers of today have a wide range of information sources available to make valuable decisions, so much so that it can lead to information overload. The purpose of this research was to investigate the extent of information overload in the South African banking industry. The empirical part of this study was done at the Standard Bank of South Africa, where 115 questionnaires were distributed to three categories of employees. It was found that e-mail is one of the most used computer-mediated applications and is used more than the World-Wide Web, instant messaging or peer-to-peer file sharing. Of the respondents, 65% felt overwhelmed by the amount of e-mails they received as 25% received more than 60 e-mails per day. A third of the respondents dedicated three hours or more to e-mails per day. Respondents agreed that the implementation of policies is important to ensure compliance with legislation, protection of privacy rights and copyright, and the filtering of spam. In conclusion, the respondents indicated that formal training in e-mail management should make a significant difference in the usage of e-mail within the organization and reduce e-mail overload.

  19. Consumers with Sexual Performance Problems and Spam E - mail for Pornography

    Joshua Fogel

    2010-04-01

    Full Text Available Pornography adverti sements arrive through spam e - mail advertising products online. We study consumer responses to these advertisements. College student participants (n=200 with and without sexual performance problems (SPP were asked if they received, opened/read, and bou ght pornography from spam e - mail. Those with SPP had significantly greater percentages than those without SPP for receiving (93.3% versus 68.1%, p=0.042, opening/reading (66.7% versus 14.1%, p<0.001, and purchasing (46.7% versus 4.9%, p<0.001 pornograp hy from spam e - mail. In the multivariate logistic regression analyses adjusting for demographic (age, sex, race/ethnicity, Internet (Internet use, number spam e - mails received, and psychological (self - esteem, perceived stress, sexual performance attitud es variables, those with SPP were significantly associated with opening/reading (OR: 4.51, 95% CI: 1.05, 19.33 and purchasing (OR: 8.76, 95% CI: 1.78, 43.27 pornography from spam e - mail. Also, increased sexual performance attitudes were associated with opening/reading (OR: 1.37, 95% CI: 1.21, 1.54 and purchasing (OR: 1.37, 95% CI: 1.15, 1.62 pornography from spam e - mail. None of the other demographic, Internet, or psychological variables had any associations. Pornography spam e - mail is opened/read a nd purchased, especially among those with SPP. T argeting those with SPP with e - mail advertisements has ethical implications, in addition to the general ethical issue of sending spam e - mail

  20. E-marketing, Unsolicited Commercial E-mail, and Legal Solutions

    Li Xingan

    2006-01-01

    The purpose of this paper is to explore the legal solutions to unsolicited commercial e-mail. The advantages of e-mail enable it to be one of the most important e-marketing instruments. Spammers are also motivated by potential profits in spamming. The low costs and high benefits of the spammers, and the high costs and low benefits of the spammed determine the illegal nature of the spamming. The spam poses challenges for e-mail recipients' property rights, fair trade, public morals, cybersecur...

  1. Machine Learning for E-mail Spam Filtering: Review,Techniques and Trends

    Bhowmick, Alexy; Hazarika, Shyamanta M.

    2016-01-01

    We present a comprehensive review of the most effective content-based e-mail spam filtering techniques. We focus primarily on Machine Learning-based spam filters and their variants, and report on a broad review ranging from surveying the relevant ideas, efforts, effectiveness, and the current progress. The initial exposition of the background examines the basics of e-mail spam filtering, the evolving nature of spam, spammers playing cat-and-mouse with e-mail service providers (ESPs), and the ...

  2. Open-Rate Controlled Experiment in E-Mail Marketing Campaigns

    Antun Biloš; Davorin Turkalj; Ivan Kelić

    2016-01-01

    Purpose – The main purpose of this paper is to test the controlled experiment (A/B split) methodology in B2C oriented e-mail marketing campaigns. Design/Methodology/Approach – E-mail marketing techniques have been a substantial part of e-marketing methodology since the early Internet days of the mid-1990s. From the very beginning of Internet utilization for business purposes, e-mail was one of the most widely used communication techniques in B2B and B2C markets alike. Due to high volumes o...

  3. A Novel Feature Selection Based on One-Way ANOVA F-Test for E-Mail Spam Classification

    Nadir Omer Fadl Elssied; Othman Ibrahim; Ahmed Hamza Osman

    2014-01-01

    Spam is commonly defined as unwanted e-mails and it became a global threat against e-mail users. Although, Support Vector Machine (SVM) has been commonly used in e-mail spam classification, yet the problem of high data dimensionality of the feature space due to the massive number of e-mail dataset and features still exist. To improve the limitation of SVM, reduce the computational complexity (efficiency) and enhancing the classification accuracy (effectiveness). In this study, feature selecti...

  4. [Research on testing the robustness of DICOM-e-mail secure teleradiology systems].

    Cao, O Li-ji; Zhao, Jun; Zhuang, Tian-ge

    2006-07-01

    DICOM-e-mail is a secure teleradiology protocol released by German Radiology Society and has already been applied clinically. To improve the robustness of the system, the protocol has been upgraded by adding some mechanisms such as system feedback. Moreover, a test method is also implemented by sending erroneous mails to application software that supports DICOM-e-mail. Through the tests for two different DICOM-e-mail teleradiology application, the validity of the new protocol is proved and at the same time some bugs are found. The implementation of the latest protocol and the general error tests can help to make the whole teleradiology system a better robustness. The implementation of DICOM-e-mail protocol in our country is also discussed in this paper. PMID:17039939

  5. Test of the Behavioral Perspective Model in the Context of an E-Mail Marketing Experiment

    Sigurdsson, Valdimar; Menon, R. G. Vishnu; Sigurdarson, Johannes Pall; Kristjansson, Jon Skafti; Foxall, Gordon R.

    2013-01-01

    An e-mail marketing experiment based on the behavioral perspective model was conducted to investigate consumer choice. Conversion e-mails were sent to two groups from the same marketing database of registered consumers interested in children's books. The experiment was based on A-B-A-C-A and A-C-A-B-A withdrawal designs and consisted of…

  6. Putting social context into text: The semiotics of e-mail interaction

    Tian, X; Menchik, DA

    2008-01-01

    E-mail excludes the multiple nonlinguistic cues and gestures that facilitate face-to-face communication. How, then, should interaction in a text-based context be understood? The authors analyze the problems and solutions experienced by a research panel that communicated over e-mail and face-to-face for 18 months, evaluating both kinds of exchanges alongside survey and interview data. Semiotic and linguistic theory is used to expose essential properties associated with the successful communica...

  7. Consumers with Sexual Performance Problems and Spam E - mail for Pornography

    Joshua Fogel; Sam Shlivko

    2010-01-01

    Pornography adverti sements arrive through spam e - mail advertising products online. We study consumer responses to these advertisements. College student participants (n=200) with and without sexual performance problems (SPP) were asked if they received, opened/read, and bou ght pornography from spam e - mail. Those with SPP had significantly greater percentages than those without SPP for receiving (93.3% versus 68.1%, p=0.042), opening/reading (6...

  8. Decision Support for Estimation of the Utility of Software and E-mail

    Borg, Anton

    2012-01-01

    Background: Computer users often need to distinguish between good and bad instances of software and e-mail messages without the aid of experts. This decision process is further complicated as the perception of spam and spyware varies between individuals. As a consequence, users can benefit from using a decision support system to make informed decisions concerning whether an instance is good or bad. Objective: This thesis investigates approaches for estimating the utility of e-mail and softwar...

  9. A survey to evaluate patients' perspective concerning e-mail in an oncology practice

    Purpose: Use of e-mail to improve physician-patient communication is becoming increasingly widespread, however, little research has been done to evaluate patients' interest and concerns regarding this technology. The goals of this study were to (1) evaluate the effectiveness of e-mail for communication between patients and their oncologist and (2) assess from the perspective of the patient the accessibility and usefulness of e-mail to facilitate medical treatment and advice as compared to conventional mail and telephone. E-mail as a clinical tool is a new trend in medicine that is growing quickly, however, there are few reports to date that evaluate the patients' perspective concerning e-mail usage. The use of e-mail in doctor-patient communication is potentially faster and more efficient than conventional mail and may reduce 'telephone tag'. E-mail initiated by the physician also allows for potential follow-up after treatment. Our study evaluated the types of transactions (personal medical questions, referrals, etc.) for which patients' preferred using e-mail in place of conventional communication methods. Materials and Methods: A self-administered survey (8 pages; 50 items) was mailed to 65 patients who were treated within the previous three years for prostate cancer in a radiation oncology practice. This survey explored the opinions and behaviors of patients with regard to online communication about general healthcare issues. The items included: patients' interest in e-mail, comfort in using e-mail, concerns about confidentiality, and access to e-mail. Patients' interest in using e-mail for specific situations were also evaluated, such as, making appointments, following up on treatment, or asking general health related questions. Patients' concerns about using email to communicate with healthcare organizations also were assessed. Results: The response rate to the survey was 63%, with a median age of 68 years (range 53-82), and the majority of respondents were

  10. Legal and policy issues associated with monitoring employee E-mail

    Segura, M.A.; Rither, A.C.

    1997-01-01

    This paper examines the legal issues involved with employer monitoring of employee e-mail. In addition to identifying pertinent legal issues, the paper provides guidelines that will help the Pacific Northwest National Laboratory (PNNL) establish a program for monitoring outgoing e-mail to insure compliance with company policies, particularly those regarding protection of trade secrets and proprietary information, and to comply with the Department of Energy`s (DOE) procedures for protecting Export Controlled Information (ECI). Electronic communication has allowed companies to enhance efficiency, responsiveness and effectiveness. E-mail allows employees to transmit all types of data to other individuals inside and outside of their companies. The ease with which information can be transmitted by e-mail has placed trade secrets, proprietary information, and other sensitive data at risk from inadvertent disclosure by employees. As employers attempt to protect their interests through measures such as monitoring e-mail, they may expose themselves to liability under federal and state laws for violating employee privacy. Business use of e-mail has proliferated so rapidly that the federal and state legal systems have not been able to adequately address the issues arising out of its use in the workplace.

  11. Effect of Media Usage Selection on Social Mobilization Speed: Facebook vs E-Mail.

    Wang, Jing; Madnick, Stuart; Li, Xitong; Alstott, Jeff; Velu, Chander

    2015-01-01

    Social mobilization is a process that enlists a large number of people to achieve a goal within a limited time, especially through the use of social media. There is increasing interest in understanding the factors that affect the speed of social mobilization. Based on the Langley Knights competition data set, we analyzed the differences in mobilization speed between users of Facebook and e-mail. We include other factors that may influence mobilization speed (gender, age, timing, and homophily of information source) in our model as control variables in order to isolate the effect of such factors. We show that, in this experiment, although more people used e-mail to recruit, the mobilization speed of Facebook users was faster than that of those that used e-mail. We were also able to measure and show that the mobilization speed for Facebook users was on average seven times faster compared to e-mail before controlling for other factors. After controlling for other factors, we show that Facebook users were 1.84 times more likely to register compared to e-mail users in the next period if they have not done so at any point in time. This finding could provide useful insights for future social mobilization efforts. PMID:26422171

  12. Do you feel you know how to write an e-mail?

    Leonova, Anna O.

    2003-10-01

    Computers have opened doors to the new era of telecommunication. Electronic mail is becoming very popular in different spheres of professional activity and everyday life of people all over the world as it provides people an excellent opportunity for real, natural communication. The use of e-mail and the Internet involves a whole range of skills including knowing how to use a personal computer, knowing how to navigate the immense resources of cyberspace, and becoming familiar with the special register of e-mail communication (which lies somewhere between the formality of traditional writing and the spontaneity of speech). Conferencing via e-mail, or communicating with partners through networked computers, offers many opportunities in the Scientific Community. E-mail allows us to collaborate easily with thousands of colleagues, sharing new ideas, resources, and materials. It can provide the information, contacts, and stimulation that can make our research work more effective and enjoyable. The English language is world-wide accepted as lingua-franca of the Internet and intercultural communication. This brings us to a necessity to introduce some ideas on e-mail writing.

  13. Teleradiology with DICOM e-mail: recommendations of rate at GIT

    E-mail is ideal for ad-hoc connections in teleradiology. The DICOM standard offers the possibility to append DICOM data types as a MIME attachment to any e-mail, thus ensuring the transmission of the original DICOM data. Nevertheless, there are additional requirements (e.g. protection of data privacy) which must be obeyed. Because of the lack of given standards which would grant interoperability as well as manufacturer independence, teleradiology has not been established in Germany until today. Therefore, the IT-Team (Arbeitsgemeinschaft fuer Informationstechnologie, rate at GIT) of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) set up an initiative to standardise telemedicine by using e-mail. Its members agreed that an e-mail-based variant would be the most practicable way to a communication solution - as easy to implement as to use. In their opinion, e-mail represents the smallest common denominator for a safe data interchange that would fulfill the legal advantages for telemedicine in Germany. (orig.)

  14. EVALUATION OF E-MAIL USAGE BY EXTENDED TECHNOLOGY ACCEPTANCE MODEL

    Savaş Mutlu

    2013-01-01

    Full Text Available This study is performed to evaluate E-mail usage by Extended Technology Acceptance Model (TAM2 and to test the moderation effects of Espoused National Cultural Values between Subjective Norm (SN and E-mail usage Behavioral Intention (BI/Perceived Usefulness (PU. Survey was conducted in Adana Branches of an important Turkish State-Run Bank including 151 participants who have E-mail access for work purposes. As the results of the study; PU and Perceived Ease Of Use (PEOU have positive effects on BI, PEOU and SN both effect PU, Femininity (F shows positive moderating effect on the relationship between SN and PU as well as the relation between SN and BI, Collectivism (C shows positive moderation effect between SN and PU, moderation effect of SN on PU is higher for people who have higher tolerance to uncertainty.

  15. The Use of Verbs in Business E-Mail Communication – A Pragmalingu Istic Corpus Study

    Šiškovič Mojca Nidorfer

    2014-06-01

    Full Text Available Corpus analyses conducted with the help of special tools have become more widely used in all areas of linguistics, including discourse analysis, genre analysis and pragmatics. The paper presents a pragmalinguistic research study of verbs, carried out on a specialized corpus of authentic correspondence of (chains of Slovene business e-mails, Posle-pis. The corpus tools Oxford Wordsmith Tools 5.0 and Sketch Engine were used for analysis, and the research was followed by a comparison of language use with two Slovene reference corpora FidaPLUS and Gigafida. The study confirms the hypothesis that business discourse via e-mail has inherent characteristics that are shown through the frequency of use of certain verbs and verb forms. Certain forms were also identified which prove the conventionalized language use of business e-mail discourse.

  16. Design and development of practical and secure e-mail system /

    Özcan, Mahmut; Ozcan, Mahmut

    2003-01-01

    Key distribution and management in applications that use public key cryptosystems generally rely on Public Key Infrastructures (PKI). In this thesis, the disadvantages of this approach are discussed and an e-mail system that performs public key distribution and management in a unique way is proposed. The name of this system is "Practical and Secure E-Mail System" ("PractiSES"). PractiSES does not use the certification mechanisms of PKIs. A central authority, which is trusted by all users, tak...

  17. No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large

    Mayer, Wilfried; Zauner, Aaron; Schmiedecker, Martin; Huber, Markus

    2015-01-01

    TLS is the most widely used cryptographic protocol on the Internet. While many recent studies focused on its use in HTTPS, none so far analyzed TLS usage in e-mail related protocols, which often carry highly sensitive information. Since end-to-end encryption mechanisms like PGP are seldomly used, today confidentiality in the e-mail ecosystem is mainly based on the encryption of the transport layer. A well-positioned attacker may be able to intercept plaintext passively and at global scale. In...

  18. Electronic information exchange between NRC and licensees using Internet E-mail

    Roe, J.W.; Carpenter, C.E. Jr.

    1994-12-31

    One of the goals established in the U.S. Nuclear Regulatory Commission (NRC) Strategic Information Technology Plan was the development of high-performance computer networks that would allow users to have E-mail and document transfer capabilities with NRC staff, certain U.S. Department of Energy laboratories, and with outside users over the public Internet network. Subsequently, individual Internet E-mail accounts have been established for project managers in the Office of Nuclear Reactor Regulation (NRR), which allow informal communications with licensees that have access to the Internet.

  19. E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm

    Ismaila Idris

    2011-01-01

    This paper apply neural network and spam model based on Negative selection algorithm for solving complex problems in spam detection. This is achieved by distinguishing spam from non-spam (self from non-self). We propose an optimized technique for e-mail classification; The e-mail are classified as self and non-self whose redundancy was removed from the detector set in the previous research to generate a self and non-self detector memory. A vector with an array of two element self and non-self...

  20. Measuring the Effectiveness of E-mail Direct Marketing in Building Customer Relationship

    Abdel Baset I. Hasouneh; Marzouq Ayed Alqeed

    2010-01-01

    The objective of the study is to examine how response data from direct marketing email campaigns could beutilized in measuring the development of a customer relationship in the context of an end-user loyalty program.The case analysed in the study is Club Sony Ericsson e-mail campaigns targeted at its registered members. Theprimary research problem covered in the study is “how can e-mail direct marketing results be measured by usingClub Sony Ericsson existing campaign response and customer dat...

  1. Implementation of Personalized E-Mail Prioritization-A Content Based Social Network Analysis

    K.HARINI

    2011-12-01

    Full Text Available Now a Day’s, Email is one of the most prevalent personal and business communication tool, but it exhibits some significant drawbacks. One of the drawback of this is the portion of e-mail is that spam, has increased dramatically in the past few years. A recent study showed that 52 percent of e-mail users say spam has made them less trusting of e-mail, and 25 percent say that the volume of spam has reduced their e-mail use. This crisis has prompted proposals for a broad spectrum of potential solutions, ranging from more efficient antispam software tools to antispam laws at both the federal and state levels. But Still there is a necessity, to overcome this, in this paper We propose a novel approach that combines unsupervised clustering, social network analysis, semi supervised feature induction, and supervised classification to model user priorities among incoming email messages. This article presents the first study on PEP with a fully personalized methodology, where only each user’s personal email data. Finally results show that this method somehow better compared to other methods

  2. Identification and Disidentification in Organizational Discourse: A Metaphor Analysis of E-Mail Communication at Enron

    Turnage, Anna K.

    2010-01-01

    This project is situated within the interpretive tradition in organizational communication research, focusing on organizational discourse. It goes further by bringing the discussion into the 21st century through examining how communication technology--specifically e-mail--plays a role in the linguistic practices that help create, maintain and…

  3. E-Mail Bonding: Making the Most of Electronic Communication between Teacher and Student.

    Zolten, Jerry

    An instructor's idea of using required e-mail as a communication link with students in the basic public speaking course sprang from his work with Gerald M. Philips in the pioneering reticence program he developed at Penn State University in the 1970s and 1980s. The instructor's focus in teaching a basic communication course has always been more on…

  4. Principles and algorithms of information security maintenance for nuclear material protection in e-mail system

    The relevant component of protection of nuclear materials is the securing of only the authorized usage of the information about them and particular its safeguarding. One of channels of unauthorized usage of the information can arise at transferring on E-Mail with the conforming sanction of the proprietor of this information and its senders and also going through formalities adopted in the institute present the proprietary information. For detection and suppression of dispatch on a E-Mail of the reports contain items of information, the transfer of which requires the sanction of the proprietor of the information, the method of a selective filtration has been elaborated. For this method the principles and algorithms permitting a dispatch on a E-Mail without the filtration only those reports which went through the formalities established by the proprietor of the information. For scientific institutes it can be, for example, discussed at scientific recommended for publication or correspondence with collaborators on joint projects. The information for which listed above or similar requirements are not fulfilled subjects to the filtration. If this information contains the items on nuclear safety or other information, which can be transferred on E-Mail only upon the sanction of administration, the electronic letter does not depart and is transferred to the manager of information safety, who introduces it to the administration for the conforming consideration. The work was supported by the grant CST RUz P-20.56. (author)

  5. The effectiveness of personalized e-mail and the role of personal characteristics

    E. Maslowska; B. van den Putte; E.G. Smit

    2011-01-01

    Personalizing communication means creating persuasive messages that refer to aspects of a person's self. Although the use of personalization is increasing, research on its effectiveness is limited and the results are mixed. This study examined the persuasiveness of personalized e-mail newsletters in

  6. Endorsement of the New Ecological Paradigm in Systematic and E-Mail Samples of College Students

    Rideout, Bruce E.; Hushen, Katherine; McGinty, Dawn; Perkins, Stephanie; Tate, Jennifer

    2005-01-01

    As the initial phase of a longitudinal study of environmental perspective in college students, resident student opinion was sampled using the New Ecological Paradigm (NEP) scale administered through systematic alphabetical sampling. Sampling was also carried out by a blanket e-mail distribution of surveys for voluntary response. Results showed…

  7. "Dear Mr. Shawn": A Lesson in E-Mail Pragmatics (Netiquette).

    Ford, Shawn

    2003-01-01

    This tip provides information that will help English-as-a-Second-Language learners understand the rules of formal e-mail communication, also known as netiquette, and enable them to practice using these communication skills effectively for academic purposes. (Author/VWL)

  8. E-marketing, Unsolicited Commercial E-mail, and Legal Solutions

    Li Xingan

    2006-03-01

    Full Text Available The purpose of this paper is to explore the legal solutions to unsolicited commercial e-mail. The advantages of e-mail enable it to be one of the most important e-marketing instruments. Spammers are also motivated by potential profits in spamming. The low costs and high benefits of the spammers, and the high costs and low benefits of the spammed determine the illegal nature of the spamming. The spam poses challenges for e-mail recipients' property rights, fair trade, public morals, cybersecurity, personal data protection, and involves other concerns as well. In dealing with spam, technical and marketing solutions cannot work alone without the legal mechanisms. The legal regulation is justified by balancing the interest between senders, service providers and even users. Criminal sanctions, civil remedies, and international harmonization are alternative steps in establishing legal solutions. As a necessary part of the legislation, punishment for unsolicited commercial e-mails should be more severe. Still, there are a number of limitations to the effectiveness of law enforcement against spamming. Spam must be eliminated by comprehensive mechanisms.

  9. Open-Rate Controlled Experiment in E-Mail Marketing Campaigns

    Antun Biloš

    2016-06-01

    Full Text Available Purpose – The main purpose of this paper is to test the controlled experiment (A/B split methodology in B2C oriented e-mail marketing campaigns. Design/Methodology/Approach – E-mail marketing techniques have been a substantial part of e-marketing methodology since the early Internet days of the mid-1990s. From the very beginning of Internet utilization for business purposes, e-mail was one of the most widely used communication techniques in B2B and B2C markets alike. Due to high volumes of spamming and progression of online communication clutter, some practitioners began to question the usability of e-mail as a marketing communication channel, while others embarked on working on improving the message itself. Efforts were invested into improving message quality, as well as into better understanding user expectations. One of the most commonly used techniques to test specific e-mail message elements is the controlled experiment. Findings and implications – This paper explores several types of controlled experiments in a specific Croatian B2C market. Tests were run to determine subscriber behavior towards several newsletter components, including sending time, sending day, sender’s name, and subject line. Open and click rates for tested campaigns, and several other metrics were investigated using MailChimp software. An N − 1 two-proportion test using an adjusted Wald confidence interval around the difference in the proportions was used for comparing the open-rate measure in the controlled experiments between subjects. Limitation – Controlled experiments (A/B split tests showed a lot of potential as a way of measuring behavior and preferences of subscribers, although several apparent limitations (the data-set scope, comparability issues indicated a clear need for standardization on a managerial and scientific level. Originality – This paper provides an up-to-date e-mail marketing effectiveness literature review, describes and tests the

  10. Using viral e-mails to distribute tobacco control advertisements: an experimental investigation.

    Carter, Owen B J; Donovan, Robert; Jalleh, Geoffrey

    2011-08-01

    The authors' objective was to conduct a trial of viral e-mail marketing as a distribution method for tobacco control advertisements. University students (n = 200) in the state of Western Australia were randomly allocated to receive 1 of 2 e-mails with hyperlinks to tobacco control advertisements ("Toilet" and "Rubbish") emphasizing the disgusting nature of smoking. Recipients followed a hyperlink to a Web page playing Toilet or Rubbish on endless loop. Viewers were encouraged to forward the e-mail to their friends and invited to complete an online survey about the advertisement. Unique downloads for each advertisement were identified by internet provider (IP) location and tallied by date and geographical location to assess subsequent dissemination beyond the initial 200 students. There were 826 unique viewings of the advertisements averaging 26.9 viewings per day for the first fortnight, followed by a lower average of 4.1 hits per day for the next 3.5 months. IP addresses identified hits from 3 other Australian states and 7 other countries. Online surveys were completed by 103 respondents (12.5% of total hits) but included few smokers (n = 9). Significantly more respondents rated Toilet as "funny" compared with Rubbish (40% vs. 11%; p < .05), likely explaining why the former accounted for significantly more viewings than the latter (487 vs. 339; p < .001). There was a greater than fourfold return in dissemination for each initial e-mail sent but daily hits rapidly deteriorated over time. Entertainment appears to facilitate viral e-mails being forwarded onwards but only exceptionally compelling tobacco control materials are ever likely to become self-perpetuating. PMID:21432712

  11. Predicted Outcome Value of E-Mail Communication: Factors that Foster Professional Relational Development between Students and Teachers

    Young, Stacy; Kelsey, Dawn; Lancaster, Alexander

    2011-01-01

    Using predicted outcome value theory as a guide, this study investigated the link between e-mail correspondence as a form of computer mediated extra class communication and how it may shape students' desire to foster student-teacher relational development. The findings revealed that when students believe their teacher e-mails the class frequently,…

  12. E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm

    Ismaila Idris

    2011-12-01

    Full Text Available This paper apply neural network and spam model based on Negative selection algorithm for solving complex problems in spam detection. This is achieved by distinguishing spam from non-spam (self from non-self. We propose an optimized technique for e-mail classification; The e-mail are classified as self and non-self whose redundancy was removed from the detector set in the previous research to generate a self and non-self detector memory. A vector with an array of two element self and non-self concentration vector are generated into a feature vector used as an input in neural network classifier to classify the self and non-self feature vector of self and nonself program. The hybridization of both neural network and our previous model will further enhance our spam detector by improving the false rate and also enable the two different detectors to have a uniform platform for effective performance rate.

  13. Notation for national and international telephone numbers, e-mail addresses and Web addresses

    International Telecommunication Union. Geneva

    2001-01-01

    Recommendation E.123 defines a standard way to write telephone numbers, e-mail addresses, and web addresses. It recommends the following formats (when dialing the area code is optional for local calling): Telephone number: National notation (042) 123 4567 International notation +31 (0)42 123 4567 E-mail address: name@provider.com Internet address / URL: www.company.com It also recommends that a hypen (-), space ( ), or period (.) can be used to visually separate groups of numbers. The parentheses are used to indicate digits that are sometimes not dialed. a slash (/) is used to indicate alternate numbers. This information is important if you want to make sure people know how to dail a phone number in a specific country.

  14. INVESTIGATION OF E-MAIL TRAFFIC BY USING ZERO-INFLATED REGRESSION MODELS

    Yılmaz KAYA

    2012-06-01

    Full Text Available Based on count data obtained with a value of zero may be greater than anticipated. These types of data sets should be used to analyze by regression methods taking into account zero values. Zero- Inflated Poisson (ZIP, Zero-Inflated negative binomial (ZINB, Poisson Hurdle (PH, negative binomial Hurdle (NBH are more common approaches in modeling more zero value possessing dependent variables than expected. In the present study, the e-mail traffic of Yüzüncü Yıl University in 2009 spring semester was investigated. ZIP and ZINB, PH and NBH regression methods were applied on the data set because more zeros counting (78.9% were found in data set than expected. ZINB and NBH regression considered zero dispersion and overdispersion were found to be more accurate results due to overdispersion and zero dispersion in sending e-mail. ZINB is determined to be best model accordingto Vuong statistics and information criteria.

  15. New information technology and communication in health care: using e-mail for marketing services

    Jorge Iván Martínez Espitia

    2015-01-01

    Research that was conducted was aimed to determine their use of e-mail independent health professionals. Email is one of the tools of information and communication that has shown great versatility and efciency as a means to improve the relationship between those who provide services or sell products users. Good communication is essential to keep current customers and attract new business prospects. To achieve the objective of the research a survey that measured the perception and use of email...

  16. Evaluation of e-mail reference service in University Donja Gorica library

    Tomić, Tamara

    2015-01-01

    Reference service in academic libraries has been in use for a very long time. The University Donja Gorica Library (UDG) is the first library in Montenegro providing e-mail reference service. The purpose of this research is to examinee-mails containing reference questions at UDG. This evaluation discusses the first three years (2008-2011) of implementing this service at UDG and shows its importance and usability for library users. The thesis presents and evaluates this service, some improvemen...

  17. Dead Letters to Alice - Reachability of E-Mail Addresses in the PGP Web of Trust

    Leiding, Benjamin; Dähn, Andreas

    2016-01-01

    Over the last 25 years four million e-mail addresses have accumulated in the PGP web of trust. In a study each of them was tested for vitality with the result of 40% being unreachable. Of the mailboxes proven to be reachable, 46.77% turn out to be operated by one of three organizations. In this article, the authors share their results and challenges during the study.

  18. Heart murmurs recorded by a sensor based electronic stethoscope and e-mailed for remote assessment

    Wren, C; Dahl, L.; Hasvold, P; Arild, E; Hasvold, T.

    2002-01-01

    Background: Heart murmurs are common in children, and they are often referred to a specialist for examination. A clinically innocent murmur does not need further investigation. The referral area of the University Hospital is large and sparsely populated. A new service for remote auscultation (telemedicine) of heart murmurs in children was established where heart sounds and short texts were sent as an attachment to e-mails.

  19. Effect of Media Usage Selection on Social Mobilization Speed: Facebook vs E-Mail

    Jing Wang; Stuart Madnick; Xitong Li; Jeff Alstott; Chander Velu

    2015-01-01

    Social mobilization is a process that enlists a large number of people to achieve a goal within a limited time, especially through the use of social media. There is increasing interest in understanding the factors that affect the speed of social mobilization. Based on the Langley Knights competition data set, we analyzed the differences in mobilization speed between users of Facebook and e-mail. We include other factors that may influence mobilization speed (gender, age, timing, and homophily...

  20. You've got e-mail: the impact of electronic communication technology on faculty productivity

    Elworthy, Sheila Frances Culver

    2008-01-01

    This qualitative case study explores the connection between electronic communication technology and faculty productivity. Despite the pervasive use of e-mail and other electronic communication media at educational institutions, few studies investigate the relationship of electronic communication to faculty productivity. In this study, sixteen faculty members from a public, medium-sized, and instruction-oriented college in Western Canada answered detailed questions about their professional on-...

  1. An Improved AIS Based E-mail Classification Technique for Spam Detection

    Idris, Ismaila; Abdulhamid, Shafii Muhammad

    2014-01-01

    An improved email classification method based on Artificial Immune System is proposed in this paper to develop an immune based system by using the immune learning, immune memory in solving complex problems in spam detection. An optimized technique for e-mail classification is accomplished by distinguishing the characteristics of spam and non-spam that is been acquired from trained data set. These extracted features of spam and non-spam are then combined to make a single detector, therefore re...

  2. Compulsory registration of mail servers in order to accept e-mail from the Internet

    IT Department

    2008-01-01

    This announcement is intended only for administrators of a mail server (sendmail, postfix, etc.). It concerns e-mails sent from the Internet to addresses of the following type: somemailbox@somehost.cern.ch. Mail server managers are requested to register their servers so that they can accept e-mail from outside CERN. In future the CERN mail infrastructure will relay messages from outside CERN only to officially registered mail servers. This rule applies only to messages sent from the Internet. There will be NO change with respect to messages sent from inside CERN. If you are responsible for a mail server that accepts e-mails from outside CERN, please read the following page: http://cern.ch/mail/Help/?kbid=191090, where you can find information about the new rule and check if your host is already registered in the system. If you wish to register a mail server please send a message to: mailto:mail.support@cern.ch. This rule will be gradually enforced from 20 February 2008 onwards. Thank you for your cooperation...

  3. Health Literacy and Global Cognitive Function Predict E-Mail but Not Internet Use in Heart Failure Patients

    Jared P. Schprechman

    2013-01-01

    Full Text Available Background. The internet offers a potential for improving patient knowledge, and e-mail may be used in patient communication with providers. However, barriers to internet and e-mail use, such as low health literacy and cognitive impairment, may prevent patients from using technological resources. Purpose. We investigated whether health literacy, heart failure knowledge, and cognitive function were related to internet and e-mail use in older adults with heart failure (HF. Methods. Older adults (N=119 with heart failure (69.84±9.09 years completed measures of health literacy, heart failure knowledge, cognitive functioning, and internet use in a cross-sectional study. Results. Internet and e-mail use were reported in 78.2% and 71.4% of this sample of patients with HF, respectively. Controlling for age and education, logistic regression analyses indicated that higher health literacy predicted e-mail (P<.05 but not internet use. Global cognitive function predicted e-mail (P<.05 but not internet use. Only 45% used the Internet to obtain information on HF and internet use was not associated with greater HF knowledge. Conclusions. The majority of HF patients use the internet and e-mail, but poor health literacy and cognitive impairment may prevent some patients from accessing these resources. Future studies that examine specific internet and email interventions to increase HF knowledge are needed.

  4. A Mixed-Methods Study of Patient-Provider E-Mail Content in a Safety-Net Setting.

    Mirsky, Jacob B; Tieu, Lina; Lyles, Courtney; Sarkar, Urmimala

    2016-01-01

    To explore the content of patient-provider e-mails in a safety-net primary care clinic, we conducted a content analysis using inductive and deductive coding of e-mail exchanges (n = 31) collected from January through November 2013. Participants were English-speaking adult patients with a chronic condition (or their caregivers) cared for at a single publicly funded general internal medicine clinic and their primary care providers (attending general internist physicians, clinical fellows, internal medicine residents, and nurse practitioners). All e-mails were nonurgent. Patients included a medical update in 19% of all e-mails. Patients requested action in 77% of e-mails, and the most common requests overall were for action regarding medications or treatment (29%). Requests for information were less common (45% of e-mails). Patient requests (n = 56) were resolved in 84% of e-mail exchanges, resulting in 63 actions. These results show that patients in safety-net clinics are capable of safely and effectively using electronic messaging for between-visit communication with providers. Safety-net systems should implement electronic communications tools as soon as possible to increase health care access and enhance patients' involvement in their care. PMID:26332306

  5. Impact of humor and gender in e-mail marketing : Case DefShop GmbH

    Sivén, Johanna

    2015-01-01

    This Bachelor’s thesis project was conducted for DefShop GmbH. In accordance to the commissioner’s interests towards customization of their e-mail newsletter service, a test campaign was administered in order to detect possible differences in the clicking behavior of male and female newsletter subscribers when receiving either neutral or humorous e-mails. The two test e-mails used for the campaign differed in their visual content, changing the message in either humorous or neutral direction. ...

  6. Polarity Determination using Opinion Mining in Stocks and Shares-advertising Unsolicited Bulk e-mails

    Dr. Jatinderkumar R. Saini

    2012-04-01

    Full Text Available e-mail has become an important means of electronic communication but the viability of its usage is marred by Un-solicited Bulk e-mail (UBE messages. UBE consists of many types like pornographic, virus infected messages, ‘cry-for-help’ messages as well as fake and fraudulent offers/advertisements/promotions of stocks and shares, jobs, winnings, and medicines. UBE poses technical and socio-economic challenges to usage of e-mails. To meet this challenge and combat this menace, we need to understand UBE. Towards this end, a content-based textual analysis of more than 3100 stocks and shares-advertising unstructured UBE documents is presented. The paper is aimed at polarity determination of such UBE through its sentiment analysis. Technically, this is an application of Opinion Mining approached with help of Text Parsing, Tokenization, BOW and VSDM techniques. Sentiment Analysis is used to determine the polarity of the document because such UBE contain opinion of the spammer about specific stock symbol of share market. The Sentiment-depicting words are analyzed in the UBE corpus, scaled and extremes of positive and negative opinions are identified. An attempt has been made for polarity-based distribution of such UBE. It has been found that for almost 50�0of cases, the opinions expressed through such UBE have positive polarity, almost 30�0cases are negatively opined whereas almost 20�0cases contain neutral opinion. To the best knowledge and based on review of related literature, determination of UBE polarity using Opinion Mining for understanding spammer behaviour is a new concept.

  7. E-Mail discussion Forums in Library and Information Services (LIS: A Study

    Dhanavandan S

    2012-08-01

    Full Text Available The email facilities are currently provided free service through many search engines groups. The discussion forums are discussed through e-mail groups in same professions. The terms discussion forum “Forum, Mailing list and List are using interchangeably. This paper made an attempt to analysis library and information services (LIS forum. This paper analysed the highlights definition, purpose of the study, groups available over the internet and features of the forum, .the number of members, the mode of hosting the messages among LIS forum.

  8. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  9. Increasing the efficiency of marketing e-mail in customer retention

    Gurbag, Ali; Morales Valuis, Guadalupe Katherine

    2016-01-01

    Technology development has changes many things in the way businesses are done nowadays. Compa-nies needed to readapt their processes to the new demands of the markets in order to be competitive in online platforms. To achieve this, companies need to focus on retaining customers. E-marketing has developed many tools for this purpose, e-mail marketing has proven to have advantages in this task; however, sometimes the outcome is not as good as expected, mainly because the content and struc-ture ...

  10. Health Literacy and Global Cognitive Function Predict E-Mail but Not Internet Use in Heart Failure Patients

    Schprechman, Jared P.; Gathright, Emily C.; Goldstein, Carly M.; Guerini, Kate A.; Dolansky, Mary A.; Redle, Joseph; Hughes, Joel W.

    2013-01-01

    Background. The internet offers a potential for improving patient knowledge, and e-mail may be used in patient communication with providers. However, barriers to internet and e-mail use, such as low health literacy and cognitive impairment, may prevent patients from using technological resources. Purpose. We investigated whether health literacy, heart failure knowledge, and cognitive function were related to internet and e-mail use in older adults with heart failure (HF). Methods. Older adults (N = 119) with heart failure (69.84 ± 9.09 years) completed measures of health literacy, heart failure knowledge, cognitive functioning, and internet use in a cross-sectional study. Results. Internet and e-mail use were reported in 78.2% and 71.4% of this sample of patients with HF, respectively. Controlling for age and education, logistic regression analyses indicated that higher health literacy predicted e-mail (P cognitive function predicted e-mail (P cognitive impairment may prevent some patients from accessing these resources. Future studies that examine specific internet and email interventions to increase HF knowledge are needed. PMID:24282634

  11. Online-Jugendberatung. Eine kommunikationswissenschaftliche Arbeit über eMail-, Chat- und Forenberatung

    Selina Englmayer

    2006-03-01

    Full Text Available Gegenstand dieser kommunikationswissenschaftlichen Diplomarbeit sind eMail-, Chat- und Foren-Beratung für Jugendliche in Österreich. Nach einer Auseinandersetzung mit herkömmlichen Formen von Beratung (face-to-face- und Telefonberatung sowie Ratgeberjournalismus geht es um Definition und Formen der Online-Beratung. Des weiteren werden u.a. spezifische Beratungsstrategien und -methoden aus Theorie und Praxis, AkteurInnen und Rollen, Vor- und Nachteile sowie Qualitätskriterien dieser Beratungsform thematisiert. Weiters setzt sich die Autorin mit Jugendlichen und Internet (Nutzungsverhalten, Mediensozialisation, soziale Beziehungen im Internet auseinander. In der Folge geht es um herkömmliche und computervermittelte Kommunikation (CvK: Kommunikationsformen und -typen, Mediencharakteristika und Spezifika, Modelle der CVK etc. sind in diesem Zusammenhang unter besonderer Berücksichtigung der Online-Jugendberatung Thema. Abschließend stellt die Autorin in Reflexion auf den vorangegangenen theoretischen Teil drei österreichische Fallbeispiele der Online-Beratung für Jugendliche vor. Dabei handelt es sich um eine eMail-Beratungseinrichtung (ChEck iT!, einen Beratungschat (Kinderschutzzentrum Wien sowie ein Online-Forum (wienXtra.

  12. Standardization of teleradiology using Dicom e-mail: recommendations of the German Radiology Society

    Until recently there has been no standard for an interoperable and manufacturer-independent protocol for secure teleradiology connections. This was one of the main reasons for the limited use of teleradiology in Germany. Various teleradiology solutions have been developed in the past, but the vast majority have not been interoperable. Therefore an ad hoc teleradiology connection was impossible even between partners who were already equipped with teleradiology workstations. Based on the evaluation of vendor-independent protocols in recent years the IT Working Group (AGIT) of the German Radiology Society set up an initiative to standardize basic teleradiology. An e-mail based solution using the Dicom standard for e-mail attachments with additional encryption according to the OpenPGP standard was found to be the common denominator. This protocol is easy to implement and safe for personalized patient data and fulfills the legal requirements for teleradiology in Germany and other countries. The first version of the recommendation was presented at the 85th German Radiology Convention in 2004. Eight commercial and three open-source implementations of the protocol are currently available; the protocol is in daily use in over 50 hospitals and institutions. (orig.)

  13. Standardization of teleradiology using Dicom e-mail: recommendations of the German Radiology Society.

    Weisser, G; Walz, M; Ruggiero, S; Kämmerer, M; Schröter, A; Runa, A; Mildenberger, P; Engelmann, U

    2006-03-01

    Until recently there has been no standard for an interoperable and manufacturer-independent protocol for secure teleradiology connections. This was one of the main reasons for the limited use of teleradiology in Germany. Various teleradiology solutions have been developed in the past, but the vast majority have not been interoperable. Therefore an ad hoc teleradiology connection was impossible even between partners who were already equipped with teleradiology workstations. Based on the evaluation of vendor-independent protocols in recent years the IT Working Group (AGIT) of the German Radiology Society set up an initiative to standardize basic teleradiology. An e-mail based solution using the Dicom standard for e-mail attachments with additional encryption according to the OpenPGP standard was found to be the common denominator. This protocol is easy to implement and safe for personalized patient data and fulfills the legal requirements for teleradiology in Germany and other countries. The first version of the recommendation was presented at the 85th German Radiology Convention in 2004. Eight commercial and three open-source implementations of the protocol are currently available; the protocol is in daily use in over 50 hospitals and institutions. PMID:16228213

  14. The effectiveness of personalized e-mail newsletters and the role of personal characteristics.

    Maslowska, Ewa; Putte, Bas van den; Smit, Edith G

    2011-12-01

    Personalizing communication means creating persuasive messages that refer to aspects of a person's self. Although the use of personalization is increasing, research on its effectiveness is limited and the results are mixed. This study examined the persuasiveness of personalized e-mail newsletters in terms of increased attention, cognitive activity, evaluation, attitude, intention, and behavior by means of an experiment (n=109). Participants randomly received either a personalized or a generic newsletter advertising a sports center. Personalization triggered a more positive evaluation of the message; however, it did not influence the other effect variables. The effects were moderated by consumers' need for uniqueness, trust, and privacy concerns, suggesting that personalization is a good strategy to increase message evaluation only among individuals who have a high need for uniqueness. PMID:21790275

  15. SMEmail - A New Protocol for the Secure E-mail in Mobile Environments

    Toorani, Mohsen

    2010-01-01

    The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabilities and attacks, it is essential to provide suitable security solutions regarding the limitations of resource restricted platforms. Although some solutions such as PGP and S/MIME are currently available for the secure e-mail over the Internet, they are based on traditional public key cryptography that involves huge computational costs. In this paper, a new secure application-layer protocol, called SMEmail, is introduced that provides several security attributes such as confidentiality, integrity, authentication, non-repudiation, and forward secrecy of message confidentiality for the electronic mails. SMEmail offers an elliptic curve-based public key solution that uses public keys for the secure key establishment of a symmetric encryption, and is so suitable for the resource restricted platforms such as mobile phones.

  16. Health literacy and global cognitive function predict e-mail but not internet use in heart failure patients.

    Schprechman, Jared P; Gathright, Emily C; Goldstein, Carly M; Guerini, Kate A; Dolansky, Mary A; Redle, Joseph; Hughes, Joel W

    2013-01-01

    Background. The internet offers a potential for improving patient knowledge, and e-mail may be used in patient communication with providers. However, barriers to internet and e-mail use, such as low health literacy and cognitive impairment, may prevent patients from using technological resources. Purpose. We investigated whether health literacy, heart failure knowledge, and cognitive function were related to internet and e-mail use in older adults with heart failure (HF). Methods. Older adults (N = 119) with heart failure (69.84 ± 9.09 years) completed measures of health literacy, heart failure knowledge, cognitive functioning, and internet use in a cross-sectional study. Results. Internet and e-mail use were reported in 78.2% and 71.4% of this sample of patients with HF, respectively. Controlling for age and education, logistic regression analyses indicated that higher health literacy predicted e-mail (P literacy and cognitive impairment may prevent some patients from accessing these resources. Future studies that examine specific internet and email interventions to increase HF knowledge are needed. PMID:24282634

  17. A Novel Feature Selection Based on One-Way ANOVA F-Test for E-Mail Spam Classification

    Nadir Omer Fadl Elssied

    2014-01-01

    Full Text Available Spam is commonly defined as unwanted e-mails and it became a global threat against e-mail users. Although, Support Vector Machine (SVM has been commonly used in e-mail spam classification, yet the problem of high data dimensionality of the feature space due to the massive number of e-mail dataset and features still exist. To improve the limitation of SVM, reduce the computational complexity (efficiency and enhancing the classification accuracy (effectiveness. In this study, feature selection based on one-way ANOVA F-test statistics scheme was applied to determine the most important features contributing to e-mail spam classification. This feature selection based on one-way ANOVA F-test is used to reduce the high data dimensionality of the feature space before the classification process. The experiment of the proposed scheme was carried out using spam base well-known benchmarking dataset to evaluate the feasibility of the proposed method. The comparison is achieved for different datasets, categorization algorithm and success measures. In addition, experimental results on spam base English datasets showed that the enhanced SVM (FSSVM significantly outperforms SVM and many other recent spam classification methods for English dataset in terms of computational complexity and dimension reduction.

  18. The Uses of E-mail as a Medium on the Contante Justitie Proceedings on the Courts in Indonesia

    Yasser S. Wahab

    2015-10-01

    Full Text Available This research aims to know how the contante justitie principle may be applied into the enforced legislation in Indonesia, and to investigate the synergy of proceedings by means of e-mail in realizing contante justitie. The research employed in this paper is normative research, using both primary and secondary legal sources. Primary sources obtained from compiling relevant rules on the research concerned, in addition to secondary sources taken from books, court decisions, newspapers, internet materials and others relevant with the issue; that is to oversee the contradictions of humanist and mechanical processes when utilizing the internet e-mail for the court proceedings. The use of internet media e-mail in the correspondence process is expected to cut down the time, cost and potential instability. Thus strongly supports the realization of the principle of contante justitie in court proceedings more effectively and efficiently.

  19. Providing cell phone numbers and e-mail addresses to patients: The patient’s perspective, a cross sectional study

    Peleg Roni

    2012-08-01

    Full Text Available Abstract Background Today patients can consult with their treating physician by cell phone or e-mail. These means of communication enhance the quality of medical care and increase patient satisfaction, but they can also impinge on physicians’ free time and their patient schedule while at work. The objective of this study is to assess the attitudes and practice of patients on obtaining the cell phone number or e-mail address of their physician for the purpose of medical consultation. Methods Personal interviews with patients, 18 years of age or above, selected by random sampling from the roster of adults insured by Clalit Health Services, Southern Division. The total response rate was 41%. The questionnaire included questions on the attitude and practice of patients towards obtaining their physician’s cell phone number or e-mail address. Comparisons were performed using Chi-square tests to analyze statistically significant differences of categorical variables. Two-tailed p values less than 0.05 were considered statistically significant, with a power of 0.8. Results The study sample included 200 patients with a mean age of 46.6 ± 17.1, of whom 110 were women (55%. Ninety-three (46.5% responded that they would be very interested in obtaining their physician’s cell phone number, and an additional 83 (41.5% would not object to obtaining it. Of the 171 patients (85.5% who had e-mail addresses, 25 (14.6% said they would be very interested in obtaining their physician’s e-mail address, 85 (49.7% said they would not object to getting it, and 61 (35.7% were not interested. In practice only one patient had requested the physician’s e-mail address and none actually had it. Conclusions Patients favored cell phones over e-mail for consulting with their treating physicians. With new technologies such as cell phones and e-mail in common use, it is important to determine how they can be best used and how they should be integrated into the flow

  20. E-Mail-Kommunikation als Form der Online-Beratung – Einzelfallstudie aus dem Fallmanagement eines SGB-II-Trägers

    Katharina Katz

    2009-04-01

    Full Text Available Die Autorin hat eine Einzelfallstudie über die E-Mail-Kommunikation einer Fallmanagerin mit ihren Beratungskunden im JobCenter angefertigt. Hierfür hat sie sowohl die grundsätzlichen Möglichkeiten in der Arbeitslosenberatung des JobCenters ergänzend zur persönlichen Beratung per E-Mail zu kommunizieren als auch den konkreten E-Mail-Verlauf binnen dreier Wochen ausgewertet. Ein Abdruck beispielhafter E-Mail-Kommunikationsverläufe rundet die Arbeit ab.

  1. A Knowledge Acquisition Method of Judgment Rules for Spam E-mail by using Self Organizing Map and Automatically Defined Groups by Genetic Programming

    Ichimura, Takumi; Mera, Kazuya; HARA, AKIRA

    2010-01-01

    In this paper, we propose a classification method for Spam E-mail based on the results of SpamAssassin. This method can learn patterns of Ham and Spam E-mails. First, SOM can classify many E-mails into the some categories. In this phase, we can see the characters of current received Spam E-mails. Second, ADG can extract the correct judgment rules of Hams misjudged as Spams. However, there are a few cases of Spam misjudged as Ham. In this experiment, ADG makes an over fitting to the characters...

  2. Differences between chat room and e-mail sampling approaches in Chinese men who have sex with men.

    Wang, Quanyi; Ross, Michael W

    2002-10-01

    In a study to determine sampling differences between Internet sites, we obtained data on 353 men who have sex with men in Chinese gay chat rooms and through e-mail web sites. Respondents were approached by the investigator and agreed to fill out an anonymous questionnaire on their Internet use and sexual activity. All materials and contacts were in Chinese characters. Data indicated that there were few differences between the chat room and Internet samples, but that those using e-mail appear to be more isolated, more homosexually-identified (rather than bisexual), have more experience with casual partners on a number of sexual activities, and were less likely to carry condoms and to have safe sex. E-mail respondents were more likely to want to discuss HIV/AIDS prevention on a web site or other site. These data suggest that the two recruiting methods are largely comparable in respondent characteristics, but that e-mail respondents are likely to be more isolated and at higher HIV risk than chat room participants. PMID:12413182

  3. Assessing the Factors Affecting the Amount of E-Mail Spam Delivery in a Public School District

    Yasenchock, David A.

    2013-01-01

    Eighty to ninety percent of e-mail is considered unsolicited commercial communication, or spam. Not only does spam violate the privacy of users, but it also incurs societal costs associated with time-related losses, serves as a vehicle for cyber-crime, and threatens the success of e-commerce by lowering consumer confidence. This quantitative…

  4. New information technology and communication in health care: using e-mail for marketing services

    Jorge Iván Martínez Espitia

    2015-01-01

    Full Text Available Research that was conducted was aimed to determine their use of e-mail independent health professionals. Email is one of the tools of information and communication that has shown great versatility and efciency as a means to improve the relationship between those who provide services or sell products users. Good communication is essential to keep current customers and attract new business prospects. To achieve the objective of the research a survey that measured the perception and use of email marketing by independent health professionals was conducted in Colombia. Four variables, including tenure email account, receiving these email accounts marketing of products or services, read marketing emails and use by marketing professionals were measured with email. The result of this study showed that independent health professionals in Colombia are familiar with this type of marketing. Generally interested incorporate it as one of your marketing tools, but do not know how to do this activity, which is described in a simple way how to do a marketing campaign with the use of emails to the users of health services.

  5. Auto-Faxing imaging reports to referring physicians

    Robertson, Pauline; Day, Dennis; Leung, Desmond; Chien, Eugene; Lima-Simao, Fatima

    1997-01-01

    One of the major service issues within Medical Imaging is delivering reports quickly to referring physicians. As an effort to improve service, Mount Sinai Hospital’s Department of Medical Imaging implemented Auto-Fax to distribute imaging reports to physicians instead of the postal service. When a report is transcribed and then verified by the dictating radiologist, the radiology information system will automatically fax the result report to the referring physicians if subscribed to the Auto-...

  6. IntegraTUM Teilprojekt E-Mail: Aufbau eines mandantenfähigen Groupware-Services und seine Integration in Identity Management und E-Mail Infrastruktur der Technischen Universität München

    Diehn, Max

    Die E-Mail-Infrastruktur an der Technischen Universität München (TUM) ist historisch bedingt sehr heterogen und komplex. Viele Einrichtungen müssen wertvolle Arbeitskraft auf die Administration eigener Mailserver verwenden. Auf der anderen Seite wird bei einigen Einrichtungen der Ruf nach Groupware-Funktionalitäten wie z.B. gemeinsame Kalender immer lauter. Das Teilprojekt E-Mail stellt einen zentralen Mail- und Groupware-Service bereit, der den Einrichtungen ermöglichen soll, den Betrieb eigener Server und zugehöriger Systeme (etwa lokaler Benutzerverwaltungen) für diesen Zweck aufzugeben und diese Dienste an das Teilprojekt E-Mail zu migrieren, ohne ihre Verwaltungshoheit oder ihre Maildomains aufgeben zu müssen. Dieser Service versteht sich als eine Ergänzung zur bestehenden Grundversorgung der TUM mit den Maildiensten des myTUM-Mailers, ist mandantenfähig aufgebaut und kann daher künftig neben der TUM auch weiteren Organisationen im Münchner Wissenschaftsnetz zur Verfügung gestellt werden.

  7. Personal Media Producer: A System for Creating 3D CG Animation from Mobile Phone E-mail

    Koichi Emura

    2006-05-01

    Full Text Available Mobile phone e-mail is increasingly being chosen by consumers as their primary communication tool. Messages exchanged among mobile phone users frequently contain “emoticons (smileys” and “emoji (pictograms”. Some consumers have started to use services that add a relevant animated image to a message. Consumers will start to exchange animated messages if they are available. This paper proposes a method of generating animation sequences from plain text messages without an authoring process. This method utilizes information available in the consumer’s ubiquitous computing environment to obtain necessary information not included in the original e-mail. The results of the preliminary evaluation show that a user needs around two minutes to create a one-minute animation using this method, a 3.6 times improvement in creation efficiency over that of a prior method.

  8. The Uses of E-mail as a Medium on the Contante Justitie Proceedings on the Courts in Indonesia

    Yasser S. Wahab; Julianto J.J. Kalalo; Lisa Mery

    2015-01-01

    This research aims to know how the contante justitie principle may be applied into the enforced legislation in Indonesia, and to investigate the synergy of proceedings by means of e-mail in realizing contante justitie. The research employed in this paper is normative research, using both primary and secondary legal sources. Primary sources obtained from compiling relevant rules on the research concerned, in addition to secondary sources taken from books, court decisions, newspapers, internet ...

  9. Support Vector Machines Parameter Selection Based on Combined Taguchi Method and Staelin Method for E-mail Spam Filtering

    Wei-Chih Hsu; Tsan-Ying Yu

    2012-01-01

    Support vector machines (SVM) are a powerful tool for building good spam filtering models. However, the performance of the model depends on parameter selection. Parameter selection of SVM will affect classification performance seriously during training process. In this study, we use combined Taguchi method and Staelin method to optimize the SVM-based E-mail Spam Filtering model and promote spam filtering accuracy. We compare it with other parameters optimization methods, such as g...

  10. Phone and e-mail counselling are effective for weight management in an overweight working population : A randomized controlled trial

    Dekkers J Caroline; Ariëns Geertje AM; van Wier Marieke F; Hendriksen Ingrid JM; Smid Tjabe; van Mechelen Willem

    2009-01-01

    Abstract Background The work setting provides an opportunity to introduce overweight (i.e., Body Mass Index ≥ 25 kg/m2) adults to a weight management programme, but new approaches are needed in this setting. The main purpose of this study was to investigate the effectiveness of lifestyle counselling by phone or e-mail on body weight, in an overweight working population. Secondary purposes were to establish effects on waist circumference and lifestyle behaviours, and to assess which communicat...

  11. The Diagnostic Agreement of Original and Faxed Copies of Electrocardiograms

    Sadrihe Hajesmaeel-Gohari

    2013-02-01

    Full Text Available Background: General practitioners working in remote and rural areas sometimes need consultation with cardiologists. One practical and cost-effective way is transmission of patients’ electrocardiographic images via ordinary fax machine to the cardiologists, but there is an important question that how much agreement exists between the diagnoses made by reading an original electrocardiogram and its copy transmitted via fax.Materials and Methods: In this cross-sectional study, 60 original electrocardiographic images were given to cardiologists for diagnosis. In the next step those electrocardiographic images were faxed to the hospital through a simple cheap fax machine, one month later the same cardiologist was asked to put his diagnosis on the copied versions of electrocardiographs, and the results were compared. Results: In 59 studied cases, the two method of diagnoses were exactly the same and only in one case the diagnoses were different. Therefore, Kappa agreement coefficient was calculated as 96%.Conclusion: According to the results of this study, general practitioners working in deprived areas can be certainly recommended to send patients’ electrocardiographic images to the cardiologists via fax in the case of needing consultation.

  12. Phone and e-mail counselling are effective for weight management in an overweight working population: a randomized controlled trial

    Dekkers J Caroline

    2009-01-01

    Full Text Available Abstract Background The work setting provides an opportunity to introduce overweight (i.e., Body Mass Index ≥ 25 kg/m2 adults to a weight management programme, but new approaches are needed in this setting. The main purpose of this study was to investigate the effectiveness of lifestyle counselling by phone or e-mail on body weight, in an overweight working population. Secondary purposes were to establish effects on waist circumference and lifestyle behaviours, and to assess which communication method is the most effective. Methods A randomized controlled trial with three treatments: intervention materials with phone counselling (phone group; a web-based intervention with e-mail counselling (internet group; and usual care, i.e. lifestyle brochures (control group. The interventions used lifestyle modification and lasted a maximum of six months. Subjects were 1386 employees, recruited from seven companies (67% male; mean age 43 (SD 8.6 y; mean BMI 29.6 (SD 3.5 kg/m2. Body weight was measured by research personnel and by questionnaire. Secondary outcomes fat, fruit and vegetable intake, physical activity and waist circumference were assessed by questionnaire. Measurements were done at baseline and after six months. Missing body weight was multiply imputed. Results Body weight reduced 1.5 kg (95% CI -2.2;-0.8, p Conclusion Lifestyle counselling by phone and e-mail is effective for weight management in overweight employees and shows potential for use in the work setting. Trial registration ISCRTN04265725.

  13. Support Vector Machines Parameter Selection Based on Combined Taguchi Method and Staelin Method for E-mail Spam Filtering

    Wei-Chih Hsu

    2012-04-01

    Full Text Available Support vector machines (SVM are a powerful tool for building good spam filtering models. However, the performance of the model depends on parameter selection. Parameter selection of SVM will affect classification performance seriously during training process. In this study, we use combined Taguchi method and Staelin method to optimize the SVM-based E-mail Spam Filtering model and promote spam filtering accuracy. We compare it with other parameters optimization methods, such as grid search. Six real-world mail data sets are selected to demonstrate the effectiveness and feasibility of the method. The results show that our proposed methods can find the effective model with high classification accuracy

  14. Pros and Cons when Combining E-mail Marketing with Telemarketing in Business-to-Business Direct Marketing

    Ignatov, Sille

    2011-01-01

    The objective of this thesis is to find pros and cons for combining e-mail marketing with telemarketing in business-to-business direct marketing. This topic is current because more and more businesses want to properly use this combination but have no skills of doing it successfully. One of the example company is EcoTelematics Group, for whom this thesis has been written for. However, due to the general level of the content other businesses struggling with the same issues can find help from...

  15. 'Can you upload as soon as you can please?' A study of university student requests by e-mail in English Medium Instruction

    Lazarescu, Raluca Catalina

    2013-01-01

    In the last two decades, the use of Information and Communication Technology (ICT) has somewhat changed educational patterns. More specifically, e-mail communication in the academic setting has to some extent modified the student-teacher relationship (Economidou-Kogetsidis, 2011). Through electronic mail, students no longer need to wait until lesson time or advising sessions to have their queries and requests solved. The use of e-mail seems to have made possible a new kind of relationship bet...

  16. 1991 worldwide petroleum phone/fax/telex directory

    This book puts more than 34,000 worldwide locations just a phone call or fax or telex message away. The directory lists companies and their subsidiaries in locations from Alaska to Zaire, whether their operations are in exploration, production, refining, transportation, petrochemicals, etc., offshore or on land. The listings are organized by country, with the companies listed in alphabetical order. So if you happen to know the country you wish to reach, you simply choose the company listed under it. And if you happen to know only the company name, two company indices will help you find the specific location you want. The Company Index Hierarchical lists all subsidiaries, branches, divisions, etc., under their corporate names. The Company Index - Alphabetical lists all entries alphabetically. Country codes for telephone, fax or telex are provided

  17. 一种新的E-mail应用模式的研究%A New Model of E-mail Application

    马勤; 陶先平; 吕建

    2001-01-01

    E-mail has been the most mature and widely used way of mail exchanging on Internet. But its ability is far more than this. Virtually,it can be used as a basic facility for data exchanging and automatic processing in various domain applications. From this point of view,a new model of E-mail application is presented in this paper,and based on the new model,we advise a two-layer framework for implementation. In the framework a middleware system EAMS is desigened and implemented with well generality,flexibility and expandability. Also meeting notification is discussed as a typical application.

  18. E-mail marketing e a influência na intenção de compra do consumidor online : caso Clubefashion

    Silva, Marta Costa da

    2015-01-01

    Mestrado em Marketing O e-commerce é hoje um grande motor da economia mundial. O e-mail marketing continua a ser a ferramenta de comunicação mais poderosa na decisão de compra. Este projeto tem como objetivo perceber a influência do e-mail marketing na intenção de compra, analisando de que forma algumas das variáveis que caracterizam as campanhas, como linha de assunto, layout e segmentação, bem como as taxas de aberturas e cliques, contribuem para maior propensão para a compra. Para tal, ...

  19. E-mail og/eller SMS: 22 husholdningers erfaringer på baggrund af et års feedback om elforbruget

    Larsen, Anders

    Hovedresultatet er, at husholdningerne værdsætter on-line information (via sms og e-mail) om udviklingen i deres elforbrug. Husholdningerne værdsætter dette uafhængigt af deres holdninger i øvrigt til energibesparelser. Informationen giver husholdningerne en ønsket oplevelse af kontrol. Rapporten...

  20. Comparing Traditional Journal Writing with Journal Writing Shared over E-mail List Serves as Tools for Facilitating Reflective Thinking: A Study of Preservice Teachers

    Kaplan, Diane S.; Rupley, William H.; Sparks, Joanne; Holcomb, Angelia

    2007-01-01

    To determine the conditions that would best encourage reflection in journal writing of preservice teachers in field-based reading internships, the degree of reflective content found in self-contained traditional journals was compared to the reflective content found in journal entries shared over e-mail list serves. Participants were 56 preservice…

  1. Efficient information theoretic strategies for classifier combination, feature extraction and performance evaluation in improving false positives and false negatives for spam e-mail filtering.

    Zorkadis, V; Karras, D A; Panayotou, M

    2005-01-01

    Spam emails are considered as a serious privacy-related violation, besides being a costly, unsolicited communication. Various spam filtering techniques have been so far proposed, mainly based on Naïve Bayesian algorithms. Other Machine Learning algorithms like Boosting trees, or Support Vector Machines (SVM) have already been used with success. However, the number of False Positives (FP) and False Negatives (FN) resulting through applying various spam e-mail filters still remains too high and the problem of spam e-mail categorization cannot be solved completely from a practical viewpoint. In this paper, we propose a novel approach for spam e-mail filtering based on efficient information theoretic techniques for integrating classifiers, for extracting improved features and for properly evaluating categorization accuracy in terms of FP and FN. The goal of the presented methodology is to empirically but explicitly minimize these FP and FN numbers by combining high-performance FP filters with high-performance FN filters emerging from a previous work of the authors [Zorkadis, V., Panayotou, M., & Karras, D. A. (2005). Improved spam e-mail filtering based on committee machines and information theoretic feature extraction. Proceedings of the International Joint Conference on Neural Networks, July 31-August 4, 2005, Montreal, Canada]. To this end, Random Committee-based filters along with ADTree-based ones are efficiently combined through information theory, respectively. The experiments conducted are of the most extensive ones so far in the literature, exploiting widely accepted benchmarking e-mail data sets and comparing the proposed methodology with the Naive Bayes spam filter as well as with the Boosting tree methodology, the classification via regression and other machine learning models. It is illustrated by means of novel information theoretic measures of FP & FN filtering performance that the proposed approach is very favorably compared to the other rival methods

  2. Foreign language learning using e-mail in a task-oriented perspective: Interuniversity experiments in communication and collaboration

    Barson, John; Frommer, Judith; Schwartz, Michael

    1993-12-01

    From 1988 to 1990 several collaborative “cross-country” intermediate French classes at Harvard and Stanford became one class. Students combined their efforts and insights in the accomplishment of a semester-long task, in most cases the publication of a student newspaper or magazine, using the electronic mail (e-mail) network to contact each other, elaborate their plans, and bring their projects to successful conclusion. Additional experiments of a similar nature took place between Harvard and the University of Pittsburgh (in the spring of 1990) and between Stanford and the University of Pittsburgh during 1991 1993. This paper suggests that this type of task-oriented learning through distance-communication is applicable at many different course levels and has considerable merit as an approach to teaching and learning. The key phases of this task-based model are presented along with technological information regarding computers and networks, as a guide to colleagues interested in pursuing similar lines of experimental teaching. Also included are samples of student messages, with their varied and often highly colorful discourse features, which attest to the motivation of students and reveal the strong personal investment made by the participants as they join hands across the miles in a productive, communication-based enterprise. The language and learning styles generated by technology and computers fully deserve closer investigation by researchers and teaching practitioners alike. The authors summarize the experiments, discuss assessment, and present research issues, concluding that good pedagogy and quality technology must share a vision of what can be accomplished in this rapidly evolving educational work place.

  3. Motivation and identity in a class of young EFL students in Taiwan: Effects of participating in an e-mail exchange with native English speaking students.

    White, Simon

    2014-01-01

    Abstract This dissertation focuses on motivation and identity in language learning by studying a class of young (elementary school) EFL learners in Taiwan. The students participated in an e-mail exchange program with a group of similarly aged native speaking students in England. The exchange offered the students a more stimulating way of using their English than their conventional classes, and afforded them the opportunity of communicating with a group of native...

  4. How can PT efficiently and effectvely align its e-mail and sms marketing efforts to drive channel migrations to online touchpoints?

    Almeida, Rodrigo

    2016-01-01

    This work studies the current Portugal Telecom’s Customer Journey, exploring opportunities to do channel migrations into online touchpoints by using E-mail and SMS as tools, as a way to be more efficient. In-depth interviews were conducted to access PT’s strategic aim, and 913 persons were surveyed about their path when contacting the company and its competitors. Statistical evidence was found for differences between the telecommunications operators in the use of some touchpoints, mainly Word...

  5. Reklam i din bästa vän? : en jämförelse av uppfattningar av reklam genom E-mail respektive SMS

    Larsson, Josefin

    2012-01-01

    The work with this paper began with a belief that the permission aspect plays acrucial part when it comes to consumers perceptions of marketing through E-mailand SMS - especially when it comes to advertising that is received through a devicethat the consumer has a strong personal relationship with. The questions to beinvestigated was: "How do users of computers and mobile phones feel aboutadvertisement received through E-mail and SMS?" and "In what way does the usersrelationship to the comput...

  6. Faxing Structures to the Moon: Freeform Additive Construction System (FACS)

    Howe, A. Scott; Wilcox, Brian; McQuin, Christopher; Townsend, Julie; Rieber, Richard; Barmatz, Martin; Leichty, John

    2013-01-01

    Using the highly articulated All-Terrain Hex-Limbed Extra-Terrestrial Explorer (ATHLETE) robotic mobility system as a precision positioning tool, a variety of print head technologies can be used to 3D print large-scale in-situ structures on planetary surfaces such as the moon or Mars. In effect, in the same way CAD models can be printed in a 3D printer, large-scale structures such as walls, vaults, domes, berms, paving, trench walls, and other insitu derived elements can be FAXed to the planetary surface and built in advance of the arrival of crews, supplementing equipment and materials brought from earth. This paper discusses the ATHLETE system as a mobility / positioning platform, and presents several options for large-scale additive print head technologies, including tunable microwave "sinterator" approaches and in-situ concrete deposition. The paper also discusses potential applications, such as sintered-in-place habitat shells, radiation shielding, road paving, modular bricks, and prefabricated construction components.

  7. E-mail as the Appropriate Method of Communication for the Decision-Maker When Soliciting Advice for an Intellective Decision Task.

    Prahl, Andrew; Dexter, Franklin; Swol, Lyn Van; Braun, Michael T; Epstein, Richard H

    2015-09-01

    For many problems in operating room and anesthesia group management, there are tasks with optimal decisions, and yet experienced personnel tend to make decisions that are worse or no better than random chance. Such decisions include staff scheduling, case scheduling, moving cases among operating rooms, and choosing patient arrival times. In such settings, operating room management leadership decision-making should typically be autocratic rather than participative. Autocratic-style decision-making calls for managers to solicit and consider feedback from stakeholders in the decision outcome but to make the decision themselves using their expert knowledge and the facts received. For this to be effective, often the manager will obtain expert advice from outside the organization (e.g., health system). In this narrative review, we evaluate the advantages and disadvantages of using prompt asynchronous written communication (i.e., e-mail) as a communication channel for such interaction between a decision-maker (manager) and advisor. A detailed Appendix (Supplemental Digital Content, http://links.lww.com/AA/B72) lists each observational and experimental result. We find that the current ubiquitous role of e-mail for such communication is appropriate. Its benefits include improved time management via asynchronicity, low cognitive load (e.g., relative to Web conferencing), the ability to hide undesirable and irrelevant cues (e.g., physical appearance), the appropriateness of adding desirable cues (e.g., titles and degrees), the opportunity to provide written expression of confidence, and the ability for the advisor to demonstrate the answer for the decision-maker. Given that the manager is e-mailing an advisor whose competence the manager trusts, it is unnecessary to use a richer communication channel to develop trust. Finally, many of the limitations of e-mail can be rectified through training. We expect that decades from now, e-mail (i.e., asynchronous writing) between an

  8. The 16 most common fossil groups from Danian found in Faxe Quarry

    Lauridsen, Bodil Wesenberg

    2009-01-01

    Twelve folders dealing with the 16 most common fossil groups from Danian found in Faxe Quarry. The folders are for sale at the museum and designated for visitor......Twelve folders dealing with the 16 most common fossil groups from Danian found in Faxe Quarry. The folders are for sale at the museum and designated for visitor...

  9. Kurumsal Bilgi Kaynağı Olarak E-posta Yönetim Sistemleri = E-mail Management Systems as an Enterprise Information Resource

    Külcü, Özgür

    2012-01-01

    Full Text Available Çalışmada, e-posta kullanımı ve yönetimine ilişkin uluslararası koşullar incelenmekte, bu çerçevede Türkiye’de 28 kurum örneğinde gerçekleştirilen anket verileri değerlendirilmektedir. Betimleme yönteminin kullanıldığı çalışmada literatür incelemesi ve anket tekniklerine dayanarak gerekli veriler elde edilmiştir. Araştırmada e-posta kullanımına ilişkin elde edilen verilerin, ilgili alanda sistemler geliştirmeye çalışan araştırmacılara yardımcı olması beklenmektedir. Kurumsal e-posta yönetimine ilişkin temel sorunlar arasında mesajların üretimi, düzenlenmesi, ayıklanması ve uzun süre korunmasını içeren e-posta yönetim sistemlerinin geliştirilmesi yer almaktadır. Ayrıca insan kaynakları, mali ve idari konuların yönetimi ile belge ve arşiv yönetimi çalışmalarını kapsamına alan, içerisine e-posta yönetiminin de dâhil olduğu sistemlerin bütünleştirilmesi güncel araştırma konuları arasındadır. / This study examines the universal usage and management of e-mail communication and compares with the data, gathered from 28 Turkish institutions. This is a descriptive research in nature and the quantitative data were collected through surveys. It is expected that the results one-mail communication and its usage styles will shed a ligth into researcher who are working on system development. One of the basic problems of organizational e-mail management systems are lack of e-mail systems including message creation, maintenance, disposition, and long term preservation. Furthermore, the results indicate that integration of human resources management, financial and administrative management systems and archival management systems with e-mail managment system is another major problem.

  10. UNIFYING AUTHENTICATION OF MOODLE AND E-MAIL SYSTEM BASED ON LDAP%Moodle及邮件系统基于LDAP的统一身份认证

    徐鹂; 王耀

    2011-01-01

    Moodle and e-mail system are two related,but separate applications,they have their own authentication system. Under the campus application environment, the practical problem we have encountered is how to realise the uniform authentication and management of both. Through learning and comprehending the authentication ways of two systems,and proceeding from the LDAP data model,we elaborately discuss the config uration of LDAP server as well as the process of LDAP configuration in regard to Moodle and e-mail system as the client sides.%Moodle和邮件系统是两个既相关又独立的应用系统,它们有各自的认证体系.在校园应用环境下,如何实现两者的统一认证和管理,这是在工作实际中遇到的一个问题.通过对两个系统的认证方式的认识和了解,从轻量级目录访问协议LDAP的数据模型入手,着重讨论LDAP服务器的配置以及作为客户端的Moodle与邮件系统的LDAP配置过程.

  11. What a rude e-mail! Examining the differential effects of incivility versus support on mood, energy, engagement, and performance in an online context.

    Giumetti, Gary W; Hatfield, Andrea L; Scisco, Jenna L; Schroeder, Amber N; Muth, Eric R; Kowalski, Robin M

    2013-07-01

    Existing research on workplace incivility has demonstrated an association with a host of negative outcomes, including increased burnout, turnover intentions, and physical symptoms. With the rise in Internet communication over the last decade, interpersonal mistreatment has spilled over to the Internet, but little is known about the impact of incivility communicated via e-mail on employee psychological and performance outcomes. The current study presents a within-subjects experiment wherein incivility and support were manipulated in a laboratory-based simulated workplace setting. Eighty-four participants completed a series of math tasks while interacting with either an uncivil or a supportive supervisor via e-mail. Data were collected on energy, cardiac activity, mood, task performance, and engagement. Findings indicate that participants reported higher levels of negative affect and lower levels of energy after working with the uncivil supervisor than with the supportive supervisor. Additionally, participants performed significantly worse on the math tasks and had lower engagement in the uncivil condition than the supportive condition, and these relationships were mediated by energy. No differences were found in cardiac activity between the two conditions. Results are discussed in terms of their implications for the 21st century world of work. PMID:23834445

  12. CyLaw-Report XXVII: Zu Art. 10 GG bei der "Beschlagnahme" von E-Mails auf dem Mailserver des Providers und beim Zugriff des Arbeitgebers auf E-Mails des Arbeitnehmers : Entscheidungen des Bundesverfassungsgerichts (BVerfG) vom 16.06.2009 - 2 BvR 902/06, des Verwaltungsgerichtshofs (VGH) Kassel vom 19.05.2009 - 6 A 2672/08.Z und des Verwaltungsgerichts (VG) Frankfurt vom 06.11.2008 - 1 K 628/08.F

    Schmid, Viola

    2009-01-01

    Im Sachverhalt der Entscheidung des BVerfG nehmen die Ermittlungsbehörden Zugriff auf E-Mails, die nicht auf einem Rechner des Durchsuchten, sondern nur beim Provider gespei-chert sind. Die Herrschaft des E-Mail-Account-Inhabers ist also nicht absolut, sondern von der Entscheidung des Diensteanbieters über die Preisgabe der Daten abhängig. Im Sach-verhalt der Entscheidung des VG Frankfurts verlangt die Bundesanstalt für Finanzdienstleis-tungsaufsicht (BaFin) von einem Arbeitgeber, der die Pri...

  13. COPROLITES FROM THE DANIAN LIMESTONE (LOWER PALEOCENE) OF FAXE QUARRY, DENMARK

    Milàn, Jesper

    2010-01-01

    attributed to sharks, and large, cylindrical coprolites with longitudinal striations on the surface are identified as crocodile coprolites. Fish and sharks are known from abundant finds of otoliths and teeth in Faxe Quarry, and crocodiles are known from finds of single bones and teeth....

  14. SNG-log in borehole P7 in Faxe Chalk Quarry

    Korsbech, Uffe C C

    1996-01-01

    A spectral natural gamma-ray log in a 190 m borehole in Faxe chalk quarry confirms that Danish bryozoan and corallic limestones contain very low levels of natural radioactivity. Due to the low content of natural radioactivity it has been possible to observe the influence from cosmic radiation. The...

  15. Increasing Induction-Level Teachers' Positive-to-Negative Communication Ratio and Use of Behavior-Specific Praise through E-Mailed Performance Feedback and Its Effect on Students' Task Engagement

    Rathel, Jeanna M.; Drasgow, Erik; Brown, William H.; Marshall, Kathleen J.

    2014-01-01

    The purpose of this study was to examine the effects of e-mailed specific performance feedback that included progress monitoring graphs on induction-level teachers' ratios of positive-to-negative communication behaviors and their use of behavior-specific praise in classrooms for students with emotional and behavioral disorders, mild…

  16. A catalogue of Danian gastropods from the Baunekule facies, Faxe Formation, Denmark

    Lauridsen, B.W.

    2014-12-01

    Full Text Available This catalogue of 194 gastropod taxa is based on the collection of Danian gastropods from the Baunekule facies, Faxe Formation in eastern Denmark. The gastropod fauna is extremely rich and well preserved. Most of the gastropods (106 species are referred to genus level only, 9 morphotypes to even higher taxonomical levels and 79 gastropods are referred to species level. The gastropods are classified following Bouchet & Rocroi (2005 as 4 different clades: Vetigastropoda (represented by 26 species and 10 superfamilies, Caenogastropoda (represented by 142 species and 17 superfamilies, Heterobranchia (represented by 23 species and 5 superfamilies and Opisthobranchia (represented by 1 species and 1 superfamily. The new species Zaclys? nuetzeli n. sp. is introduced. The Faxe Formation is recognised as a cold-water coral ecosystem with interfingering smaller bryozoan mounds. The Baunekule facies is found in the upper part of the coral mound complex of the Faxe Formation, where it forms isolated lensoidal bodies in the flanks of some of the coral mounds. It is characterised by a high diversity invertebrate fauna that occurs in weakly consolidated coraldominated floatstone to rudstone. The diagenesis of the Baunekule facies is of special significance because a high proportion of the originally aragonite-shelled fauna is preserved by recrystallization to calcite during early burial diagenesis. Most of the gastropods are not known from other parts of the Faxe Fm. The fauna is very important for comparative evolutionary studies of fossil and modern gastropods on cold-water coral mounds. Many of the genera have not previously been recorded from Danian strata. None of the gastropod species found in the Baunekule facies are known for certain to range below the Cretaceous–Palaeogene boundary. The fauna is comparable to gastropods found on modern cold-water coral mounds in the North Atlantic. The gastropod fauna from the Baunekule facies is characterised by a

  17. Spam Collaborative Filtering in Enron E-mail Network%邮件网络协同过滤机制研究

    杨震; 赖英旭; 段立娟; 李玉鑑; 许昕

    2012-01-01

    基于 Enron邮件集合探索真实邮件网络,揭示出邮件网络的无标度特性和有限小世界特性.在此基础上,依据用户间交互强度设计出垃圾邮件协同过滤机制,通过调整参数λ,用户可以决定主要是依靠自己还是其他用户协同进行垃圾信息过滤.算法即使在没有对用户个人阅读习惯充分训练的情况下,也可以通过基于交互强度的网络协同方式实现良好过滤.同时为了解决Enron数据集缺乏标注的情况,基于训练样本集W和测试样本集T独立同分布的假设,利用改进的EM (Expectation maximization)算法最小化WUT集合上风险函数,给出了未知样本的一个良好标注.真实数据上的实验表明,同单.机过滤和集成过滤方法相比,协同过滤能够提高平均过滤精度且方法简单易行.%Social network analysis in Enron corpus found that the real e-mail network was a scale-free and small world in some degree. Then a spam collaborative filtering method was designed based on users' interaction. By adjusting the parameter A, users can decide filtering spam by themselves or others or trade-off between them. Even in the absence of reading habits of users, the collaborative filtering method could achieve good performance. Because the Enron corpus was unlabeled, by adding I.I.d. Assumption constraint to training data set W and test data set T, we labeled Enron corpus using improved EM (Expectation maximization) algorithm in a sense of minimum statistical risk in W ∪ T. Experiment results showed that the collaborative filtering method is simple and effective which can steadily increase average accuracy compared with single machine and ensemble filterings.

  18. Bite traces in a turtle carapace fragment from the middle Danian (Lower Paleocene) bryozoan limestone, Faxe, Denmark

    Milan, Jesper; Lindow, Bent Erik Kramer; Lauridsen, Bodil Wesenberg

    2011-01-01

    A fragment of a turtle carapace from the Middle Danian bryozoan limestone at the Faxe quarry, eastern Denmark, is identified as a partial costal plate from the carapace of a chelonioid turtle. The fragment bears traces of three separate acts of predation or scavenging. Two circular bite traces...... either alone or in a row of three, are either from sharks or fish. This is the first record of turtles from the Danian bryozoan limestone exposed in Faxe....

  19. MAX06 and FAX06: update of two adult human phantoms for radiation protection dosimetry

    The International Commission on Radiological Protection (ICRP) is currently preparing new recommendations which will replace those released in ICRP 1991, 1990 Recommendations of the ICRP ICRP Publication 60 (Oxford: Pergamon). The draft report previews a change for the effective dose with respect to the number of organs and tissues to be included in its calculation. In the future, adipose tissue, connective tissue, the extrathoracic airways, the gall bladder, the heart wall, the lymphatic nodes, the prostate and the salivary glands have to be taken into account for the determination of the effective dose. This study reports on a second segmentation of the recently introduced male adult voxel (MAX) and female adult voxel (FAX) phantoms with regard to the new organs and tissues, but also presents a revised representation of the skeletons, which had not been adjusted to ICRP-based volumes in the first release of the two phantoms

  20. E-mailed Evidence Based Summaries Impact Physician Learning More than Practice. A Review of: Grad, Roland M., Pierre Pluye, Jay Mercer, Bernard Marlow, Marie Eve Beauchamp, Michael Shulha, Janique Johnson-Lafleur and Sharon Wood-Dauphinee. “Impact of Research-based Synopses Delivered as Daily E-mail: A Prospective Observational Study.” Journal of the American Medical Informatics Association (2008)15.2: 240-5.

    Hannigan, Gale G.

    2009-01-01

    Objective – To determine the use and construct validity of a method to assess the cognitive impact of information derived from daily e-mail evidence based summaries (InfoPOEMs), and to describe the self-reported impact of these InfoPOEMs.Design – Prospective, observational study over a period of 150 days employing a questionnaire and rating scale.Setting – This study was conducted via the Internet between September 8, 2006 and February 4, 2007.Subjects – Canadian Medical Association (CMA) mem...

  1. The fate of a middle Danian (Lower Paleocene) turtle from the bryozoan limestone of Faxe Quarry, Denmark

    Milàn, Jesper; Lindow, Bent Erik Kramer; Lauridsen, Bodil Wesenberg

    A piece of turtle carapace from the Middle Danian bryozoan limestone at the Faxe quarry, eastern Denmark, is identified as a partial coastal plate from the carapace of a chelonioid turtle. In addition to being the first record of turtles from the Middle Danian of Denmark, the fragment bears...

  2. Implementing a fax referral program for quitline smoking cessation services in urban health centers: a qualitative study

    Cantrell Jennifer

    2009-12-01

    Full Text Available Abstract Background Fax referral services that connect smokers to state quitlines have been implemented in 49 U.S. states and territories and promoted as a simple solution to improving smoker assistance in medical practice. This study is an in-depth examination of the systems-level changes needed to implement and sustain a fax referral program in primary care. Methods The study involved implementation of a fax referral system paired with a chart stamp prompting providers to identify smoking patients, provide advice to quit and refer interested smokers to a state-based fax quitline. Three focus groups (n = 26 and eight key informant interviews were conducted with staff and physicians at two clinics after the intervention. We used the Chronic Care Model as a framework to analyze the data, examining how well the systems changes were implemented and the impact of these changes on care processes, and to develop recommendations for improvement. Results Physicians and staff described numerous benefits of the fax referral program for providers and patients but pointed out significant barriers to full implementation, including the time-consuming process of referring patients to the Quitline, substantial patient resistance, and limitations in information and care delivery systems for referring and tracking smokers. Respondents identified several strategies for improving integration, including simplification of the referral form, enhanced teamwork, formal assignment of responsibility for referrals, ongoing staff training and patient education. Improvements in Quitline feedback were needed to compensate for clinics' limited internal information systems for tracking smokers. Conclusions Establishing sustainable linkages to quitline services in clinical sites requires knowledge of existing patterns of care and tailored organizational changes to ensure new systems are prioritized, easily integrated into current office routines, formally assigned to specific

  3. Development of a Fax-Based System for Incorporating Nondigital Paper-Based Data into DICOM Imaging Examinations

    Rothpearl, Allen; Sanguinetti, Rafael; Killcommons, John

    2008-01-01

    We describe the development of software that allows and automates the routine inclusion of nondigital paper-based data directly into DICOM examinations. No human intervention is required. The software works by allowing the direct faxing of nondigital paper-based patient data directly into DICOM imaging examinations and is added as the first series in the examination. The software is effective in any typical PACS/DICOM server environment.

  4. Ratios between the effective doses for tomographic phantoms MAX and FAX

    In the last two decades, the coefficients for the equivalent dose in organs and tissues, as well as to the effective dose, recommended by the International Commission on Radiological Protection (ICRP) were determined using exposure models based on stylized phantoms type MIRD, representing the human body with its radiosensitive organs and tissues according to the ICRP 23 Reference Man, Monte Carlo codes that simulate in a simplified way radiation physics, fabric compositions from different sources, and sometimes applied in a no realistic way, and by the list of organs and tissues at risk with their corresponding weight factors, published in ICRP 60. In the meantime, the International Commission on radiation units and Measurements (ICRU) published reference data to human tissue compositions in ICRU 44 and ICRP launched new anatomical and physiological data of reference in the report number 89. In addition a draft report with recommendations to be released in 2005 (http://icrp.org/) advances significant changes in the list of radiosensitive organs and tissues as well as their corresponding weight factors. As a practical consequence, all components of the traditional stylized models of exposure should be replaced: Monte Carlo codes, human phantoms, the compositions of the fabric and the selection of the organs and tissues at risk with their respective weight factors to determine the effective dose. This article presents the results of comprehensive research into the dosimetric consequences of replacing the stylized models of exposure. The calculations were done using the EGS4 Monte Carlo and MCNP4C codes for external and internal exposure to photons and electrons with phantoms ADAM and EVA, as well as with tomographic phantoms MAX and FAX, for different compositions and tissue distributions. The ratios between effective doses for models of exposure based on phantoms of voxels and effective doses for the stylized models for external and internal exposure to photons and

  5. E-mailed Evidence Based Summaries Impact Physician Learning More than Practice. A Review of: Grad, Roland M., Pierre Pluye, Jay Mercer, Bernard Marlow, Marie Eve Beauchamp, Michael Shulha, Janique Johnson-Lafleur and Sharon Wood-Dauphinee. “Impact of Research-based Synopses Delivered as Daily E-mail: A Prospective Observational Study.” Journal of the American Medical Informatics Association (200815.2: 240-5.

    Gale G. Hannigan

    2009-06-01

    Full Text Available Objective – To determine the use and construct validity of a method to assess the cognitive impact of information derived from daily e-mail evidence based summaries (InfoPOEMs, and to describe the self-reported impact of these InfoPOEMs.Design – Prospective, observational study over a period of 150 days employing a questionnaire and rating scale.Setting – This study was conducted via the Internet between September 8, 2006 and February 4, 2007.Subjects – Canadian Medical Association (CMA members who received InfoPOEMs via e-mail as of September 2006 were invited to participate. For inclusion in the analyses, a participant was defined as a practising family physician or general practitioner who submitted at least five ratings of InfoPOEMS during the study period (n=1,007.Methods – Volunteers completed a demographic questionnaire and provided informed consent online. Each subsequent InfoPOEM delivered included a link to a “ten-item impact assessment scale” (241. Participants checked “all that apply” of descriptive statements such as: My practice was (will be improved; I learned something new; I think this information is potentially harmful. Each combination of selections made was considered a pattern of cognitive impact. College of Family Physicians of Canada received continuing medical education (CME credit for each InfoPOEM rated. Data were collected by the CMA and forwarded weekly to the investigators who used descriptive statistics, principal component analysis, and multilevel factor analysis to analyze the data.Main Results – 1,007 participants rated an average of 61 InfoPOEMs (ranging from five to 111. A total of 61,493 patterns of cognitive impact were submitted. Eighty-five different patterns were observed, i.e., there were 85 different combinations of the scale’s statements used. Ten patterns accounted for 89.4% of the reports. The top five patterns were: I learned something new (35.2%; No impact (17.1%; This

  6. Instalace, konfigurace a testování serverových služeb typu www, e-mail, DNS a SAMBA v prostředí IPv4 a IPv6

    Dosoudil, Petr

    2012-01-01

    Cílem práce je ukázat zprovoznění serverových služeb typu www, e-mail, DNS a SAMBA, v prostředích operačních systémů Microsoft Windows Server 2008 a Debian. Teoretická část práce se zaměřuje na popis jednotlivých služeb a princip jejich fungování. Dále je doplněna o problematiku modelu TCP/IP, včetně jeho vrstev a rozdílů mezi IPv4 a IPv6. V praktické části je pro každou službu navržena určitá realizace, zabývající se instalací a následnou konfigurací dané služby ve vybraných operačních systé...

  7. 基于WinPcap的邮件信息解析系统的实现与优化%Realize and optimize of E-mail information analysis system based on WinPcap

    吴鑫; 余飞

    2009-01-01

    随着互联网的迅速发展,利用电子邮件进行不良信息传播的情况越来越严重,给用户带来极大的困扰,因此对网络中的邮件信息进行有效获取已成为当务之急.根据WinPcap抓包原理,研究了基于简单邮件传输协议SMTP(Simple Message Transfer Protocol)及邮局协议POP3(Post Office Protocol 3)传输的邮件信息解析方法,实现了一个基于WinPcap的邮件信息解析系统EIAS(E-mail Information Analysis System) 并提出了系统的性能优化方案.本文的研究成果不仅填补了在高速网络环境下邮件正文及附件信息还原方案的空白,更为监控网络中的不良信息提供了参考.

  8. 图书馆邮件服务系统集成的设计与实现%Design and Implementation of Library E-mail Service System Integration

    秦志华

    2011-01-01

    利用电子邮件开展读者服务已经成为图书馆日常服务的基本手段。但如何将图书馆多个读者服务系统通过电子邮件集成起来,实现一站式电子邮件服务,通过采用Jmail组件与PowerBuilder开发平台。实现了图书馆多个信息服务系统间的集成,有效地提高了图书馆读者电子邮件服务的质量与效率。%Using E-mail in reader service has become the basic daily method of library. But how to integrate multiple reader service by Email system, and realize one-stop Email service, is the focus of this article. The article realized the integration of the multiple library information service systems by using Jmail component and PowerBuilder development platform, and then effectively improved the library reader Email service quality and efficiency.

  9. Bridging cultural diversity through e-mail

    Shachaf, Pnina

    2005-01-01

    The implementation of global virtual teams presents modern organizations with significant challenges, such as a multicultural workforce and the use of information and communication technology. Cultural diversity increases teamwork complexity and may weaken a team's effectiveness and jeopardize its viability. Selection and implementation of appropriate information technology may facilitate group processes and overcome potential barriers created by team heterogeneity. This study illustrates how...

  10. Virtual Racism Rears its Head: Uncovering Librarian Bias in E-mail Reference Services. A review of: Shachaf, Pnina, and Sarah Horowitz. “Are Virtual Reference Services Color Blind?” Library & Information Science Research 28.4 (Sept. 2006): 501‐20.

    Wendy Furlan

    2007-01-01

    Objective – To examine whether librarians provide equitable virtual reference services to diverse user groups.Design – Unobtrusive method of defined scenarios submitted via e-mail.Setting – Twenty‐three Association of Research Libraries (ARL) member libraries from across the United States. All ARL member libraries were invited to participate, with the 23 acceptances providing 19% participation.Subjects – Anonymous librarians from the 23 participating libraries’ virtual e‐mail reference servic...

  11. Evaluation of Prescriber Responses to Pharmacist Recommendations Communicated by Fax in a Medication Therapy Management Program (MTMP)

    Perera, Prasadini N.; Guy, Mignonne C.; Sweaney, Ashley M.; Boesen, Kevin P.

    2016-01-01

    BACKGROUND As defined by the Medicare Prescription Drug, Improvement, and Modernization Act of 2003, medication therapy management programs (MTMPs) must be designed to decrease adverse drug events and improve patient outcomes by promoting appropriate medication use. WellPoint Inc. contracted with the pharmacist-run University of Arizona College of Pharmacy Medication Management Center (UA MMC) to provide a pilot telephone-based MTMP to approximately 5,000 high-risk beneficiaries from among its nearly 2 million Medicare prescription drug plan (PDP) beneficiaries. Eligibility for the program was determined by a minimum of 2 of 6 chronic diseases (dyslipidemia, cardiovascular disease, depression, diabetes mellitus, congestive heart failure, and chronic obstructive pulmonary disease; at least 1 of the latter 2 diseases must be present), at least 3 Part-D covered medications, and greater than $4,000 per year in predicted drug spending. In addition to these criteria, WellPoint Inc. used the Johns Hopkins adjusted clinical groups (ACG) predictive model to identify the high-risk beneficiaries to be enrolled in the program. Medication therapy reviews were conducted for these patients. If any medication-related problems (MRPs) were identified, the patient’s prescribers were contacted via a fax communication with recommendation(s) to resolve these MRPs. The UA MMC fax interventions were categorized as cost saving, guideline adherence, or safety concerns. OBJECTIVES To (a) determine prescriber responses to pharmacist-initiated recommendations in an MTMP for the 3 intervention categories, (b) compare prescriber responses between intervention categories, and (c) compare prescriber response by prescriber type (primary care physician [PCP] vs. specialist) within each intervention category. METHODS A retrospective analysis of pharmacist-initiated interventions from August through December 2008 was performed using data collected from the UA MMC database. Data were collected on

  12. Provisional English Translation by the IAEA of Notification Faxes Sent by the Fukushima Daiichi NPP Site Superintendent to Off-Site Officials on 11 March 2011. Annex I of Technical Volume 3

    This annex contains a provisional English translation of the faxes sent by the Fukushima Daiichi NPP Site Superintendent to METI, the Governor of Fukushima Prefecture and the Mayors of Okuma and Futaba on 11 March 2011

  13. Estimation of past sea-level variations based on ground-penetrating radar mapping of beach-ridges - preliminary results from Feddet, Faxe Bay, eastern Denmark

    Hede, Mikkel Ulfeldt; Nielsen, Lars; Clemmensen, Lars B; Noe-Nygaard, Nanna

    2011-01-01

    Estimates of past sea-level variations based on different methods and techniques have been presented in a range of studies, including interpretation of beach ridge characteristics. In Denmark, Holocene beach ridge plains have been formed during the last c. 7700 years, a period characterised by both...... isostatic uplift and changes in eustatic sea-level, and therefore represent an archive of past relative sea-level variations. Here, we present preliminary results from investigation of beach ridges from Feddet, a small peninsula located in Faxe Bay (Baltic Sea) in the eastern part of Denmark. Feddet has...... architecture which may be used as a proxy of past relative sea-level. High-resolution GPR images with a vertical resolution of c. 0.1 m of the near-surface sediments resolve downlapping reflections along the GPR profiles, which are interpreted to mark the transition from the beach to the upper shoreface regime...

  14. Erfahrungsbericht: E-Mail-Beratung in der Jugendberatungsstelle Waggon

    Katharina Fidesser

    2006-09-01

    Full Text Available Wie in vielen anderen Einrichtungen auch, entstand die e-Mailberatung in der Beratungsstelle WAGGON in Mödling einfach deshalb, weil es die Nachfrage gab. Niemand ahnte, dass sich dieser Bereich so weiterentwickeln und die Nachfrage so ansteigen würde, doch genau das ist passiert. Diese Tatsache machte es erforderlich, neue Strukturen und Herangehensweisen zu erarbeiten, um weiterhin ein professionelles Beratungsangebot, angepasst an die Bedingungen des WAGGONs und den neuesten Entwicklungen im Bereich der Online-Beratung, garantieren zu können. Die e-Mailberatung im WAGGON ist immer noch in einem Entwicklungsstadium. Aber wir haben schon viel erreicht, verbessert, ausprobiert, verworfen und wieder eingeführt.

  15. Elforbrug på e-mail & sms

    Christiansen, Ellen Tove; Kanstrup, Anne Marie; Grønhøj, Alice;

    electricity suppliers should focus on feedback about metering and billing as a service, which in the first place supports households' wish to sustain themselves. In the second place, this feedback also brings energy consumption issues more to the foreground, improves general energy literacy, and plays a role...... in storytelling to friends and family. Thereby it also becomes part of the social norm landscape and contributes to the fostering of both family identity and the education of children. Such a reframing of feedback information from a saving focus to a service focus may lead to the development of new...

  16. E-Mail Server and Traffic Control Management in 2012

    Cosmin Catalin Olteanu

    2012-12-01

    Full Text Available Emails represents one of the most used communication system in world wide web for more than 15 years and “spam” messages are one of the most annoying and disturbing phenomena. All of us are aware that online marketers are trying to transmit their advertising messages to as many addresses they can. For such “unwanted” messages, adaptive systems must be assembled to review and mark what is wright and what is bad. Always these systems must adapt to consumers preferences to mark only that messages that are not in his white list. Surveys for more than 3000000 messages showed me that some criteria can be defined by start.

  17. Archiving Writers' Work in the Age of E-Mail

    Kolowich, Steve

    2009-01-01

    The job of literary archivist is changing as paper manuscripts yield to laptops, Blackberry's, and Facebook content, and digital preservation lets scholars learn more about authors' creative process than ever before. Personal computers and external storage devices have been around for more than a quarter-century, but only now, as the famous…

  18. E-mail security: new restriction on attachments

    The Mail Team

    2006-01-01

    In order to further protect CERN mail users against viruses that spread using malicious files, from 1st March onwards dangerous file types already forbidden as mail attachments will also be forbidden as contents of an archive attachment (.zip and .rar compressed files). More details, including a list of blocked file types, can be found at http://cern.ch/mmmservices/Help/?kbid=171010 The Mail Team

  19. E-mail security: new restriction on attachments

    The Mail Team

    2006-01-01

    In order to further protect CERN mail users against viruses that spread using malicious files, from 1st March onwards dangerous file types already forbidden as mail attachments will also be forbidden as contents of an archive attachment (.zip and .rar compressed files). More details, including a list of blocked file types, can be found at http://cern.ch/mmmservices/Help/?kbid=171010. The Mail Team

  20. Сlassification methodology e-mails using neural networks

    Терейковський, Ігор Анатолійович; Національний технічний університет України «Київський політехниічний інститут»

    2013-01-01

    The effectiveness of email security is largely dependent on the accuracy of spam detection in leaves and roots. Existing recognition methods based on statistical analysis of text information, which significantly limits their ability to detect new types of spam and leaks. To overcome this shortcoming proposed classification methodology sheets based on semantic analysis using an electronic neural networks. A used as input parameters of the neural network in the frequency of meeting the letter o...

  1. The Communicative Functions of Emoticons in Workplace E-Mails :-)

    Skovholt, Karianne; Grønning, Anette; Kankaanranta, Anne

    2014-01-01

    function as contextualization cues, which serve to organize interpersonal relations in written interaction. They serve 3 communicative functions. First, when following signatures, emoticons function as markers of a positive attitude. Second, when following utterances that are intended to be interpreted as...

  2. Clasificarea distribuita a mesajelor de e-mail

    Pop, Florin; Trauşan-Matu, Ştefan

    2011-01-01

    A basic component in Internet applications is the electronic mail and its various implications. The paper proposes a mechanism for automatically classifying emails and create dynamic groups that belong to these messages. Proposed mechanisms will be based on natural language processing techniques and will be designed to facilitate human-machine interaction in this direction.

  3. Integrating E-mail Service with Opportunistic Network

    Wang, Kunkun

    2011-01-01

    Haggle is a networking architecture for content-centric opportunistic communication. Legacy networks and legacy services are possible to be integrated into Haggle. A typical legacy service is email service. The key problem for integrating email service is that data is opportunistically transmitted to any node and any node which has Internet connection could be a potential email gateway. Therefore, one email may find many gateways in Haggle and duplicate emails will be sent to a destination. A...

  4. 75 FR 23747 - Notice of Availability (NOA) of the Draft Environmental Impact Statement for the Disposal and...

    2010-05-04

    ... writing either at the hearing or mailed or e-mailed to: Director, BRAC Program Management Office (PMO... (2) Written comments mailed to the BRAC PMO address in this notice; or (3) Written comments faxed to the BRAC PMO fax number in this notice; or (4) Comments submitted via e-mail using the BRAC PMO...

  5. 76 FR 10012 - Notice of Availability of the Draft Supplemental Environmental Impact Statement for the Disposal...

    2011-02-23

    ... 6:30 p.m. FOR FURTHER INFORMATION CONTACT: Director, BRAC PMO West, Attn: Mr. Ronald Bochenek, 1455... mailed to the BRAC PMO address in this notice; or (3) written comments faxed to the BRAC PMO fax number in this notice; or (4) comments submitted via e-mail using the BRAC PMO e-mail address in this...

  6. Assessments of conversion coefficients between equivalent dose and accumulated activity using pre-dose scanning images of patients subjected to radioiodine treatment and the Fax/Egs4 computational model

    The radioiodine is a technique for treatment of thyroid cancer. In this technique, the patients are submitted to the incorporation of the radioactive substance sodium iodide (Na131I), which reacts with physiologically metastasis, thyroid tissue remains of and other organs and tissues of the human body. The locations of these reactions are known as areas of highest concentration, hipercaptured areas, hiperconcentrator areas, ''hot areas'' or organ-sources and are viewed through images of nuclear medicine scan known as pre-dose (front and rear). To obtain these images, the patient receives, orally, a quantity of 131I with low activity (±74 MBq) and is positioned in the chamber of flicker. According to the attendance of hot areas shown in the images, the doctor determines the nuclear activity to be administered in treatment. This analysis is purely qualitative. In this study, the scanning images of pre-dose were adjusted to the dimensions of FAX voxel phantom, and the hot areas correspond to internal sources of the proposed model. Algorithms were developed to generate particles (photons and electrons) in these regions of the FAX. To estimate the coefficients of conversions between equivalent dose and accumulated activity in major radiosensitive organs, FAX and algorithms source were coupled to the Monte Carlo EGS4 code (Electron Gamma Shower, version 4). With these factors is possible to estimate the equivalent doses in the radiosensitive organs and tissues of patients as long as is know the activity administered and the half-life of organic sources. (author)

  7. Assessments of conversion coefficients between equivalent dose and accumulated activity using pre-dose scanning images of patients subjected to radioiodine treatment and the Fax/Egs4 computational model

    The radioiodine is a technique for treatment of thyroid cancer. In this technique, the patients are submitted to the incorporation of the radioactive substance sodium iodide (Na131I), which reacts with physiologically metastasis, thyroid tissue remains of and other organs and tissues of the human body. The locations of these reactions are known as areas of highest concentration, hipercaptured areas, hiperconcentrator areas, 'hot areas' or organ-sources and are viewed through images of nuclear medicine scan known as pre-dose (front and rear). To obtain these images, the patient receives, orally, a quantity of 131I with low activity (± 74 MBq) and is positioned in the chamber of flicker. According to the attendance of hot areas shown in the images, the doctor determines the nuclear activity to be administered in treatment. This analysis is purely qualitative. In this study, the scanning images of pre-dose were adjusted to the dimensions of FAX voxel phantom, and the hot areas correspond to internal sources of the proposed model. Algorithms were developed to generate particles (photons and electrons) in these regions of the FAX. To estimate the coefficients of conversions between equivalent dose and accumulated activity in major radiosensitive organs, FAX and algorithms source were coupled to the Monte Carlo EGS4 code (Electron Gamma Shower, version 4). With these factors is possible to estimate the equivalent doses in the radiosensitive organs and tissues of patients as long as is know the activity administered and the half-life of organic sources. (author)

  8. 基于ICT中间件的电信级网络传真运营系统%A Telecom-Grade Network Fax Operation System Based on ICT Mid-Ware Technology

    林晓勇; 糜正琨; 赵康; 张奇

    2011-01-01

    The faxing behaviors have been investigated and analyzed for conventional enterprises and individuals, A novel central-mode and telecom-level network fax operation system (FOS) is implemented for operator's valued-added service(VAS), the system is schemed by ICT (information communication technology)mid-ware technology which separate the specific upper applications from the complex lower driven devices, the varying applications can quickly be ordered by the ICT SCE (service creation environment) even for a short-time trainee, the ICT Flow solves the service flow and state scheduling, the ICT Engines drive the different devices of multi-venders in heterogeneous networks. The SIB (service independence block) are designed and classified, the GSL(general service logic) describes detailed logical relationship between SIB from the POI (point of initiation) to POR (point of return), FOS has a telecom-level redundancy deployment of load-sharing, key techniques also are interpreted including virtual fax number, online stamps and virtual print. The statistics proved it an efficient solution for the conventional and neglected fax service on a low-carbon and green earth under the summons of energy saving and emission reduction.%对传统企业和个人用户传真业务的行为进行了比较,为拓展运营商增值业务(VAS)设计了一种集中式的电信级网络传真运营系统(FOS).系统采用了将业务与设备分离的中间件技术,不同业务的定制由ICT SCE生成,业务的解析和调度ICTFIow完成,异构网络和多厂商设备的具体驱动由ICT Engine实现.ICT中间件解决了业务独立元件(SIB)的分类与通用业务逻辑(GSL)实现.设计了电信级的负荷分担的冗余保护方案,其创新点包括“虚拟传真号码”、“在线电子签章”和“虚拟打印技术”等关键技术.在当前号召“节能减排”、“绿色低碳”的社会中,FOS为传统的易忽视的传真业务提供了高效的解决方案.

  9. Virtual Racism Rears its Head: Uncovering Librarian Bias in E-mail Reference Services. A review of: Shachaf, Pnina, and Sarah Horowitz. “Are Virtual Reference Services Color Blind?” Library & Information Science Research 28.4 (Sept. 2006: 501‐20.

    Wendy Furlan

    2007-06-01

    Full Text Available Objective – To examine whether librarians provide equitable virtual reference services to diverse user groups.Design – Unobtrusive method of defined scenarios submitted via e-mail.Setting – Twenty‐three Association of Research Libraries (ARL member libraries from across the United States. All ARL member libraries were invited to participate, with the 23 acceptances providing 19% participation.Subjects – Anonymous librarians from the 23 participating libraries’ virtual e‐mail reference services. Up to 6 librarians from each library may have been involved. Six fictitious personas were developed to represent particular ethnic or religious groups, whereby the ethnic or religious affiliation was only indicated by the name chosen for each user and the correspondinge‐mail address. Names were selected from lists of names or baby names available online: Latoya Johnson (African‐American, Rosa Manuz (Hispanic, Chang Su (Asian ‐Chinese, Mary Anderson(Caucasian/Christian, Ahmed Ibrahim (Muslim, and Moshe Cohen(Caucasian/Jewish. These personas were used to submit reference queries via e‐mail to the virtual reference services taking part in the study.Methods – Five different types of reference queries were developed for use in this study. Three were based on prior published research as they were deemed to be answerable by the majority of libraries. They included a dissertation query, a sports team query, and a population query all designed to be tailored to the target institution. The other 2 queries were developed with participating institutions’ virtual reference guidelines in mind, and were thought to not be answered by the target institutions when submitted by unaffiliated users. They consisted of a subject query on a special collection topic that asked for copies of relevant articles to be sent out, and an article query requesting that a copy of a specific article be e‐mailed to the patron. The study was conducted over a 6 week

  10. Social and Emotional Issues of Living with OI

    ... need information about intimacy, sexuality, and reproduction. While dating may be delayed for some people, teens still ... or 301-947-0083 Fax: 301-947-0456 Internet: www.oif.org E-mail: bonelink@oif.org ...

  11. 75 FR 20977 - Departmental Management; Advisory Committee on Minority Farmers

    2010-04-22

    ... may also be requested by telephone, fax, or e-mail. All inquiries about the nomination process and... membership on the Committee and may be in the form of a letter of nomination or a completed...

  12. 75 FR 78673 - Agency Information Collection Activities: Proposed Collection; Comment Request-Study To Assess...

    2010-12-16

    ... also be submitted via fax to the attention of Steven Carlson at 703-305-2576 or via e-mail to Steve... administering the program. The natural experiment offered by the ARRA's benefit increase will be used to...

  13. 76 FR 31379 - Notice of Availability of Environmental Assessment and Finding of No Significant Impact for...

    2011-05-31

    ..., Pennsylvania, 19406. Telephone: 610-337-5236; fax number: 610-337-5269; e-mail: John.Nicholson@nrc.gov..., Pennsylvania this 18th day of May 2011. For the Nuclear Regulatory Commission. Judith A. Joustra,...

  14. 75 FR 69397 - Minnkota Power Cooperative, Inc.: Notice of Availability of an Environmental Assessment

    2010-11-12

    ... Independence Ave., SW., Room 2244-S, Stop 1571, Washington, DC 20250-1571, fax: (202) 690-0649, or e-mail... Auditor......... 115 West Main, 701-794-8777 Hensler, ND 58530. Sheridan County Auditor....... 215...

  15. The Characteristics ofEmailLanguage onInternet

    Wang Xiao-Hui; Ma Hao-Yan

    2014-01-01

    With the popular use of computer in our life and work, the E-mail has become the important medium of people’s communication insteadof letter, fax and telephone. The E-mail language has its own unique characteristics. On one hand it tends to be oral, informal,on the other hand it resemblesthetraditional letter which has the fixed structure of discourse .By analyzing the E-mail language features we can use the communication tool correctly.

  16. 75 FR 67697 - Privacy Act of 1974; Systems of Records

    2010-11-03

    ...: Title, full name, Social Security Number (SSN), current address, permanent address, phone number, cell phone number, e-mail address, office address, office phone number, office fax number, office e-mail... enrollment status at a Center for Academic Excellence (CAE) to include anticipated date of...

  17. 76 FR 1346 - Airworthiness Directives; Airbus Model A300, A300-600, A310, A318, A319, A320, A321, A330-300...

    2011-01-10

    ... 5 61 93 44 51; e-mail account.airworth-eas@airbus.com ; Internet http://www.airbus.com . For service... 96; fax +33 5 61 93 44 51; e-mail account.airworth-eas@airbus.com ; Internet http://www.airbus.com... ; Internet http://www.airbus.com . Examining the AD Docket You may examine the AD docket on the Internet...

  18. 75 FR 28103 - Indian Child Welfare Act; Designated Tribal Agents for Service of Notice

    2010-05-19

    ...; Fax: (907) 826-5526; E-mail: n/a. Crooked Creek, Village of, Evelyn Thomas, President and Lorraine... Xavier, ICWA Worker, P.O. 3551; E-mail: oxavier@avcp.org ; and Association of Village Council Presidents....cravalho@qira.org . Koyuk, Native Village of, Leo M. Charles Sr., Tribal Family Coordinator, P.O. Box...

  19. Wireless Controlled Methods via Voice and Internet (e-mail for Home Automation System

    R.A.Ramlee

    2013-08-01

    Full Text Available This paper presents a wireless Home Automation System (HAS that mainly performed by computer. The system is designed with several control methods in order to control the target electrical appliances. This various control methods implemented to fulfill the needs of users at home even at outside. The computer application is designed in Microsoft Windows OS that integrated with speech recognition voice control by using Microsoft Speech Application Programming Interface (SAPI. The voice control method provides more convenience especially to the blind and paralyzed users at home. This system is designed to perform short distance control by using wireless Bluetooth technology and long distance control by using Simple Mail Transfer Protocol (SMTP email control method. The short distance control is considered as the control that performed inside the house. Moreover, the long distance control can be performed at everywhere by devices that installed with browser or email application, and also with the internet access. The system intended to control electrical appliances at home with relatively low cost design, user-friendly interface and ease of installation.

  20. Chat, E-Mail, Web, and Chat Room Slang and Acronyms

    ... Shop AAP Find a Pediatrician Family Life Medical Home Health Insurance Pediatric Specialists Family Dynamics Adoption & Foster Care Communication & Discipline Types of Families Media Work & Play ...

  1. 76 FR 46853 - International Business Machines Corporation, ITD Business Unit, Division 7, E-mail and...

    2011-08-03

    ... Employment and Training Administration International Business Machines Corporation, ITD Business Unit... States Reporting to Armonk, NY; International Business Machines Corporation, Web Strategy and Enablement..., applicable to workers of International Business Machines Corporation (IBM), ITD Business Unit, Division 7,...

  2. Fair exchange in e-commerce and certified e-mail, new scenarios and protocols

    Draper Gil, Gerard

    2013-01-01

    We are witnessing a steady growth in the use of Internet in the electronic commerce field. This rise is promoting the migration from traditional processes and applications (paper based) to an electronic model. But the security of electronic transactions continues to pose an impediment to its implementation. Traditionally, most business transactions were conducted in person. Signing a contract required the meeting of all interested parties, the postman delivered certified mail i...

  3. Classification of Textual E-Mail Spam Using Data Mining Techniques

    Rasim M. Alguliev

    2011-01-01

    Full Text Available A new method for clustering of spam messages collected in bases of antispam system is offered. The genetic algorithm is developed for solving clustering problems. The objective function is a maximization of similarity between messages in clusters, which is defined by k-nearest neighbor algorithm. Application of genetic algorithm for solving constrained problems faces the problem of constant support of chromosomes which reduces convergence process. Therefore, for acceleration of convergence of genetic algorithm, a penalty function that prevents occurrence of infeasible chromosomes at ranging of values of function of fitness is used. After classification, knowledge extraction is applied in order to get information about classes. Multidocument summarization method is used to get the information portrait of each cluster of spam messages. Classifying and parametrizing spam templates, it will be also possible to define the thematic dependence from geographical dependence (e.g., what subjects prevail in spam messages sent from certain countries. Thus, the offered system will be capable to reveal purposeful information attacks if those occur. Analyzing origins of the spam messages from collection, it is possible to define and solve the organized social networks of spammers.

  4. On Classification of N=2 Supersymmetric Theories, (e-mail uncorrupted version)

    Cecotti, S.; Vafa, C.

    1992-01-01

    We find a relation between the spectrum of solitons of massive $N=2$ quantum field theories in $d=2$ and the scaling dimensions of chiral fields at the conformal point. The condition that the scaling dimensions be real imposes restrictions on the soliton numbers and leads to a classification program for symmetric $N=2$ conformal theories and their massive deformations in terms of a suitable generalization of Dynkin diagrams (which coincides with the A--D--E Dynkin diagrams for minimal models)...

  5. A Game Theoretic Framework for E-Mail Detection and Forgery Analysis

    Long Chen

    2016-01-01

    Full Text Available In email forensic, the email detection and forgery conflict is an interdependent strategy selection process, and there exists complex dynamics between the detector and the forger, who have conflicting objectives and influence each other’s performance and decisions. This paper aims to study their dynamics from the perspective of game theory .We firstly analyze the email basic structure and header information, then discuss the email detection and forgery technologies. In this paper, we propose a Detection-Forgery Game (DFG model and make a classification of players’ strategy with the Operation Complexity (OC. In the DFG model, we regard the interactions between the detector and the forger as a two-player, non-cooperative, non-zero-sum and finite strategic game, and formulate the Nash Equilibrium. The optimal detection and forgery strategies with minimizing cost and maximizing reward will be found by using the model. Finally, we perform empirical experiments to verify the effectiveness and feasibility of the model.

  6. A Game Theoretic Framework for E-Mail Detection and Forgery Analysis

    Long Chen; Yuan Lou; Min Xiao; Zhen-Xing Dong

    2016-01-01

    In email forensic, the email detection and forgery conflict is an interdependent strategy selection process, and there exists complex dynamics between the detector and the forger, who have conflicting objectives and influence each other’s performance and decisions. This paper aims to study their dynamics from the perspective of game theory .We firstly analyze the email basic structure and header information, then discuss the email detection and forgery technologies. In this paper, we propose ...

  7. The Language of Business E-Mail: An Opportunity to Bridge Theory and Practice

    Julio C. Gimenez

    2015-01-01

    The language of business email has attracted a great deal of attention in the last decade. Research studies on the language, style and register of business email have been published in many journals, books and other publications. However, many of these discussions have been theoretical in nature, failing to make a connection between theory and practice. It is then the task of the ESP teacher to make such a connection. This article argues that business communication lends itself well to bringi...

  8. Analysis of the Use of Linguistic Politeness Strategies in An E-mail

    屈厦沙

    2012-01-01

    I .Politeness in pragmatics The term "politeness" used by pragmaticis'ts is potentially misleading. It sounds as though it might be concerned with social etiquette, but it is not. Politeness in pragmatics describes the relationship between "how something is said and the addressee' s judgement as to how it should be said" (Grundy, 2000). In other words, politeness consists of strategies employed by participants in spoken and written discourse to best achieve their communicative goals in a particular context while attempting to maintain, or even enhance their relationship with the hearer or reader. To understand politeness in the .

  9. Measuring Organizational Consciousness Through E-Mail Based Social Network Analysis

    Gloor, Peter A.; Colladon, Andrea Fronzetti

    2015-01-01

    This paper describes first experiments measuring organizational consciousness by comparing six "honest signals" of interpersonal communication within organizations with organizational metrics of performance.

  10. Participation Rates in a Worksite Wellness Program Using E-Mail Wellness Messages

    Larry W. Anenson; Ardith Brunt; Donna J. Terbizan; Bryan Christensen

    2014-01-01

    The purpose of this study was to determine which days of the work week had the largest rate of opened e-health messages, whether detailed or basic e-health messages were more likely to be opened, if motivation influenced the rate of message opening, and if the rate of opening messages declined over time. Ninety-one city employees (52 male and 39 female) of a medium-sized Midwestern city in the United States participated in the study. Participants were divided into four groups accordin...

  11. The Language of Business E-Mail: An Opportunity to Bridge Theory and Practice

    Julio C. Gimenez

    2015-10-01

    Full Text Available The language of business email has attracted a great deal of attention in the last decade. Research studies on the language, style and register of business email have been published in many journals, books and other publications. However, many of these discussions have been theoretical in nature, failing to make a connection between theory and practice. It is then the task of the ESP teacher to make such a connection. This article argues that business communication lends itself well to bringing theory and practice closer together. To this end, the article first identifies relevant features which have started to emerge from main studies in the language of business email, a vital component in business communication. It then explores different possible pedagogical applications of these findings in the BE class. The article discusses the SAE (Selecting, Applying and Evaluating model which can be used to design and evaluate classroom activities. The article finally presents four activities which have been created following the main findings emerging from the research reviewed.

  12. Opportunities for reflection : e-mail and the web in the primary classroom

    Vries, de Bregje

    2004-01-01

    This thesis presents four design experiments in primary schools that address the following research problem: How can reflection be embedded in the learning process to improve the development of personal understanding of a domain and learning task?

  13. A NOVEL GRAPH MODEL FOR E-MAIL FORENSICS: EVIDENCE ACTIVITY ANALYSIS GRAPH

    Sridhar Neralla

    2013-10-01

    Full Text Available This work puts forward a novel technique for evidence analysis that assist cyber forensics expert for analyzing cyber crime episode in an effective manner. Novelty in Evidence Activity Analysis Graph is reflection of activities involved in the cyber crime that are represented as nodes along with stylometric analysis. In this pieceof work email based cyber crime incident is considered for study and that incident is represented in Evidence Activity Analysis Graph to fix the suspect. Comparisons between various graphs that are used in cyber forensics were also discussed in this paper. This model establishes relationships between various activities that were happened in the cyber crime.

  14. Finding Relationships between Socio-Technical Aspects and Personality Traits by Mining Developer E-mails

    Paruma-Pabón, Oscar Hernán; GONZÁLEZ, FABIO A.; Aponte, Jairo; Camargo, Jorge E.; Restrepo-Calle, Felipe

    2016-01-01

    Personality traits influence most, if not all, of the human activities, from those as natural as the way people walk, talk, dress and write to those most complex as the way they interact with others. Most importantly, personality influences the way people make decisions including, in the case of developers, the criteria they consider when selecting a software project they want to participate. Most of the works that study the influence of social, technical and human factors in software develop...

  15. Analysis of E-mail Marketing%E-mail营销策略运用浅析

    李巍

    2005-01-01

    介绍了E-mail营销的概念、内容和特点,分析了实施E-mail营销所存在的优势和问题,针对性地分析应当如何获取用户的E-mail地址,并行之有效地实施E-mail营销,实现企业网络营销的成功.

  16. Spam and E-Mail Marketing%垃圾邮件与E-Mail营销

    杜运庆; 白人朴; 王瑞婷

    2005-01-01

    根据中国互联网信息中心(CNNIC)最新的第15次中国互联网络发展状况报告,截止到2004年12月31日,我国的上网计算机总数已达4160万台,同上一次调查结果相比,我国的上网计算机总数半年增加了530万台,增长率为14.6%,是1997年10月第一次调查结果29.9万台的139.1倍,上网用户总人数为 9400 万,而这些用户得知新网站的主要途径有28.3%是通过电子邮件,可见E-Mail在电子营销中起着举足轻重的作用.然而,被誉为小企业宣传法宝的E-Mail营销却往往跟"垃圾邮件"形影不离,为广大网民所诟病.

  17. E-mail营销方法探讨%The E-mail Marketing Method Study

    李燕

    2006-01-01

    随着互联网的进一步发展和普及,E-mail营销越来越成为商家进行营销的一个重要手段,但是E-mail营销的发展现状却并不客人乐观.因此,研究E-mil营销的策略应是商家的首要选择.

  18. Email营销面临的问题%Questions E-mail Marketing Faced With

    于兆河

    2003-01-01

    随着计算机网络的快速发展,也为企业的营销增加了新的渠道,Email营销逐渐的被企业所应用,而且市场潜力巨大.但Email营销存在着很多急需解决的问题,在很大程度上制约了Email营销的发展.与传统的营销方法相比,其已逐渐开始体现出其优势,随着网络经济的发展和完善,Email营销必然发挥更大的作用.

  19. Dynamic modeling of web purchase behavior and e-mailing impact by Petri net

    BALAGUE, Christine; LEE, Janghyuk

    2004-01-01

    In this article, the authors introduce Petri nets to model the dynamics of web site visits and purchase behaviors in the case of wish list systems. They describe web site activities and their transition with probability distributions and model the sequential impact of influential factors through links that better explain web purchase behavior dynamics. The basic model, which analyzes site connections and purchases to explain visit and purchase behavior, performs better than a classical negati...

  20. The Hispanic View of E-mail, Popup, and Banner Advertising

    Pradeep K. Korgaonkar; Ronnie Silverblatt; Enrique P. Becerra

    2010-01-01

    In this paper, the authors broadly investigate Hispanic consumer attitudes and their sociological behaviors toward online advertising. The study documents the correlation between Hispanic attitudes, behaviors, and three types of online advertising that have an effect on cultural distinctions. Additionally, the study compares the group’s attitudes toward TV advertising vis-Ã -vis the three types of online advertising to compare the two medium’s similarities and differences. Notably, Hispanics ...

  1. E-Alerts: Environmental pollution and control (water pollution and control). E-mail newsletter

    NONE

    1999-04-01

    Topics of discussion include the following: Pollution by municipal wastes, agricultural wastes, industrial wastes, mine wastes, radioactive contaminants; Chemistry and analysis of pollutants; Thermal pollution; Oil pollution; Control techniques and equipment; Sewage treatment; Industrial waste water pretreatment; Hydrology and limnology; Biological and ecological effects; Waste water reuse; Laws, legislation, and regulations; Public administration; Economics; Land use.

  2. Wissen, Intuition und Können in der E-Mail-Beratung

    Marc Weinhardt

    2014-04-01

    Full Text Available The article clears the concepts of knowledge, intuition and skills in the domain of e-mailcounseling. Along a competence model of psychosocial counseling differences are analyzed between knowledge, skills and intuition under a development and structure perspective and then explained with regard to her significance for education, supervision and case work.

  3. Changes in the e-mail policy for people without CERN affiliation

    2012-01-01

    When affiliated with CERN, every computing account owner is entitled to have a CERN mail address (e.g. “John.Doe@cern.ch”). However, up to now, this mail address was still valid even after the end of a person's affiliation if the owner declared an external email address (e.g. “John.Doe@gmail.com”) to which all personal CERN emails (i.e. those sent to “John.Doe@cern.ch”) could be forwarded.*   As a result, to use our John Doe analogy, John could continue to write and receive emails ostensibly on behalf of CERN despite the fact that he is no longer a member of the personnel or subject to the CERN Staff Rules and Regulations and the Computing Rules. It is doubtful whether this makes sense. Therefore, in agreement with departments and LHC experiments at the last ITSRM meeting, all CERN email addresses of people whose affiliation has been terminated more than six months ago will be deactivated on 15 October 2012. For all others, incl...

  4. In e-mail to students, Annan urges communication to build understanding

    2003-01-01

    "Using the original computer on which the Internet was created, United Nations Secretary-General Kofi Annan today sent an electronic message to young people around the world urging them to keep communicating with each other to build bridges of understanding between cultures and societies" (1 page)

  5. Classification of Textual E-Mail Spam Using Data Mining Techniques

    Ramiz M. Aliguliyev; Rasim M. Alguliev; Nazirova, Saadat A.

    2011-01-01

    A new method for clustering of spam messages collected in bases of antispam system is offered. The genetic algorithm is developed for solving clustering problems. The objective function is a maximization of similarity between messages in clusters, which is defined by k-nearest neighbor algorithm. Application of genetic algorithm for solving constrained problems faces the problem of constant support of chromosomes which reduces convergence process. Therefore, for acceleration of convergence of...

  6. E-Alerts: Environmental pollution and control (radiation pollution and control). E-mail newsletter

    The paper discusses pollution of the environment by particle and electromagnetic radiation from natural and synthetic sources, including neutrons, X-rays, ultraviolet radiation, microwaves, alpha particles; Radon; Sampling and analytical techniques; Fallout; Biological and ecological effects; Laws, legislation, and regulations; Public administration; and Economics

  7. Participation Rates in a Worksite Wellness Program Using E-Mail Wellness Messages

    Anenson, Larry W.; Brunt, Ardith; Terbizan, Donna J.; Christensen, Bryan

    2014-01-01

    The purpose of this study was to determine which days of the work week had the largest rate of opened e-health messages, whether detailed or basic e-health messages were more likely to be opened, if motivation influenced the rate of message opening, and if the rate of opening messages declined over time. Ninety-one city employees (52 male and 39…

  8. REDISAIN FAX COURT IN THE ENFORCEMENT FOR TAX LAW FRAMEWORK

    Muhammad Djafar Saidi; Ruslan Hambali; Muchsin Salnia; Eka Merdekawati Djafar

    2013-01-01

    The research located at legal region of municipality of Jakarta, with considered that tax court include in ministry of finance of Indonesia republic and court of law of Indonesia republic are located in Jakarta. Tax court include in manistry of finance of Indonesia republik and court of law of Indonesia republic were expected to have relation to efforts in design the tax court in the enforcement of tax law framewark. The aim of the research are 1) to identify the position of tax court in Indo...

  9. The power of online advertising : how hedonic and utilitarian appeals on e-mail : newsletters can impact consumer choices

    Neves, Ana Manuel

    2015-01-01

    Digital marketing has revolutionized the advertising industry. One of the areas it has had a meaningful impact is on the online shopping experiences, called e-commerce. To engage and retain customers to an online shop, one of the most popular and beneficial advertising tools is the e-newsletter. To better understand how to optimize such a tool, this dissertation focuses on one of the main differentiations between products (hedonic vs. utilitarian), The purpose is to understand ...

  10. Phase 1 pilot study of e-mail support for people with long term conditions using the Internet

    Williamson Graham R

    2011-04-01

    Full Text Available Abstract Background Use of the Internet for people with Long Term Conditions (LTCs can have a positive effect on knowledge, social support, behavioural and clinical outcomes, yet there is concern that a 'digital divide' prevents some patients from benefitting. While some patients do not have access to the Internet, others that do may still lack expertise or the confidence to make full use of it. The aim of this pilot study was to develop an intervention and test methods for a definitive randomised controlled trial (RCT of anonymous personal online email support for patients in this latter group. Methods Recruitment success was evaluated by the number and appropriateness of participants recruited. A personalised e-health support intervention was developed. The provisional primary outcome was the extent to which the Internet affected the participants' confidence in dealing with their LTC. Primary outcome, seven process measures and two secondary outcomes measures were evaluated for completeness of data and sensitivity to detect changes. Results Thirty nine participants were recruited, 29 after personally receiving a leaflet, seven via email advertising, and three via leaflets left in waiting areas. Most participants (61% were aged over 60. The majority (21/38 rated themselves as experienced Internet users although only 5/38 had used discussion forums for their LTC. Piloting the intervention identified support needed as: (i technical help with some websites, (ii advice about issues such as anonymity, (iii help in judging information quality, (iv identification of relevant information (via 'Information Prescriptions', (v motivational support to try new sites. Attrition was fairly high: 20/39 completed follow up questionnaires. Three process measures showed ceiling effects and two had too many missing values to be useable. Conclusion E-health support is a promising way of addressing the problems faced by older generation e-health seekers. Face-to-face leaflet distribution recruited sufficient numbers but additional locations other than hospital should be tried to recruit Internet novices with LTCs. An RCT is feasible and necessary to evaluate the potential benefits of anonymous email support. Our methods could be used by other researchers studying Internet use by people with LTCs.