WorldWideScience

Sample records for group email email

  1. Group Dynamic Processes in Email Groups

    Science.gov (United States)

    Alpay, Esat

    2005-01-01

    Discussion is given on the relevance of group dynamic processes in promoting decision-making in email discussion groups. General theories on social facilitation and social loafing are considered in the context of email groups, as well as the applicability of psychodynamic and interaction-based models. It is argued that such theories may indeed…

  2. Email Negotiation

    DEFF Research Database (Denmark)

    Bülow, Anne Marie

    This paper investigates a set of email negotiations in order to explain a high number of deadlocks. The paper argues that one reason is the combination of cognitive effort characteristic of the e-mail genre, and the argumentative pattern found when two parties simultaneously try to persuade...... the other of the justice of their cause. For a negotiation involving the wording of a contract, the evidence suggests that, while there is a distinct advantage in the features of reviewability and revisablity, the email format allows selective attention to the other party’s arguments, which can be shown...

  3. Common Knowledge in Email Exchanges

    CERN Document Server

    Sietsma, Floor

    2011-01-01

    We consider a framework in which a group of agents communicates by means of emails, with the possibility of replies, forwards and blind carbon copies (BCC). We study the epistemic consequences of such email exchanges by introducing an appropriate epistemic language and semantics. This allows us to determine when a group of agents acquires common knowledge of the formula expressing that an email was sent. We also show that in our framework from the epistemic point of view the BCC feature of emails cannot be simulated using messages without BCC recipients. Finally, we clarify the notion of a causal relationship between emails using the concept of properly terminating email exchanges.

  4. Email Mining: A Survey

    Directory of Open Access Journals (Sweden)

    Pranjal S. Bogawar

    2012-01-01

    Full Text Available E-mail is one of the most widely used ways of written communication over the internet, and its traffic has increased exponentially with the advent of World Wide Web. The increase in email traffic comes also with an increase in the use of emails for illegitimate purpose. Phishing, Spamming, email bombing, threatening, cyber bullying, racial vilification, terrorist activities, child pornography and sexual harassment are common examples of e-mail abuses. So, there is a need for e-mail mining. Various methods and approaches were used by the scientists for classification of email messages in above categories. In this paper we are presenting various techniques and approaches used by researchers for email mining and subsequent classification.

  5. RECEIVING UNWANTED EMAIL?

    CERN Multimedia

    Denise Heagerty

    2002-01-01

    Unsolicited email, commonly known as SPAM, is a growing problem across the Internet at large. You are recommended to delete it. If the email looks suspicious, do not even open it (from Outlook you can delete email using the right button of your mouse to select the message and then selecting delete). Viruses are often hidden inside attachments, so do not open attachments in unsolicited email. SPAM and virus emails can be disguised to trick you into reading the email and/or performing an action. Here are examples of some techniques to help you recognise them: fake email addresses: emails can appear to be from people you know or even from yourself. Your own email address can appear in emails which you did not send, resulting in non-delivery messages or unexpected replies. Fake addresses may be used to send viruses. If the email looks suspicious then delete it and do not open the attachments. If you are unsure then check with the sender first. enticing subjects: the email subject uses words to make you curious...

  6. Hacked E-mail

    Science.gov (United States)

    ... Tips for Using Public Wi-Fi Networks Understanding Mobile Apps Apps to Help You Shop in Stores Hacked Email Laptop Security Bookmark Shopping Online with Virtual Currencies infographic Using IP Cameras ...

  7. Common knowledge in email exchanges

    NARCIS (Netherlands)

    Sietsma, F.; Apt, K.R.; van Eijck, D.J.N.; Verbrugge, R.

    2011-01-01

    We consider a framework in which a group of agents communicates by means of emails, with the possibility of replies, forwards and blind carbon copies (BCC). We study the epistemic consequences of such email exchanges by introducing an appropriate epistemic language and semantics. This allows us to

  8. FNAL central email systems

    Energy Technology Data Exchange (ETDEWEB)

    Schmidt, Jack; Lilianstrom, Al; Pasetes, Ray; Hill, Kevin; /Fermilab

    2004-10-01

    The FNAL Email System is the primary point of entry for email destined for an employee or user at Fermilab. This centrally supported system is designed for reliability and availability. It uses multiple layers of protection to help ensure that: (1) SPAM messages are tagged properly; (2) All mail is inspected for viruses; and (3) Valid mail gets delivered. This system employs numerous redundant subsystems to accomplish these tasks.

  9. EmailTime: visual analytics and statistics for temporal email

    Science.gov (United States)

    Erfani Joorabchi, Minoo; Yim, Ji-Dong; Shaw, Christopher D.

    2011-01-01

    Although the discovery and analysis of communication patterns in large and complex email datasets are difficult tasks, they can be a valuable source of information. We present EmailTime, a visual analysis tool of email correspondence patterns over the course of time that interactively portrays personal and interpersonal networks using the correspondence in the email dataset. Our approach is to put time as a primary variable of interest, and plot emails along a time line. EmailTime helps email dataset explorers interpret archived messages by providing zooming, panning, filtering and highlighting etc. To support analysis, it also measures and visualizes histograms, graph centrality and frequency on the communication graph that can be induced from the email collection. This paper describes EmailTime's capabilities, along with a large case study with Enron email dataset to explore the behaviors of email users within different organizational positions from January 2000 to December 2001. We defined email behavior as the email activity level of people regarding a series of measured metrics e.g. sent and received emails, numbers of email addresses, etc. These metrics were calculated through EmailTime. Results showed specific patterns in the use email within different organizational positions. We suggest that integrating both statistics and visualizations in order to display information about the email datasets may simplify its evaluation.

  10. Detecting and combating malicious email

    CERN Document Server

    Ryan, Julie JCH

    2014-01-01

    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both perso...

  11. Email Updates: MedlinePlus

    Science.gov (United States)

    ... of this page: https://medlineplus.gov/listserv.html Email Updates To use the sharing features on this ... view your email history or unsubscribe. Prevent MedlinePlus emails from being marked as "spam" or "junk" To ...

  12. A New Email Retrieval Ranking Approach

    CERN Document Server

    AbdelRahman, Samir; Bahgat, Reem; 10.5121/ijcsit.2010.2504

    2010-01-01

    Email Retrieval task has recently taken much attention to help the user retrieve the email(s) related to the submitted query. Up to our knowledge, existing email retrieval ranking approaches sort the retrieved emails based on some heuristic rules, which are either search clues or some predefined user criteria rooted in email fields. Unfortunately, the user usually does not know the effective rule that acquires best ranking related to his query. This paper presents a new email retrieval ranking approach to tackle this problem. It ranks the retrieved emails based on a scoring function that depends on crucial email fields, namely subject, content, and sender. The paper also proposes an architecture to allow every user in a network/group of users to be able, if permissible, to know the most important network senders who are interested in his submitted query words. The experimental evaluation on Enron corpus prove that our approach outperforms known email retrieval ranking approaches.

  13. A New Email Retrieval Ranking Approach

    CERN Document Server

    AbdelRahman, Samir; Bahgat, Reem; 10.5121/ijcsit.2010.2504

    2010-01-01

    Email Retrieval task has recently taken much attention to help the user retrieve the email(s) related to the submitted query. Up to our knowledge, existing email retrieval ranking approaches sort the retrieved emails based on some heuristic rules, which are either search clues or some predefined user criteria rooted in email fields. Unfortunately, the user usually does not know the effective rule that acquires best ranking related to his query. This paper presents a new email retrieval ranking approach to tackle this problem. It ranks the retrieved emails based on a scoring function that depends on crucial email fields, namely subject, content, and sender. The paper also proposes an architecture to allow every user in a network/group of users to be able, if permissible, to know the most important network senders who are interested in his submitted query words. The experimental evaluation on Enron corpus prove that our approach outperforms known email retrieval ranking approaches

  14. E-mail: Outlook Express

    Directory of Open Access Journals (Sweden)

    Zainul Bakri

    2012-10-01

    Full Text Available Salah satu layanan Internet yang sangat penting adalah electronic mail atau sering hanya disebut sebagai e-mail. Untuk menggunakan e-mail, diperlukan piranti lunak khusus supaya pengguna dapat mengirim dan menerima e-mail. Jenis piranti lunak e-mail diantaranya adalah Outlook Express yang merupakan satu paket yang didistribusikan bersama Internet Explorer versi 4. Piranti lunak ini dijalankan pada PC yang mempunyai sistem operasi Windows 95 atau 98. Jenis piranti lunak e-mail yang lain adalah Eudora, Pegasus dan sebagainya. Bahkan ada yang diintegrasikan dengan Web Browser (alat untuk menelusuri situs Web misalnya IE,dan Netscape.Sebagai layaknya pelayanan pos, maka setiap pengguna e-mail mempunyai alamat tertentu yang tidak mungkin dipunyai oleh pengguna lainnya diseluruh dunia. Untuk keperluan pendistribusian, maka e-mail mempunyai semacam kantor pos yang ditempatkan dalam sebuah komputer server (mail server atau sering disebut sebagai host. 

  15. Naive Bayesian for Email Filtering

    Institute of Scientific and Technical Information of China (English)

    2002-01-01

    The paper presents a method of email filter based on Naive Bayesian theory that can effectively filter junk mail and illegal mail. Furthermore, the keys of implementation are discussed in detail. The filtering model is obtained from training set of email. The filtering can be done without the users specification of filtering rules.

  16. Email Adaptation for Conflict Handling

    DEFF Research Database (Denmark)

    Lee, Joyce Yi‐Hui; Panteli, Niki; Bülow, Anne Marie

    2017-01-01

    This paper explores the context of email‐based communication in anestablished but fragile, inter‐organisational partnership, which wasoften overlain with conflict. Drawing upon adaptation theory, thisstudy explores how participants adapt to the use of email to handleconflict. Extensive data were...... the leanness of email in managing conflict, we found that underthe described conflict situation the very leanness of emailwas appreciated and thus, exploited by those concerned tomanage the conflict situation. Specifically, we identified 4 keyconflict‐triggered adaptation strategies, namely......, interactionavoidance, disempowering, blame‐protection, and image‐shelteringthat drove the ways in which email was adapted to maintainorganisational partnerships under conflict....

  17. Business e-mail communication

    Directory of Open Access Journals (Sweden)

    Bengin Senka

    2015-01-01

    Full Text Available This paper presents a discourse analysis in the business e-mail communication with the aim of determining formal and informal linquistic characteristics. Researched corpus has been based on 148 e-mails exchanged between a manager employed in a marketing agency and his clients. The research is based on Speech Act Theory and Theory of Politeness. It has been found that the analyzed business e-mail correspondence is mostly characterized as informal, even with the characteristics of colloquial communication, unlike the expected characteristics of formal business style.

  18. Personal Digital Libraries of Email

    Science.gov (United States)

    Gross, Benjamin M.

    In this paper, I describe the results of user interviews that reveal problems in current email systems, including role conflict, high cognitive overhead associated with organization and retrieval, inability to navigate conversations and difficulties in addressing messages. I also describe the design of a prototype system with an underlying message store for the email collection. Services layered on top of the message store address many problems described by users through improved support for identity and role management, authority control and query interfaces. Many of the solutions described in this paper to improve management of personal email collections can also be applied to other digital library collections.

  19. Hooked on E-Mail

    Science.gov (United States)

    Espinoza, Kathy

    2011-01-01

    Information overload, and an expectation that e-mails, tweets, and text messages will be answered immediately, impact productivity. The younger, information-addicted workers have a greater capacity to process this open floodgate of information, as well as a better ability to multitask. Research suggests that there is a marked drop in worker…

  20. Email Adaptation for Conflict Handling

    DEFF Research Database (Denmark)

    Lee, Joyce Yi‐Hui; Panteli, Niki; Bülow, Anne Marie

    2017-01-01

    This paper explores the context of email‐based communication in anestablished but fragile, inter‐organisational partnership, which wasoften overlain with conflict. Drawing upon adaptation theory, thisstudy explores how participants adapt to the use of email to handleconflict. Extensive data were ...

  1. People Like Emailing in English

    Institute of Scientific and Technical Information of China (English)

    张顺伍

    2002-01-01

    On a recent Friday,Beijing native Zhou Yanhong wrote this email to her friends:"How's everyone's Chinese New Year?I am looking forward to getting together with you.We can go to Karaoke,find a good place,before or after dinner or anywhere."

  2. Email-Set Visualization: Facilitating Re-Finding in Email Archives

    OpenAIRE

    Gorton, Douglas; Murthy, Uma; Vemuri, Naga Srinivas; Pérez-Quiñones, Manuel A.

    2007-01-01

    In this paper we describe ESVT – EmailSet Visualization Tool, an email archive tool that provides users a visualization to re-find and discover information in their email archive. ESVT is an end-to-end email archive tool that can be used from archiving a user’s email messages to visualizing queries on the email archive. We address email archiving by allowing import of email messages from an email server or from a standard existing email client. The central idea in ESVT’s visualization, an “em...

  3. The Importance of Etiquette in School Email

    Science.gov (United States)

    Filippone, Monica; Survinski, Melissa

    2016-01-01

    This article investigates the appropriate use of email among secondary and postsecondary students and instructors and provides recommendations for proper email etiquette. A review of the current literature shows that poor email etiquette can impact the working relationship between teachers and students. Evidence indicates that email etiquette must…

  4. Perancangan Email Client Dengan Pengklasifikasian Email Menggunakan Algoritma Vector Space Model

    OpenAIRE

    Christian, Moses

    2015-01-01

    On today's age of technology, widely used email to send information throughout the world. During the classification of the email is still done manually and less objective. So in this study, the authors apply the method of Vector Space Model (VSM) to make an automatic email classification and more objective. With this method of email classification can be done automatically based on address, subject, and body of an email that allows users to email in the organization of every incoming email in...

  5. Incrementally Exploiting Sentential Association for Email Classification

    Institute of Scientific and Technical Information of China (English)

    Li Qu; He Yu; Feng Jianlin; Feng Yucai

    2006-01-01

    A novel association-based algorithm EmailInClass is proposed for incremental Email classification. In view of the fact that the basic semantic unit in an Email is actually a sentence, and the words within the same sentence are typically more semantically related than the words that just appear in the same Email, EmailInClass views a sentence rather than an Email as a transaction. Extensive experiments conducted on benchmark corpora Enron reveal that the effectiveness of EmailInClass is superior to the non-incremental alternatives such as NaiveBayes and SAT-MOD. In addition, the classification rules generated by EmailInClass are human readable and revisable.

  6. Backpropagation Learning Algorithms for Email Classification.

    Directory of Open Access Journals (Sweden)

    *David Ndumiyana and Tarirayi Mukabeta

    2016-07-01

    Full Text Available Today email has become one the fastest and most effective form of communication. The popularity of this mode of transmitting goods, information and services has motivated spammers to perfect their technical skills to fool spam filters. This development has worsened the problems faced by Internet users as they have to deal with email congestion, email overload and unprioritised email messages. The result was an exponential increase in the number of email classification management tools for the past few decades. In this paper we propose a new spam classifier using a learning process of multilayer neural network to implement back propagation technique. Our contribution to the body of knowledge is the use of an improved empirical analysis to choose an optimum, novel collection of attributes of a user’s email contents that allows a quick detection of most important words in emails. We also demonstrate the effectiveness of two equal sets of emails training and testing data.

  7. MedlinePlus Connect: Email List

    Science.gov (United States)

    ... https://medlineplus.gov/connect/emaillist.html MedlinePlus Connect: Email List To use the sharing features on this ... developments and exchange ideas with your colleagues. This email list will be useful for health IT developers ...

  8. Email for clinical communication between healthcare professionals.

    Science.gov (United States)

    Goyder, Clare; Atherton, Helen; Car, Mate; Heneghan, Carl J; Car, Josip

    2015-02-20

    Email is one of the most widely used methods of communication, but its use in healthcare is still uncommon. Where email communication has been utilised in health care, its purposes have included clinical communication between healthcare professionals, but the effects of using email in this way are not well known. We updated a 2012 review of the use of email for two-way clinical communication between healthcare professionals. To assess the effects of email for clinical communication between healthcare professionals on healthcare professional outcomes, patient outcomes, health service performance, and service efficiency and acceptability, when compared to other forms of communicating clinical information. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 9 2013), MEDLINE (OvidSP) (1946 to August 2013), EMBASE (OvidSP) (1974 to August 2013), PsycINFO (1967 to August 2013), CINAHL (EbscoHOST) (1982 to August 2013), and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched November 2013). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies, and interrupted time series studies examining interventions in which healthcare professionals used email for communicating clinical information in the form of: 1) unsecured email, 2) secure email, or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two authors independently assessed studies for inclusion, assessed the included studies' risk of bias, and extracted data. We contacted study authors for additional information and have reported all measures as per the study report. The previous version of this review included one randomised controlled

  9. Conversation Threads Hidden within Email Server Logs

    Science.gov (United States)

    Palus, Sebastian; Kazienko, Przemysław

    Email server logs contain records of all email Exchange through this server. Often we would like to analyze those emails not separately but in conversation thread, especially when we need to analyze social network extracted from those email logs. Unfortunately each mail is in different record and those record are not tided to each other in any obvious way. In this paper method for discussion threads extraction was proposed together with experiments on two different data sets - Enron and WrUT..

  10. Detection of Illegitimate Emails using Boosting Algorithm

    DEFF Research Database (Denmark)

    2011-01-01

    In this paper, we report on experiments to detect illegitimate emails using boosting algorithm. We call an email illegitimate if it is not useful for the receiver or for the society. We have divided the problem into two major areas of illegitimate email detection: suspicious email detection...... and spam email detection. For our desired task, we have applied a boosting technique. With the use of boosting we can achieve high accuracy of traditional classification algorithms. When using boosting one has to choose a suitable weak learner as well as the number of boosting iterations. In this paper, we...

  11. On Successful E-Mail Writing

    Directory of Open Access Journals (Sweden)

    Vesna Vulić

    2009-12-01

    Full Text Available This article is intended to be a simplified guide for the efficient use of e-mail in business and private communication in English. E-mailing is frequently used as a substitute for other kinds of communication in today’s working environment, due in particular, to the fact that messages are transmitted instantly, irrespective of the distance of the recipient. Due to the speed and volume of e-mail, mastering the art of effective e-mail writing includes the knowledge of Network Etiquette or ‘Netiquette’ and it is therefore important that whether it be for business or private use, the basics of e-mail etiquette are followed. When writing an e-mail it is important to consider the recipient. Careful consideration will determine the content and style of the e-mail. No less important is knowing the points of detail in writing e-mail. That is, to be clear and concise in the specific information that the e-mail should contain. Furthermore, abbreviations, acronyms and emoticons are frequently found in e-mail and their use should also be considered. An e-mail is a valuable communication tool and it is essential to use it effectively in order to improve both professional and private communication.

  12. User Name Alias Extraction in Emails

    Directory of Open Access Journals (Sweden)

    Meijuan Yin

    2011-04-01

    Full Text Available Finding out user identity information from emails is one of the important research topics in email mining. Most approaches extract an email user’s name only from the header of an email, but there are often many name information appearing in the body of emails, and those names are usually more suitable for representing the sender’s or recipient’s identity. This paper focuses on the problem of extracting email users’ name aliases in the body of plain-text emails. After locating and extracting salutation and signature blocks from email bodies, we can identify the potential aliases in the salutation and signature lines, which can be directly associated with the corresponding email address in email headers, by using named entity recognition(NER tools. However the identified aliases may be half-baked or there are still some potential aliases that can’t be correctly identified. So we propose a novel approach to efficiently and accurately extract aliases in the salutation and signature lines based on name boundary word template built on the characteristics of alias neighboring words. Results on the public subset of the Enron corpus indicate that the approaches presented in this paper can efficiently extract user’s aliases from email bodies.

  13. A New Architecture for Email Knowledge Extraction

    Directory of Open Access Journals (Sweden)

    Majdi Beseiso

    2012-08-01

    Full Text Available The Semantic Web was designed to represent the enormous data that is existing on the World Wide Web ina machine readable format. The research shows the long period of time that was spent on the Emails forcommunication and information exchange. Adding the semantics to the existing Email systems could not only provide for the valuable usage of time and resources, but also refreshes the meaning of Email communication. The presented research work examines the ontology extraction process from the Email systems adopting scalable pattern rules that is based on the extracted techniques. The proposed architecture is designed to handle the unstructured Emails and the ontologies that are extracted from the Email which is divided into four main components as follows: the Ontology Learning Component, the Management Component, the Semantic Email Component and the Client Side Plugin.

  14. Using Insights from Email Users to Inform Organisational Email Management Policy

    Science.gov (United States)

    Ramsay, Judith; Renaud, Karen

    2012-01-01

    One would expect email substantially to increase organisational productivity and efficiency. There is little empirical evidence of this since email use is such a complex tool that it would be well nigh impossible to attribute efficiency increases solely to email. There is anecdotal evidence of the positive aspects of email (Phillips, S.R. and…

  15. Assessing e-mail intent and tasks in e-mail messages

    NARCIS (Netherlands)

    Sappelli, M.; Pasi, G.; Verberne, S.; Boer, M. de; Kraaij, W.

    2016-01-01

    In this paper, we analyze corporate e-mail messages as a medium to convey work tasks. Research indicates that categorization of e-mail could alleviate the common problem of information overload. Although e-mail clients provide possibilities of e-mail categorization, not many users spend effort on

  16. WORKLOAD CHARACTERIZATION OF SPAM EMAIL FILTERING SYSTEMS

    Directory of Open Access Journals (Sweden)

    Yan Luo

    2010-01-01

    Full Text Available Email systems have suffered from degraded quality of service due to rampant spam, phishing and fraudulent emails. This is partly because the classification speed of email filtering systems falls far behindthe requirements of email service providers. We are motivated to address this issue from the perspective of computer architecture support. In this paper, as the first step towards novel architecture designs, we present extensive performance data collected from measurement and profiling experiments using representative email filtering systems including CRM114, DSPAM, SpamAssassin and TREC Bogofilter. We provide detailed analysis of the time consuming functions in the systems under study. We also show how the processor architecture parameters affect the performance of these email filters through simulation experiments.

  17. Properties of evolving e-mail networks

    Science.gov (United States)

    Wang, Juan; de Wilde, Philippe

    2004-12-01

    Computer viruses spread by attaching to an e-mail message and sending themselves to users whose addresses are in the e-mail address book of the recipients. Here we investigate a simple model of an evolving e-mail network, with nodes as e-mail address books of users and links as the records of e-mail addresses in the address books. Within specific periods, some new links are generated and some old links are deleted. We study the statistical properties of this e-mail network and observe the effect of the evolution on the structure of the network. We also find that the balance between the generation procedure and deletion procedure is dependent on different parameters of the model.

  18. Tracking and Analytics Applied to Email Marketing

    OpenAIRE

    Widdowson, Jeremy

    2016-01-01

    The purpose of this thesis is to introduce both marketing theory, as well as email marketing theory, after which a case study will be conducted in order to demonstrate the effects of uti-lizing email tracking software in connection to email marketing campaigns. Conducted for Jobgo International, these email marketing tests were carried out in a startup company envi-ronment where all campaigns were sent out in order to acquire customers. The goal was to ascertain whether or not tracking and an...

  19. Management and Archiving e-mail Messages in Governmental Organization

    Directory of Open Access Journals (Sweden)

    Ashraf Mohamed A.Mohsen

    2006-06-01

    Full Text Available The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  20. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  1. Graphical Browsing of Email Data: A Usability Based Comparative Study

    OpenAIRE

    Dimitrios Rigas; Saad Alharbi

    2009-01-01

    Problem statement: With the rapid growth of the number of email messages and the diverse use of email, people have become overwhelmed by the large volumes of email archives. As a result, email tools that facilitate the browsing of email messages are highly required. This study described an empirical study that aimed to investigate whether the usability of email client can be improved by incorporating graphical visualization techniques to browse email data. Approach: Two email visualization ap...

  2. Digital Authentication for Official Bulk Email

    Science.gov (United States)

    2009-03-01

    Postgraduate School provides robust email capability to all NPS students, faculty, and associates (contractors, etc.). The system utilizes Barracuda SPAM...internally is sent directly to the exchange cluster, without being processed by the barracuda filters. NPS hosts email for students, faculty, and

  3. Detection of Illegitimate Emails using Boosting Algorithm

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah; Wiil, Uffe Kock

    2011-01-01

    In this paper, we report on experiments to detect illegitimate emails using boosting algorithm. We call an email illegitimate if it is not useful for the receiver or for the society. We have divided the problem into two major areas of illegitimate email detection: suspicious email detection...... and spam email detection. For our desired task, we have applied a boosting technique. With the use of boosting we can achieve high accuracy of traditional classification algorithms. When using boosting one has to choose a suitable weak learner as well as the number of boosting iterations. In this paper, we...... propose suitable weak learners and parameter settings for the boosting algorithm for the desired task. We have initially analyzed the problem using base learners. Then we have applied boosting algorithm with suitable weak learners and parameter settings such as the number of boosting iterations. We...

  4. CEAI: CCM based Email Authorship Identification Model

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah

    2013-01-01

    In this paper we present a model for email authorship identification (EAI) by employing a Cluster-based Classification (CCM) technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature-set to include some...... more interesting and effective features for email authorship identification (e.g. the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell). We also included Info Gain feature selection based...... reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM)-based models, as well as the models proposed by Iqbal et al. [1, 2]. The proposed model attains an accuracy rate of 94% for 10...

  5. Did You Get My E-Mail? Moving E-Mails beyond the Inbox

    Science.gov (United States)

    Ellis, Susan J.

    2011-01-01

    The challenge today is how to make e-mail and other forms of electronic communication effective in motivating volunteer action. Is it possible to make e-mails feel personal and welcoming? E-mail, instant messaging, texting, and social media are tools that allow individuals to communicate quickly and inexpensively, but they are lifeless without the…

  6. Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years

    Directory of Open Access Journals (Sweden)

    De Wang

    2014-05-01

    Full Text Available With the increasing dedication and sophistication of spammers, email spam is a persistent problem even today. Popular social network sites such as Facebook, Twitter, and Google+ are not exempt from email spam as they all interface with email systems. While some report predicts that email spam business is dying due to the decreasing volume of email spam. Whether email spam business is really dying is an interesting question. In this paper, we analyze email spam trends on Spam Archive dataset, which contains 5.5 million spam emails over 15 years (1998 – 2013. We statistically analyze emails contents including header information (e.g. content type and embedded items (e.g. URL links. Also, we investigate topic drift using topic modeling technique. Moreover, we perform network analysis on sender-to-receiver IP routing networks. Our study shows the dynamic nature of email spam over one and a half decades and demonstrate that the email spam business is not dying but more capricious.

  7. E-mail support as an adjunct to cognitive-behavioral group therapy for social anxiety disorder: Impact on dropout and outcome.

    Science.gov (United States)

    Delsignore, Aba; Rufer, Michael; Emmerich, Juliane; Weidt, Steffi; Brühl, Annette Beatrix; Moergeli, Hanspeter

    2016-10-30

    The present study evaluates the impact of semi-individualized e-mail support as an adjunct to cognitive behavioral group therapy (CBGT) for social anxiety disorder (SAD) on dropout and outcome. The effectiveness of additional semi-individualized e-mail support was evaluated for the whole sample and for a subsample of patients at risk of dropping out of therapy. A total of 91 patients with SAD were allocated either to the intervention condition (CBGT with e-mail support), or to the control condition (CBGT without e-mail support). Anxiety symptoms, depression, global symptomatology and life satisfaction were assessed at pretreatment, post-treatment and follow-up (3, 6 and 12 months). From pre-treatment to post-treatment, both groups improved significantly on all symptom measures. Therapy gains were maintained at the 1-year follow-up. Subsample analyses showed that CBGT+e-mail was more effective than CGBT alone in reducing symptom severity among patients missing at least two therapy sessions. Additionally, in this subgroup, those receiving additional e-mail support showed a tendency towards lower dropout rates. Based on the results of this study, semi-individualized e-mail support between sessions seems to enhance the effectiveness of CBGT for SAD patients at risk of dropping out of treatment and should be considered as an additional tool in clinical practice.

  8. Using e-mail to support reflective narration

    NARCIS (Netherlands)

    Vries, de Bregje; Meij, van der Hans

    2003-01-01

    This article presents an exploratory study of e-mail use for reflective narration. Narration is viewed from three perspectives: the narrating act, the narrative statement, and the story. These perspectives are used to characterize the 69 e-mails that were exchanged between 13 groups of children from

  9. A Discourse Analysis of School Counseling Supervisory E-Mail

    Science.gov (United States)

    Luke, Melissa; Gordon, Cynthia

    2011-01-01

    This article is a discourse analysis of weekly computer-mediated communications between 8 school counseling interns and their e-mail supervisor over a 16-week semester. Course-required e-mail supervision was provided as an adjunct to traditional face-to-face individual and group supervision. School counselor supervisees and supervisor enacted 3…

  10. Troubleshooting Requests e-mail Confirmation

    CERN Multimedia

    TS Department

    2004-01-01

    In an ongoing effort to improve quality of the repair requests, a new e-mail confirmation automatic system will be implemented starting from the 21st October. All repair requests transmitted to the TCR (72201) or the FM Helpdesk (77777) will be confirmed in an e-mail to the requestor, provided that the latter has a valid e-mail address in the HR database. The e-mail will contain a reference number, a brief description of the problem, the location and a contact where more information can be obtained. A second e-mail will be sent when the processing of the repair request is finished. We hope that this initiative will improve the transparency and quality of our service. Helpdesk Troubleshooting Requests (reminder) We remind you that all the repair requests and other communication concerning the CERN machine buildings have to be transmitted to the TCR via 72201, whereas the ones concerning tertiary buildings are handled directly by the FM helpdesk under the phone number 77777, i.e. problems on systems and equ...

  11. Email-Practices and Coordination in an Expanding Innovative Organization

    OpenAIRE

    Helmers, Jan Henrik

    2009-01-01

    Email has enjoyed increasing popularity in the last two decades. For some companies, email is how they communicate and coordinate their work. One such company is Opera Software. I have studied this Norwegian company and their email practices, using qualitative methods and lightweight statistics. I argue that the large volume of email at Opera Software has made the employees email professionals, employing particular strategies to tackle the constant stream of incoming email. As the company con...

  12. Online Counseling Using Email: A Qualitative Study

    Science.gov (United States)

    Salleh, Amla; Hamzah, Ramlan; Nordin, Norazah; Ghavifekr, Simin; Joorabchi, Toktam Namyandeh

    2015-01-01

    Despite numerous studies in increasingly popular online mental health service, the nature of the relationship between online counselors and their clients, particularly in the email modality, deserves more attention. To enhance the knowledge in this area, this study was conducted to explore whether the online counseling relationship could be…

  13. Who Owns Your E-mail?

    Science.gov (United States)

    Panepinto, Joe

    1995-01-01

    Examines recent findings that could influence the use of e-mail on university campuses. National privacy legislation and the inviolability of student records are discussed. It is concluded that more effective safeguards are necessary, and that the current steps are inadequate for the protection of students' rights. (Author/LRW)

  14. SPAM: Beware of emails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and must never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake emails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake email message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, however future cases may still occur. Users need to be vigilant for any requests for passwords or personal data. Fake emails should be immediately deleted. In case of questions on this topic, you may contact helpdesk@cern.ch. CERN IT Department

  15. Network Analysis with the Enron Email Corpus

    Science.gov (United States)

    Hardin, J. S.; Sarkis, G.; URC, P. .

    2015-01-01

    We use the Enron email corpus to study relationships in a network by applying six different measures of centrality. Our results came out of an in-semester undergraduate research seminar. The Enron corpus is well suited to statistical analyses at all levels of undergraduate education. Through this article's focus on centrality, students can explore…

  16. Online Counseling Using Email: A Qualitative Study

    Science.gov (United States)

    Salleh, Amla; Hamzah, Ramlan; Nordin, Norazah; Ghavifekr, Simin; Joorabchi, Toktam Namyandeh

    2015-01-01

    Despite numerous studies in increasingly popular online mental health service, the nature of the relationship between online counselors and their clients, particularly in the email modality, deserves more attention. To enhance the knowledge in this area, this study was conducted to explore whether the online counseling relationship could be…

  17. E-mail security a pocket guide

    CERN Document Server

    Furnell, Steven

    2010-01-01

    This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.

  18. Using Email to Improve Parental Involvement in Middle School

    Science.gov (United States)

    Radin, Benjamin Theodore

    2013-01-01

    The purpose of this study was to test the relationship between the type of school-to-home communication (regularly sent, structured emails versus ad hoc emails), the originator of these emails (teacher or student), and Parental Involvement (PI) as measured according to the frequency of email contact and distribution of student and parent emails…

  19. End of Interactive Emailing from the Technical Network

    CERN Multimedia

    2006-01-01

    According to the CNIC Security Policy for Control Systems (EDMS #584092), interactive emailing on PCs (and other devices) connected to the Technical Network is prohibited. Please note that from November 6th, neither reading emails nor sending emails interactively using e.g. Outlook or Pine mail clients on PCs connected to the Technical Network will be possible anymore. However, automatically generated emails will not be blocked and can still be sent off using CERNMX.CERN.CH as mail server. These restrictions DO NOT apply to PCs connected to any other network, like the General Purpose (or office) network. If you have questions, please do not hesitate to contact Uwe Epting, Pierre Charrue or Stefan Lueders (Technical-Network.Administrator@cern.ch). Your CNIC Working Group

  20. Secure E-mailing Between Physicians and Patients

    OpenAIRE

    Garrido, Terhilda; Meng, Di; Wang, Jian J.; Palen, Ted E; Kanter, Michael H.

    2014-01-01

    Secure e-mailing between Kaiser Permanente physicians and patients is widespread; primary care providers receive an average of 5 e-mails from patients each workday. However, on average, secure e-mailing with patients has not substantially impacted primary care provider workloads. Secure e-mail has been associated with increased member retention and improved quality of care. Separate studies associated patient portal and secure e-mail use with both decreased and increased use of other health c...

  1. Email for the coordination of healthcare appointments and attendance reminders.

    Science.gov (United States)

    Atherton, Helen; Sawmynaden, Prescilla; Meyer, Barbara; Car, Josip

    2012-08-15

    Email is a popular and commonly-used method of communication, but its use in health care is not routine. Where email communication has been utilised in health care, its purposes have included the coordination of healthcare appointments and attendance reminders, but the effects of using email in this way are not known. This review considers the use of email for the coordination of healthcare appointments and reminders for attendance; particularly scheduling, rescheduling and cancelling healthcare appointments, and providing prompts/reminders for attendance at appointments. To assess the effects of using email for the coordination of healthcare appointments and attendance reminders, compared to other forms of coordinating appointments and reminders, on outcomes for health professionals, patients and carers, and health services, including harms. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010),and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies of interventions that use email for scheduling health appointments, for reminders for a scheduled health appointment or for ongoing coordination of health appointments and that took the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two review authors independently assessed the titles and abstracts of retrieved

  2. Cultural determinants of email communication styles

    OpenAIRE

    Holtbrügge, Dirk; Weldon, Abigail; Rogers, Helen

    2014-01-01

    Based on a sample of 234 IT consulting and services professionals from various cultural backgrounds, this study investigates whether Edward T. Hall’s concept of culture can explain cultural differences in email communication. Although a vast array of intercultural research employs Hall’s concept in various communication settings, few take into account the computer-mediated communication technologies that now play an integral role in the operations of international companies. Our results show ...

  3. E-mail to SMS service change

    CERN Multimedia

    IT Department

    2010-01-01

    If you have a CERN e-mail account, you have probably already used one of the popular services that CERN’s IT Department offers to CERN users: the mail2SMS service. It allows any CERN e-mail account holder to send short messages (SMS) free of charge to CERN GSM phone numbers. Further to recent negotiations with our GSM operator, this service has been extended. It is now possible to send short messages free of charge to any Swiss mobile number. This extension of service aims at replacing the similar service that was made available by SWITCH(1) to CERN users (address: mobilenumber@sms.switch.ch). Because of repeated abuse, this service will be definitively stopped for CERN users on 15th January 2010. Please keep in mind that CERN’s e-mail to SMS service still has some restrictions: messages can only be sent from CERN mail accounts, and not from personal ones, such as GMAIL, MSN, Yahoo; the maximum length of the message is 160 characters (standard maximum SMS length); and only Swiss mobile...

  4. Current e-mailing of Nutricia and overtures for improving.

    OpenAIRE

    Valc, Pavel

    2014-01-01

    Objective is analyse current e-mailing of Nutricia and offer the best possible in automated e-mailing. Recommendations are based on possibilities of e-mailing tool Silverpop, which belongs to the best technologies of present days and which Nutricia chose for development of its e-mailing. Based on his experience as e-mailing specialist and operator of Silverpop author will recommend the best what is possible in today's e-mail marketing and adapt it for Nutricia business.Theory is concieved as ...

  5. Email use in elementary school: an analysis of exchange patterns and content

    NARCIS (Netherlands)

    van der Meij, Hans; Boersma, Kerst

    Email was embedded in a project in design and technology education in elementary school. During four lessons children worked in groups on building a flying object. These groups communicated through email with groups of children from another school. The analyses of the emails, as viewed from

  6. Email and Epistolary technologies: Presence, Intimacy, Disembodiment

    Directory of Open Access Journals (Sweden)

    Esther Milne

    2003-01-01

    Full Text Available A key problem for critical media practice is how to assess accurately the technological impact, historical significance and cultural consequences of a particular change in a communications system. Contemporary theorising about the impact of electronic, digitally networked culture is often articulated within an eschatological narrative of apocalypse and last things. The old is cast as naive and redundant while the new appears triumphant, conquering and redemptive. Washing away the sins of the old, the new technology arrives, it seems, out of nowhere. In response to such socio-technological representations, this paper argues that the dialectic between old and new communication systems is more complex than has been assumed by contemporary media theory. Rather than a narrative of radical changes, decisive shifts and abrupt breaks, the relation between epistolary and email technology reveals certain continuities. Specifically, tropes of presence and intimacy are traced through three media sites: a "virtual community" of British nineteenth-century letter writers, the postcard correspondence of an Australian First World War soldier and a twenty first century email discussion list. Mapping these sites reveals a central paradox of technological and discursive cultural practice, namely, that material signifiers can be used to produce incorporeal presence.

  7. How to Use E-Mails for Business

    Institute of Scientific and Technical Information of China (English)

    N.J.Stirk

    2004-01-01

    @@ E-mail is a quick and convenient way of communicating. It is faster than a letter and often more convenient than a telephone call. You are probably used to exchanging e-mail with friends using highly informal language.In this article you will learn more about the form and language of e-mail in professional contexts.

  8. Using Mobile-Based Email for English Foreign Language Learners

    Science.gov (United States)

    Alzu'bi, Mohammad Akram mohammad; Sabha, Muhannad Rushdi Nimer

    2013-01-01

    This study aimed at investigating the role of Mobile-based Email in improving Ajloun College English Students' Achievement. It attempts to answer the following questions: What is the potential contribution of mobile-based email exchanged to writing skills? What is the potential contribution of mobile-based email exchanged to vocabulary…

  9. Teaching Email Politeness in the EFL/ESL Classroom

    Science.gov (United States)

    Economidou-Kogetsidis, Maria

    2015-01-01

    Writing status-congruent emails is a skill that requires high pragmatic competence and awareness of the politeness conventions and email etiquette that need to be followed. Planning and composing such emails pose a greater challenge for EFL learners who use English in "lingua franca" communication (ELF), as they not only often struggle…

  10. You’ve Got Email: a Workflow Management Extraction System

    NARCIS (Netherlands)

    P. chaipornkaew (Piyanuch); T. Prexawanprasut (Takorn); M.J. McAleer (Michael)

    2017-01-01

    textabstractEmail is one of the most powerful tools for communication. Many businesses use email as the main channel for communication, so it is possible that substantial data are included in email content. In order to help businesses grow faster, a workflow management system may be required. The

  11. Clasificarea distribuita a mesajelor de e-mail

    CERN Document Server

    Pop, Florin; Trauşan-Matu, Ştefan

    2011-01-01

    A basic component in Internet applications is the electronic mail and its various implications. The paper proposes a mechanism for automatically classifying emails and create dynamic groups that belong to these messages. Proposed mechanisms will be based on natural language processing techniques and will be designed to facilitate human-machine interaction in this direction.

  12. Advanced Email Risk Classification and Recipient Decision Assistance

    Science.gov (United States)

    Estes, Aaron

    2016-01-01

    Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…

  13. Techniques and Tools for Forensic Investigation of E-mail

    Directory of Open Access Journals (Sweden)

    M. Tariq Banday

    2011-12-01

    Full Text Available E-mail has emerged as the most important application on Internet for communication of messages, delivery of documents and carrying out of transactions and is used not only from computers but many other electronic gadgets like mobile phones. Over a period of year’s e-mail protocols have been secured through several security extensions and producers, however, cybercriminals continue to misuse it for illegitimate purposes by sending spam, phishing e-mails, distributing child pornography, and hate emails besides propagating viruses, worms, hoaxes and Trojan horses. Further, Internet infrastructure misuse through denial of service, waste of storage space and computational resources are costing everyInternet user directly or indirectly. It is thus essential to identify and eliminate users and machines misusing e-mail service. E-mail forensic analysis is used to study the source and content of e-mail message as evidence, identifying the actual sender, recipient and date and time it was sent, etc. to collect credible evidence to bring criminals to justice. This paper is an attempt to illustrate e-mail architecture from forensics perspective. It describes roles and responsibilities of different e-mail actors and components, itemizes meta-data contained in e-mail headers, and lists protocols and ports used in it. It further describes various tools and techniques currently employed to carry out forensic investigation of an e-mail message.

  14. Email for communicating results of diagnostic medical investigations to patients.

    Science.gov (United States)

    Meyer, Barbara; Atherton, Helen; Sawmynaden, Prescilla; Car, Josip

    2012-08-15

    As medical care becomes more complex and the ability to test for conditions grows, pressure on healthcare providers to convey increasing volumes of test results to patients is driving investigation of alternative technological solutions for their delivery. This review addresses the use of email for communicating results of diagnostic medical investigations to patients. To assess the effects of using email for communicating results of diagnostic medical investigations to patients, compared to SMS/ text messaging, telephone communication or usual care, on outcomes, including harms, for health professionals, patients and caregivers, and health services. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010), and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies of interventions using email for communicating results of any diagnostic medical investigations to patients, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two review authors independently assessed the titles and abstracts of retrieved citations. No studies were identified for inclusion. Consequently, no data collection or analysis was possible. No studies met the inclusion criteria, therefore there are no results to report on the use of email for communicating results of diagnostic medical

  15. Are You Managing Your Email - Or is Email Managing You? An Analysis of Email Among Personnel Within Army Project Management Offices

    Science.gov (United States)

    2005-12-01

    effective communications . The use of emoticons should typically be reserved for personal or informal email communication ; however their use does help...12b. DISTRIBUTION CODE 13. ABSTRACT (maximum 200 words) Based on a class project that developed leadership communication competencies...for seven levels of Army civilians, email was found to be the most prevalent means of communication , regardless of leadership level. Additionally

  16. Impact of Information Security Policies on Email-Virus Propagation

    Institute of Scientific and Technical Information of China (English)

    2005-01-01

    Aimed at tracing out the email-virus propagation rules in communication network, this paper extends the traditional epidemiological model (i. e., SEIR) by taking into account the behavior of email users, such as email checking frequency and anti-virus information security policies, and discusses the factors that affect the email-virus propagation in an organization. With the extended SEIR model, namely E-SEIR, three aspects of information security policies (i. e., immunization, information security training,and user recovery support) are investigated in terms of their impacts on the email virus propagation. The results show that the E-SEIR model is suitable to reflect the propagation pattern of email virus, and may also be used in anti-virus policies simulation and evaluation.

  17. E-mail Spam Filtering Using Adaptive Genetic Algorithm

    Directory of Open Access Journals (Sweden)

    Jitendra Nath Shrivastava

    2014-01-01

    Full Text Available Now a day’s everybody email inbox is full with spam mails. The problem with spam mails is that they are not malicious in nature so generally don’t get blocked with firewall or filters etc., however, they are unwanted mails received by any internet users. In 2012, more that 50% emails of the total emails were spam emails. In this paper, a genetic algorithm based method for spam email filtering is discussed with its advantages and dis-advantages. The results presented in the paper are promising and suggested that GA can be a good option in conjunction with other e-mail filtering techniques can provide more robust solution.

  18. The Discourse of all.department e-mails

    DEFF Research Database (Denmark)

    Pogner, Karl-Heinz; Søderberg, Anne-Marie

    2001-01-01

    This paper is based on an explorative case study of all.department e-mails that were sent on the Intranet of a Danish university department. Following a social constructionist approach, our analysis assumes that language use shapes relations, identities, and representations. We thus investigate...... which social relations are expressed and constructed in the e-mail discourse and how the organizational world of the department is represented in the all.department e-mails. Our analyses of the e-mails show that the managerial voices are dominant as well as the perception of e-mail communication...... as a tool of information transmission. However, a few e-mails sent by employees without specific organizational functions differ significantly from the `managerial' mails. In these mails employee voices articulate a latent and unfulfilled need for a community and a forum for dialogue. The usage of the all...

  19. Modeling Suspicious Email Detection using Enhanced Feature Selection

    OpenAIRE

    2013-01-01

    The paper presents a suspicious email detection model which incorporates enhanced feature selection. In the paper we proposed the use of feature selection strategies along with classification technique for terrorists email detection. The presented model focuses on the evaluation of machine learning algorithms such as decision tree (ID3), logistic regression, Na\\"ive Bayes (NB), and Support Vector Machine (SVM) for detecting emails containing suspicious content. In the literature, various algo...

  20. The Characteristics ofEmailLanguage onInternet

    Institute of Scientific and Technical Information of China (English)

    Wang Xiao-Hui; Ma Hao-Yan

    2014-01-01

    With the popular use of computer in our life and work, the E-mail has become the important medium of people’s communication insteadof letter, fax and telephone. The E-mail language has its own unique characteristics. On one hand it tends to be oral, informal,on the other hand it resemblesthetraditional letter which has the fixed structure of discourse .By analyzing the E-mail language features we can use the communication tool correctly.

  1. A literature review of email-based telemedicine.

    Science.gov (United States)

    Caffery, Liam J; Smith, Anthony C

    2010-01-01

    A structured analysis of peer-reviewed literature about the delivery of health services by email was undertaken for this review. A total of 185 articles were included in the analysis. These articles were thematically categorised for medical specialty, participants, sub-topic, study design and service-delivery application. It was shown that email-based telemedicine can be practiced in a large number of medical specialties and has application in primary consultation, second opinion consultation, telediagnosis and administrative roles (e.g. e-referral). Email has niche applications in low-bandwidth, image-based specialties (e.g. dermatology, pathology, wound care and ophthalmology) where attached digital camera images were used for telediagnosis. Diagnostic accuracy of these images was the predominant topic of research and results show email as a valid means of delivering these medical services. Email is also often used in general practice as an adjunct for face-to-face consultation. Further, a number of organisations have significantly improved the efficiency of their outpatient services when using email as a triage or e-referral system. Email-based telemedicine provides specialist medical opinion in the majority of reviewed services and is most likely to be instigated by the patient's primary care giver. However, email-consultations between patient and primary care and patient and secondary care are not uncommon. Most email services are implemented using ordinary email. However, a number of organisations have developed purpose-written email applications to support their telemedicine service due to impediments of using ordinary email. These impediments include lack of management tools for: the allocation and auditing of cases for a timely response and the co-ordination of effort in a multi-clinician, multi-disciplinary service. The ability to encrypt ordinary email thereby securing patient confidentiality is also regarded as difficult when using ordinary email. Hence

  2. Evolving Fuzzy Neural Network for Phishing Emails Detection

    Directory of Open Access Journals (Sweden)

    Esraa ALomari

    2012-01-01

    Full Text Available One of the broadly used internet attacks to deceive customers financially in banks and agencies is unknown “zero-day” phishing Emails “zero-day” phishing Emails is a new phishing email that it has not been trained on old dataset, not included in black list. Accordingly, the current paper seeks to Detection and Prediction of unknown “zero-day” phishing Emails by provide a new framework called Phishing Evolving Neural Fuzzy Framework (PENFF that is based on adoptive Evolving Fuzzy Neural Network (EFuNN. PENFF does the process of detection of phishing email depending on the level of features similarity between body email and URL email features. The totality of the common features vector is controlled by EFuNN to create rules that help predict the phishing email value in online mode. The proposed framework has proved its ability to detect phishing emails by decreasing the error rate in classification process. The current approach is considered a highly compacted framework. As a performance indicator; the Root Mean Square Error (RMSE and Non-Dimensional Error Index (NDEI has 0.12 and 0.21 respectively, which has low error rate compared with other approaches Furthermore, this approach has learning capability with footprint consuming memory."

  3. E-mail server and anti-spam protection

    OpenAIRE

    Kučera, Jan

    2016-01-01

    This thesis deals with e-mail server and anti-spam protection. Its content is the presentation of information on various types of spam, anti-spam protection options and principles of e-mail communication. Furthermore, the content of this work is to install and configure e-mail server and test its anti-spam filters. Test results are compared with the results of the free e-mail inboxes. The main goal is to provide readers with comprehensive information on spam issues, and also helping them when...

  4. E-mail Interaction in Foreign Language Learning

    Institute of Scientific and Technical Information of China (English)

    任艳

    2007-01-01

    E-mail has been implemented in foreign langnage learning and teaching for many years.It is widely approved that language learners'communicative competence and intereuhural competence can be developed through e-mail interaction in spite of the problems and difficulties existing in the process of designing and carrying out ofan e-mail project.Hence,more and more language teachers from different countries are trying to search for the possibilities of integrating email interaction in their teaching context so as to improve the language-learning environment.

  5. Decisional style, mood and work communication: email diaries.

    Science.gov (United States)

    Shirren, S; Phillips, J G

    2011-10-01

    To understand the use of technology to support interpersonal interaction, a theory of decisional style was applied to email use within the workplace. Previous research has used self-report and rating scales to address employee email behaviours, but this falls short of management's capability to monitor the actual behaviour. Thirty-nine employed individuals completed a five-day communication diary recording their actual behaviour upon receiving personal and work-related emails as well as the Melbourne Decision Making Questionnaire and the Depression Anxiety Stress Scales. It was found that vigilant individuals were more likely to use email in an efficient manner by deleting personal email and being less likely to open email later. Procrastinators, buckpassers and people experiencing high levels of negative affect were all more likely to delay dealing with email, which could be viewed as dealing with email in a less efficient manner. STATEMENT OF RELEVANCE: This work offers insights as to how people receive and process emails and is thus relevant to the development and implementation of collaborative technologies. Whilst other studies use individual's self-reports, this study uses a more accurate communication diary. Decisional style can predict the monitoring and response to electronic communication.

  6. Reaching consumers: How the tobacco industry uses email marketing.

    Science.gov (United States)

    Brock, Betsy; Carlson, Samantha C; Moilanen, Molly; Schillo, Barbara A

    2016-12-01

    Tobacco companies are restricted from engaging in many traditional forms of marketing. Direct marketing is one way tobacco companies can reach consumers while complying with regulation and avoiding negative public perception. There is little research on this type of opt-in marketing, which includes mail marketing, email marketing, web marketing, and mobile marketing, and its impact is not well understood. This study examined 6990 tobacco company emails received by individuals living in the state of Minnesota, US between January 2010 and May 2015 to determine email frequency by brand. These emails were gathered as part of ongoing surveillance of tobacco industry direct marketing. A subset of these emails received between October 2014 and May 2015 (n = 1646) were content analyzed to identify the purpose of the email communication along with type of product promoted. Tobacco companies use email to communicate with consumers on a regular basis. This communication was observed to be as frequent as nine times per month. Emails are most commonly used to promote contests (54.1%), content on tobacco company websites (39.1%), and tobacco coupons (15.7%). Email promotion of menthol-flavored tobacco products was common and was associated with promotion of coupons. Emails promoting menthol had a 1.9 times higher prevalence of also promoting coupons (95% CI: 1.52-2.37). Little is known about tobacco company email marketing and this study fills an identified research gap. A deeper understanding of this type of marketing is needed in order to counter tobacco industry messaging and advance tobacco control.

  7. Reaching consumers: How the tobacco industry uses email marketing

    Directory of Open Access Journals (Sweden)

    Betsy Brock

    2016-12-01

    Full Text Available Tobacco companies are restricted from engaging in many traditional forms of marketing. Direct marketing is one way tobacco companies can reach consumers while complying with regulation and avoiding negative public perception. There is little research on this type of opt-in marketing, which includes mail marketing, email marketing, web marketing, and mobile marketing, and its impact is not well understood. This study examined 6990 tobacco company emails received by individuals living in the state of Minnesota, US between January 2010 and May 2015 to determine email frequency by brand. These emails were gathered as part of ongoing surveillance of tobacco industry direct marketing. A subset of these emails received between October 2014 and May 2015 (n = 1646 were content analyzed to identify the purpose of the email communication along with type of product promoted. Tobacco companies use email to communicate with consumers on a regular basis. This communication was observed to be as frequent as nine times per month. Emails are most commonly used to promote contests (54.1%, content on tobacco company websites (39.1%, and tobacco coupons (15.7%. Email promotion of menthol-flavored tobacco products was common and was associated with promotion of coupons. Emails promoting menthol had a 1.9 times higher prevalence of also promoting coupons (95% CI: 1.52–2.37. Little is known about tobacco company email marketing and this study fills an identified research gap. A deeper understanding of this type of marketing is needed in order to counter tobacco industry messaging and advance tobacco control.

  8. Private E-Mail Requests and the Diffusion of Responsibility.

    Science.gov (United States)

    Barron, Greg; Yechiam, Eldad

    2002-01-01

    Discussion of e-mail technology and requesting information from multiple sources simultaneously focuses on an experiment demonstrating that addressing e-mails simultaneously to multiple recipients may actually reduce the number of helpful responses. Discusses diffusion of responsibility and implications for the application of social cueing theory…

  9. Recipient Recommendation in Enterprises Using Communication Graphs and Email Content

    NARCIS (Netherlands)

    Graus, D.; van Dijk, D.; Tsagkias, M.; Weerkamp, W.; de Rijke, M.

    2014-01-01

    We address the task of recipient recommendation for emailing in enterprises. We propose an intuitive and elegant way of modeling the task of recipient recommendation, which uses both the communication graph (i.e., who are most closely connected to the sender) and the content of the email.

  10. The Perceived Helpfulness of Rendering Emotional First Aid via Email

    Science.gov (United States)

    Gilat, Itzhak; Reshef, Eyal

    2015-01-01

    The present research examined the perceived helpfulness of an increasingly widespread mode of psychological assistance, namely, emotional first aid via email. The sample comprised 62 naturally occurring email interactions between distressful clients and trained volunteers operating within the framework of the Israeli Association for Emotional…

  11. Technology Corner: Analysing E-mail Headers For Forensic Investigation

    Directory of Open Access Journals (Sweden)

    M. Tariq Banday

    2011-06-01

    Full Text Available Electronic Mail (E-Mail, which is one of the most widely used applications of Internet, has become a global communication infrastructure service.  However, security loopholes in it enable cybercriminals to misuse it by forging its headers or by sending it anonymously for illegitimate purposes, leading to e-mail forgeries. E-mail messages include transit handling envelope and trace information in the form of structured fields which are not stripped after messages are delivered, leaving a detailed record of e-mail transactions.  A detailed header analysis can be used to map the networks traversed by messages, including information on the messaging software and patching policies of clients and gateways, etc. Cyber forensic e-mail analysis is employed to collect credible evidence to bring criminals to justice. This paper projects the need for e-mail forensic investigation and lists various methods and tools used for its realization. A detailed header analysis of a multiple tactic spoofed e-mail message is carried out in this paper. It also discusses various possibilities for detection of spoofed headers and identification of its originator. Further, difficulties that may be faced by investigators during forensic investigation of an e-mail message have been discussed along with their possible solutions.

  12. Faculty Perceptions of Student Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Wiechowski, Linda S.; Scafe, Marla G.

    2011-01-01

    The purpose of this study was to evaluate faculty perceptions of student credibility based on email addresses. The survey was conducted at an upper division business school in Michigan where all students have completed at least two years of college courses. The survey results show that a student's selection of an email address does influence the…

  13. Instruction and Pragmatic Change during Study Abroad Email Communication

    Science.gov (United States)

    Alcón-Soler, Eva

    2015-01-01

    The study deals with the effect of instruction and study abroad (SA) on pragmatic knowledge. More specifically, the focus is on gains in explicit knowledge of request mitigators, and whether learners draw on this knowledge when they perform email requests. Email requests produced by 60 Spanish students staying abroad (30 treatment/30 control…

  14. Student Perceptions of Peer Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Scafe, Marla G.; Wiechowski, Linda S.; Maier, David J.

    2013-01-01

    The purpose of this study was to evaluate students' perceptions of their peer's credibility based on email addresses. The survey was conducted at a community college in Michigan where all students were registered and actively taking at least one course. The survey results show that a student's selection of an email address does influence other…

  15. The Perceived Helpfulness of Rendering Emotional First Aid via Email

    Science.gov (United States)

    Gilat, Itzhak; Reshef, Eyal

    2015-01-01

    The present research examined the perceived helpfulness of an increasingly widespread mode of psychological assistance, namely, emotional first aid via email. The sample comprised 62 naturally occurring email interactions between distressful clients and trained volunteers operating within the framework of the Israeli Association for Emotional…

  16. Student Perceptions of Faculty Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Scafe, Marla G.; Wiechowski, Linda S.

    2010-01-01

    The purpose of this study was to evaluate students' perceptions of faculty credibility based on email addresses. The survey was conducted at an upper division business school in Michigan where all students have completed at least two years of college courses. The survey results show that a faculty member's selection of an email address does…

  17. Using contextual information to improve search in email archives

    NARCIS (Netherlands)

    Weerkamp, W.; Balog, K.; de Rijke, M.

    2009-01-01

    In this paper we address the task of finding topically relevant email messages in public discussion lists. We make two important observations. First, email messages are not isolated, but are part of a larger online environment. This context, existing on different levels, can be incorporated into the

  18. What parents want from emails with their pediatrician: implications for teaching communication skills.

    Science.gov (United States)

    Schiller, Jocelyn H; Christner, Jennifer G; Stansfield, Robert Brent; Watnick, Caroline S; Mullan, Patricia B

    2013-07-01

    Physician-patient email communication is increasing but trainees receive no education on this communication medium. Research eliciting patient preferences about email communication could inform training. Investigators elicited parents' perspectives on physician-parent email communication and compared parent and faculty assessments of medical students' emails. This mixed methods study explored physician-parent email communication in 5 parent focus groups using qualitative analyses to identify themes. Differences between faculty and parent assessment scores for students' email responses were calculated using univariate general linear modeling. Themes that emerged were: (1) Building the Relationship, (2) Clarity of Communication and (3) Expectations. Parents criticized student's statements as condescending. The sum of assessment scores by parents and faculty were moderately correlated (r(44)=.407, Pparents gave students lower scores on "acknowledges validity/expresses empathy" (P=.01) and higher scores on "provides next steps" (PParents place value on students' abilities to communicate clearly and convey respect and empathy in email. Parent and faculty perspectives on email communication are similar but not the same. Differences between parental and faculty assessments of medical students' emails supports the need for the involvement of patients and families in email communication curriculum development. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  19. An Improved Bayesian with Application to Anti-Spam Email

    Institute of Scientific and Technical Information of China (English)

    ZHAN Chuan; LU Xian-liang; ZHOU Xu; HOU Meng-shu

    2005-01-01

    Along with the wide application of e-mail nowadays, many spam e-mails flood into people's email-boxes and cause catastrophes to their study and life. In anti-spam e-mails campaign, we depend on not only legal measures but also technological approaches. The Bayesian classifier provides a simple and effective approach to discriminate classification. This paper presents a new improved Bayesian-based anti-spam e-mail filter. We adopt a way of attribute selection based on word entropy, use vector weights which are represented by word frequency, and deduce its corresponding formula. It is proved that our filter improves total performances apparently in our experiment.

  20. Quantifying social vs. antisocial behavior in email networks

    CERN Document Server

    Gomes, L H; Almeida, V A F; Bettencourt, L M A; Castro, F D O; Almeida, Jussara M.; Almeida, Virgilio A. F.; Bettencourt, Luis M. A.; Castro, Fernando D. O.; Gomes, Luiz H.

    2006-01-01

    Email graphs have been used to illustrate general properties of social networks of communication and collaboration. However, increasingly, the majority of email traffic reflects opportunistic, rather than symbiotic social relations. Here we use e-mail data drawn from a large university to construct directed graphs of email exchange that quantify the differences between social and antisocial behaviors in networks of communication. We show that while structural characteristics typical of other social networks are shared to a large extent by the legitimate component they are not characteristic of antisocial traffic. Interestingly, opportunistic patterns of behavior do create nontrivial graphs with certain general characteristics that we identify. To complement the graph analysis, which suffers from incomplete knowledge of users external to the domain, we study temporal patterns of communication to show that the dynamical properties of email traffic can, in principle, distinguish different types of social relatio...

  1. Detection of Fraudulent Emails by Employing Advanced Feature Abundance

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah; Glasdam, Mathies

    2014-01-01

    In this paper, we present a fraudulent email detection model using advanced feature choice. We extracted various kinds of features and compared the performance of each category of features with the others in terms of the fraudulent email detection rate. The different types of features...... are incorporated step by step. The detection of fraudulent email has been considered as a classification problem and it is evaluated using various state-of-the art algorithms and on CCM [1] which is authors' previous cluster based classification model. The experiments have been performed on diverse feature sets...... and the different classification methods. The comparison of the results is also presented and the evaluations shows that for the fraudulent email detection tasks, the feature set is more important regardless of classification method. The results of the study suggest that the task of fraudulent emails detection...

  2. Evaluation of email alerts in practice: Part 1. Review of the literature on clinical emailing channels.

    Science.gov (United States)

    Pluye, Pierre; Grad, Roland M; Granikov, Vera; Jagosh, Justin; Leung, Kit

    2010-12-01

    Methods to systematically assess electronic knowledge resources by health professionals may enhance evaluation of these resources, knowledge exchange between information users and providers, and continuing professional development. We developed the Information Assessment Method (IAM) to document health professional perspectives on the relevance, cognitive impact, potential use and expected health outcomes of information delivered by (push) or retrieved from (pull) electronic knowledge resources. However, little is known about push communication in health sciences, and what we propose to call clinical emailing channels (CECs). CECs can be understood as a communication infrastructure that channels clinically relevant research knowledge, email alerts, from information providers to the inboxes of individual practitioners. In two companion papers, our objectives are to (part 1) explore CEC evaluation in routine practice, and (part 2) examine the content validity of the cognitive component of IAM. The present paper (part 1) critically reviews the literature in health sciences and four disciplines: communication, information studies, education and knowledge translation. Our review addresses the following questions. What are CECs? How are they assessed? The review contributes to better define CECs, and proposes a 'push-pull-acquisition-cognition-application' evaluation framework, which is operationalized by IAM. Compared with existing evaluation tools, our review suggests IAM is comprehensive, generic and systematic. © 2010 Blackwell Publishing Ltd.

  3. Save our inboxes! Use e-mail wisely

    CERN Multimedia

    Achintya Rao

    2013-01-01

    At CERN, with collaborators all over the world, e-mail is inevitably the primary means of communication: we use it for everything from coordinating projects to organising lunches. But e-mail can also be one of the most inefficient means of communication we have! Here's how to fix it.   Let’s get straight to the point: we receive too many e-mails. Think about all the e-mails that you deleted without a second thought. Think about the times you’ve unnecessarily been in CC. Take a look at the unread e-mails sitting in your inbox at this very moment, ones that you have no intention of ever looking at. You can, however, tame this overload with a few simple measures and turn e-mail into an important communication and productivity tool. Many recommendations for improving e-mail etiquette suggest an abrasive approach riddled with bullet points. In a vastly multi-cultural setting such as CERN, however this approach may fail. So, here are a few dos and don’ts based o...

  4. Direct e-mail marketing: Case of Serbia

    Directory of Open Access Journals (Sweden)

    Končar Jelena A.

    2005-01-01

    Full Text Available Direct e-mail marketing refers to approaching customers directly, without employing intermediaries. It represents a direct mode of communication with the target population, which affects the creation of stronger and more loyal relationships with prospective customers, compared to traditional direct marketing resources (TV, radio, print and advertising panels, etc. The main goal of direct e-mail marketing is building long-term "one to one" relationships with current and prospective customers. Direct e-mail marketing is not aimed at momentary sale, but at boosting certain product preferences due to the engagement of numerous electronic media.

  5. The Role of E-Mail in an Industrial Dispute

    Directory of Open Access Journals (Sweden)

    Nava Pliskin

    1996-05-01

    Full Text Available The purpose of this paper is to show, based on a case study, how electronic communication networks have affected the process of a large scale industrial dispute. The case study describes a two-and-a-half month long strike of academic staff members at all universities in Israel. During the strike, electronic mail (e-mail was used as a major means of communication between faculty members. Sources of data for this paper were mass media reports, including reports from national radio, TV, and newspapers, participant observations, and messages that flowed on the e-mailing list throughout the lengthy strike. Analysis of the data from the various sources suggests that the e-mailing list was instrumental in enabling the strikers to succeed in what was presumed to be a hopeless battle. The paper is concluded with a discussion of the lessons to be drawn from this case for e-mail research and practice

  6. Manipulating E-Mail Server Feedback for Spam Prevention

    Directory of Open Access Journals (Sweden)

    O. A. Okunade

    2017-08-01

    Full Text Available The cyber criminals who infect machines with bots are not the same as the spammers who rent botnets to distribute their messages. The activities of these spammers account for the majority of spam emails traffic on the internet. Once their botnets and campaigns are identified, it is not enough to keep on filtering the spam emails, it is necessary to deploy techniques that will carry the fight to their end. It is observed that spammers also take into account server feedback (for example to detect and remove non-existent recipients from email address lists. We can take advantage of this observation by returning fake information, thereby poisoning the server feedback on which the spammers rely. The results of this paper show that by sending misleading information to a spammer, it is possible to prevent recipients from receiving subsequent spam emails from that same spammer.

  7. Email English (2nd Edition) by Paul Emmerson

    OpenAIRE

    Simpson, Adam John

    2013-01-01

    A thoroughly worthwhile update to a classic book about emailing which retains everything that was right about the first edition while effectively revitalizing its content a decade on from the first edition.

  8. Polite Requestive Strategies in Emails: An Investigation of Pragmatic Competence of Chinese EFL Learners

    Science.gov (United States)

    Zhu, Wuhan

    2012-01-01

    This paper is motivated by the premise that little is known about the use of requestive strategies in request emails in Chinese English-as-a-Foreign-Language (EFL) context. Specifically, the paper examines and compares requestive strategies in request emails between two groups of university students, namely English majors (EM) and non-English…

  9. Test of the Behavioral Perspective Model in the Context of an E-Mail Marketing Experiment

    Science.gov (United States)

    Sigurdsson, Valdimar; Menon, R. G. Vishnu; Sigurdarson, Johannes Pall; Kristjansson, Jon Skafti; Foxall, Gordon R.

    2013-01-01

    An e-mail marketing experiment based on the behavioral perspective model was conducted to investigate consumer choice. Conversion e-mails were sent to two groups from the same marketing database of registered consumers interested in children's books. The experiment was based on A-B-A-C-A and A-C-A-B-A withdrawal designs and consisted of sending B…

  10. Polite Requestive Strategies in Emails: An Investigation of Pragmatic Competence of Chinese EFL Learners

    Science.gov (United States)

    Zhu, Wuhan

    2012-01-01

    This paper is motivated by the premise that little is known about the use of requestive strategies in request emails in Chinese English-as-a-Foreign-Language (EFL) context. Specifically, the paper examines and compares requestive strategies in request emails between two groups of university students, namely English majors (EM) and non-English…

  11. Reaching consumers: How the tobacco industry uses email marketing

    OpenAIRE

    Betsy Brock; Samantha C. Carlson; Molly Moilanen; Barbara A. Schillo

    2016-01-01

    Tobacco companies are restricted from engaging in many traditional forms of marketing. Direct marketing is one way tobacco companies can reach consumers while complying with regulation and avoiding negative public perception. There is little research on this type of opt-in marketing, which includes mail marketing, email marketing, web marketing, and mobile marketing, and its impact is not well understood. This study examined 6990 tobacco company emails received by individuals living in the st...

  12. An email system with non-repudiation service

    Institute of Scientific and Technical Information of China (English)

    2007-01-01

    Based on a non-repudiation protocol NRPUM, which provides point-to-point non-repudiation services, this paper proposes a non-repudiation solution to secure email systems. Specifically, non-repudiation evidence is used at every hop between relay nodes so that an evidence chain is formed between end hosts. An email non-repudiation delivery system is then developed based on this concept. Our experiment results show that the solution is feasible and the system is effective.

  13. Utilising channels in email : an approach to organising communication

    OpenAIRE

    Yang, Xi; 楊希

    2015-01-01

    Email, as one of the most prevalent communication methods, is now playing a bigger role in our work and personal life. Modern tools and clients have been developed with the aim to better support Email communication. However, few has successfully achieved the goal, without being able to live up to users’ expectations. An increasingly large amount of time has been wasted, and the interaction between the sender, recipient and the mail has remained almost the same for many years. Therefore, it’s ...

  14. Email networks and the spread of computer viruses

    Science.gov (United States)

    Newman, M. E.; Forrest, Stephanie; Balthrop, Justin

    2002-09-01

    Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the implications of this structure for the understanding and prevention of computer virus epidemics.

  15. Email and political campaigning: the experience of MPs in Westminster

    Directory of Open Access Journals (Sweden)

    Nigel Jackson

    2004-04-01

    Full Text Available Traditionally individual politicians communicated directly with their constituents, but the arrival of the mass media, especially television, eroded the role of direct communication. The development of new Information Communication Technologies (ICTs is now re-opening the use of direct communication as part of post-modern campaigning (Norris 2000, with the Internet providing an alternative to media relations. The World Wide Web has attracted great interest from political commentators, but so far email has been largely ignored. Yet the Web is a pull technique, whereas the push nature of email opens up new campaigning possibilities. Downes and Mui (2000 suggest that email represents potentially a 'killer app' which might revolutionize the way MPs approach re-election. A survey of Members of Parliament (MPs Assembly Members (AMs of the Welsh Assembly and Members of the Scottish Parliament (MSPs examines whether they have grasped the opportunities email represents. The research suggests that the outbound use of email for campaigning purposes is limited to a small number of pioneers. Resources, parliamentary culture and party affiliation all shape the use of email campaigning.

  16. Identifying spam e-mail messages using an intelligence algorithm

    Directory of Open Access Journals (Sweden)

    Parichehr Ghaedi

    2014-06-01

    Full Text Available During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams.

  17. CEAI: CCM-based email authorship identification model

    Directory of Open Access Journals (Sweden)

    Sarwat Nizamani

    2013-11-01

    Full Text Available In this paper we present a model for email authorship identification (EAI by employing a Cluster-based Classification (CCM technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature set to include some more interesting and effective features for email authorship identification (e.g., the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell. We also included Info Gain feature selection based content features. It is observed that the use of such features in the authorship identification process has a positive impact on the accuracy of the authorship identification task. We performed experiments to justify our arguments and compared the results with other base line models. Experimental results reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM-based models, as well as the models proposed by Iqbal et al. (2010, 2013 [1,2]. The proposed model attains an accuracy rate of 94% for 10 authors, 89% for 25 authors, and 81% for 50 authors, respectively on Enron dataset, while 89.5% accuracy has been achieved on authors’ constructed real email dataset. The results on Enron dataset have been achieved on quite a large number of authors as compared to the models proposed by Iqbal et al. [1,2].

  18. Internet and Email Use Among STD Clinic Patients

    Science.gov (United States)

    Mark, Karen E.; Wald, Anna; Drolette, Linda; Golden, Matthew R.

    2009-01-01

    Background Little data exist on Internet and email use among STD clinic patients for research and clinical care communication. Methods An anonymous cross-sectional survey of STD clinic patients aged ≥ 18 years in Seattle, Washington, March 13–22, 2006. Results Of 489 study period patients, 251 (51%) completed the questionnaire. Participants had a median age of 30 (range 18–66) years and were 69% male, 56% White, 19% African-American, 9% Hispanic, and 7% Asian/Pacific Islander. 75% had some post-secondary education but half reported an annual income of email that they check at least 3 times a week, and 144 (57%) were willing to receive an email reminding them to come back for a follow-up appointment if diagnosed with an STD. MSM were more likely than women and heterosexual men to be regular Internet and email users (92% versus 70%, p = 0.001) and to have met a sex partner over the Internet during the past year (69% versus 11%, p email use, as was racial/ethnic background (86% of Whites, 48% of African-Americans, 73% of Hispanics, 100% of Asians/Pacific Islanders, and 57% of others, p email use are common and acceptable to many STD clinic patients for research and clinical purposes. PMID:18685548

  19. Email for the provision of information on disease prevention and health promotion.

    Science.gov (United States)

    Sawmynaden, Prescilla; Atherton, Helen; Majeed, Azeem; Car, Josip

    2012-11-14

    Email is a popular and commonly used method of communication, but its use in health care is not routine. Its application in health care has included the provision of information on disease prevention and health promotion, but the effects of using email in this way are not known. This review assesses the use of email for the provision of information on disease prevention and health promotion. To assess the effects of email for the provision of information on disease prevention and health promotion, compared to standard mail or usual care, on outcomes for healthcare professionals, patients and caregivers, and health services, including harms. We searched: the Cochrane Consumers and Communication Review Group Specialised Register (January 2010), the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (1950 to January 2010), EMBASE (1980 to January 2010), CINAHL (1982 to February 2010), ERIC (1965 to January 2010) and PsycINFO (1967 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists, contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies examining interventions where email is used by healthcare professionals to provide information to patients on disease prevention and health promotion, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. We considered healthcare professionals or associated administrative staff as participants originating the email communication, and patients and caregivers as participants receiving the email communication, in all settings. Email communication was one-way from healthcare professionals or associated administrative staff originating the email communication, to patients or caregivers receiving the email communication. Two

  20. The Educational Impact of E-Mail: Extraverted versus Introverted Students.

    Science.gov (United States)

    Kunderewicz, Larisa; Michener, Stacey; Chambliss, Catherine

    College students (N=151) completed surveys assessing the relationship between e-mail use and extraversion. The variables studied included time spent on e-mail; the frequency of e-mail usage; and the purposes e-mail served for each student. The results suggest that extraverts use e-mail as a form of procrastination more than introverts, and that…

  1. Who Sends the Email? Using Electronic Surveys in Violence Research

    Directory of Open Access Journals (Sweden)

    Melissa A Sutherland

    2013-08-01

    Full Text Available Introduction: Students aged 16–24 years are at greatest risk for interpersonal violence and the resulting short and long-term health consequences. Electronic survey methodology is well suited for research related to interpersonal violence. Yet methodological questions remain about best practices in using electronic surveys. While researchers often indicate that potential participants receive multiple emails as reminders to complete the survey, little mention is made of the sender of the recruitment email. The purpose of this analysis is to describe the response rates from three violence-focused research studies when the recruitment emails are sent from a campus office, researcher or survey sampling firm. Methods: Three violence-focused studies were conducted about interpersonal violence among college students in the United States. Seven universities and a survey sampling firm were used to recruit potential participants to complete an electronic survey. The sender of the recruitment emails varied within and across the each of the studies depending on institutional review boards and university protocols.Results: An overall response rate of 30% was noted for the 3 studies. Universities in which researcher initiated recruitment emails were used had higher response rates compared to universities where campus officials sent the recruitment emails. Researchers found lower response rates to electronic surveys at Historically Black Colleges or Universities and that other methods were needed to improve response rates.Conclusion: The sender of recruitment emails for electronic surveys may be an important factor in response rates for violence-focused research. For researchers identification of best practices for survey methodology is needed to promote accurate disclosure and increase response rates. [West J Emerg Med. 2013;14(4:363–369.

  2. E-mail Writing: Providing Background Information in the Core of Computer Assisted Instruction

    Directory of Open Access Journals (Sweden)

    Behzad NAZARI

    2015-01-01

    Full Text Available The present study highly supported the effective role of providing background information via e-mail by the teacher to write e-mail by the students in learners’ writing ability. A total number of 50 EFL advanced male students aged between 25 and 40 at different branches of Iran Language Institute in Tehran, Tehran. Through the placement test of Oxford English Language Placement Test (OELPT the students' proficiency level seems to be nearly the same. Participants were randomly assign into two groups of experimental and control, each consisting of 25 students. After the administration of the proficiency test, all groups were assigned to write topic 1 as the pre-test. Next, the teacher involved the learners in the new instruction (treatment. During writing topics 2, 3, 4, 5, 6, and 7 experimental group’s background knowledge was activated through e-mail before writing and e-mailing topics while the control group received no background knowledge activation through e-mail. After the treatment was given to the experimental group, the students in both groups were required to write another composition about the last topic, topic 8. Again, in this phase, none of the groups received any background information. The results indicated that providing background information via e-mail by the teacher to write e-mail by the students significantly improved learners’ writing ability.

  3. Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email

    Directory of Open Access Journals (Sweden)

    Albert Ginting

    2015-04-01

    Full Text Available In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography. One fairly popular cryptographic algorithms are RSA algorithm. In this study will discuss the implementation of a cryptographic algorithm RSA encryption and decryption process email. To test created a java-based email client program with message encryption and decryption features messages. This application uses the Java programming language and Netbeans 7.4 as editor. Mail servers used is Google Mail. The initial step of this study was to download email from the Google server and encrypt the message. The second step is decrypt the message to verify whether the message is still the same as the original message before it is encrypted . Results from this study is the application that can encrypt and decrypt messages using RSA cryptographic algorithm. With this application is expected to mail delivery is much safer. Because encrypted email will generate a random decimal number of unknown value .

  4. DESCRIPTIVE STUDY OF HONORIFIC USE IN KOREAN EMAIL DISCOURSE

    Directory of Open Access Journals (Sweden)

    Jaegu Kim

    2016-07-01

    Full Text Available It is a relatively new field that examines how Korean culture affects Korean language use in terms of age difference in a corpus of computer mediated email discourse. The purpose of this descriptive study and experiment is to prove the close relationship between Korean language and culture. This paper shows the descriptive study of Korean culture in relation to language use. Korean culture acknowledges an inherent hierarchy with regard to age, and considers [+age] as relating socially to [+power]. When younger Koreans converse with older ones, they express different morpho-syntactic patterns, which is an age complex. The main task of the experiment was to examine the way through which the age complex is reflected by Korean honorific linguistic system in email discourse. I asked 15 Korean native speakers between the ages of 20 to 25 to write emails expressing an impositive request to [+age (46-50 years old], [-age (below 25 years old] and [=age] recipients. The results show significant differences in the use of grammatical features in emails written to [+age] recipients, as compared to emails written to [-age] and [=age] recipients. The implication of the findings is that the cultural values that are attached to age and aging in the Korean society affects Koreans’ language use, which means Korean language and culture are closely intermingled.

  5. Detection of fraudulent emails by employing advanced feature abundance

    Directory of Open Access Journals (Sweden)

    Sarwat Nizamani

    2014-11-01

    Full Text Available In this paper, we present a fraudulent email detection model using advanced feature choice. We extracted various kinds of features and compared the performance of each category of features with the others in terms of the fraudulent email detection rate. The different types of features are incorporated step by step. The detection of fraudulent email has been considered as a classification problem and it is evaluated using various state-of-the art algorithms and on CCM (Nizamani et al., 2011 [1] which is authors’ previous cluster based classification model. The experiments have been performed on diverse feature sets and the different classification methods. The comparison of the results is also presented and the evaluation show that for the fraudulent email detection tasks, the feature set is more important regardless of classification method. The results of the study suggest that the task of fraudulent emails detection requires the better choice of feature set; while the choice of classification method is of less importance.

  6. Managing E-mail Interactions with Patients: A Discussion with Clinicians in Evaluating the Personal Health Link Project.

    Science.gov (United States)

    Serrato, Carl A; Retecki, Sally

    2004-01-01

    One software feature in the Personal Health Link (PHL) Project allows members of Kaiser Permanente to send secure e-mail messages to clinicians and staff. As an early step in the PHL evaluation process, a group of primary care physicians met to discuss their opinions and experiences with e-mail interactions with patients and to suggest strategies for effectively managing these e-mail interactions. Most clinicians spoke from their experience with e-mail interactions with patients in a conventional e-mail environment; only one clinician in the group was using PHL.

  7. Using e-mail to facilitate nursing scholarship.

    Science.gov (United States)

    Ribbons, B; Vance, S

    2001-01-01

    A central tenet of university education is the development of scholarly abilities. The traditional hallmarks of scholarship, such as critical thinking, reflection, creativity, critical analysis, and openness to new thinking, need to be fostered in the face of increasing technological change. Contemporary e-mail applications provide a sophisticated environment in which many of the fundamental skills of scholarship can be nurtured. This article describes an interdisciplinary curricular project in which e-mail was employed as a vehicle to support the development of students' understanding of scholarship within a cohort of first-year undergraduate nursing students. The project involved the establishment of "Virtual Colleague" activity, which used e-mail to conduct scholarly activities, including critical analysis of electronic journals and web sites and peer review. The theoretical underpinning of the project and an evaluation of the project are presented. Future use of such technologies in the promotion of scholarship among nurses is discussed.

  8. Testing for telepathy in connection with e-mails.

    Science.gov (United States)

    Sheldrake, Rupert; Smart, Pamela

    2005-12-01

    This study investigated possible telepathic communication in connection with e-mails. On each trial, there were four potential e-mailers, one of whom was selected at random by the experimenter. One minute before a prearranged time at which the e-mail was to be sent, the participant guessed who would send it. 50 participants (29 women and 21 men) were recruited through an employment web site. Of 552 trials, 235 (43%) guesses were hits, significantly above the chance expectation of 25%. Further tests with 5 participants (4 women, 1 man, ages 16 to 29) were videotaped continuously. On the filmed trials, the 64 hits of 137 (47%) were significantly above chance.

  9. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  10. Variation of English business e-mails in Asian countries

    Directory of Open Access Journals (Sweden)

    María Luisa Carrió-Pastor

    2013-10-01

    Full Text Available The overall aim of this paper is to detect whether there is language variation in a setting such as international business communication, in which interaction is expected to be precise and concise. In order to achieve this, the research aims of this paper are, first, to detect whether there is variation in the internal organization of e-mails; second, to analyse the moves and steps in the e-mails (Swales, 1990; Bhatia, 1993 and the changes in the organization patterns; and, third, to establish whether the variation in the internal organization and the moves of the e-mails interfered with the exchange of ideas. The corpus used in this study was made up of authentic texts, consisting of one hundred e-mails, written by business managers from India and China, who communicate in English with their counterparts in order to report business issues at their offices, which are subsidiaries of an international company specialising in the manufacture of machinery. Firstly, we analysed the moves of the corpus taking into consideration the standard structure of e-mails, following the proposal made by Bhatia (1993. Secondly, we detailed the steps used in Moves 5 and 6 as the non-native speakers of English varied the structure of these moves. Thirdly, we contrasted the results obtained in the analysis of the moves and steps in the e-mails and discussed whether move variation in international business communication is due to the influence of the cultural or linguistic background of the writer. The conclusions show that the influence of the mother tongue of the speakers of English as an international language is changing the use of English in Asian countries.

  11. Pandora’s Email Box? An Exploratory Study of Web-Based Email Forgery Detection and Validation.

    Directory of Open Access Journals (Sweden)

    Richard Boddington

    2012-03-01

    Full Text Available Web based email systems may be a source of pristine digital evidence because of the perceived difficulty of client tampering with messages stored inside the email account. We demonstrate that such assumption is wrong in the case of Windows Live Hotmail™. Windows Live Mail™ synchronises message on client-side computers with the Hotmail™ server, benefiting users wishing to synchronise their email accounts and personal devices. However, this synchronisation opens an exploit for wrongdoers to tamper with existing email messages and attachments as well as facilitating the insertion of fabricated messages. The exploit enables persistent storage of tampered and fabricated messages on the Hotmail™ server. The exploit favours both account owners and wrongdoers who gain unauthorised access of others’ accounts. Even if tampering were suspected, we anticipate some difficulties in validating messages to determine their reliability and relevance. We predict, with trepidation, that the exploit will become commonplace and pose greater challenges to the cyber forensics examiner and legal practitioner during investigations and legal proceedings. Regrettably, the exploit complements the existing arsenal of tools for email forgery. More ominously, it provides opportunity for traceless injection of illicit material/malware onto any machine synchronised with the Hotmail™ account.

  12. Machine Learning for Email Spam Filtering and Priority Inbox

    CERN Document Server

    Conway, Drew

    2011-01-01

    If you're an experienced programmer willing to crunch data, this concise guide will show you how to use machine learning to work with email. You'll learn how to write algorithms that automatically sort and redirect email based on statistical patterns. Authors Drew Conway and John Myles White approach the process in a practical fashion, using a case-study driven approach rather than a traditional math-heavy presentation. This book also includes a short tutorial on using the popular R language to manipulate and analyze data. You'll get clear examples for analyzing sample data and writing machi

  13. Internet recruitment and e-mail interviews in qualitative studies.

    Science.gov (United States)

    Hamilton, Rebekah J; Bowers, Barbara J

    2006-07-01

    In 2004, 111 million adults accessed the Internet looking for health and medical information. Qualitative researchers can apply long-standing principles of recruitment and interviewing to the Internet. The purpose of this article is to examine the theoretical and methodological aspects of Internet recruitment and e-mail interviewing. The authors address issues of appropriateness, adequacy, representativeness, sample bias, data fraud, flexibility and consistency in interviewing, timing, elimination of the need for transcription, oral versus written communication, reliability and validity, and ethical concerns. They include some practical suggestions on a research design for a qualitative study employing both Internet recruitment and e-mail interviewing.

  14. Discourse strategies in professional e-mail negotiation

    DEFF Research Database (Denmark)

    Jensen, Astrid

    2009-01-01

    The purpose of this article is to report on some of the preliminary results of an on-going study on the use of discourse strategies in e-mail negotiation. The analysis aims at showing how relations between the participants develop through the use of specific discourse strategies in their e......-mail communication which covers a period of three months, during which the relationship progresses from initial contact to on-going business. Drawing on Hyland's (2005) concept of metadiscourse combined with Charles' (1996) categories of ‘old and new relationship negotiations', this study provides insights...

  15. Unraveling mulitple translatorship through an e-mail correspondence

    DEFF Research Database (Denmark)

    2017-01-01

    The aim of this study is to shed light on questions of “multiple translatorship” and particularly on translation collaboration processes. The empirical material consists of more than three hundred e-mails exchanged between two co-translators who translated Claudio Magris’s novel Alla cieca (2005......) into Danish. The theoretical framework presents a double perspective through which the e-mail correspondence is studied: on the one hand, as an ethnographic “thick description” (focusing on translation as an event), with the aim of uncovering who the agents involved are, how they interact, and what...

  16. BEWARE OF OPENING ATTACHMENTS IN E-MAIL

    CERN Multimedia

    2000-01-01

    Following the recent e-mail viruses you are asked to be cautious when opening e-mail attachments on your PC. Attachments that are apparently harmless might hide active content producing nasty effects as soon as they are opened. Some of these so called 'Trojan horses' can conceal themselves in very attractive pictures and funny slide shows.On the PC Windows infrastructure, CERN runs software to protect users from known viruses, but new ones can sometimes arrive before our software recognises them. They can enter your system when you open an attachment. To remove them it may be necessary to re-install the Windows software on your PC.

  17. Colleges Get out of E-Mail Business

    Science.gov (United States)

    Carnevale, Dan

    2008-01-01

    Frantic troubleshooting by an overworked staff versus someone else fixing problems smoothly. A sliver of server space per person versus a five-gigabyte chunk. Half a million dollars versus free. That's what colleges are faced with as they decide whether to continue running their own e-mail services or outsource them to a professional service like…

  18. E-mailing jako środek w pracy socjalnej

    OpenAIRE

    Tytko, Marek Mariusz

    2013-01-01

    Hasło w "Słowniku metod, technik i form pracy socjalnej, opiekuńczej i terapeutycznej" ukazuje zastosowanie poczty elektronicznej (e-mailingu) w pracy socjalnej. The entry in "The dictionary of methods, techniques and forms in the social, caring and therapeutic work" shows using electronic mailing (e-mailing) in the social work

  19. Fostering Language Learning via Email: An English-Spanish Exchange

    Science.gov (United States)

    Vinagre, Margarita

    2005-01-01

    This article describes an email project carried out jointly by the Institute of Modern Languages and the Department of Applied Languages at Antonio de Nebrija University in Madrid and the University of Massachusetts Amherst (UMass) in the US during the first semester of the academic year 2004-2005. Students worked with a partner exchanging…

  20. SPAM: Beware of e-mails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake e-mails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake e-mail message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, but future cases may still occur. Users need to be vigilant regarding any requests for passwords or personal data. Fake e-mails should be immediately deleted. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN IT Department

  1. E-Mail as an Effective Teaching Supplement.

    Science.gov (United States)

    Poling, Don J.

    1994-01-01

    The use of electronic mail (e-mail) to facilitate communications between professors and students is presented. Examples of uses include announcements, students' questions, counseling, distribution of class assignments, quizzes, grade posting, homework hints, and attendance issues. Advantages and disadvantages are discussed. (SLW)

  2. Fostering Language Learning via Email: An English-Spanish Exchange

    Science.gov (United States)

    Vinagre, Margarita

    2005-01-01

    This article describes an email project carried out jointly by the Institute of Modern Languages and the Department of Applied Languages at Antonio de Nebrija University in Madrid and the University of Massachusetts Amherst (UMass) in the US during the first semester of the academic year 2004-2005. Students worked with a partner exchanging…

  3. The Use of Email to Coach Preservice Early Childhood Teachers

    Science.gov (United States)

    Barton, Erin E.; Fuller, Elizabeth A.; Schnitz, Alana

    2016-01-01

    The purpose of this study was to examine the impact of performance feedback on preservice teachers' use of recommended practices within inclusive early childhood classrooms. A multiple baseline design across behaviors was used to examine the relation between performance feedback delivered via email and practicum students' use of target-recommended…

  4. Dynamics of Email Communications among University Students throughout a Semester

    Science.gov (United States)

    Uddin, Shahadat; Jacobson, Michael J.

    2013-01-01

    Email is considered as one of the most widely accepted computer-mediated communication tools among university students. Evidence from the present literature shows that students make a significant amount of their course-related communications (e.g. discuss a topic with peers) using this tool. This study explores the dynamics of an email…

  5. Orality and literacy, formality and informality in email communication

    Directory of Open Access Journals (Sweden)

    Carmen Pérez Sabater

    2008-04-01

    Full Text Available Approaches to the linguistic characteristics of computer-mediated communication (CMC have highlighted the frequent oral traits involved in electronic mail along with features of written language. But email is today a new communication exchange medium in social, professional and academic settings, frequently used as a substitute for the traditional formal letter. The oral characterizations and linguistic formality involved in this use of emails are still in need of research. This paper explores the formal and informal features in emails based on a corpus of messages exchanged by academic institutions, and studies the similarities and differences on the basis of their mode of communication (one-to-one or one-to-many and the sender’s mother tongue (native or nonnative. The language samples collected were systematically analyzed for formality of greetings and farewells, use of contractions, politeness indicators and non-standard linguistic features. The findings provide new insights into traits of orality and formality in email communication and demonstrate the emergence of a new style in writing for even the most important, confidential and formal purposes which seems to be forming a new sub-genre of letter-writing.

  6. Communicative In-Betweens of E-mail Communication

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2009-01-01

    In this paper I seek to deconstruct internet-based communication. I highlight Derrida’s focus on the margins and in-betweens of communication, and relate it to the genre of e-mail. I argue (i) that the silence between the dialogic turns becomes more marked, while (ii) the separation of present...

  7. Detecting Threat E-mails using Bayesian Approach

    CERN Document Server

    Banday, M Tariq; Jan, Tariq R; Shah, Nisar A

    2011-01-01

    Fraud and terrorism have a close connect in terms of the processes that enables and promote them. In the era of Internet, its various services that include Web, e-mail, social networks, blogs, instant messaging, chats, etc. are used in terrorism not only for communication but also for i) creation of ideology, ii) resource gathering, iii) recruitment, indoctrination and training, iv) creation of terror network, and v) information gathering. A major challenge for law enforcement and intelligence agencies is efficient and accurate gathering of relevant and growing volume of crime data. This paper reports on use of established Na\\"ive Bayesian filter for classification of threat e-mails. Efficiency in filtering threat e-mail by use of three different Na\\"ive Bayesian filter approaches i.e. single keywords, weighted multiple keywords and weighted multiple keywords with keyword context matching are evaluated on a threat e-mail corpus created by extracting data from sources that are very close to terrorism.

  8. Pediatric caregiver attitudes toward email communication: survey in an urban primary care setting.

    Science.gov (United States)

    Dudas, Robert Arthur; Crocetti, Michael

    2013-10-23

    Overall usage of email communication between patients and physicians continues to increase, due in part to expanding the adoption of electronic health records and patient portals. Unequal access and acceptance of these technologies has the potential to exacerbate disparities in care. Little is known about the attitudes of pediatric caregivers with regard to their acceptance of email as a means to communicate with their health care providers. We conducted a survey to assess pediatric caregiver access to and attitudes toward the use of electronic communication modalities to communicate with health care providers in an urban pediatric primary care clinic. Participants were pediatric caregivers recruited from an urban pediatric primary care clinic in Baltimore, Maryland, who completed a 35-item questionnaire in this cross-sectional study. Of the 229 caregivers who completed the survey (91.2% response rate), 171 (74.6%) reported that they use email to communicate with others. Of the email users, 145 respondents (86.3%) stated that they would like to email doctors, although only 18 (10.7%) actually do so. Among email users, African-American caregivers were much less likely to support the expanded use of email communication with health care providers (adjusted OR 0.34, 95% CI 0.14-0.82) as were those with annual incomes less than US $30,000 (adjusted OR 0.26, 95% CI 0.09-0.74). Caregivers of children have access to email and many would be interested in communicating with health care providers. However, African-Americans and those in lower socioeconomic groups were much less likely to have positive attitudes toward email.

  9. The impact of email recruitment on our understanding of college smoking

    OpenAIRE

    Norton, Tina R.; Lazev, Amy B.; Schnoll, Robert A.; Miller, Suzanne M.

    2009-01-01

    Email recruitment is growing in popularity; however, this convenience sampling method may yield very different results from prior convenience sampling methods. Participants in the current study were 825 undergraduate students, 446 recruited through a campus wide email and 379 recruited through Introductory Psychology courses, who completed an online survey on smoking and health. Outcomes varied significantly by group. Introductory Psychology students reported higher smoker self-concept, more ...

  10. Letters by Phone or Speech by Other Means: The Linguistics of Email.

    Science.gov (United States)

    Baron, Naomi S.

    1998-01-01

    Discussion of the linguistic character of electronic mail (e-mail) looks at technology's role in shaping spoken and written usage, the growth of e-mail as a new communication genre, and formal linguistic properties of e-mail. Proposes a model of e-mail as a creolizing linguistic modality, analogous to pidginization and creolization processes well…

  11. Phishtest: Measuring the Impact of Email Headers on the Predictive Accuracy of Machine Learning Techniques

    Science.gov (United States)

    Tout, Hicham

    2013-01-01

    The majority of documented phishing attacks have been carried by email, yet few studies have measured the impact of email headers on the predictive accuracy of machine learning techniques in detecting email phishing attacks. Research has shown that the inclusion of a limited subset of email headers as features in training machine learning…

  12. Employees' Perceptions of Email Communication, Volume and Management Strategies in an Australian University

    Science.gov (United States)

    Pignata, Silvia; Lushington, Kurt; Sloan, Jeremy; Buchanan, Fiona

    2015-01-01

    Despite email playing a central role in university business, little is known about the strategies used by staff to manage email and the factors contributing to email overload. In a mixed method study undertaken in one Australian university comparing academic (n = 193) and professional (n = 278) staff, we found that while email volume was higher in…

  13. 36 CFR 1250.76 - May I email my FOIA appeal?

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false May I email my FOIA appeal... email my FOIA appeal? Yes, you may submit a FOIA appeal via email to http://www.archives.gov/global_pages/inquire_form.html. You must put the words “FOIA Appeal” in the subject line of your email message...

  14. Measuring Future Worker Productivity via Business Email Message Creation: Implications for Education

    Science.gov (United States)

    Hagler, Barbara E.; Erthal, Margaret; Walzer, Dona; Anderson, Marcia A.

    2009-01-01

    Objective: This research was conducted to determine if relationships exist among college students' business email message productivity score and (a) email message quality score, (b) text keying method used to create email message, and (c) self-reported college English grade. Background: Email is increasingly the communication channel preferred for…

  15. Phishtest: Measuring the Impact of Email Headers on the Predictive Accuracy of Machine Learning Techniques

    Science.gov (United States)

    Tout, Hicham

    2013-01-01

    The majority of documented phishing attacks have been carried by email, yet few studies have measured the impact of email headers on the predictive accuracy of machine learning techniques in detecting email phishing attacks. Research has shown that the inclusion of a limited subset of email headers as features in training machine learning…

  16. Employees' Perceptions of Email Communication, Volume and Management Strategies in an Australian University

    Science.gov (United States)

    Pignata, Silvia; Lushington, Kurt; Sloan, Jeremy; Buchanan, Fiona

    2015-01-01

    Despite email playing a central role in university business, little is known about the strategies used by staff to manage email and the factors contributing to email overload. In a mixed method study undertaken in one Australian university comparing academic (n = 193) and professional (n = 278) staff, we found that while email volume was higher in…

  17. 36 CFR 1250.24 - Will you accept a FOIA request through email?

    Science.gov (United States)

    2010-07-01

    ... request through email? 1250.24 Section 1250.24 Parks, Forests, and Public Property NATIONAL ARCHIVES AND... Access Records Under FOIA § 1250.24 Will you accept a FOIA request through email? Yes, send email FOIA... of your email message that you are sending a FOIA request. The body of the message must contain all...

  18. The impact of email as a communicative medium on the doctor-patient relationship

    DEFF Research Database (Denmark)

    Jensen, Matilde Nisbeth; Fage-Butler, Antoinette Mary

    Background and objective: Although theoretical perspectives on the doctor-patient relationship have characteristically assumed the temporal and physical co-presence of doctor and patient, the advent of email in doctor-patient communication has brought with it a different communicative reality. New...... technologies come with significant implications as, amongst other things, they impose practices and identities on participants (Malater 2007). The purpose of this integrative literature review is thus to investigate how the advent of email as a medium of communication affects the doctor-patient relationship....... Methods: Using the methodology of the integrative literature review (Whittemore and Knafl 2005), 38 articles identified from database searches from 2002-2012 are grouped and evaluated under three headings: the content of email exchanges, patients’ perspectives on email communication and doctors...

  19. Perceived Barriers to and Facilitators of Patient-to-Provider E-Mail in the Management of Diabetes Care.

    Science.gov (United States)

    Popeski, Naomi; McKeen, Caitlin; Khokhar, Bushra; Edwards, Alun; Ghali, William A; Sargious, Peter; White, Debbie; Hebert, Marilynne; Rabi, Doreen M

    2015-12-01

    1) to describe current utilization of e-mail in the clinical care of patients with diabetes; and 2) to identify barriers to and facilitators of the adoption of e-mail in diabetes care. Participants included diabetes care providers, including 9 physicians and 7 allied health professionals (AHPs). Participation involved, first, completing a self-administered survey to evaluate the use of e-mail within diabetes-related clinical practice. Second, focus group discussions were conducted with diabetes care providers using semistructured interviews to collect data about their perceptions of using e-mail to exchange information with patients diagnosed with diabetes. Patients' perspectives on the use of e-communication with their care providers was also proposed on the basis of the discussions. Significant differences were found between physicians and AHPs concerning questions that were related to the use of e-mail and the amount of time spent using e-mail to communicate to patients. There was perceived function and value to the use of e-mail among AHPs, while few physicians used e-mail routinely and were uncertain about its potential in improving care. Five themes, including barriers, benefits, risks, safeguards and compensation, were developed from the focus group interviews. Currently, most of the physicians surveyed do not e-mail patients directly; however, AHPs frequently use e-mail in diabetes care and find this tool valuable. Variation in practices regarding clinical e-mail across care disciplines suggest that appropriate policy with guidelines for e-mail and e-communication within the health care system may improve uptake of clinical e-mail and perhaps, by extension, improve efficiency and access in diabetes care. Copyright © 2015. Published by Elsevier Inc.

  20. BEBAN JARINGAN SAAT MENGAKSES EMAIL DARI BEBERAPA MAIL SERVER

    Directory of Open Access Journals (Sweden)

    Husni Thamrin

    2017-01-01

    Full Text Available Expensive internet facilities require prudent in its use both as a source of information and communication media. This paper discusses observations of the perceived burden of network bandwidth when accessing some of the mail server using a webmail application. Mail server in question consists of three commercial server and 2 non-commercial server. Data when it download home page, while logged in, open the email, and during idle logout recorded with sniffer Wireshark. Observations in various situations and scenarios indicate that access Yahoo email gives the network load is very high while the SquirrelMail gives the network load is very low than 5 other mail servers. For an institution, use a local mail server (institutional is highly recommended in the context of banddwidth savings.

  1. AN INTELLIGENT CLASSIFICATION MODEL FOR PHISHING EMAIL DETECTION

    Directory of Open Access Journals (Sweden)

    Adwan Yasin

    2016-07-01

    Full Text Available Phishing attacks are one of the trending cyber-attacks that apply socially engineered messages that are communicated to people from professional hackers aiming at fooling users to reveal their sensitive information, the most popular communication channel to those messages is through users’ emails. This paper presents an intelligent classification model for detecting phishing emails using knowledge discovery, data mining and text processing techniques. This paper introduces the concept of phishing terms weighting which evaluates the weight of phishing terms in each email. The pre-processing phase is enhanced by applying text stemming and WordNet ontology to enrich the model with word synonyms. The model applied the knowledge discovery procedures using five popular classification algorithms and achieved a notable enhancement in classification accuracy; 99.1% accuracy was achieved using the Random Forest algorithm and 98.4% using J48, which is –to our knowledge- the highest accuracy rate for an accredited data set. This paper also presents a comparative study with similar proposed classification techniques.

  2. Classification of Phishing Email Using Random Forest Machine Learning Technique

    Directory of Open Access Journals (Sweden)

    Andronicus A. Akinyelu

    2014-01-01

    Full Text Available Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals. In 2012, an online report put the loss due to phishing attack at about $1.5 billion. This global impact of phishing attacks will continue to be on the increase and thus requires more efficient phishing detection techniques to curb the menace. This paper investigates and reports the use of random forest machine learning algorithm in classification of phishing attacks, with the major objective of developing an improved phishing email classifier with better prediction accuracy and fewer numbers of features. From a dataset consisting of 2000 phishing and ham emails, a set of prominent phishing email features (identified from the literature were extracted and used by the machine learning algorithm with a resulting classification accuracy of 99.7% and low false negative (FN and false positive (FP rates.

  3. Ombuds' corner: Code of Conduct and e-mails

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Luke* holds a key position in the coordination of a large project. He is also a recognized expert in modeling complicated structures. Because of his expertise in the field, he receives a considerable number of e-mails every day which he has trouble responding to in addition to his responsibilities of management and development. Constantly interrupted, he tends to answer his emails quickly, sometimes even in an instinctive way, which leads to somewhat laconic messages. One day he receives an e-mail from Dave* challenging some of the decisions taken by the project’s management. Luke agrees with Dave’s remarks, which seem justified given his own expertise of the su...

  4. Use of email in a family practice setting: opportunities and challenges in patient- and physician-initiated communication

    Directory of Open Access Journals (Sweden)

    Scannell Margaret A

    2006-08-01

    Full Text Available Abstract Background Electronic mail (email has the potential to improve communication between physicians and patients. Methods We conducted two research studies in a family practice setting: 1 a brief, anonymous patient survey of a convenience sample to determine the number of clinic patients receptive to communicating with their physician via email, and 2 a randomized, controlled pilot study to assess the feasibility of providing health education via email to family practice patients. Results Sixty-eight percent of patients used email, and the majority of those (80% were interested in using email to communicate with the clinic. The majority also reported that their email address changed less frequently than their home address (65%, n = 173 or telephone number (68%, n = 181. Forty-two percent were willing to pay an out-of-pocket fee to have email access to their physicians. When evaluating email initiated by the clinic, 26% of otherwise eligible patients could not participate because they lacked email access; those people were more likely to be black and to be insured through Medicaid. Twenty-four subjects agreed to participate, but one-third failed to return the required consent form by mail. All participants who received the intervention emails said they would like to receive health education emails in the future. Conclusion Our survey results show that patients are interested in email communication with the family practice clinic. Our feasibility study also illustrates important challenges in physician-initiated electronic communication. The 'digital divide' – decreased access to electronic technologies in lower income groups – is an ethical concern in the use of email for patient-physician communication.

  5. Automated Personal Email Organizer with Information Management and Text Mining Application

    Directory of Open Access Journals (Sweden)

    Dr. Sanjay Tanwani

    2012-04-01

    Full Text Available Email is one of the most ubiquitous applications used regularly by millions of people worldwide. Professionals have to manage hundreds of emails on a daily basis, sometimes leading to overload and stress. Lots of emails are unanswered and sometimes remain unattended as the time pass by. Managing every single email takes a lot of effort especially when the size of email transaction log is very large. This work is focused on creating better ways of automatically organizing personal email messages. In this paper, a methodology for automated event information extraction from incoming email messages is proposed. The proposed methodology/algorithm and the software based on the above, has helped to improve the email management leading to reduction in the stress and timely response of emails.

  6. Advantages and disadvantages of educational email alerts for family physicians: viewpoint.

    Science.gov (United States)

    Badran, Hani; Pluye, Pierre; Grad, Roland

    2015-02-27

    Electronic knowledge resources constitute an important channel for accredited Continuing Medical Education (CME) activities. However, email usage for educational purposes is controversial. On the one hand, family physicians become aware of new information, confirm what they already know, and obtain reassurance by reading educational email alerts. Email alerts can also encourage physicians to search Web-based resources. On the other hand, technical difficulties and privacy issues are common obstacles. The purpose of this discussion paper, informed by a literature review and a small qualitative study, was to understand family physicians' knowledge, attitudes, and behavior in regard to email in general and educational emails in particular, and to explore the advantages and disadvantages of educational email alerts. In addition, we documented participants' suggestions to improve email alert services for CME. We conducted a qualitative descriptive study using the "Knowledge, Attitude, Behavior" model. We conducted semi-structured face-to-face interviews with 15 family physicians. We analyzed the collected data using inductive-deductive thematic qualitative data analysis. All 15 participants scanned and prioritized their email, and 13 of them checked their email daily. Participants mentioned (1) advantages of educational email alerts such as saving time, convenience and valid information, and (2) disadvantages such as an overwhelming number of emails and irrelevance. They offered suggestions to improve educational email. The advantages of email alerts seem to compensate for their disadvantages. Suggestions proposed by family physicians can help to improve educational email alerts.

  7. Research on an E-mail Encryption Protocol Based on Quantum Teleportation

    Science.gov (United States)

    Shufen, Xiao; Yumin, Dong; Hongyang, Ma; Libo, Chen

    2016-07-01

    With the rapid development of information technology (IT), E-mail has become an important communication tool between human beings. Meanwhile, E-mail safety becomes increasingly important because of its universal applications. In order to overcome shortages of classical E-mail encryption, an E-mail encryption protocol based on quantum teleportation was proposed. It makes quantum encryption of E-mails during sending and receiving processes by taking advantages of entanglement and nonclonability of quantum, thus ensuring safety and reliability of E-mail transmission.

  8. Research on an E-mail Encryption Protocol Based on Quantum Teleportation

    Science.gov (United States)

    Shufen, Xiao; Yumin, Dong; Hongyang, Ma; Libo, Chen

    2016-11-01

    With the rapid development of information technology (IT), E-mail has become an important communication tool between human beings. Meanwhile, E-mail safety becomes increasingly important because of its universal applications. In order to overcome shortages of classical E-mail encryption, an E-mail encryption protocol based on quantum teleportation was proposed. It makes quantum encryption of E-mails during sending and receiving processes by taking advantages of entanglement and nonclonability of quantum, thus ensuring safety and reliability of E-mail transmission.

  9. Experiences of using email for general practice consultations: a qualitative study.

    Science.gov (United States)

    Atherton, Helen; Pappas, Yannis; Heneghan, Carl; Murray, Elizabeth

    2013-11-01

    Reports suggest approximately 21-23% of GPs in the UK have consulted with patients using email, but little is known about the nature of this use and what it means for clinicians and patients in general practice. To understand the use of email consultation in general practice by investigating the experiences of existing users and views of experts. A qualitative study conducted in 2010 using purposive sampling and semi-structured interviews in general practice and community settings in some London boroughs. A maximum variation sample of GPs and patients who had used email for consultation in general practice were recruited, as were policy and/or implementation experts. Interviews continued until saturation was achieved. In total 10 GPs, 14 patients, and six experts were interviewed. Consultation by email was often triggered by logistic or practical issues; motivators for ongoing use were the benefits, such as convenience, for GPs and patients. Both GPs and patients reported concerns about safety and lack of guidance about the 'rules of engagement' in email consultations, with GPs also concerned about workload. In response, both groups attempted to introduce their own rules, although this only went some way to addressing uncertainty. Long term, participants felt there was a need for regulation and guidance. Consultations by email in general practice occur in an unregulated and unstructured way. Current UK policy is to promote consultations by email, making it crucial to consider the responsibility and workload faced by clinicians, and the changes required to ensure safe use; not doing so may risk safety breaches and result in suboptimal care for patients.

  10. Demonstration of an E-mailed Worksite Nutrition Intervention Program

    Directory of Open Access Journals (Sweden)

    Gladys Block

    2004-10-01

    Full Text Available Introduction Dietary fat and low fruit and vegetable intake are linked to many chronic diseases, and U.S. population intake does not meet recommendations. Interventions are needed that incorporate effective behavior-change principles and that can be delivered inexpensively to large segments of the population. Methods Employees at a corporate worksite were invited to participate in a program, delivered entirely by e-mail, to reduce dietary fat and increase fruit and vegetable intake. Behavior-change principles underlying the intervention included tailoring to the participant’s dietary lifestyle, baseline assessment and feedback about dietary intake, family participation, and goal setting. Assessment, tailoring, and delivery was fully automated. The program was delivered weekly to participants’ e-mail inboxes for 12 weeks. Each e-mail included information on nutrition or on the relationship between diet and health, dietary tips tailored to the individual, and small goals to try for the next week. In this nonrandomized pilot study, we assessed technical feasibility, acceptability to employees, improvement in Stage of Change, increase in fruit and vegetable consumption, and decrease in fat intake. Results Approximately one third (n = 84 of employees who were offered the 12-week program signed up for it, and satisfaction was high. There was significant improvement in Stage of Change: 74% of those not already at the top had forward movement (P < .001. In addition, results suggest significant increase in fruit and vegetable consumption (0.73 times/day, P < .001 and significant decrease in intake of fat sources (-0.39 times/day, P < .001. Conclusion This inexpensive program is feasible and appears to be effective. A randomized controlled trial is needed.

  11. Therapeutic neuroscience education via e-mail: a case report.

    Science.gov (United States)

    Louw, Adriaan

    2014-11-01

    Therapeutic neuroscience education (TNE) aims to alter a patient's thoughts and beliefs about pain and has shown efficacy in treating chronic pain. To date, TNE sessions mainly consist of one-on-one verbal communication. This approach limits availability of TNE to pain patients in remote areas. A 32-year-old patient with chronic low back pain (CLBP) who underwent surgery for thoracic outlet syndrome (TOS) attended a single clinic one-on-one TNE session followed by TNE via electronic mail (e-mail), pacing and graded exposure over a 4-month period. A physical examination, Numeric Rating Scale (NRS), Oswestry Disability Index (ODI), the Disabilities of Arm, Shoulder and Hand (DASH), and Fear-Avoidance Beliefs Questionnaire (FABQ) were assessed during her initial physical therapy visit as well as 1 and 4 months later. Pre-TNE, the patient reported: NPRS (arm) = 7/10; NPRS (leg) = 4/10; ODI = 10.0%; DASH = 36.7%; FABQ-W = 24; and FABQ-PA = 17. After 5 e-mail sessions all outcome measures improved, most noticeably NRS (arm) = 2/10; NRS (leg) = 0/10; DASH = 16.7%; FABQ-W = 8; and FABQ-PA = 7. TNE can potentially be delivered to suffering pain patients in remote areas or to individuals who have time and financial constraints, and likely at a significant reduced cost via e-mail.

  12. Rapid response: email, immediacy, and medical humanitarianism in Aceh, Indonesia.

    Science.gov (United States)

    Grayman, Jesse Hession

    2014-11-01

    After more than 20 years of sporadic separatist insurgency, the Free Aceh Movement and the Indonesian government signed an internationally brokered peace agreement in August 2005, just eight months after the Indian Ocean tsunami devastated Aceh's coastal communities. This article presents a medical humanitarian case study based on ethnographic data I collected while working for a large aid agency in post-conflict Aceh from 2005 to 2007. In December 2005, the agency faced the first test of its medical and negotiation capacities to provide psychiatric care to a recently amnestied political prisoner whose erratic behavior upon returning home led to his re-arrest and detention at a district police station. I juxtapose two methodological approaches-an ethnographic content analysis of the agency's email archive and field-based participant-observation-to recount contrasting narrative versions of the event. I use this contrast to illustrate and critique the immediacy of the humanitarian imperative that characterizes the industry. Immediacy is explored as both an urgent moral impulse to assist in a crisis and a form of mediation that seemingly projects neutral and transparent transmission of content. I argue that the sense of immediacy afforded by email enacts and amplifies the humanitarian imperative at the cost of abstracting elite humanitarian actors out of local and moral context. As a result, the management and mediation of this psychiatric case by email produced a bureaucratic model of care that failed to account for complex conditions of chronic political and medical instability on the ground. Copyright © 2014 Elsevier Ltd. All rights reserved.

  13. E-Mail discussion Forums in Library and Information Services (LIS: A Study

    Directory of Open Access Journals (Sweden)

    Dhanavandan S

    2012-08-01

    Full Text Available The email facilities are currently provided free service through many search engines groups. The discussion forums are discussed through e-mail groups in same professions. The terms discussion forum “Forum, Mailing list and List are using interchangeably. This paper made an attempt to analysis library and information services (LIS forum. This paper analysed the highlights definition, purpose of the study, groups available over the internet and features of the forum, .the number of members, the mode of hosting the messages among LIS forum.

  14. Communicative In-Betweens of E-mail Communication

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2009-01-01

    In this paper I seek to deconstruct internet-based communication. I highlight Derrida’s focus on the margins and in-betweens of communication, and relate it to the genre of e-mail. I argue (i) that the silence between the dialogic turns becomes more marked, while (ii) the separation of present...... and previous statements becomes less marked. The visibility of the silence between the turns (i) can be a resource for increased awareness of how communicative exchanges are shaped by self-arrangements and -presentations. The dissolution of the separation between present and previous statements (ii) can...

  15. Understanding Online Malicious Behavior: Social Malware and Email Spam

    OpenAIRE

    2013-01-01

    Online social networks (OSNs) have become a popular new vector for distribution of malware and spam, which we refer to as socware . Unlike email spam - which is mostly sent by spammers directly to intended victims - socware leverages in great part on the "word-of- mouth" propagation of online social networks. In the dissertation, we study socware through analysis of 173 billions posts collected from 16K users of MyPageKeeper, a Facebook application created by ourselves, for ten months. We unc...

  16. The Communicative Functions of Emoticons in Workplace E-Mails :-)

    DEFF Research Database (Denmark)

    Skovholt, Karianne; Grønning, Anette; Kankaanranta, Anne

    2014-01-01

    CMC research presents emoticons as visual representations of writers' emotions. We argue that the emoticons in authentic workplace e-mails do not primarily indicate writers' emotions. Rather, they provide information about how an utterance is supposed to be interpreted. We show that emoticons fun...... as humorous, they are joke/irony markers. Third, they are hedges: when following expressive speech acts (such as thanks, greetings, etc.) they function as strengtheners and when following directives (such as requests, corrections, etc.) they function as softeners....

  17. PENGARUH APLIKASI SUBSTRAT IKAN TERI PADA PERMUKAAN EMAIL TERHADAP REMINERALISASI EMAIL

    Directory of Open Access Journals (Sweden)

    Harun A. Gunawan

    2015-07-01

    Full Text Available Topical fluoridation recently has become the method of choice in caries prevention. Fluoride plays an important role not only in the formation of fluoroapatite, but also promoting enamel remineralization. Enamel remineralization occur when the enamel environment supersaturated with calcium and phosphate ions. When the pH level decrease, the rise of H+ ions, the hydroxyl of the apatite will be drawn out from the enamel, and substitute by fluoride ions, this condition will cause apatite breakdown, and both calcium and phosphate will be released to the enamel environment. The release of those minerals will cause supersaturation and promoting enamel remineralization. In the nature fluoride can be found in the sea fishes, such like teri (anchovy, Stolephora sp fishes. Teri fish has about 17 - 38 ppm of fluoride content. The high fluoride content of teri fish, lead this research to knwo the influence of its application to the enamel surface on remineralization process, measured with enamel surfacce roughness and hardness tests. Seven enamel discs, 5x10 mm (W and L obtained from 4 impacted third molars, were used in this research. One disc used as initial control, and 6 discs divided into 2 groups, used as experiment groups. All of the experimental discs, demineralized using 50% phosphoric acid, then 3 of them were applied with teri substrate, whether other 3 discs applied with non ionic aquadest. All experimental discs, then immersed in the remineralization solution containing calcium phosphate stabilized with caseinphosphopeptide. The cycle above repeated for 26 times. Analysis of the specimens were done using surfcom for enamel rougness and Buehler microhardness tester for surface hardness. Surfaace roughness of the group is 1,78 μm compared to the initial group (215 μm, and enamel surface micro hardness of the group is (376 VHN, significantly differ from the control group, 358 VHN. Conclusion: based on this research result, it can be concluded

  18. [Email in a dedicated headache clinic: experience gained over a five-year period].

    Science.gov (United States)

    Pedraza, M Isabel; Herrero-Velázquez, Sonia; López-Mesonero, Luis; Ruiz-Piñero, Marina; Posadas, Javier; Guerrero-Peral, Ángel L

    2015-06-16

    The use of email can facilitate communication between the different levels of an organisation. Our primary care physicians have had an email service in the dedicated headache clinic (DHC) since November 2009, and our aim is therefore to analyse the use of email over that five-year period. Data concerning the emails sent up until October 2014 were collected prospectively. The questions were classified as need for referral to the DHC (group 1), progress made by the cases seen in the DHC (group 2), training in headaches (group 3) or the treatment of the headaches suffered by primary care physicians themselves as patients (group 4). A total of 274 email messages were analysed. Monthly consultations have increased (from 1.5 per month during the first year to 7.5 per month during the fifth). Findings showed that 10.2% of the email messages came from rural health centres and 89.8% were sent from urban health centres. Replies were sent within 2 ± 2.8 days (range: 0-24 days). Altogether 130 consultations were classified as belonging to group 1 (47.4%), in which referral through the normal channel was recommended in 60 cases (46.2%), via the preferential channel in 47 (36.2%) and non-referral was suggested in 23 cases (17.6%). Group 2 included 125 emails (45.7%) and in 80 cases there was no need to make a new appointment or to bring forward the existing one (64%). Thirteen visits (4.7%) were classified into group 3 and six (2.2%) in group 4. Our primary care physicians are using the email of the DHC on an increasingly more frequent basis. Its use makes it possible to detect patients whose appointment -whether the first or a follow-up- needs to be brought forward, as well as allowing issues to be solved without the need for referral. It is effective for the treatment of physicians who themselves have headaches and as a tool for continuing education.

  19. [E-mail in psychotherapy--an aftercare model via electronic mail for psychotherapy inpatients].

    Science.gov (United States)

    Wolf, Markus; Maurer, Wolf-Jürgen; Dogs, Peter; Kordy, Hans

    2006-01-01

    We introduce an aftercare program for psychotherapy inpatients, which is based on regular communication via E-mail. The organizational and operational structure of the program are described within the context of computer mediated communication. First results on utilization and acceptance are reported. In comparison to patients who did not participate in either aftercare program of the clinic, the E-mail participants are younger and higher educated. Inpatient treatment of the participants was three days shorter in duration than that of non participants. Both groups were similar with regard to symptom distress at discharge from hospital. A low dropout rate of 8%, the high activity and satisfaction emphasize the positive acceptance of the program. Therapists' E-mail activity turned out to be important for the participants. Neither age, internet experience or symptom related variables nor the own E-mail activity were associated with participants' evaluation of the new service. Based on these first positive experiences the perspectives of using E-mail in psychotherapy will be discussed.

  20. The Role of E-mail in Organizational Communication

    Directory of Open Access Journals (Sweden)

    Lecturer Ph.D. Niculina Vârgolici

    2008-12-01

    Full Text Available The present article aims to briefly describe the advantages of the e-mail communication,the constraints of such communication means, as well as a set of rules which should be complied with inorder to ensure efficient organizational communication. The fact that communication is such a universal,normal, daily and natural can make us forget sometimes about its particular complexity. Every moment,people communicate with one another, meaning they exchange information, and for this they use variousmeans. Electronic message is an invention which makes our life easier, shatters distances and inhibitions,helps us rediscover and open ourselves to others, casts loneliness away, can bring us closer, but also can setus apart, because it has its rules and traps, of which we should be aware. We consider that nowadays knowingthe e-mail related conduit refers to more than simply avoiding long messages written in caps lock, assuch can really make a difference between profit and loss. Communication is indispensable, but we shouldcompare and view any information we receive and send with a critical sight.

  1. Single Session Email Consultation for Parents: An Evaluation of Its Effect on Empowerment

    Science.gov (United States)

    Nieuwboer, Christa C.; Fukkink, Ruben G.; Hermanns, Jo M. A.

    2015-01-01

    This study evaluated the effect of single session email consultation (SSEC) on empowerment of parents. Practitioners in a control group (n = 19) received no training and practitioners in an experimental group (n = 21) were trained to use empowerment-oriented techniques in online consultation. Parental empowerment was measured (n = 96) through a…

  2. Becoming Known through Email: A Case of Woman, Leadership, and an Awfully Familiar Strange Land

    Science.gov (United States)

    Drake, Pat

    2015-01-01

    This project explores women and educational leadership from the perspective of an individual who moved from the UK to Australia in order to take up the position of Dean of an education grouping in a university. Emails sent by the Dean to the group are analysed after nine months in post and categorised according to the requirements of the position…

  3. The Application of E-Mail to College English Teaching in China

    Science.gov (United States)

    Wang, Guofeng

    2010-01-01

    With the development of information technology in the past 10 years, e-mail has been widely used in the field of English teaching. This paper, based on an analysis of the ways of using e-mail in college English teaching in China, probes the feasibility and the benefits of application of e-mail to college English teaching.

  4. The Use of Email Interviewing as a Qualitative Method of Inquiry in Educational Research

    Science.gov (United States)

    James, Nalita

    2007-01-01

    This article argues for the potential that email interviewing has as a qualitative method in educational research. The article draws on research that uses email as a way of generating online narratives in order to understand how academics construct their identities. In doing so, the article considers the challenges that email interviewing poses…

  5. An Exploration of Linguistic Functions of English Cross-Cultural Love Emails

    Institute of Scientific and Technical Information of China (English)

    黄海平

    2015-01-01

    New technology gives singles a whole new way to find love and has affected the mode of interpersonal communication.English cross-cultural love email is a by- product of online love.By using the method of illustration,I attempt to define English cross-cultural love emails and explore linguistic functions of these emails.

  6. 49 CFR 551.63 - May a foreign manufacturer submit a designation by email or facsimile?

    Science.gov (United States)

    2010-10-01

    ... email or facsimile? 551.63 Section 551.63 Transportation Other Regulations Relating to Transportation... foreign manufacturer submit a designation by email or facsimile? No, the statute requires designation... designation documents submitted via email or facsimile, as they do not satisfy this requirement. ...

  7. Patterns of Email Use by Teachers and Implications: A Singapore Experience

    Science.gov (United States)

    Hu, Chun; Wong, Angela F. L.; Cheah, Horn Mun; Wong, Philip

    2009-01-01

    This paper attempts to identify the patterns of email use by schoolteachers. The findings are based on a survey of 2998 Singapore teachers whose teaching experiences ranged from 24 to 48 months. The result shows that teachers use email mainly to communicate with colleagues, and the degree of email use varies according to the school level that the…

  8. 78 FR 45910 - Proposed Information Collection; Comment Request; Current Population Survey (CPS) Email Address...

    Science.gov (United States)

    2013-07-30

    ... Census Bureau Proposed Information Collection; Comment Request; Current Population Survey (CPS) Email... concerning the November 2013 Email Address Collection Test Supplement. The Census Bureau and the Bureau of.... We foresee that in the future, we could collect email addresses from our respondents. For those that...

  9. Email for clinical communication between patients/caregivers and healthcare professionals.

    Science.gov (United States)

    Atherton, Helen; Sawmynaden, Prescilla; Sheikh, Aziz; Majeed, Azeem; Car, Josip

    2012-11-14

    Email is a popular and commonly-used method of communication, but its use in health care is not routine. Where email communication has been demonstrated in health care this has included its use for communication between patients/caregivers and healthcare professionals for clinical purposes, but the effects of using email in this way is not known.This review addresses the use of email for two-way clinical communication between patients/caregivers and healthcare professionals. To assess the effects of healthcare professionals and patients using email to communicate with each other, on patient outcomes, health service performance, service efficiency and acceptability. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010) and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists, contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies examining interventions using email to allow patients to communicate clinical concerns to a healthcare professional and receive a reply, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two authors independently assessed the risk of bias of included studies and extracted data. We contacted study authors for additional information. We assessed risk of bias according to the Cochrane Handbook for Systematic Reviews of Interventions. For continuous measures, we report effect sizes as mean

  10. Use of email in communication between the Finnish primary healthcare system and general practitioners.

    Science.gov (United States)

    Karhula, Tuula; Kauppila, Timo; Elonheimo, Outi; Brommels, Mats

    2011-01-01

    The volume of emails is rising rapidly everywhere. However, there is no data available concerning how primary healthcare physicians feel about the use of email communication between themselves, with their managers and with other people contacting them. The objective of this study was to find out what the attitudes of primary care physicians are towards email at work. The use of email was studied among a convenience sample of primary healthcare physicians. Physicians thought that email was a good instrument for delivering information but not as an instrument for leadership. Physicians in lead positions thought more often than ordinary general practitioners (GPs) that email is good for information. The leaders used email more actively than other GPs. The contents of the emails received by the GPs differed depending on the site of work. The total number of emails was higher in urban areas than in rural areas. Emails relating to administration, educational information and meeting materials were more often sent in rural than in urban primary healthcare settings. Information about daily work arrangements and about social events were more frequently emailed in urban than in rural surroundings. Email was considered important for information inside the system but a somewhat difficult tool for discussing complicated subjects. Generally, it was agreed that there was some unimportant information filtering through this medium to the target GPs. GPs were uncertain whether important data reached everybody who needed it or not. Still, almost everybody used the email system regularly and the use of it was considered relatively easy. GPs were generally prone to adopt advice and instructions given via email and implemented those in their working routines. The use of the email system was related to technical ability to use the system. The easier the GP thought that the email system was the more he used it. Rural GPs were more critical in applying advice shared via email than their

  11. The effect of feedback by SMS-text messages and email on household electricity consumption

    DEFF Research Database (Denmark)

    Gleerup, Maria; Larsen, Anders; Leth-Petersen, Søren

    2010-01-01

    This paper analyzes the effect of supplying feedback by text messages (SMS) and email about electricity consumption on the level of total household electricity consumption. An experiment was conducted in which 1,452 households were randomly allocated to three experimental groups and two control....... Results suggest that email and SMS messaging that communicated timely information about a household's 'exceptional' consumption periods (e.g. highest week of electricity use in past quarter) produced average reductions in total annual electricity use of about 3%. The feedback technology is cheap...

  12. Etiquette for medical students' email communication with faculty members: a single-institution study.

    Science.gov (United States)

    Kim, Do-Hwan; Yoon, Hyun Bae; Yoo, Dong-Mi; Lee, Sang-Min; Jung, Hee-Yeon; Kim, Seog Ju; Shin, Jwa-Seop; Lee, Seunghee; Yim, Jae-Joon

    2016-04-27

    Email is widely used as a means of communication between faculty members and students in medical education because of its practical and educational advantages. However, because of the distinctive nature of medical education, students' inappropriate email etiquette may adversely affect their learning as well as faculty members' perception of them. Little data on medical students' competency in professional email writing is available; therefore, this study explored the strengths and weaknesses of medical students' email etiquette and factors that contribute to professional email writing. A total of 210 emails from four faculty members at Seoul National University College of Medicine were collected. An evaluation criteria and a scoring rubric were developed based on the various email-writing guidelines. The rubric comprised 10 items, including nine items for evaluation related to the email components and one item for the assessment of global impression of politeness. Three evaluators independently assessed all emails according to the criteria. Students were identified as being 61.0% male and 52.8% were in the undergraduate-entry program. The sum of each component score was 62.21 out of 100 and the mean value for global impression was 2.6 out of 4. The results demonstrated that students' email etiquettes remained low-to-mediocre for most criteria, except for readability and honorifics. Three criteria, salutation (r=0.668), closing (r=0.653), and sign-off (r=0.646), showed a strong positive correlation with the global impression of politeness. Whether a student entered a graduate-entry program or an undergraduate-entry program significantly contributed to professional email writing after other variables were controlled. Although students in the graduate-entry program demonstrated a relatively superior level of email etiquette, the majority of medical students did not write emails professionally. Educating all medical students in email etiquette may well contribute to

  13. EMAIL SPAM CLASSIFICATION USING HYBRID APPROACH OF RBF NEURAL NETWORK AND PARTICLE SWARM OPTIMIZATION

    Directory of Open Access Journals (Sweden)

    Mohammed Awad

    2016-07-01

    Full Text Available Email is one of the most popular communication media in the current century; it has become an effective and fast method to share and information exchangeall over the world. In recent years, emails users are facing problem which is spam emails. Spam emails are unsolicited, bulk emails are sent by spammers. It consumes storage of mail servers, waste of time and consumes network bandwidth.Many methods used for spam filtering to classify email messages into two groups spam and non-spam. In general, one of the most powerful tools used for data lassification is Artificial Neural Networks (ANNs; it has the capability of dealing a huge amount of data with high dimensionality in better accuracy. One important type of ANNs is the Radial Basis Function Neural Networks (RBFNN that will be used in this work to classify spam message. In this paper, we present a new approach of spam filtering technique which combinesRBFNN and Particles Swarm Optimization (PSO algorithm (HC-RBFPSO. The proposed approach uses PSO algorithm to optimize the RBFNN param eters, depending on the evolutionary heuristic search process of PSO. PSO use to optimize the best position of the RBFNN centers c. The Radii r optimize using K-Nearest Neighbors algorithmand the weights w optimize using Singular Value Decomposition algorithm within each iterative process of PSO depending the fitness (error function. The experiments are conducted on spam dataset namely SPAMBASE downloaded from UCI Machine Learning Repository. The experimental results show that our approach is performed in accuracy compared with other approaches that use the same dataset.

  14. EMAIL MARKETING CAMPAIGNS: THE EASIEST PATH FROM ORGANIZATIONS TO CONSUMERS – AN EXPLORATORY ASSESSMENT

    Directory of Open Access Journals (Sweden)

    Pantea Carmen

    2010-07-01

    Full Text Available The email is a valuable marketing tool for conveying short, simple messages that call for action on behalf of the recipient. Usually companies develop email marketing campaigns for attracting new customers, persuading the existing customers to buy again, encourage customer loyalty, announce or remind about special offers or events. For an email marketing campaign to be efficient, it is wanted a greater number of responses from those in the target. The paper assesses in an exploratory manner the frequency in using the email accounts, the level of exposure to email marketing campaigns as well as the type of information wanted to be received by the Romanian users.

  15. Understanding Patient Experience Using Internet-based Email Surveys: A Feasibility Study at Mount Sinai Hospital.

    Science.gov (United States)

    Morgan, Matthew; Lau, Davina; Jivraj, Tanaz; Principi, Tania; Dietrich, Sandra; Bell, Chaim M

    2015-01-01

    Email is becoming a widely accepted communication tool in healthcare settings. This study sought to test the feasibility of Internet-based email surveys of patient experience in the ambulatory setting. We conducted a study of email Internet-based surveys sent to patients in selected ambulatory clinics at Mount Sinai Hospital in Toronto, Canada. Our findings suggest that email links to Internet surveys are a feasible, timely and efficient method to solicit patient feedback about their experience. Further research is required to optimally leverage Internet-based email surveys as a tool to better understand the patient experience.

  16. Elforbrug på e-mail & sms

    DEFF Research Database (Denmark)

    Christiansen, Ellen Tove; Kanstrup, Anne Marie; Grønhøj, Alice

    suppliers should focus on feedback about metering and billing as a service, which in the first place supports households' wish to sustain themselves. In the second place, this feedback also brings energy consumption issues more to the foreground, improves general energy literacy, and plays a role......This qualitative study of customer demand for online feedback on electricity consumption in private households in Denmark is a follow-up on an experimental study where SMS and e-mail notification were tested as media for giving feedback to private households about electricity consumption (the...... Feedback Project: 'Dansk Energi, Projekt nr. 338-020', http://feedback.noe.dk, reported in Kibsgaard 2008; Junge 2008). The main finding in this follow-up study is that customers demand knowledge about their electricity consumption independent of their attitude towards electricity conservation. We find...

  17. E-mail security: mail clients must use encrypted protocols

    CERN Multimedia

    2006-01-01

    In the coming weeks, users of mail clients other than Outlook (e.g. Pine, Mozilla, Mac Mail, etc.) may receive an e-mail from Mail-service@cern.ch with instructions to update the security settings of their mail client. The aim of this campaign is to enforce the use of encrypted and authenticated mail protocols in order to prevent the propagation of viruses and protect passwords from theft. As a first step, from 6 June 2006 onwards, access to mail servers from outside CERN will require a securely configured mail client as described in the help page http://cern.ch/mmmservices/Help/?kbid=191040. On this page most users will also find tools that will update their mail client settings automatically. Note that Outlook clients and WebMail access are not affected. The Mail Team

  18. E-Mail Server and Traffic Control Management in 2012

    Directory of Open Access Journals (Sweden)

    Cosmin Catalin Olteanu

    2012-12-01

    Full Text Available Emails represents one of the most used communication system in world wide web for more than 15 years and “spam” messages are one of the most annoying and disturbing phenomena. All of us are aware that online marketers are trying to transmit their advertising messages to as many addresses they can. For such “unwanted” messages, adaptive systems must be assembled to review and mark what is wright and what is bad. Always these systems must adapt to consumers preferences to mark only that messages that are not in his white list. Surveys for more than 3000000 messages showed me that some criteria can be defined by start.

  19. The effect of feedback by SMS-text messages and email on household electricity consumption

    DEFF Research Database (Denmark)

    Gleerup, Maria; Larsen, Anders; Leth-Petersen, Søren

    2010-01-01

    This paper analyzes the effect of supplying feedback by text messages (SMS) and email about electricity consumption on the level of total household electricity consumption. An experiment was conducted in which 1,452 households were randomly allocated to three experimental groups and two control...

  20. Securing E-mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

    Directory of Open Access Journals (Sweden)

    Andri Zakariya

    2012-08-01

    Full Text Available One of the most popular internet services is electronic mail (e-mail. By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.

  1. Securing E-mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

    Directory of Open Access Journals (Sweden)

    Andri Zakariya

    2012-12-01

    Full Text Available One of the most popular internet services is electronic mail (e-mail. By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.

  2. An Empirical Study of Email-Based Advertisement and its Influence on Consumers’ Attitude

    Directory of Open Access Journals (Sweden)

    Navid Behravan

    2012-07-01

    Full Text Available E-commerce becomes a cornerstone for many businesses over the recent years. Align with e-commerce activities, the marketing communication through online media plays a major role in achieving competitive advantageous. E-mail advertising in this context offers a cost effective, direct and reciprocal means for businesses overcoming time and geographical barriers. As so, this study discussed the advertising e-mail characteristics and its influences on customers' attitude about email-based advertisement. According to the research findings, entertainment and informativeness of advertising email content is strongly and positively affect customers’ attitude about email-based advertisement. On the other hand, the privacy of advertising e-mail is strongly, yet negatively influences the customers’ attitude towards email-based advertisement.

  3. Understanding interprofessional communication: a content analysis of email communications between doctors and nurses

    Science.gov (United States)

    Smith, C. N. C.; Quan, S.D.; Morra, D.; Rossos, P.G.; Khatibi, H.; Lo, V.; Wong, H.; Wu, R.C.

    2012-01-01

    Background Clinical communication is recognized as a major source of errors in hospitals. The lack of documentation of communication, especially among verbal interactions, often creates hindrances and impedes improvement efforts. By providing smartphones to residents and encouraging nurses to communicate with residents by email shifted much of the communication to emails which permitted analysis of content. Objective Description on the interprofessional email communication between doctors and nurses occurring on the general internal medicine wards at two academic hospitals. Design A prospective analysis of email communications between doctors and nurses. Setting 34 out of the 67 residents who were on the general medicine clinical teaching units consented to allow analysis of their emails over a 6 month period. Main measures Statistical tabulations were performed on the volume and frequency of communications as well the response time of messages. Two physicians coded the content of randomly selected emails for urgency, emotion, language, type of interaction, and subject content. Key results A total of 13,717 emails were available for analysis. Among the emails from nurses, 39.1% were requests for a call back, 18.9% were requests for a response by email and the remaining 42.0% indicated no response was required from physicians. For the messages requesting a response by email, only 50% received an email response. Email responses had a median response time of 2.3 minutes. Content analysis revealed that messages were predominantly non-urgent. The two most frequent purposes for communications were to convey information (91%) and to request action by the physician (36%). Conclusions A smartphone-based email system facilitated the description and content analysis of a large amount of email communication between physicians and nurses. Our findings provide a picture of the communication between physicians, nurses and other healthcare professionals. This work may help inform

  4. Acceptability of a theory of planned behaviour email-based nutrition intervention.

    Science.gov (United States)

    Kothe, E J; Mullan, B A

    2014-03-01

    This study investigated feasibility and acceptability of a new email-delivered intervention promoting fruit and vegetable consumption in a university-based population of Australian young adults. The study explored whether there are differences in the reported feasibility and acceptability between demographic groups within the population of interest and at three levels of intervention intensity. The email-delivered intervention program consists of an implementation intention 'planning task' and between 3 and 15 short email messages over a 15-day study period. The intervention program was developed using the Theory of Planned Behaviour and was designed to modify perceived behavioural control. One hundred and ten participants (mean age = 19.21 years, 25.6% male) completed the feasibility and acceptability questionnaire at Day 15. This questionnaire contained items about all intervention components. High acceptability and feasibility scores were found for all intervention parts and at all levels of intervention intensity. There were few significant differences in the reported acceptability of items between key demographic sub-groups, and no differences in reported acceptability at different levels of intervention intensity. These results suggest that this email-delivered intervention is an acceptable and feasible tool for promoting fruit and vegetable consumption for participants in the target population.

  5. Factors affecting acceptability of an email-based intervention to increase fruit and vegetable consumption.

    Science.gov (United States)

    Kothe, Emily J; Mullan, Barbara A

    2014-09-30

    Fresh Facts is a 30-day email-delivered intervention designed to increase the fruit and vegetable consumption of Australian young adults. This study investigated the extent to which the program was acceptable to members of the target audience and examined the relationships between participant and intervention characteristics, attrition, effectiveness, and acceptability ratings. Young adults were randomised to two levels of message frequency: high-frequency (n = 102), low-frequency (n = 173). Individuals in the high-frequency group received daily emails while individuals in the low-frequency group received an email every 3 days. Individuals in the high-frequency group were more likely to indicate that they received too many emails than individuals in the low-frequency group. No other differences in acceptability were observed. Baseline beliefs about fruit and vegetables were an important predictor of intervention acceptability. In turn, acceptability was associated with a number of indicators of intervention success, including change in fruit and vegetable consumption. The findings highlight the importance of considering the relationship between these intervention and participant factors and acceptability in intervention design and evaluation. Results support the ongoing use of email-based interventions to target fruit and vegetable consumption within young adults. However, the relationships between beliefs about fruit and vegetable consumption and acceptability suggest that this intervention may be differentially effective depending on individual's existing beliefs about fruit and vegetable consumption. As such, there is a pressing need to consider these factors in future research in order to minimize attrition and maximize intervention effectiveness when interventions are implemented outside of a research context.

  6. THE DEVELOPMENT OF E-MAIL LITERACY: FROM WRITING TO PEERS TO WRITING TO AUTHORITY FIGURES

    Directory of Open Access Journals (Sweden)

    Chi-Fen Emily Chen

    2006-05-01

    Full Text Available Though e-mail has become a common interpersonal communication medium, it does not mean that this medium is used without difficulty. While people can write e-mails to peers in any manner they like, writing e-mails to authority figures requires higher pragmatic competence and critical language awareness of how discourse shapes and reflects power asymmetry in an institutional context. For L2 learners, the challenge of composing this type of e-mail can be greater due not only to their limited linguistic ability but also their unfamiliarity with the target culture's norms and values. To provide a deeper understanding of how an L2 learner develops e-mail literacy in the target language environment, this paper presents a longitudinal case study of a Taiwanese graduate student’s e-mail practice in English during her studies at a U.S. university for two and a half years. Using a critical discourse analysis approach, the study reveals the complexity of an L2 learner’s evolving e-mail practice and struggle for appropriateness, particularly in her e-mail communication with professors. Her development of e-mail literacy is discussed in relation to her evolving understanding of the e-mail medium, changing performance of student identity, increasing knowledge of student-professor interaction and realization of culture-specific politeness.

  7. Use of email for patient communication in student health care: a cross-sectional study

    Directory of Open Access Journals (Sweden)

    Castrén Johanna

    2005-01-01

    Full Text Available Abstract Background Citizens increasingly use email in personal communication. It is not however clear to what extent physicians utilize it for patient communication. Our study was designed to examine physicians' activity in using email and to estimate the proportion of email messages missing from documentation in electronic patient records (EPR. Methods All physicians (n = 76; 48 general practitioners and 28 specialists at the Finnish Student Health Service received a questionnaire by email, and were asked to print it and keep a daily tally of visits, phone calls and email messages over the study period of one working week (5.5. – 9.5.2003. The response rate was 70%. The data originating from the questionnaire were compared with statistical data from the EPR during the study period. Results The majority (79%, 41/52 of doctors reported using email with patients, averaging 8.6 (range: 0–96 email contacts and a percentage rate of "email / visit" 20% (range: 0–185% in one working week. Doctors in the capital city region and those doctors who had a positive attitude toward email for patient communication were most active in email use. Up to 73% of email contacts were not documented in the EPR. Conclusion The activity in using email with patients verified among Finnish physicians is compatible with recent study results elsewhere. The notable proportion of un-recorded email messages establishes the need for an electric communication system built into the EPR to improve the quality of patient care and to limit medico-legal risks.

  8. The style of academic e-mails and conventional letters: contrastive analysis of four conversational routines

    Directory of Open Access Journals (Sweden)

    Clyde Ancarno

    2005-04-01

    Full Text Available This paper presents the results of a corpus-based study which investigates the genre of academic email and more specifically its pragmatic dimension. Four conversational routines (thank yous, apologies, requests, offers are analysed and compared in two channels: academic e-mails and conventional print letters. In addition, data from both native and non-native speakers of English is considered, which sheds light on some of the differences found in the academic e-mail writing of learners of English. The findings indicate that academic e-mail is a relatively formal type of correspondence which is still largely influenced, as is to be expected, by the genre of the academic letter, and that as a genre, academic e-mail is in the process of formation or semi-formation. Finally, native speakers of English are found to be more informal than non-native speakers of English in academic e-mails.

  9. Modeling Personalized Email Prioritization: Classification-based and Regression-based Approaches

    Energy Technology Data Exchange (ETDEWEB)

    Yoo S.; Yang, Y.; Carbonell, J.

    2011-10-24

    Email overload, even after spam filtering, presents a serious productivity challenge for busy professionals and executives. One solution is automated prioritization of incoming emails to ensure the most important are read and processed quickly, while others are processed later as/if time permits in declining priority levels. This paper presents a study of machine learning approaches to email prioritization into discrete levels, comparing ordinal regression versus classier cascades. Given the ordinal nature of discrete email priority levels, SVM ordinal regression would be expected to perform well, but surprisingly a cascade of SVM classifiers significantly outperforms ordinal regression for email prioritization. In contrast, SVM regression performs well -- better than classifiers -- on selected UCI data sets. This unexpected performance inversion is analyzed and results are presented, providing core functionality for email prioritization systems.

  10. THE EFFECT OF USING EMAIL ON ENHANCING IRANIAN EFL LEARNERS’ GRAMMAR DEVELOPMENT

    Directory of Open Access Journals (Sweden)

    Seyed Jalal Abdolmanafi-Rokni

    2013-01-01

    Full Text Available There has been much debate over the use of computers and the internet in foreign language teaching for more than two decades. Education, especially foreign language teaching, has to adapt and renew itself to be compatible with the globalized world. The purpose of this study was to examine the effect of using email on improving EFL learners' grammar development and to highlight the benefits of using email in an EFL grammar class. The participants of the study were 52 female students, aged 13-18 who were randomly assigned to an experimental and control group. Each group consisted of 26 participants. The course lasted for three weeks and was held in one of the institutes in Gorgan, Iran. The experimental group sent their assignments through emails in addition to the traditional class activities but the control group receiving a placebo had the traditional class and assignments were handed in hard copies. For measuring the grammar proficiency, a pretest and posttest was administered to both groups. The pretests and posttests were tests based on the materials covered in the class. The results of the study show that the experimental group outperformed the control group in the posttest.

  11. Language Use in Computer-Mediated Communication: An Investigation into the Genre of Workplace Emails

    OpenAIRE

    Mohammad Awad AlAfnan

    2015-01-01

    This study investigated the moves and communicative purposes used in 522 email messages that were exchanged in a Malaysian private educational institute. Using Swales’s (1990) move approach, this study revealed that email writers used fourteen moves that are mainly six framing and eight content moves. Content moves included four main, one intertextual, one supporting and two follow-up moves. The four main content moves reflected the main communicative purposes of the emails that are discussin...

  12. Measuring Information Glut: Applying Systems Thinking to the Problem of E-mail Overload

    Science.gov (United States)

    2012-09-01

    shortage in caloric intake by sending information (feedback) to the brain to start eating more food in order to reduce the gap between the dieter’s...all of the correct puzzle pieces are readily accessible, we can create a valuable end-product given a reasonable amount of time and effort. However...3. E-mail Filters E-mail filters perform exceptionally well at minimizing spam, also known as unsolicited junk -mail. Most e-mail filters operate by

  13. Assessment of email communication skills of rheumatology fellows: a pilot study

    Science.gov (United States)

    Dhuper, Sonal; Siva, Chokkalingam; Fresen, John L; Petruc, Marius; Velázquez, Celso R

    2010-01-01

    Physician–patient email communication is gaining popularity. However, a formal assessment of physicians' email communication skills has not been described. We hypothesized that the email communication skills of rheumatology fellows can be measured in an objective structured clinical examination (OSCE) setting using a novel email content analysis instrument which has 18 items. During an OSCE, we asked 50 rheumatology fellows to respond to a simulated patient email. The content of the responses was assessed using our instrument. The majority of rheumatology fellows wrote appropriate responses scoring a mean (±SD) of 10.6 (±2.6) points (maximum score 18), with high inter-rater reliability (0.86). Most fellows were concise (74%) and courteous (68%) but not formal (22%). Ninety-two percent of fellows acknowledged that the patient's condition required urgent medical attention, but only 30% took active measures to contact the patient. No one encrypted their messages. The objective assessment of email communication skills is possible using simulated emails in an OSCE setting. The variable email communication scores and incidental patient safety gaps identified, suggest a need for further training and defined proficiency standards for physicians' email communication skills. PMID:20962134

  14. E-mail access to NetCME: implementation of server push paradigm.

    Science.gov (United States)

    McEnery, K W; Grossman, J E

    1997-01-01

    We describe the implementation of a Continuing Medical Education project which utilizes e-mail delivery of HTML documents to facilitate participant access to case material. HTML e-mail is displayed directly within the e-mail reader of the Netscape browser. This system of proactive educational content delivery ensures simultaneous distribution to all participants. Although a more effective method of content distribution, the system preserves user confidentiality and maintains security. HTML e-mail is non-proprietary and could be integrated into existing Internet-based educational projects to facilitate user access.

  15. Assessment of email communication skills of rheumatology fellows: a pilot study.

    Science.gov (United States)

    Mittal, Mayank K; Dhuper, Sonal; Siva, Chokkalingam; Fresen, John L; Petruc, Marius; Velázquez, Celso R

    2010-01-01

    Physician-patient email communication is gaining popularity. However, a formal assessment of physicians' email communication skills has not been described. We hypothesized that the email communication skills of rheumatology fellows can be measured in an objective structured clinical examination (OSCE) setting using a novel email content analysis instrument which has 18 items. During an OSCE, we asked 50 rheumatology fellows to respond to a simulated patient email. The content of the responses was assessed using our instrument. The majority of rheumatology fellows wrote appropriate responses scoring a mean (±SD) of 10.6 (±2.6) points (maximum score 18), with high inter-rater reliability (0.86). Most fellows were concise (74%) and courteous (68%) but not formal (22%). Ninety-two percent of fellows acknowledged that the patient's condition required urgent medical attention, but only 30% took active measures to contact the patient. No one encrypted their messages. The objective assessment of email communication skills is possible using simulated emails in an OSCE setting. The variable email communication scores and incidental patient safety gaps identified, suggest a need for further training and defined proficiency standards for physicians' email communication skills.

  16. Mass Communication and Journalism Faculty's Perceptions of the Effectiveness of Email Communication with College Students: A Nationwide Study

    Science.gov (United States)

    Yates, Bradford L.; Adams, Jennifer Wood; Brunner, Brigitta R.

    2009-01-01

    Nearly 700 US journalism and mass communication faculty (all teaching personnel) reported their perceptions of student email use via a web-based survey. This nationwide study focused on the content of email sent by faculty to students, email's effectiveness, and email's effect on student learning. Comparisons were made based on faculty gender,…

  17. Mass Communication and Journalism Faculty's Perceptions of the Effectiveness of Email Communication with College Students: A Nationwide Study

    Science.gov (United States)

    Yates, Bradford L.; Adams, Jennifer Wood; Brunner, Brigitta R.

    2009-01-01

    Nearly 700 US journalism and mass communication faculty (all teaching personnel) reported their perceptions of student email use via a web-based survey. This nationwide study focused on the content of email sent by faculty to students, email's effectiveness, and email's effect on student learning. Comparisons were made based on faculty gender,…

  18. Email communication in a developing country: different family physician and patient perspectives.

    Science.gov (United States)

    Makarem, Nisrine N; Antoun, Jumana

    2016-01-01

    Email communication between physicians and patients could improve access to and delivery of health care. Most of the literature studies about email communication between physicians and patients have been conducted in developing countries. Therefore, this study aims to analyze the practices, attitudes, and barriers of both physicians' and patients' use of email within the same health care setting of a developing country. A cross-sectional paper-based survey was conducted among 39 physicians and 500 patients at the Family Medicine clinics of the American University of Beirut, a tertiary academic medical center. Most of the surveyed patients and physicians reported that they would like to communicate through email and agreed that it is useful. However, only 19% of the patients have ever communicated with their physicians via email, and only 5.1% of physicians have often communicated with their patients via email. Almost half of the patients surveyed were unaware of the possibility of this form of communication, and only 17% reported that their physician offered them his or her email address. In addition, physicians and patients did not agree on the services to be provided by email communication. For instance, almost half of the patients indicated consultation for an urgent medical matter as suitable for email communication. The use of email communication in health care is still scarce. Patients and physicians have different perspectives of its use and importance. Further rigorous research is needed to clarify the advantages and disadvantages of this form of communication, especially in the developing world. Interested physicians are encouraged to establish appropriate personal policies for email communication with adequate announcement and patient education plans.

  19. We.I.Pe: Web Identification of People using e-mail ID

    CERN Document Server

    Kuppusamy, K S

    2012-01-01

    With the phenomenal growth of content in the World Wide Web, the diversity of user supplied queries have become vivid. Searching for people on the web has become an important type of search activity in the web search engines. This paper proposes a model named "We.I.Pe" to identify people on the World Wide Web using e-mail Id as the primary input. The approach followed in this research work provides the collected information, based on the user supplied e-mail id, in an easier to navigate manner. The grouping of collected information based on various sources makes the result visualization process more effective. The proposed model is validated by a prototype implementation. Experiments conducted on the prototype implementation provide encouraging results

  20. Request Strategies in Professional E-Mail Correspondence: Insights from the United States Workplace

    Science.gov (United States)

    Leopold, Lisa

    2015-01-01

    Despite growing interest in the rhetorical features of e-mail correspondence, this is the first study to examine the request strategies in e-mails written by native English-speaking professionals from a variety of industries in the United States. This study uses Blum-Kulka, House, and Kasper's (1989) speech act framework to analyze the request…

  1. Detecting Targeted Malicious Email through Supervised Classification of Persistent Threat and Recipient Oriented Features

    Science.gov (United States)

    Amin, Rohan Mahesh

    2010-01-01

    Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…

  2. Composing Effective and Efficient E-mails: A Primer for Pharmacy Practitioners.

    Science.gov (United States)

    Summerfield, Marc R; Feemster, Agnes Ann

    2015-09-01

    This primer describes the purpose and importance of e-mail as a key communication medium in the workplace. It emphasizes clarity as a primary modality to enhance efficiency and effectiveness. Finally, the primer reviews elements of grammar, punctuation, and style that contribute to each e-mail's ability to meet language standards, enhance the writer's image, and successfully transmit information.

  3. Relationships between Emotional States and Emoticons in Mobile Phone Email Communication in Japan

    Science.gov (United States)

    Kato, Shogo; Kato, Yuuki; Scott, Douglass

    2009-01-01

    Three related studies conducted on the role of emotional transfer in email messages were studied in order to better understand Japanese college students' online communications and their broader participation in online communications. The first study investigated users' initiatives in preventing emotional misunderstandings when sending email.…

  4. E-Mail Writing: Providing Background Information in the Core of Computer Assisted Instruction

    Science.gov (United States)

    Nazari, Behzad; Ninknejad, Sahar

    2015-01-01

    The present study highly supported the effective role of providing background information via email by the teacher to write e-mail by the students in learners' writing ability. A total number of 50 EFL advanced male students aged between 25 and 40 at different branches of Iran Language Institute in Tehran, Tehran. Through the placement test of…

  5. Using Email Interviews in Qualitative Educational Research: Creating Space to Think and Time to Talk

    Science.gov (United States)

    James, Nalita

    2016-01-01

    The article explores how the Internet and email offer space for participants to think and make sense of their experiences in the qualitative research encounter. It draws on a research study that used email interviewing to generate online narratives to understand academic lives and identities through research encounters in virtual space. The…

  6. Ars Dictaminis Perverted: The Personal Solicitation E-Mail as a Genre

    Science.gov (United States)

    Ross, Derek G.

    2009-01-01

    Phishing e-mails deceive individuals into giving out personal information which may then be utilized for identity theft. One particular type, the Personal Solicitation E-mail (PSE) mimics personal letters--modern perversions of "ars dictaminis" (the classical art of letter writing). In this article, I determine and discuss 19 appeals common to the…

  7. Power Perceptions and Negotiations in a Cross-National Email Writing Activity

    Science.gov (United States)

    Liu, Yichun

    2011-01-01

    The present study investigates EFL students' perceptions of power differentials and their negotiation strategies when communicating with native English-speaking students via emails. The study involved 28 Taiwanese and American undergraduates who participated in a semester-long cross-national email writing activity. Findings show that students in…

  8. Discourse Strategies in Professional E-Mail Negotiation: A Case Study

    Science.gov (United States)

    Jensen, Astrid

    2009-01-01

    The purpose of this article is to report on some of the preliminary results of an on-going study on the use of discourse strategies in e-mail negotiation. The analysis aims at showing how relations between the participants develop through the use of specific discourse strategies in their e-mail communication which covers a period of three months,…

  9. Towards designing an email classification system using multi-view based semi-supervised learning

    NARCIS (Netherlands)

    Li, Wenjuan; Meng, Weizhi; Tan, Zhiyuan; Xiang, Yang

    2014-01-01

    The goal of email classification is to classify user emails into spam and legitimate ones. Many supervised learning algorithms have been invented in this domain to accomplish the task, and these algorithms require a large number of labeled training data. However, data labeling is a labor intensive t

  10. The U.S. Mail vs. E-mail: Understanding Interpersonal Communication through Traditional Pedagogical Pathways.

    Science.gov (United States)

    Swarts, Valerie R.; Walters, Timothy L.

    This paper investigates a number of questions concerning the relative advantages of the U.S. Mail versus electronic mail. Specifically, the paper asks: (1) what is the impact that E-mail has on the ways in which people communicate interpersonally in a visual presentation; (2) will E-mail replace such traditional forms of communication as greeting…

  11. Ethical Judgments Concerning Email Use in the Workplace: University Students' Perceptions.

    Science.gov (United States)

    Keith, Nancy; Perreault, Heidi; Sutliff, Kris

    2001-01-01

    A survey of 1,272 college students showed that most believed it appropriate to use company e-mail accounts for personal messages, but inappropriate to read others' e-mail or send messages with ethnic, racial, or sexual content. Students who participated in ethics discussions were less likely to rate certain behaviors as appropriate. (Contains 22…

  12. "My Heart Want to Say Something": Exploring ELL Vocabulary Use through E-Mail

    Science.gov (United States)

    Hwang, Sung-on; Piazza, Carolyn L.; Pierce, Michael J.; Bryce, Sara M.

    2011-01-01

    Purpose: The purpose of this paper is to report on one high school English-language-learner's (ELL) breadth and depth of vocabulary as he communicated with his teacher through e-mail across geographic boundaries for over 18 months. Design/methodology/approach: The authors began by separating 358 e-mails into three time periods (first beginning,…

  13. An Exploration of English Cross-cultural Love Emails in English Teaching

    Institute of Scientific and Technical Information of China (English)

    黄海平

    2015-01-01

    As a byproduct of on-line love,English crosscultural love email is special and useful in its own way and can be creatively applied in our teaching.In this paper,I attempt to discuss the strengths and limitation of English cross-cultural love emails in English teaching.

  14. Pragmatic Failure of Turkish EFL Learners in Request Emails to Their Professors

    Science.gov (United States)

    Burgucu-Tazegül, Assiye; Han, Turgay; Engin, Ali Osman

    2016-01-01

    In an established convention regarding the e-mail communication setting, the e-mails should be linguistically polite to facilitate interaction by reducing the likelihood of conflicts and preventing pragmatic failure regarding the comprehension of any meaning conveyed by what is stated. These are potential problems for most…

  15. A Comparison between English and Chinese Cross-cultural Love Email

    Institute of Scientific and Technical Information of China (English)

    黄海平

    2015-01-01

    The World Wide Web is quickly becoming the world’s most popular matchmaker.English cross-cultural love email is a by- product of online love.By using the method of comparison in this thesis,I attempt to compare English and Chinese cross-culture love emails.

  16. Outcomes of an Intercultural E-Mail Based University Discussion Project

    Science.gov (United States)

    Furcsa, Laura

    2009-01-01

    This article investigates the development of intercultural awareness in an electronic mail (e-mail) discussion project between Hungarian learners of English and American speakers. Students discussed topics relating to cultures, languages, and pedagogical issues. The e-mails were analyzed in terms of language skill improvement, apprehensiveness…

  17. Using Email Interviews in Qualitative Educational Research: Creating Space to Think and Time to Talk

    Science.gov (United States)

    James, Nalita

    2016-01-01

    The article explores how the Internet and email offer space for participants to think and make sense of their experiences in the qualitative research encounter. It draws on a research study that used email interviewing to generate online narratives to understand academic lives and identities through research encounters in virtual space. The…

  18. New information technology and communication in health care: using e-mail for marketing services

    Directory of Open Access Journals (Sweden)

    Jorge Iván Martínez Espitia

    2015-01-01

    Full Text Available Research that was conducted was aimed to determine their use of e-mail independent health professionals. Email is one of the tools of information and communication that has shown great versatility and efciency as a means to improve the relationship between those who provide services or sell products users. Good communication is essential to keep current customers and attract new business prospects. To achieve the objective of the research a survey that measured the perception and use of email marketing by independent health professionals was conducted in Colombia. Four variables, including tenure email account, receiving these email accounts marketing of products or services, read marketing emails and use by marketing professionals were measured with email. The result of this study showed that independent health professionals in Colombia are familiar with this type of marketing. Generally interested incorporate it as one of your marketing tools, but do not know how to do this activity, which is described in a simple way how to do a marketing campaign with the use of emails to the users of health services.

  19. The Internet and Email For The Over 50s Teach Yourself

    CERN Document Server

    Reeves, Bob

    2010-01-01

    The Internet and Email for the Over 50s provides instruction and advice on how to get the best out of email and the Internet and is written with practical good humour for the the late beginner or the technicologically terrified!

  20. Pandora's electronic box: GPs reflect upon email communication with their patients

    Directory of Open Access Journals (Sweden)

    Felicity Goodyear-Smith

    2005-11-01

    Conclusion Study sample closely mirrored current NZ GP population. Although few GPs emailed with patients, many might once barriers are addressed. GPs had a collective view of the appropriate boundaries for email communication, routine tasks and the transmission of information. GPs would encourage professional debate regarding guidelines for good practice, managing demand and remuneration.

  1. A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence

    NARCIS (Netherlands)

    Stembert, N.; Padmos, A.; Bargh, M.S.; Choenni, R.; Jansen, F.

    2015-01-01

    Cyber criminals use phishing emails in high-volume and spear phishing emails in low volume to achieve their malicious objectives. Hereby they inflict financial, reputational, and emotional damages on individuals and organizations. These (spear) phishing attacks get steadily more sophisticated as cyb

  2. An Exploration of Lexical Features of English Cross-Cultural Love Emails

    Institute of Scientific and Technical Information of China (English)

    黄海平

    2015-01-01

    English cross-cultural love email is a by- product of online love.By using the methods of illustration and statistics in this thesis,I attempt to introduce English cross-cultural love emails and sum up certain distinctive lexical features.

  3. Use of email in communication between the Finnish primary healthcare system and general practitioners

    Directory of Open Access Journals (Sweden)

    Tuula Karhula

    2011-03-01

    Conclusion Especially during periods of change in the workplace, it is very important that management is conducted personally. Care must be taken so that disinformation does not spoil the informative value of email in the administration of primary health care. The needed technical assistance should be given to everyone in order to get the best advantage from the use of the email system.

  4. Detecting Targeted Malicious Email through Supervised Classification of Persistent Threat and Recipient Oriented Features

    Science.gov (United States)

    Amin, Rohan Mahesh

    2010-01-01

    Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…

  5. Understanding Style, Language and Etiquette in Email Communication in Higher Education: A Survey

    Science.gov (United States)

    Lewin-Jones, Jenny; Mason, Victoria

    2014-01-01

    This study investigates academic staff and student attitudes to style and etiquette of emails. Data were collected through two online staff and student surveys. Reported use and acceptability of particular features of email style were assessed. Open-ended responses yielded four themes: the balance between formality and informality, relationships,…

  6. Using Email to Enable E[superscript 3] (Effective, Efficient, and Engaging) Learning

    Science.gov (United States)

    Kim, ChanMin

    2008-01-01

    This article argues that technology that supports both noncognitive and cognitive aspects can make learning more effective, efficient, and engaging (e[superscript 3]-learning). The technology of interest in this article is email. The investigation focuses on characteristics of email that are likely to enable e[superscript 3]-learning. In addition,…

  7. Teaching Email Requests in the Academic Context: A Focus on the Role of Corrective Feedback

    Science.gov (United States)

    Nguyen, Thi Thuy Minh; Do, Thi Thanh Ha; Nguyen, Anh Tuan; Pham, Thi Thanh Thuy

    2015-01-01

    As email requests from students to professors have become increasingly common in academic settings, research has also shown second-language (L2) students' unfamiliarity with email etiquette in L2 has adversely affected their communication with their professors. The present study examines whether giving corrective feedback on students' performance…

  8. The Impact of Using Email on Improving the Writing Skills among Iranian Students

    Science.gov (United States)

    Janfaza, Abusaied; Shahsavari, Khadijeh; Soori, Afshin

    2014-01-01

    The need for the application of technology in education has been increased. One of the new approaches in technology is using email for learning a second or a foreign language. The present study aimed at investigating the effectiveness of using email in improving writing skills among Iranian EFL students. The participants of the study were 42…

  9. Language Use in Computer-Mediated Communication: An Investigation into the Genre of Workplace Emails

    Directory of Open Access Journals (Sweden)

    Mohammad Awad AlAfnan

    2015-01-01

    Full Text Available This study investigated the moves and communicative purposes used in 522 email messages that were exchanged in a Malaysian private educational institute. Using Swales’s (1990 move approach, this study revealed that email writers used fourteen moves that are mainly six framing and eight content moves. Content moves included four main, one intertextual, one supporting and two follow-up moves. The four main content moves reflected the main communicative purposes of the emails that are discussing issues, enquiring about issues, couriering (delivering documents and informing about organizational and academic issues. The four communicative purposes varied in their structural organization, number of recipients and reaction to receiving the email. Keywords: Genre analysis; Email communication; Rhetorical moves; Communicative purposes; Discourse community

  10. A Study of Email Spam and How to Effectively Combat It

    Directory of Open Access Journals (Sweden)

    Mansoor Al-A'ali

    2007-03-01

    Full Text Available This paper presents the results of researching the issues pertaining to email spam on Bahrain's email society and how to combat it. We have surveyed the status of spam amongst the Bahraini community through a carefully prepared questionnaire and studied the effects of spam on the social and economical welfare of Bahrainis. The research results stress the need to regulate spam spread through the introduction of a spam law. The overwhelming majority of the Bahraini email community expresses concern with receiving spam but some would still prefer to continue to receive some sort of controlled spam especially commercial advertising spam. The paper addresses the different concerns expressed by the email community and measures the levels of these concerns in terms of age, gender, work productivity. This paper is aimed at setting the pace for regulating and raising the level of awareness of email spam in the Arab countries.

  11. Email English with new social media section and phrase bank of useful expressions

    CERN Document Server

    Emmerson, Paul

    2013-01-01

    Email English will help students of English to write effective and convincing communications, whether for work or study, whether by email or via social media. Based on hundreds of real examples, Email English deals systematically with key language for constructing effective and convincing emails in English as well as developing an appropriate voice through social media. Basics, including opening and closing emails, giving information, making requests, arranging meetings and checking understanding. Specific situations, such as negotiating, asking for payment and dealing with a supplier or customer. Skills such as describing business trends, relating cause and effect and reporting. General grammar problems, for instance, sentence structure, verb forms, comparison and punctuation. Communication styles: formal and informal, direct and indirect, ways of seeming friendlier. A NEW social media section presents strategies, tips and key language and expressions for writing blogs and on social media platforms such as F...

  12. Development of an E-mail Application Seemit and its Utilization in an Information Literacy Course

    Science.gov (United States)

    Kita, Toshihiro; Miyazaki, Makoto; Nakano, Hiroshi; Sugitani, Kenichi; Akiyama, Hidenori

    We have developed a simple e-mail application named Seemit which is designed for being used in information literacy courses. It has necessary and sufficient functionality of an e-mail application, and it has been developed for the purpose of learning basic operations and mechanisms of e-mail transfer easily. It is equipped with the function to automatically set the configuration of user's SMTP/POP servers and e-mail address, etc. The process of transferring e-mail via SMTP and POP can be demonstrated step by step showing actual messages passed during the client-server interaction. We have utilized Seemit in a university-wide information literacy course which holds about 1800 students.

  13. A survey of GP attitudes to and experiences of email consultations

    Directory of Open Access Journals (Sweden)

    Ron Neville

    2004-12-01

    Full Text Available Email is an accepted part of modern communication in business and education. The use of email could benefit communication between patients and healthcare professionals. Use of email within health care has been hampered by concerns about privacy, technical barriers, perceived fear of change and increased workload. Sixty-two general practitioners within Dundee in east Scotland responded to a questionnaire and indicated that they regularly used email for communication within their practices and with outside agencies, but rarely with patients. Many perceived a need to provide an email service for clinical enquiries and repeat prescription requests but felt constrained from doing so by a lack of an accepted system and workload concerns.

  14. Using email reminders to engage physicians in an Internet-based CME intervention

    Directory of Open Access Journals (Sweden)

    Wall Terry

    2004-09-01

    Full Text Available Abstract Background Engaging practicing physicians in educational strategies that reinforce guideline adoption and improve the quality of healthcare may be difficult. Push technologies such as email offer new opportunities to engage physicians in online educational reinforcing strategies. The objectives are to investigate 1 the effectiveness of email announcements in engaging recruited community-based primary care physicians in an online guideline reinforcement strategy designed to promote Chlamydia screening, 2 the characteristics of physicians who respond to email announcements, as well as 3 how quickly and when they respond to email announcements. Methods Over a 45-week period, 445 recruited physicians received up to 33 email contacts announcing and reminding them of an online women's health guideline reinforcing CME activity. Participation was defined as physician log-on at least once to the website. Data were analyzed to determine participation, to compare characteristics of participants with recruited physicians who did not participate, and to determine at what point and when participants logged on. Results Of 445 recruited physicians with accurate email addresses, 47.2% logged on and completed at least one module. There were no significant differences by age, race, or specialty between participants and non-participants. Female physicians, US medical graduates and MDs had higher participation rates than male physicians, international medical graduates and DOs. Physicians with higher baseline screening rates were significantly more likely to log on to the course. The first 10 emails were the most effective in engaging community-based physicians to complete the intervention. Physicians were more likely to log on in the afternoon and evening and on Monday or Thursday. Conclusions Email course reminders may enhance recruitment of physicians to interventions designed to reinforce guideline adoption; physicians' response to email reminders may

  15. Investigating e-mail overload in the South African banking industry

    Directory of Open Access Journals (Sweden)

    E. Burger

    2007-11-01

    Full Text Available The information workers of today have a wide range of information sources available to make valuable decisions, so much so that it can lead to information overload. The purpose of this research was to investigate the extent of information overload in the South African banking industry. The empirical part of this study was done at the Standard Bank of South Africa, where 115 questionnaires were distributed to three categories of employees. It was found that e-mail is one of the most used computer-mediated applications and is used more than the World-Wide Web, instant messaging or peer-to-peer file sharing. Of the respondents, 65% felt overwhelmed by the amount of e-mails they received as 25% received more than 60 e-mails per day. A third of the respondents dedicated three hours or more to e-mails per day. Respondents agreed that the implementation of policies is important to ensure compliance with legislation, protection of privacy rights and copyright, and the filtering of spam. In conclusion, the respondents indicated that formal training in e-mail management should make a significant difference in the usage of e-mail within the organization and reduce e-mail overload.

  16. Email communication at the medical primary–secondary care interface: a qualitative exploration

    Science.gov (United States)

    Sampson, Rod; Barbour, Rosaline; Wilson, Philip

    2016-01-01

    Background There is little published research into the influence of email communication between primary and secondary care clinicians on patient care. Aim To explore the use of email communication between clinicians across the primary– secondary care interface, and how this may relate to patient care. Design and setting A qualitative study involving primary and secondary care services in the NHS Highland Health Board area, Scotland. Ten GPs and 12 hospital consultants were purposively sampled to reflect diversity. Method Eligible clinicians were invited to take part in a semi-structured interview. Data were analysed using a thematic analysis approach. Results Key themes that emerged for clinicians included general perceptions of email; using email in practice (managing workload, impact on patient journeys, and ‘quick answers’); system issues (variability and governance); relational aspects; and email skills. Conclusion Email communication between primary and secondary care clinicians generally has a positive impact on patient access to specialist expertise. Governance issues around the use of clinical email need to be defined. There may currently be a two-tier health service for those patients (and their GPs) requiring ‘quick answers’. PMID:27162209

  17. Email communication at the medical primary-secondary care interface: a qualitative exploration.

    Science.gov (United States)

    Sampson, Rod; Barbour, Rosaline; Wilson, Philip

    2016-07-01

    There is little published research into the influence of email communication between primary and secondary care clinicians on patient care. To explore the use of email communication between clinicians across the primary- secondary care interface, and how this may relate to patient care. A qualitative study involving primary and secondary care services in the NHS Highland Health Board area, Scotland. Ten GPs and 12 hospital consultants were purposively sampled to reflect diversity. Eligible clinicians were invited to take part in a semi-structured interview. Data were analysed using a thematic analysis approach. Key themes that emerged for clinicians included general perceptions of email; using email in practice (managing workload, impact on patient journeys, and 'quick answers'); system issues (variability and governance); relational aspects; and email skills. Email communication between primary and secondary care clinicians generally has a positive impact on patient access to specialist expertise. Governance issues around the use of clinical email need to be defined. There may currently be a two-tier health service for those patients (and their GPs) requiring 'quick answers'. © British Journal of General Practice 2016.

  18. Email Between Patient and Provider: Assessing the Attitudes and Perspectives of 624 Primary Health Care Patients.

    Science.gov (United States)

    Seth, Puneet; Abu-Abed, Mohamed Ismail; Kapoor, Vikram; Nicholson, Kathryn; Agarwal, Gina

    2016-12-22

    Email between patients and their health care providers can serve as a continuous and collaborative forum to improve access to care, enhance convenience of communication, reduce administrative costs and missed appointments, and improve satisfaction with the patient-provider relationship. The main objective of this study was to investigate the attitudes of patients aged 16 years and older toward receiving email communication for health-related purposes from an academic inner-city family health team in Southern Ontario. In addition to exploring the proportion of patients with a functioning email address and interest in email communication with their health care provider, we also examined patient-level predictors of interest in email communication. A cross-sectional study was conducted using a self-administered, 1-page survey of attitudes toward electronic communication for health purposes. Participants were recruited from attending patients at the McMaster Family Practice in Hamilton, Ontario, Canada. These patients were aged 16 years and older and were approached consecutively to complete the self-administered survey (N=624). Descriptive analyses were conducted using the Pearson chi-square test to examine correlations between variables. A logistic regression analysis was conducted to determine statistically significant predictors of interest in email communication (yes or no). The majority of respondents (73.2%, 457/624) reported that they would be willing to have their health care provider (from the McMaster Family Practice) contact them via email to communicate health-related information. Those respondents who checked their personal email more frequently were less likely to want to engage in this electronic communication. Among respondents who check their email less frequently (fewer than every 3 days), 46% (37/81) preferred to communicate with the McMaster Family Practice via email. Online applications, including email, are emerging as a viable avenue for patient

  19. Controlled trial of worksite health education through face-to-face counseling vs. e-mail on drinking behavior modification.

    Science.gov (United States)

    Araki, Ikuno; Hashimoto, Hideki; Kono, Keiko; Matsuki, Hideaki; Yano, Eiji

    2006-07-01

    This study examined the effectiveness of a traditional face-to-face health education and e-mail health education on alcohol usage among male workers in comparison with a control group. Male workers at a manufacturing plant (N=36) who had abnormal serum gamma-GTP were stratified by age and job types, then randomized into three groups: face-to-face education, e-mail education, and the control. The subjects were assessed on their knowledge about and attitude towards drinking, reported alcohol consumption, and serum gamma-GTP before the start of education and 2 months later after comparison of the education. Paired t-test and repeated ANOVA were conducted to test the significance of changes pre and post the intervention and across groups. In the face-to-face group, knowledge (p=0.001), attitude (p=0.026), alcohol consumption (p=0.003) and serum gamma-GTP showed significant improvement. In the e-mail group, only alcohol consumption showed marginal improvement (p=0.077). In the control group, no variables remarkably changed. These results indicate that the face-to-face health education was more effective than the e-mail program. We discuss why the face-to-face approach was superior to the e-mail approach in this study by referring to self-monitoring, goal setting processes and timely feedback. We concluded that further studies are warranted to identify the effect of health education using e-mails and other network tools in consideration of the above three factors.

  20. Identifying Speech Acts in E-Mails: Toward Automated Scoring of the "TOEIC"® E-Mail Task. Research Report. ETS RR-12-16

    Science.gov (United States)

    De Felice, Rachele; Deane, Paul

    2012-01-01

    This study proposes an approach to automatically score the "TOEIC"® Writing e-mail task. We focus on one component of the scoring rubric, which notes whether the test-takers have used particular speech acts such as requests, orders, or commitments. We developed a computational model for automated speech act identification and tested it…

  1. Report: Congressionally Requested Inquiry Into the EPA’s Use of Private and Alias Email Accounts

    Science.gov (United States)

    Report #13-P-0433, September 26, 2013. We found no evidence that the EPA used, promoted or encouraged the use of private “non-governmental” email accounts to circumvent records management responsibilities

  2. Interviewing When You’re Not Face-To-Face: The Use of Email Interviews in a Phenomenological Study

    Directory of Open Access Journals (Sweden)

    Chandra Bowden

    2015-01-01

    Full Text Available As Internet usage becomes more commonplace, researchers are beginning to explore the use of email interviews. Email interviews have a unique set of tools, advantages, and limitations, and are not meant to be blind reproductions of traditional face-to-face interview techniques. Email interviews should be implemented when: 1 researchers can justify email interviews are useful to a research project; 2 there is evidence that the target population will be open to email interviewing as a form of data collection; and 3 the justification of the email interview supports the researchers’ theoretical perspective. The objective of this study was to develop an email interviewing methodology. As with other forms of qualitative interviewing, it is important that the researcher: 1 identifies constraints; 2 adequately prepares for the interview; 3 establishes rapport; 4 asks appropriate questions; 5 actively listens; and 6 ends the email interview appropriately.

  3. The Contribution of Email Exchanges to Second Language Acquisition: A Case of Cross-Cultural Communication between Africa and North America

    Science.gov (United States)

    Ndemanu, Michael Takafor

    2012-01-01

    An online epistolary project was conducted with Cameroonian French-speaking students in order to boost English language learning. The project involved email exchanges (in English) between a small group of students from Cameroon and Canada, and it was coordinated by their teachers in both countries. At the end of the study, student emails were…

  4. The Contribution of Email Exchanges to Second Language Acquisition: A Case of Cross-Cultural Communication between Africa and North America

    Science.gov (United States)

    Ndemanu, Michael Takafor

    2012-01-01

    An online epistolary project was conducted with Cameroonian French-speaking students in order to boost English language learning. The project involved email exchanges (in English) between a small group of students from Cameroon and Canada, and it was coordinated by their teachers in both countries. At the end of the study, student emails were…

  5. Providing cell phone numbers and email addresses to Patients: the physician's perspective

    Directory of Open Access Journals (Sweden)

    Freud Tamar

    2011-03-01

    Full Text Available Abstract Background The provision of cell phone numbers and email addresses enhances the accessibility of medical consultations, but can add to the burden of physicians' routine clinical practice and affect their free time. The objective was to assess the attitudes of physicians to providing their telephone number or email address to patients. Methods Primary care physicians in the southern region of Israel completed a structured questionnaire that related to the study objective. Results The study population included 120 primary care physicians with a mean age of 41.2 ± 8.5, 88 of them women (73.3%. Physicians preferred to provide their cell phone number rather than their email address (P = 0.0007. They preferred to answer their cell phones only during the daytime and at predetermined times, but would answer email most hours of the day, including weekends and holidays (P = 0.001. More physicians (79.7% would have preferred allotted time for email communication than allotted time for cell phone communication (50%. However, they felt that email communication was more likely to lead to miscommunication than telephone calls (P = 0.0001. There were no differences between male and female physicians on the provision of cell phone numbers or email addresses to patients. Older physicians were more prepared to provide cell phone numbers that younger ones (P = 0.039. Conclusions The attitude of participating physicians was to provide their cell phone number or email address to some of their patients, but most of them preferred to give out their cell phone number.

  6. The optimization of transactional emails in a marketing perspective : Incomedia case

    OpenAIRE

    Valieri, Simona; Marin, Nicola

    2012-01-01

    Aim:  Optimize the usage of transactional emails, going beyond their communicative nature and combining it with marketing purposes. The project has been developed in collaboration with Incomedia, Italian software developer and vendor. Objective: Understand how Incomedia can exploit the benefits of transactional emails in a marketing perspective in order to increase the sales of its software. Limitation: The specificity of the topic, strictly related to Incomedia’s activities, products and con...

  7. Management of Asymptomatic Erosive Esophagitis: An E-Mail Survey of Physician's Opinions

    OpenAIRE

    Lim, Seong Woo; Lee, Jun Haeng; Kim, Jie-Hyun; Kim, Jeong Hwan; Kim, Heung Up; Jeon, Seong Woo

    2013-01-01

    Background/Aims The management of asymptomatic erosive esophagitis is controversial. We surveyed physicians' opinions on asymptomatic erosive esophagitis using e-mail. Methods All members of the Korean Society of Neurogastro-enterology and Motility were invited to answer the questionnaire on the treatment and follow-up of patients with asymptomatic erosive esophagitis by e-mail. Results A total of 73 members answered the questionnaire (response rate, 18%). As initial management, 41% of respon...

  8. Improving Customer Complaint Management by Automatic Email Classification Using Linguistic Style Features as Predictors

    OpenAIRE

    K. COUSSEMENT; D. VAN DEN POEL

    2007-01-01

    Customer complaint management is becoming a critical key success factor in today’s business environment. This study introduces a methodology to improve complaint handling strategies through an automatic email classification system that distinguishes complaints from non-complaints. As such, complaint handling becomes less time-consuming and more successful. The classification system combines traditional text information with new information about the linguistic style of an email. The empirical...

  9. Impact of health portal enrollment with email reminders on adherence to clinic appointments: a pilot study.

    Science.gov (United States)

    Horvath, Monica; Levy, Janet; L'Engle, Pete; Carlson, Boyd; Ahmad, Asif; Ferranti, Jeffrey

    2011-05-26

    Internet portal technologies that provide access to portions of electronic health records have the potential to revolutionize patients' involvement in their care. However, relatively few descriptions of the demographic characteristics of portal enrollees or of the effects of portal technology on quality outcomes exist. This study examined data from patients who attended one of seven Duke Medicine clinics and who were offered the option of enrolling in and using the Duke Medicine HealthView portal (HVP). The HVP allows patients to manage details of their appointment scheduling and provides automated email appointment reminders in addition to the telephone and mail reminders that all patients receive. Our objective was to test whether portal enrollment with an email reminder functionality is significantly related to decreases in rates of appointment "no-shows," which are known to impair clinic operational efficiency. Appointment activity during a 1-year period was examined for all patients attending one of seven Duke Medicine clinics. Patients were categorized as portal enrollees or as nonusers either by their status at time of appointment or at the end of the 1-year period. Demographic characteristics and no-show rates among these groups were compared. A binomial logistic regression model was constructed to measure the adjusted impact of HVP enrollment on no-show rates, given confounding factors. To demonstrate the effect of HVP use over time, monthly no-show rates were calculated for patient appointment keeping and contrasted between preportal and postportal deployment periods. Across seven clinics, 58,942 patients, 15.7% (9239/58,942) of whom were portal enrollees, scheduled 198,199 appointments with an overall no-show rate of 9.9% (19,668/198,199). We found that HVP enrollees were significantly more likely to be female, white, and privately insured compared with nonusers. Bivariate no-show rate differences between portal enrollment groups varied widely according

  10. The role of e-mail in the acquisition of english The role of e-mail in the acquisition of english

    Directory of Open Access Journals (Sweden)

    Vera lúcia Menezes de Oliveira e Paiva

    2008-04-01

    Full Text Available Este artigo examina o papel do correio eletrônico, ou e-mail, na aquisição de inglês como língua estrangeira à luz de teorias de aquisição de segunda língua. Serão apresentadas sugestões para se integrar, adequadamente, o uso do correio eletrônico em sala de aula e ainda algumas ferramentas, tais como lista de discussão e fórum. Além disso, o trabalho faz uma revisão de alguns projetos internacionais que utilizam o e-mail e que estão disponíveis na Internet, comprovando que a interação eletrônica é um instrumento eficiente para promover a aquisição de língua em um contexto de aprendizagem de língua estrangeira. This article examines the role of e-mail in the acquisition of English as a foreign language in the light of second language acquisition theories. Suggestions for integrating e-mail in the classroom and the judicious use of the genre are outlined before the presentation of some tools, such as discussion lists and forum. In addition, this paper presents a review of international e-mail projects available on the net, in order to give support to the conclusion that electronic interaction is an efficient tool to promote language acquisition in a foreign language-learning context.

  11. Legal and policy issues associated with monitoring employee E-mail

    Energy Technology Data Exchange (ETDEWEB)

    Segura, M.A.; Rither, A.C.

    1997-01-01

    This paper examines the legal issues involved with employer monitoring of employee e-mail. In addition to identifying pertinent legal issues, the paper provides guidelines that will help the Pacific Northwest National Laboratory (PNNL) establish a program for monitoring outgoing e-mail to insure compliance with company policies, particularly those regarding protection of trade secrets and proprietary information, and to comply with the Department of Energy`s (DOE) procedures for protecting Export Controlled Information (ECI). Electronic communication has allowed companies to enhance efficiency, responsiveness and effectiveness. E-mail allows employees to transmit all types of data to other individuals inside and outside of their companies. The ease with which information can be transmitted by e-mail has placed trade secrets, proprietary information, and other sensitive data at risk from inadvertent disclosure by employees. As employers attempt to protect their interests through measures such as monitoring e-mail, they may expose themselves to liability under federal and state laws for violating employee privacy. Business use of e-mail has proliferated so rapidly that the federal and state legal systems have not been able to adequately address the issues arising out of its use in the workplace.

  12. Social work practice in the digital age: therapeutic e-mail as a direct practice methodology.

    Science.gov (United States)

    Mattison, Marian

    2012-07-01

    The author addresses the risks and benefits of incorporating therapeutic e-mail communication into clinical social work practice. Consumer demand for online clinical services is growing faster than the professional response. E-mail, when used as an adjunct to traditional meetings with clients, offers distinct advantages and risks. Benefits include the potential to reach clients in geographically remote and underserved communities, enhancing and extending the therapeutic relationship and improving treatment outcomes. Risks include threats to client confidentiality and privacy, liability coverage for practitioners, licensing jurisdiction, and the lack of competency standards for delivering e-mail interventions. Currently, the social work profession does not have adequate instructive guidelines and best-practice standards for using e-mail as a direct practice methodology. Practitioners need (formal) academic training in the techniques connected to e-mail exchanges with clients. The author describes the ethical and legal risks for practitioners using therapeutic e-mail with clients and identifies recommendations for establishing best-practice standards.

  13. Spam Reduction by using E-mail History and Authentication (SREHA

    Directory of Open Access Journals (Sweden)

    Adwan F. Yasin

    2016-07-01

    Full Text Available Spam messages are today one of the most serious threats to users of E-mail messages. There are several ways to prevent and detect spam message, the most important way is filtering spam. Sometimes Filtering fails to discover some spam messages or even fails in the classification of non-spam messages as a spam messages. In this paper, we suggest a new effective method that reduces the spam messages by integrating prevention and detection techniques in one scheme. The reduction achieved by considering history and user authentication. This method based on issuing a certificate to each reliable user during the process of Email account Creation. The certificate used by Email servers to discard or forward ingoing or outgoing Emails. Each Server has to maintain white, gray and blacklist according to Email classification spam or ham, which determined by the user or by the contents examination of the message in terms of empty or contained only links without any text or by searching for a specific keywords in the subject and in the content. We believe that there are no bad or good E–mails forever, so the proposed model dynamically allows the transition of E-mail from one state to another state based on the number of received spam and ham messages.

  14. Analysis of Naïve Bayes Algorithm for Email Spam Filtering across Multiple Datasets

    Science.gov (United States)

    Fitriah Rusland, Nurul; Wahid, Norfaradilla; Kasim, Shahreen; Hafit, Hanayanti

    2017-08-01

    E-mail spam continues to become a problem on the Internet. Spammed e-mail may contain many copies of the same message, commercial advertisement or other irrelevant posts like pornographic content. In previous research, different filtering techniques are used to detect these e-mails such as using Random Forest, Naïve Bayesian, Support Vector Machine (SVM) and Neutral Network. In this research, we test Naïve Bayes algorithm for e-mail spam filtering on two datasets and test its performance, i.e., Spam Data and SPAMBASE datasets [8]. The performance of the datasets is evaluated based on their accuracy, recall, precision and F-measure. Our research use WEKA tool for the evaluation of Naïve Bayes algorithm for e-mail spam filtering on both datasets. The result shows that the type of email and the number of instances of the dataset has an influence towards the performance of Naïve Bayes.

  15. Adherence to and effects of the use of the Guiding the Empowerment Process Model in single session email consultation

    NARCIS (Netherlands)

    Nieuwboer, C.C.; Fukkink, R.G.; Hermanns, J.M.A.

    2015-01-01

    This study evaluated the effect of single session email consultation (SSEC) on empowerment of parents. Practitioners in a control group (n = 19) received no training and practitioners in an experimental group (n = 21) were trained to use empowerment-oriented techniques in online consultation. Parent

  16. The relationship between the external environment and physician e-mail communication: The mediating role of health information technology availability.

    Science.gov (United States)

    Mazurenko, Olena; Hearld, Larry R; Menachemi, Nir

    Physician e-mail communication, with patients and other providers, is one of the cornerstones of effective care coordination but varies significantly across physicians. A physician's external environment may contribute to such variations by enabling or constraining a physician's ability to adopt innovations such as health information technology (HIT) that can be used to support e-mail communication. The aim of the study was to examine whether the relationship of the external environment and physician e-mail communication with patients and other providers is mediated by the practice's HIT availability. The data were obtained from the Health Tracking Physician Survey (2008) and the Area Resource File (2008). Cross-sectional multivariable subgroup path analysis was used to investigate the mediating role of HIT availability across 2,850 U.S. physicians. Solo physicians' perceptions about malpractice were associated with 0.97 lower odds (p communication with patients and other providers, as compared to group and hospital practices, even when mediated by HIT availability. Subgroup analyses indicated that different types of practices are responsive to the different dimensions of the external environment. Specifically, solo practitioners were more responsive to the availability of resources in their environment, with per capita income associated with lower likelihood of physician e-mail communication (OR = 0.99, p information technology availability, which in turn was associated with a greater likelihood of communicating via e-mail with patients (OR = 1.02, p communication and the external environment is mediated by the practice's HIT availability. Efforts to improve physician e-mail communication and HIT adoption may need to reflect the varied perceptions of different types of practices.

  17. Perbedaan Penggunaan Bahan Desensitizing dan Tanpa Desensitizing Pasca Bleaching Ekstra-Koronal terhadap Kekerasan Email

    Directory of Open Access Journals (Sweden)

    Wignyo Hadriyanto

    2012-12-01

    dibandingkan tanpa aplikasi ultraEZ terhadap kekerasan email pada p>0,05.   Background. One of the side effect of bleaching agent is a dentine hypersensitive and ultraEZ is an agent can diminish this process. The purpose of this study was to evaluate difference of enamel microhardness post external bleaching with or without ultra-eze application. Method. Twenty extracted permanent bicuspid used in this study were divided into two group, each group contains 10 bicupids. Group I was treated external bleaching without ultra-eze application and group II was treated external bleaching with application ultraEZ for five minutes. After that all of the subject were seaked the artificial saliva and kept in the incubator 24 hours. Teeth were embedded into acrylic resin with the buccal sirface facing up. Further all of the subject was evaluated by Vickers using 100 g load for 15 seconds. Teeth were stapled on the Micro Hardness Tester table diagonal of emage was measure using micrometer attach on ocular lesnse. Email hardness can be known after calculating, the everage diagonal length, the load used and the duration of hardness test. Further the data was analize using t-test. The result shows there is significant difference between bleaching with and without the application of ultra-eze.

  18. The Effect of Feedback by SMS-text messages and email on Household Electricity Consumption: Experimental Evidence

    DEFF Research Database (Denmark)

    Larsen, Anders

    2010-01-01

    This paper analyzes the effect of supplying online feedback by SMS-text messages and email about electricity consumption on the level of total household electricity consumption. An experiment was conducted in which 1,452 households were randomly allocated to three experimental groups and two...

  19. The Effect of Feedback by SMS-text messages and email on Household Electricity Consumption: Experimental Evidence

    DEFF Research Database (Denmark)

    Larsen, Anders

    2010-01-01

    This paper analyzes the effect of supplying online feedback by SMS-text messages and email about electricity consumption on the level of total household electricity consumption. An experiment was conducted in which 1,452 households were randomly allocated to three experimental groups and two...

  20. Weekly e-mailed teaching tips and reading material influence teaching among general surgery residents.

    Science.gov (United States)

    Watkins, Ammara A; Gondek, Stephen P; Lagisetty, Kiran H; Castillo-Angeles, Manuel; Gangadharan, Sidharta P; Cahalane, Michael J; Kent, Tara S

    2017-01-01

    A nonintrusive e-mail reminder incorporating teaching tips and manuscripts was developed to supplement resident-as-teacher curricula. Ten high-yield manuscripts and 10 teaching tips exemplifying the themes of mentorship or role modeling, teaching methods, adult learning theory, feedback, and the resident role of teaching were distributed to general surgery house staff through a weekly e-mail series. House staff completed surveys before and after the 20-week e-mail series. Thirty (43%) and 28 (40%) respondents completed the pre-e-mail and post-e-mail survey, respectively. Residents found teaching tips to be more helpful than manuscripts. Weekly e-mail reminders were "just right" in frequency according to 74% of respondents. Forty percent of residents felt the weekly e-mails helped them teach more often and 50% of residents changed their teaching style. Weekly reminders are an easy way to encourage resident teaching without a significant resident time commitment. Residents typically find teaching tips to be more useful than manuscripts. Copyright © 2016 Elsevier Inc. All rights reserved.

  1. Formalized Conflicts Detection Based on the Analysis of Multiple Emails: An Approach Combining Statistics and Ontologies

    Science.gov (United States)

    Zakaria, Chahnez; Curé, Olivier; Salzano, Gabriella; Smaïli, Kamel

    In Computer Supported Cooperative Work (CSCW), it is crucial for project leaders to detect conflicting situations as early as possible. Generally, this task is performed manually by studying a set of documents exchanged between team members. In this paper, we propose a full-fledged automatic solution that identifies documents, subjects and actors involved in relational conflicts. Our approach detects conflicts in emails, probably the most popular type of documents in CSCW, but the methods used can handle other text-based documents. These methods rely on the combination of statistical and ontological operations. The proposed solution is decomposed in several steps: (i) we enrich a simple negative emotion ontology with terms occuring in the corpus of emails, (ii) we categorize each conflicting email according to the concepts of this ontology and (iii) we identify emails, subjects and team members involved in conflicting emails using possibilistic description logic and a set of proposed measures. Each of these steps are evaluated and validated on concrete examples. Moreover, this approach's framework is generic and can be easily adapted to domains other than conflicts, e.g. security issues, and extended with operations making use of our proposed set of measures.

  2. Effect of Media Usage Selection on Social Mobilization Speed: Facebook vs E-Mail.

    Directory of Open Access Journals (Sweden)

    Jing Wang

    Full Text Available Social mobilization is a process that enlists a large number of people to achieve a goal within a limited time, especially through the use of social media. There is increasing interest in understanding the factors that affect the speed of social mobilization. Based on the Langley Knights competition data set, we analyzed the differences in mobilization speed between users of Facebook and e-mail. We include other factors that may influence mobilization speed (gender, age, timing, and homophily of information source in our model as control variables in order to isolate the effect of such factors. We show that, in this experiment, although more people used e-mail to recruit, the mobilization speed of Facebook users was faster than that of those that used e-mail. We were also able to measure and show that the mobilization speed for Facebook users was on average seven times faster compared to e-mail before controlling for other factors. After controlling for other factors, we show that Facebook users were 1.84 times more likely to register compared to e-mail users in the next period if they have not done so at any point in time. This finding could provide useful insights for future social mobilization efforts.

  3. Design and implementation of an automated email notification system for results of tests pending at discharge.

    Science.gov (United States)

    Dalal, Anuj K; Schnipper, Jeffrey L; Poon, Eric G; Williams, Deborah H; Rossi-Roh, Kathleen; Macleay, Allison; Liang, Catherine L; Nolido, Nyryan; Budris, Jonas; Bates, David W; Roy, Christopher L

    2012-01-01

    Physicians are often unaware of the results of tests pending at discharge (TPADs). The authors designed and implemented an automated system to notify the responsible inpatient physician of the finalized results of TPADs using secure, network email. The system coordinates a series of electronic events triggered by the discharge time stamp and sends an email to the identified discharging attending physician once finalized results are available. A carbon copy is sent to the primary care physicians in order to facilitate communication and the subsequent transfer of responsibility. Logic was incorporated to suppress selected tests and to limit notification volume. The system was activated for patients with TPADs discharged by randomly selected inpatient-attending physicians during a 6-month pilot. They received approximately 1.6 email notifications per discharged patient with TPADs. Eighty-four per cent of inpatient-attending physicians receiving automated email notifications stated that they were satisfied with the system in a brief survey (59% survey response rate). Automated email notification is a useful strategy for managing results of TPADs.

  4. Kajian Kesantunan dalam E-Mail Permohonan yang Ditulis oleh Penutur Jepang dan Pembelajar Indonesia

    Directory of Open Access Journals (Sweden)

    Hani Wahyuningtias

    2014-05-01

    Full Text Available Nowadays electronic mail (e-mail is a communication tool that is often used in everyday life. One of the utilizations of e-mail is used in practical purposes such as making a request. This paper provided views on linguistic politeness in submitting an e-mail containing the request based on e-mail data written by native speakers of Japanese (J and the Indonesian Japanese language learners (IJL. The data was analyzed using the theory of politeness expressed by Brown and Levinson. This paper focused on the strategy that what more likely was to be used by J and IJL in the expression of request. In the final part, it concluded the view about what should be considered in connection with the linguistic politeness in Japanese e-mail containing request. It was intended for learners of foreign language, especially Indonesian people, to know the limitation of politeness, so that IJL will not repeat the same mistakes in the future.

  5. Politeness Strategies in Collaborative E-Mail Exchanges

    Science.gov (United States)

    Vinagre, Margarita

    2008-01-01

    Computer-supported collaborative learning (CSCL) has been the subject of a wide range of studies over the last twenty years. Previous research suggests that CSCL exchanges can facilitate group-based learning and knowledge construction among learners who are in different geographical locations [Littleton, K. & Whitelock, D. (2004). "Guiding the…

  6. Politeness Strategies in Collaborative E-Mail Exchanges

    Science.gov (United States)

    Vinagre, Margarita

    2008-01-01

    Computer-supported collaborative learning (CSCL) has been the subject of a wide range of studies over the last twenty years. Previous research suggests that CSCL exchanges can facilitate group-based learning and knowledge construction among learners who are in different geographical locations [Littleton, K. & Whitelock, D. (2004). "Guiding the…

  7. Using Publicly Available Data to Characterize Consumers Use of Email to Communicate with Healthcare Providers.

    Science.gov (United States)

    Sandefer, Ryan H; Khairat, Saif S; Pieczkiewicz, David S; Speedie, Stuart M

    2015-01-01

    The use of patient focused technology has been proclaimed as a means to improve patient satisfaction and improve care outcomes. The Center for Medicaid/Medicare Services, through its EHR Incentive Program, has required eligible hospitals and professionals to send and receive secure messages from patients in order to receive financial incentives and avoid reimbursement penalties. Secure messaging between providers and patients has the potential to improve communication and care outcomes. The purpose of this study was to use National Health Interview Series (NHIS) data to identify the patient characteristics associated with communicating with healthcare providers via email. Individual patient characteristics were analyzed to determine the likelihood of emailing healthcare providers. The use of email for this purpose is associated with educational attainment, having a usual place of receiving healthcare, income, and geography. Publicly available data such as the NHIS may be used to better understand trends in adoption and use of consumer health information technologies.

  8. Tailored emails prompt electric vehicle owners to engage with tariff switching information

    Science.gov (United States)

    Nicolson, Moira; Huebner, Gesche M.; Shipworth, David; Elam, Simon

    2017-06-01

    The carbon intensity of the electricity used to charge an electric vehicle (EV) is dependent on when in the day charging occurs. However, persuading EV owners to adopt incentives to charge during off-peak hours is challenging. Here we show that governments could exploit the 'window of opportunity' created when people purchase their first EV to promote time-of-use tariffs. Email recipients (n = 7,038 EV owners) were more likely to click-through to an information webpage when the email emphasized specific reductions in home-charging costs versus general bill savings. However, the 'window of opportunity' for maximizing potential adoption is short; email open rates declined from over 70% immediately after purchase to 40% for recipients owning their EV for over three months. These results demonstrate the potential of prompts to change behaviours for which opt-out enrolment (where enrolment is automatic unless people explicitly opt out) would be unethical or less effective.

  9. The Use of Verbs in Business E-Mail Communication – A Pragmalingu Istic Corpus Study

    Directory of Open Access Journals (Sweden)

    Šiškovič Mojca Nidorfer

    2014-06-01

    Full Text Available Corpus analyses conducted with the help of special tools have become more widely used in all areas of linguistics, including discourse analysis, genre analysis and pragmatics. The paper presents a pragmalinguistic research study of verbs, carried out on a specialized corpus of authentic correspondence of (chains of Slovene business e-mails, Posle-pis. The corpus tools Oxford Wordsmith Tools 5.0 and Sketch Engine were used for analysis, and the research was followed by a comparison of language use with two Slovene reference corpora FidaPLUS and Gigafida. The study confirms the hypothesis that business discourse via e-mail has inherent characteristics that are shown through the frequency of use of certain verbs and verb forms. Certain forms were also identified which prove the conventionalized language use of business e-mail discourse.

  10. Using PLSI-U To Detect Insider Threats from Email Traffic

    Science.gov (United States)

    Okolica, James; Peterson, Gilbert; Mills, Robert

    Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to commercial and government organizations. Once information on a specific topic has gone missing, being able to quickly determine who has shown an interest in that topic can allow investigators to focus their attention. Even more promising is when individuals can be found who have an interest in the topic but who have never communicated that interest within the organization. An employee's interests can be discerned by data mining corporate email correspondence. These interests can be used to construct social networks that graphically expose investigative leads. This paper describes the use of Probabilistic Latent Semantic Indexing (PLSI) [4] extended to include users (PLSI-U) to determine topics that are of interest to employees from their email activity. It then applies PLSI-U to the Enron email corpus and finds a small number of employees (0.02%) who appear to have had clandestine interests.

  11. The impact of email as a communicative medium on the doctor-patient relationship

    DEFF Research Database (Denmark)

    Jensen, Matilde Nisbeth; Fage-Butler, Antoinette Mary

    technologies come with significant implications as, amongst other things, they impose practices and identities on participants (Malater 2007). The purpose of this integrative literature review is thus to investigate how the advent of email as a medium of communication affects the doctor-patient relationship...... of the medium, convenience, freedom from the clinical gaze, pseudo-anonymity and greater opportunities for reflection, whilst doctors express concerns about confidentiality, time and the challenge of conveying empathy electronically. Implications: The impact of email on the doctor-patient relationship has......Background and objective: Although theoretical perspectives on the doctor-patient relationship have characteristically assumed the temporal and physical co-presence of doctor and patient, the advent of email in doctor-patient communication has brought with it a different communicative reality. New...

  12. EVALUATION OF E-MAIL USAGE BY EXTENDED TECHNOLOGY ACCEPTANCE MODEL

    Directory of Open Access Journals (Sweden)

    Savaş Mutlu

    2013-01-01

    Full Text Available This study is performed to evaluate E-mail usage by Extended Technology Acceptance Model (TAM2 and to test the moderation effects of Espoused National Cultural Values between Subjective Norm (SN and E-mail usage Behavioral Intention (BI/Perceived Usefulness (PU. Survey was conducted in Adana Branches of an important Turkish State-Run Bank including 151 participants who have E-mail access for work purposes. As the results of the study; PU and Perceived Ease Of Use (PEOU have positive effects on BI, PEOU and SN both effect PU, Femininity (F shows positive moderating effect on the relationship between SN and PU as well as the relation between SN and BI, Collectivism (C shows positive moderation effect between SN and PU, moderation effect of SN on PU is higher for people who have higher tolerance to uncertainty.

  13. Do family physicians retrieve synopses of clinical research previously read as email alerts?

    Science.gov (United States)

    Grad, Roland; Pluye, Pierre; Johnson-Lafleur, Janique; Granikov, Vera; Shulha, Michael; Bartlett, Gillian; Marlow, Bernard

    2011-11-30

    A synopsis of new clinical research highlights important aspects of one study in a brief structured format. When delivered as email alerts, synopses enable clinicians to become aware of new developments relevant for practice. Once read, a synopsis can become a known item of clinical information. In time-pressured situations, remembering a known item may facilitate information retrieval by the clinician. However, exactly how synopses first delivered as email alerts influence retrieval at some later time is not known. We examined searches for clinical information in which a synopsis previously read as an email alert was retrieved (defined as a dyad). Our study objectives were to (1) examine whether family physicians retrieved synopses they previously read as email alerts and then to (2) explore whether family physicians purposefully retrieved these synopses. We conducted a mixed-methods study in which a qualitative multiple case study explored the retrieval of email alerts within a prospective longitudinal cohort of practicing family physicians. Reading of research-based synopses was tracked in two contexts: (1) push, meaning to read on email and (2) pull, meaning to read after retrieval from one electronic knowledge resource. Dyads, defined as synopses first read as email alerts and subsequently retrieved in a search of a knowledge resource, were prospectively identified. Participants were interviewed about all of their dyads. Outcomes were the total number of dyads and their type. Over a period of 341 days, 194 unique synopses delivered to 41 participants resulted in 4937 synopsis readings. In all, 1205 synopses were retrieved over an average of 320 days. Of the 1205 retrieved synopses, 21 (1.7%) were dyads made by 17 family physicians. Of the 1205 retrieved synopses, 6 (0.5%) were known item type dyads. However, dyads also occurred serendipitously. In the single knowledge resource we studied, email alerts containing research-based synopses were rarely retrieved

  14. Use of simulated electronic mail (e-mail) to assess medical student knowledge, professionalism, and communication skills.

    Science.gov (United States)

    Christner, Jennifer G; Stansfield, R Brent; Schiller, Jocelyn H; Madenci, Arin; Keefer, Patricia M; Pituch, Ken

    2010-10-01

    Physicians communicate with patients using electronic mail (e-mail) with increasing frequency. Communication skills specific to e-mail do not appear to be taught explicitly in medical school. Therefore, the effect of an instructive session on effective e-mail communication was examined. Four simulated e-mails from a parent were developed. Students responded to an initial e-mail and then participated in a session on effective e-mail communication. Responses to a final e-mail were assessed using a rubric with subscores for medical knowledge, communication, and professionalism. Performance improved from the first to final e-mail response in the overall score and in each subscore. Improvement was sustained over the course of the academic year. Interrater reliability revealed good agreement. Communicating effectively with patients via e-mail is not intuitive but can be taught. It is feasible to introduce responses to a simulated e-mail case in a clinical clerkship as an assessment tool.

  15. letters & Emails

    Institute of Scientific and Technical Information of China (English)

    2009-01-01

    你的想法、梦想、态度、意见甚至抱怨,以及打球的经历、见解,总之一切可以分享的……为什么叫QOLFPUNK 3月24日,英国内阁大臣,苏格兰庶务大臣、国务卿Jim Murphy在上海旭宝球场参加Carnoustie Country授权上海百利纺织品有限公司成为中国第一个高尔夫服饰品牌签约仪式。在接受采访时,他好奇地问我,为什么会叫GOLF-PUNK这个名字呢,GOIF,PUNK,为什么会把这两个矛盾的词语组合在一起?

  16. Ongewenste email

    NARCIS (Netherlands)

    Happé, R.H.

    2002-01-01

    Voorstel van de schrijver om in het wetsontwerp massale bezwaarschriften de factor rechtsbescherming een ruimere plek te geven en de belastingplichtige het recht te laten behouden een bezwaarschrift in te dienen dat individueel wordt behandeld en afgedaan.

  17. Alcohol assessment and feedback by email for university students: main findings from a randomised controlled trial.

    Science.gov (United States)

    McCambridge, Jim; Bendtsen, Marcus; Karlsson, Nadine; White, Ian R; Nilsen, Per; Bendtsen, Preben

    2013-11-01

    Brief interventions can be efficacious in changing alcohol consumption and increasingly take advantage of the internet to reach high-risk populations such as students. To evaluate the effectiveness of a brief online intervention, controlling for the possible effects of the research process. A three-arm parallel groups design was used to explore the magnitude of the feedback and assessment component effects. The three groups were: alcohol assessment and feedback (group 1); alcohol assessment only without feedback (group 2); and no contact, and thus neither assessment nor feedback (group 3). Outcomes were evaluated after 3 months via an invitation to participate in a brief cross-sectional lifestyle survey. The study was undertaken in two universities randomising the email addresses of all 14 910 students (the AMADEUS-1 study, trial registration: ISRCTN28328154). Overall, 52% (n = 7809) of students completed follow-up, with small differences in attrition between the three groups. For each of the two primary outcomes, there was one statistically significant difference between groups, with group 1 having 3.7% fewer risky drinkers at follow-up than group 3 (P = 0.006) and group 2 scoring 0.16 points lower than group 3 on the three alcohol consumption questions from the Alcohol Use Disorders Identification Test (AUDIT-C) (P = 0.039). This study provides some evidence of population-level benefit attained through intervening with individual students.

  18. E-marketing, Unsolicited Commercial E-mail, and Legal Solutions

    Directory of Open Access Journals (Sweden)

    Li Xingan

    2006-03-01

    Full Text Available The purpose of this paper is to explore the legal solutions to unsolicited commercial e-mail. The advantages of e-mail enable it to be one of the most important e-marketing instruments. Spammers are also motivated by potential profits in spamming. The low costs and high benefits of the spammers, and the high costs and low benefits of the spammed determine the illegal nature of the spamming. The spam poses challenges for e-mail recipients' property rights, fair trade, public morals, cybersecurity, personal data protection, and involves other concerns as well. In dealing with spam, technical and marketing solutions cannot work alone without the legal mechanisms. The legal regulation is justified by balancing the interest between senders, service providers and even users. Criminal sanctions, civil remedies, and international harmonization are alternative steps in establishing legal solutions. As a necessary part of the legislation, punishment for unsolicited commercial e-mails should be more severe. Still, there are a number of limitations to the effectiveness of law enforcement against spamming. Spam must be eliminated by comprehensive mechanisms.

  19. Discursive Negotiation of Face via Email: Professional Identity Development in School Counseling Supervision

    Science.gov (United States)

    Gordon, Cynthia; Luke, Melissa

    2012-01-01

    This article examines email exchanges between eight Master's-level school counseling student interns and their internship supervisor to investigate how politeness strategies contribute to professional identity development in supervisory discourse. Our analysis demonstrates how identity development occurs via collaborative facework accomplished…

  20. Mirror, Mirror on the Wall: Email as an Object of Practitioner Inquiry

    Science.gov (United States)

    Maxwell, Sally V.

    2015-01-01

    As new communication technologies enter the classroom, teachers must attend to how digital platforms impact the interpersonal practices of teaching and learning. In this article, I study email exchanges with three of my students--Jorge, Adriana, and Jason--over the course of one year in an 11th-grade English class at River High School, a…

  1. Team Learning and Communication: The Effectiveness of Email-Based Ethics Discussions

    Science.gov (United States)

    Peek, Lucia; Peek, George; Roxas, Maria; Robichaud, Yves; Blanco, Huguette

    2007-01-01

    In fall 2003, students from two U.S. universities and a Canadian university participated in an ethics project. One solution to overcome the obstacles to ethics discussions among students who are geographically separated is the use of email as a mode of communication. As a basis for their discussions, the students used the accounting ethics…

  2. Changes in the e-mail policy for people without CERN affiliation

    CERN Multimedia

    2012-01-01

    When affiliated with CERN, every computing account owner is entitled to have a CERN mail address (e.g. “John.Doe@cern.ch”). However, up to now, this mail address was still valid even after the end of a person's affiliation if the owner declared an external email address (e.g. “John.Doe@gmail.com”) to which all personal CERN emails (i.e. those sent to “John.Doe@cern.ch”) could be forwarded.*   As a result, to use our John Doe analogy, John could continue to write and receive emails ostensibly on behalf of CERN despite the fact that he is no longer a member of the personnel or subject to the CERN Staff Rules and Regulations and the Computing Rules. It is doubtful whether this makes sense. Therefore, in agreement with departments and LHC experiments at the last ITSRM meeting, all CERN email addresses of people whose affiliation has been terminated more than six months ago will be deactivated on 15 October 2012. For all others, incl...

  3. Omen: identifying potential spear-phishing targets before the email is sent.

    Energy Technology Data Exchange (ETDEWEB)

    Wendt, Jeremy Daniel.

    2013-07-01

    We present the results of a two year project focused on a common social engineering attack method called "spear phishing". In a spear phishing attack, the user receives an email with information specifically focused on the user. This email contains either a malware-laced attachment or a link to download the malware that has been disguised as a useful program. Spear phishing attacks have been one of the most effective avenues for attackers to gain initial entry into a target network. This project focused on a proactive approach to spear phishing. To create an effective, user-specific spear phishing email, the attacker must research the intended recipient. We believe that much of the information used by the attacker is provided by the target organization's own external website. Thus when researching potential targets, the attacker leaves signs of his research in the webserver's logs. We created tools and visualizations to improve cybersecurity analysts' abilities to quickly understand a visitor's visit patterns and interests. Given these suspicious visitors and log-parsing tools, analysts can more quickly identify truly suspicious visitors, search for potential spear-phishing targeted users, and improve security around those users before the spear phishing email is sent.

  4. Computer Security: e-mail is broken and there is nothing we can do

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    Have you ever received an e-mail from a friend or someone you know and been surprised or appalled by its contents? Or, worse, have you have received a response to an e-mail that wasn’t written by you? Maybe with similarly surprising or appalling contents? If yes, welcome to the insecurity of the mail protocol, where nothing is as it seems…   No, this time we are not talking about “phishing” or malicious attachments but the very basics of the e-mail protocol. “SMTP” aka the “Simple Mail Transfer Protocol” is exactly what it says: very simple! In many respects, e-mails are identical to physical hand-written letters: you cannot deduce from the sender’s address nor from the message text whether it has really been sent by that person. Impersonation has never been as easy as with the SMTP protocol. Due to its simple design, I can pretend to be Mickey Mouse, Harry Potter or anyone else, and send you text messages...

  5. Promoting Children's Resilience and Coping Following September 11, 2001: An Email Analysis.

    Science.gov (United States)

    Kirkley, Kevin O.; Medway, Frederic J.

    2003-01-01

    Examines a sample of 45 emails written by adults in response to an Internet article on how to help children develop resilience and cope with hardship in the wake of the September 11, 2001 terrorist attacks. Results reveal that the sample responses often failed to include school-based support services, suggesting that schools may need to increase…

  6. A Game Theoretic Framework for E-Mail Detection and Forgery Analysis

    Directory of Open Access Journals (Sweden)

    Long Chen

    2016-01-01

    Full Text Available In email forensic, the email detection and forgery conflict is an interdependent strategy selection process, and there exists complex dynamics between the detector and the forger, who have conflicting objectives and influence each other’s performance and decisions. This paper aims to study their dynamics from the perspective of game theory .We firstly analyze the email basic structure and header information, then discuss the email detection and forgery technologies. In this paper, we propose a Detection-Forgery Game (DFG model and make a classification of players’ strategy with the Operation Complexity (OC. In the DFG model, we regard the interactions between the detector and the forger as a two-player, non-cooperative, non-zero-sum and finite strategic game, and formulate the Nash Equilibrium. The optimal detection and forgery strategies with minimizing cost and maximizing reward will be found by using the model. Finally, we perform empirical experiments to verify the effectiveness and feasibility of the model.

  7. Study of the Power-Law Fluctuations in the Email Size

    CERN Document Server

    Matsubara, Yoshitsugu

    2016-01-01

    In a previous study, we investigated the frequency distribution of the email size in the system log data of the main email server for the staff on a campus network. We found that the frequencies of email sizes followed a power-law distribution and discovered two inflection points in the distribution. After analyzing these results, we collected new system log data for both staff and students for the period from April 1, 2009 to March 31, 2015 and analyzed the frequency distributions per academic year. The results of the earlier investigation were replicated for each of these distributions. Then, we disaggregated the system log data for the staff for the period from May 1, 2015 to July 31, 2015 using the email header "Content-Type" and created four subdistributions. Frequency distributions were calculated for the disaggregated data. We then proposed and evaluated a model to explain the overall frequency distribution as a sum of the four subdistributions. The correlation coefficient between the observed frequenc...

  8. Deaf and hard of hearing Americans' instant messaging and e-mail use: a national survey.

    Science.gov (United States)

    Bowe, Frank G

    2002-10-01

    An online survey of 884 deaf and hard of hearing adults asked about their current and past use of communication technologies, notably TTY, telecommunications relay services, e-mail, and instant messaging (IM). Results showed that respondents were using e-mail and IM far more than TTY and relay services. The study participants virtually all had e-mail and IM at home. In fact, about one quarter had a high-speed ("broadband") connection at home. While the vast majority also had and used e-mail at work, just 1 in 3 had IM at his or her place of employment. The findings have several implications. Most important for educators is that strong reading and writing skills are essential if adults who are deaf or hard of hearing are to take advantage of today's communications technologies. Another conclusion is that some workers who are deaf or hard of hearing appear to face discrimination in employment because office policies forbid the use of a highly effective reasonable accommodation, instant messaging.

  9. Business communication across three European cultures: A contrastive analysis of British, Spanish and Polish email writing

    Directory of Open Access Journals (Sweden)

    Rosa Giménez-Moreno

    2013-10-01

    Full Text Available Today the most international written mode of communication within the business world is electronic correspondence. As the introductory section explains, diverse analyses of emails written in different cultures have been carried out revealing interesting differences and similarities in their discourse features and rhetorical strategies. However, a comparative examination of business emails from representative European cultures such as British (Northern Europe, Spanish (Southern Europe and Polish (Eastern Europe has not been undertaken so far. With this aim, a corpus of over 100 emails of response to business requests written in English by companies set up in these three cultures has been compiled and analysed. The main research targets are to observe the main parameters of variation across these cultures, the existent variation regarding the prototypical move structure and how register variation fluctuates depending on each culture. The results will indicate that across these cultures the move structure of this genre is more complex than current templates and existing published materials show. The study also demonstrates that, while there is a tendency to standardize email correspondence at a European level, there are certain parameters of variation that may help language learners and users to conform their messages depending on the recipient’s culture.

  10. The effectiveness of personalized e-mail and the role of personal characteristics

    NARCIS (Netherlands)

    E. Maslowska; B. van den Putte; E.G. Smit

    2011-01-01

    Personalizing communication means creating persuasive messages that refer to aspects of a person's self. Although the use of personalization is increasing, research on its effectiveness is limited and the results are mixed. This study examined the persuasiveness of personalized e-mail newsletters in

  11. Data Acquisition and Preparation for Social Network Analysis Based on Email: Lessons Learned

    Science.gov (United States)

    2009-06-01

    de ce genre, en plus d’être nécessaire pour appliquer les solutions aux serveurs de courriels, réduirait le nombre d’éventualités pour lesquelles il...J.2 Microsoft™ Support • Pierre Major, MCSE Technical Account Manager Microsoft™ Premier Support Email: Pmajor@Microsoft.Com Phone

  12. Raising Students' Intercultural Awareness and Preparing Them for Intercultural Business (Communication) by E-Mail

    Science.gov (United States)

    Gerritsen, Marinel; Verckens, Jan Pieter

    2006-01-01

    In this article, the authors report on an assignment which tries to raise students' intercultural awareness. The assignment, an intercultural e-mail project, was developed during the past 2 academic years for the course Introduction to Intercultural Communication for 1st-year students of Business Communication of the Radboud University (Nijmegen,…

  13. Analysing empowerment-oriented email consultation for parents : Development of the Guiding the Empowerment Process model

    NARCIS (Netherlands)

    Nieuwboer, C.C.; Fukkink, R.G.; Hermanns, J.M.A.

    2017-01-01

    Online consultation is increasingly offered by parenting practitioners, but it is not clear if it is feasible to provide empowerment-oriented support in a single session email consultation. Based on the empowerment theory, we developed the Guiding the Empowerment Process model (GEP model) to evaluat

  14. Using viral e-mails to distribute tobacco control advertisements: an experimental investigation.

    Science.gov (United States)

    Carter, Owen B J; Donovan, Robert; Jalleh, Geoffrey

    2011-08-01

    The authors' objective was to conduct a trial of viral e-mail marketing as a distribution method for tobacco control advertisements. University students (n = 200) in the state of Western Australia were randomly allocated to receive 1 of 2 e-mails with hyperlinks to tobacco control advertisements ("Toilet" and "Rubbish") emphasizing the disgusting nature of smoking. Recipients followed a hyperlink to a Web page playing Toilet or Rubbish on endless loop. Viewers were encouraged to forward the e-mail to their friends and invited to complete an online survey about the advertisement. Unique downloads for each advertisement were identified by internet provider (IP) location and tallied by date and geographical location to assess subsequent dissemination beyond the initial 200 students. There were 826 unique viewings of the advertisements averaging 26.9 viewings per day for the first fortnight, followed by a lower average of 4.1 hits per day for the next 3.5 months. IP addresses identified hits from 3 other Australian states and 7 other countries. Online surveys were completed by 103 respondents (12.5% of total hits) but included few smokers (n = 9). Significantly more respondents rated Toilet as "funny" compared with Rubbish (40% vs. 11%; p viral e-mails being forwarded onwards but only exceptionally compelling tobacco control materials are ever likely to become self-perpetuating.

  15. Asynchronous Communication: Investigating the Influences of Relational Elements and Background on the Framing Structure of Emails

    Science.gov (United States)

    AlAfnan, Mohammad Awad

    2015-01-01

    This study explored the influences of relational elements and the background of communicators on the framing structure of email messages that were exchanged in an educational Institute in Malaysia. The investigation revealed that social distance played a more significant role than power relations as Malaysian respondents are, generally, more…

  16. Practitioner Response to Parental Need in Email Consultation: How Do They Match? A Content Analysis

    Science.gov (United States)

    Nieuwboer, Christa C.; Fukkink, Ruben G.; Hermanns, Jo M. A.

    2014-01-01

    Background: Single session email consultations in web-based parenting support may be used for a variety of reasons. Parents may be looking for information on developmental needs of children, for suggestions to improve their parenting skills, or for referrals to helpful resources. The way the practitioner meets the needs of parents, choosing a…

  17. Practitioner response to parental need in email consultation: how do they match? A content analysis

    NARCIS (Netherlands)

    Nieuwboer, C.C.; Fukkink, R.G.; Hermanns, J.M.A.

    2014-01-01

    Background: Single session email consultations in web-based parenting support may be used for a variety of reasons. Parents may be looking for information on developmental needs of children, for suggestions to improve their parenting skills, or for referrals to helpful resources. The way the practit

  18. Practitioner Response to Parental Need in Email Consultation: How Do They Match? A Content Analysis

    Science.gov (United States)

    Nieuwboer, Christa C.; Fukkink, Ruben G.; Hermanns, Jo M. A.

    2014-01-01

    Background: Single session email consultations in web-based parenting support may be used for a variety of reasons. Parents may be looking for information on developmental needs of children, for suggestions to improve their parenting skills, or for referrals to helpful resources. The way the practitioner meets the needs of parents, choosing a…

  19. Digital Literacies and Generational Micro-Cultures: Email Feedback in Lebanon

    Science.gov (United States)

    De Coursey, Christina; Dandashly, Nadine

    2015-01-01

    This study reports on the introduction of email feedback, in a private university in Lebanon with marked generational differences and a traditional instructor culture focused on grammar correction. The instructor profile showed insufficient ELT training and a disjuncture between those with low and those with long service. Instructors were trained,…

  20. Experimental Study of Gender Effects on Language Use in College Students' Email to Faculty

    Science.gov (United States)

    Thomas-Tate, Shurita; Daugherty, Timothy K.; Bartkoski, Timothy J.

    2017-01-01

    Anecdotal reports have arisen regarding gender bias in electronic communication on college campuses. In an experiment designed to test language use in different gender contexts, participants were asked to compose an email to a professor whose gender had been experimentally manipulated. Female students, but not male students, displayed lower…

  1. Mirror, Mirror on the Wall: Email as an Object of Practitioner Inquiry

    Science.gov (United States)

    Maxwell, Sally V.

    2015-01-01

    As new communication technologies enter the classroom, teachers must attend to how digital platforms impact the interpersonal practices of teaching and learning. In this article, I study email exchanges with three of my students--Jorge, Adriana, and Jason--over the course of one year in an 11th-grade English class at River High School, a…

  2. Not Wanted in the Inbox!: Evaluations of Unsolicited and Harassing E-Mail

    Science.gov (United States)

    Khoo, Pek Ne; Senn, Charlene Y.

    2004-01-01

    This study was designed as a first step to explore sexual harassment in the electronic domain. One hundred six students read 10 e-mail messages ranging from jokes to spam to a sexual proposition from a stranger and rated them on an offensiveness evaluative scale. Participants also completed social desirability and attitudes toward sexual…

  3. Practitioner response to parental need in email consultation: how do they match? A content analysis

    NARCIS (Netherlands)

    Nieuwboer, C.C.; Fukkink, R.G.; Hermanns, J.M.A.

    2014-01-01

    Background: Single session email consultations in web-based parenting support may be used for a variety of reasons. Parents may be looking for information on developmental needs of children, for suggestions to improve their parenting skills, or for referrals to helpful resources. The way the

  4. Open-Rate Controlled Experiment in E-Mail Marketing Campaigns

    Directory of Open Access Journals (Sweden)

    Antun Biloš

    2016-06-01

    Full Text Available Purpose – The main purpose of this paper is to test the controlled experiment (A/B split methodology in B2C oriented e-mail marketing campaigns. Design/Methodology/Approach – E-mail marketing techniques have been a substantial part of e-marketing methodology since the early Internet days of the mid-1990s. From the very beginning of Internet utilization for business purposes, e-mail was one of the most widely used communication techniques in B2B and B2C markets alike. Due to high volumes of spamming and progression of online communication clutter, some practitioners began to question the usability of e-mail as a marketing communication channel, while others embarked on working on improving the message itself. Efforts were invested into improving message quality, as well as into better understanding user expectations. One of the most commonly used techniques to test specific e-mail message elements is the controlled experiment. Findings and implications – This paper explores several types of controlled experiments in a specific Croatian B2C market. Tests were run to determine subscriber behavior towards several newsletter components, including sending time, sending day, sender’s name, and subject line. Open and click rates for tested campaigns, and several other metrics were investigated using MailChimp software. An N − 1 two-proportion test using an adjusted Wald confidence interval around the difference in the proportions was used for comparing the open-rate measure in the controlled experiments between subjects. Limitation – Controlled experiments (A/B split tests showed a lot of potential as a way of measuring behavior and preferences of subscribers, although several apparent limitations (the data-set scope, comparability issues indicated a clear need for standardization on a managerial and scientific level. Originality – This paper provides an up-to-date e-mail marketing effectiveness literature review, describes and tests the

  5. Email based remote access and surveillance system for smart home infrastructure

    Directory of Open Access Journals (Sweden)

    Pooshkar Rajiv

    2016-09-01

    Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.

  6. Results of a content analysis of electronic messages (email sent between patients and their physicians

    Directory of Open Access Journals (Sweden)

    Sittig Dean F

    2003-10-01

    Full Text Available Abstract Background Email is the most important mechanism introduced since the telephone for developing interpersonal relationships. This study was designed to provide insight into how patients are using email to request information or services from their healthcare providers. Methods Following IRB approval, we reviewed all electronic mail (e-mail messages sent between five study clinicians and their patients over a one-month period. We used a previously described taxonomy of patient requests to categorize all patient requests contained in the messages. We measured message volume, frequency, length and response time for all messages sent to and received by these clinicians. Results On average the 5 physicians involved in this study received 40 messages per month, each containing approximately 139 words. Replies sent by the physicians contained 39 words on average and 59.4% of them were sent within 24 hours. Patients averaged 1 request per message. Requests for information on medications or treatments, specific symptoms or diseases, and requests for actions regarding medications or treatments accounted for 75% of all requests. Physicians fulfilled 80.2% of all these requests. Upon comparison of these data to that obtained from traditional office visits, it appears that the potential exists for email encounters to substitute for some percentage of office visits. Conclusion Electronic messaging is an important method for physicians and patients to communicate and further develop their relationship. While many physicians worry that either the number or length of messages from their patients will overwhelm them, there is no evidence to support this. In fact, the evidence suggests that many patient requests, formerly made over the telephone or during office visits, can be addressed via email thus potentially saving both patients and physicians time.

  7. Text messaging versus email for emergency medicine residents' knowledge retention: a pilot comparison in the United States.

    Science.gov (United States)

    Hoonpongsimanont, Wirachin; Kulkarni, Miriam; Tomas-Domingo, Pedro; Anderson, Craig; McCormack, Denise; Tu, Khoa; Chakravarthy, Bharath; Lotfipour, Shahram

    2016-01-01

    We evaluated the effectiveness of text messaging versus email, as a delivery method to enhance knowledge retention of emergency medicine (EM) content in EM residents. We performed a multi-centered, prospective, randomized study consisting of postgraduate year (PGY) 1 to PGY 3 & 4 residents in three United States EM residency programs in 2014. Fifty eight residents were randomized into one delivery group: text message or email. Participants completed a 40 question pre- and post-intervention exam. Primary outcomes were the means of pre- and post-intervention exam score differences. Data were analyzed using descriptive statistics, paired t-test, and multiple linear regressions. No significant difference was found between the primary outcomes of the two groups (P=0.51). PGY 2 status had a significant negative effect (P=0.01) on predicted exam score difference. Neither delivery method enhanced resident knowledge retention. Further research on implementation of mobile technology in residency education is required.

  8. Text messaging versus email for emergency medicine residents’ knowledge retention: a pilot comparison in the United States

    Directory of Open Access Journals (Sweden)

    Wirachin Hoonpongsimanont

    2016-10-01

    Full Text Available We evaluated the effectiveness of text messaging versus email, as a delivery method to enhance knowledge retention of emergency medicine (EM content in EM residents. We performed a multi-centered, prospective, randomized study consisting of postgraduate year (PGY 1 to PGY 3 & 4 residents in three United States EM residency programs in 2014. Fifty eight residents were randomized into one delivery group: text message or email. Participants completed a 40 question pre- and post-intervention exam. Primary outcomes were the means of pre- and post-intervention exam score differences. Data were analyzed using descriptive statistics, paired t-test, and multiple linear regressions. No significant difference was found between the primary outcomes of the two groups (P=0.51. PGY 2 status had a significant negative effect (P=0.01 on predicted exam score difference. Neither delivery method enhanced resident knowledge retention. Further research on implementation of mobile technology in residency education is required.

  9. Do e-mail alerts of new research increase knowledge translation? A "Nephrology Now" randomized control trial.

    Science.gov (United States)

    Tanna, Gemini V; Sood, Manish M; Schiff, Jeffrey; Schwartz, Daniel; Naimark, David M

    2011-01-01

    As the volume of medical literature increases exponentially, maintaining current clinical practice is becoming more difficult. Multiple, Internet-based journal clubs and alert services have recently emerged. The purpose of this study is to determine whether the use of the e-mail alert service, Nephrology Now, increases knowledge translation regarding current nephrology literature. Nephrology Now is a nonprofit, monthly e-mail alert service that highlights clinically relevant articles in nephrology. In 2007-2008, the authors randomized 1,683 subscribers into two different groups receiving select intervention articles, and then they used an online survey to assess both groups on their familiarity with the articles and their acquisition of knowledge. Of the randomized subscribers, 803 (47.7%) completed surveys, and the two groups had a similar number of responses (401 and 402, respectively). The authors noted no differences in baseline characteristics between the two groups. Familiarity increased as a result of the Nephrology Now alerts (0.23 ± 0.087 units on a familiarity scale; 95% confidence interval [CI]: 0.06-0.41; P = .007) especially in physicians (multivariate odds ratio 1.83; P = .0002). No detectable improvement in knowledge occurred (0.03 ± 0.083 units on a knowledge scale; 95% CI: -0.13 to 0.20; P = .687). An e-mail alert service of new literature improved a component of knowledge translation--familiarity--but not knowledge acquisition in a large, randomized, international population.

  10. E-mailed standardized cognitive behavioural treatment of work-related stress: a randomized controlled trial.

    Science.gov (United States)

    Ruwaard, Jeroen; Lange, Alfred; Bouwman, Manon; Broeksteeg, Janneke; Schrieken, Bart

    2007-01-01

    The aim of this study was to assess the effects of a 7-week standardized cognitive behavioural treatment of work-related stress conducted via e-mail. A total of 342 people applied for treatment in reaction to a newspaper article. Initial screening reduced the sample to a heterogeneous (sub)clinical group of 239 participants. Participants were assigned randomly to a waiting list condition (n = 62), or to immediate treatment (n = 177). A follow-up was conducted 3 years after inception of the treatment. The outcome measures used were the Depression Anxiety Stress Scales (DASS-42) and the Emotional Exhaustion scale of the Maslach Burnout Inventory - General Survey (MBI-GS). Fifty participants (21%) dropped out. Both groups showed statistically significant improvements. Intention-to-treat analysis of covariance (ANCOVAs) revealed that participants in the treatment condition improved significantly more than those in the waiting control condition (0.001 or = d > or = 0.5 (anxiety)). The between-group effects ranged from d = 0.6 (stress) to d = 0.1 (anxiety). At follow-up, the effects were more pronounced, but this result requires replication in view of high attrition at follow-up. The results warrant further research on Internet-driven standardized cognitive behavioural therapy for work-related stress. Such research should include the direct comparison of this treatment with face-to-face treatment, and should address the optimal level of therapist contact in Internet-driven treatment.

  11. Designing Email Messages for Corporate Readers: A Case Study of Effective and Ineffective Rhetorical Strategies at a "Fortune" 100 Company

    Science.gov (United States)

    DeKay, Sam H.

    2010-01-01

    Within the last 12 years, email has emerged as the most commonly used form of written communication in the corporate workplace. Several factors have contributed to the widespread use of email. This form of communication is generally rapid, is more economical than distributing or mailing printed documents, and permits simultaneous communication…

  12. Designing Email Tasks for the Business English Classroom: Implications from a Study of Hong Kong's Key Industries

    Science.gov (United States)

    Evans, Stephen

    2012-01-01

    Email has revolutionised the way in which professionals work and companies operate, and yet has received surprisingly little scholarly attention in English for Specific Purposes and has an unexpectedly muted presence in many Business English textbooks. The dearth of research into email use in globalised business settings may be one of the factors…

  13. E-mail use by the faculty members, students and staff of Saudi Arabian and Gulf states Universities

    Directory of Open Access Journals (Sweden)

    Fahad Alturise

    2014-09-01

    Full Text Available Electronic mail systems (Email constitute one of the most important communication and business tools that people employ. Email in the workplace can help a business improve its productivity. Many organisations now rely on email to manage internal communications as well as other communication and business processes and procedures. This paper compares email use by university stakeholders (i.e. faculty members, staff and students between Saudi Arabia on one hand, and the Gulf States - Qatar, Oman, United Arab Emirates (UAE and Bahrain – on the other. A questionnaire that was expertreviewed and pilot-tested, was used to collect data from ten universities in Saudi Arabia and five universities in the Gulf States. Slight differences emerged in the Saudi Arabia and Gulf States universities’ stakeholders’ use of email in terms of having email, frequency of checking email, and skills in using email. The Saudi Arabian universities must improve their IT infrastructure, including the provision of suitable connection networks and formal training of staff in utilising IT resources. This study’s findings aim to advise the Saudi Arabian and Gulf States’ universities on their plans and programmes for e-learning and the consolidation of required resources.

  14. Uses and Perceptions of E-Mail for Course-Related Communication between Business Faculty and Undergraduates

    Science.gov (United States)

    Costello, Robert

    2011-01-01

    Technological advancements have facilitated the learning process by offering faculty members and students better access to resources, while increasing the potential for more interaction and communication flexibility (Firmin & Miller, 2005). Among these technologies is electronic mail or e-mail. The uses and perceptions of e-mail between business…

  15. Designing Email Tasks for the Business English Classroom: Implications from a Study of Hong Kong's Key Industries

    Science.gov (United States)

    Evans, Stephen

    2012-01-01

    Email has revolutionised the way in which professionals work and companies operate, and yet has received surprisingly little scholarly attention in English for Specific Purposes and has an unexpectedly muted presence in many Business English textbooks. The dearth of research into email use in globalised business settings may be one of the factors…

  16. Two Minute Training in Class Significantly Increases the Use of Professional Formatting in Student to Faculty Email Correspondence

    Science.gov (United States)

    Aguilar-Roca, Nancy; Williams, Adrienne; Warrior, Rahul; O'Dowd, Diane K.

    2009-01-01

    Many university faculty value email as an important tool for communicating with colleagues, but express frustration with a high incidence of unprofessional email correspondence from students. The goals of this study were to document the frequency of specific formatting mistakes that contribute to faculty's unfavorable perception of student emails…

  17. Designing Email Messages for Corporate Readers: A Case Study of Effective and Ineffective Rhetorical Strategies at a "Fortune" 100 Company

    Science.gov (United States)

    DeKay, Sam H.

    2010-01-01

    Within the last 12 years, email has emerged as the most commonly used form of written communication in the corporate workplace. Several factors have contributed to the widespread use of email. This form of communication is generally rapid, is more economical than distributing or mailing printed documents, and permits simultaneous communication…

  18. (Mis)Use of Email in Student-Faculty Interaction: Implications for University Instruction in Germany, Saudi Arabia, and Japan

    Science.gov (United States)

    Danielewicz-Betz, Anna

    2013-01-01

    This paper examines student-faculty communication by email and the lack of clear guidelines that leads to misuse of email in student-faculty interaction, whereby status-incongruent pragmatic markers are employed, resulting in impoliteness and inappropriateness. The main objective is to bridge the gap in research on other than requestive speech…

  19. Aplikasi Short Message Service (SMS dan Email Sebagai Media Komunikasi Data dalam Sistem Pemantauan Suhu

    Directory of Open Access Journals (Sweden)

    Andi Adriansyah

    2011-06-01

    Full Text Available      Sistem pemantauan suhu secara langsung dengan mencatat setiap perubahan suhu secara manual, terlebih pada kondisi suhu yang ekstrim, memiliki resiko yang dapat berakibat fatal. Oleh karena itu dibutuhkan sebuah sistem yang dapat melakukannya secara otomatis. Penelitian ini bertujuan merancang sebuah sistem mandiri yang dapat melakukan pemantauan dan pencatatan perubahan suhu secara near real time (NRT dan mengirimkan laporan secara otomatis melalui email dan SMS. Sistem terdiri dari Sensor suhu LM35 yang berfungsi merubah besaran fisis suhu ke besaran listrik tegangan, Microcontroller Atmega8535 yang memegang peranan untuk mengkonversi tegangan keluaran LM35 kedalam bentuk digital, serta mengirimkan data hasil konversi melalui komunikasi serial ke computer. Program Java yang dijalankan di computer berfungsi memproses data yang dikirim mikrokontroler ATmega8535, menyimpannya ke basis data MySQL, menampilkannya dalam bentuk tabel dan grafik, dan mengirimkan laporan melalui email dan SMS bila data suhu yang diterima melebihi ambang batas yang telah ditentukan.

  20. An Application of Reinforcement Learning to Dialogue Strategy Selection in a Spoken Dialogue System for Email

    CERN Document Server

    Walker, M A

    2011-01-01

    This paper describes a novel method by which a spoken dialogue system can learn to choose an optimal dialogue strategy from its experience interacting with human users. The method is based on a combination of reinforcement learning and performance modeling of spoken dialogue systems. The reinforcement learning component applies Q-learning (Watkins, 1989), while the performance modeling component applies the PARADISE evaluation framework (Walker et al., 1997) to learn the performance function (reward) used in reinforcement learning. We illustrate the method with a spoken dialogue system named ELVIS (EmaiL Voice Interactive System), that supports access to email over the phone. We conduct a set of experiments for training an optimal dialogue strategy on a corpus of 219 dialogues in which human users interact with ELVIS over the phone. We then test that strategy on a corpus of 18 dialogues. We show that ELVIS can learn to optimize its strategy selection for agent initiative, for reading messages, and for summari...

  1. An Architecture of Active Learning SVMs with Relevance Feedback for Classifying E-mail

    CERN Document Server

    Islam, Md Saiful

    2010-01-01

    In this paper, we have proposed an architecture of active learning SVMs with relevance feedback (RF)for classifying e-mail. This architecture combines both active learning strategies where instead of using a randomly selected training set, the learner has access to a pool of unlabeled instances and can request the labels of some number of them and relevance feedback where if any mail misclassified then the next set of support vectors will be different from the present set otherwise the next set will not change. Our proposed architecture will ensure that a legitimate e-mail will not be dropped in the event of overflowing mailbox. The proposed architecture also exhibits dynamic updating characteristics making life as difficult for the spammer as possible.

  2. E-mail Spam Classification With Artificial Neural Network and Negative Selection Algorithm

    Directory of Open Access Journals (Sweden)

    Ismaila Idris

    2011-12-01

    Full Text Available This paper apply neural network and spam model based on Negative selection algorithm for solving complex problems in spam detection. This is achieved by distinguishing spam from non-spam (self from non-self. We propose an optimized technique for e-mail classification; The e-mail are classified as self and non-self whose redundancy was removed from the detector set in the previous research to generate a self and non-self detector memory. A vector with an array of two element self and non-self concentration vector are generated into a feature vector used as an input in neural network classifier to classify the self and non-self feature vector of self and nonself program. The hybridization of both neural network and our previous model will further enhance our spam detector by improving the false rate and also enable the two different detectors to have a uniform platform for effective performance rate.

  3. If You're House Is Still Available, Send Me an Email: Personality Influences Reactions to Written Errors in Email Messages.

    Science.gov (United States)

    Boland, Julie E; Queen, Robin

    2016-01-01

    The increasing prevalence of social media means that we often encounter written language characterized by both stylistic variation and outright errors. How does the personality of the reader modulate reactions to non-standard text? Experimental participants read 'email responses' to an ad for a housemate that either contained no errors or had been altered to include either typos (e.g., teh) or homophonous grammar errors (grammos, e.g., to/too, it's/its). Participants completed a 10-item evaluation scale for each message, which measured their impressions of the writer. In addition participants completed a Big Five personality assessment and answered demographic and language attitude questions. Both typos and grammos had a negative impact on the evaluation scale. This negative impact was not modulated by age, education, electronic communication frequency, or pleasure reading time. In contrast, personality traits did modulate assessments, and did so in distinct ways for grammos and typos.

  4. E-Mail Systems In Cloud Computing Environment Privacy,Trust And Security Challenges

    Directory of Open Access Journals (Sweden)

    Maha Attia

    2016-07-01

    Full Text Available In this paper, SMCSaaS is proposed to secure email system based on Web Service and Cloud Computing Model. The model offers end-to-end security, privacy, and non-repudiation of PKI without the associated infrastructure complexity. The Proposed Model control risks in Cloud Computing like Insecure Application Programming Interfaces, Malicious Insiders, Data Loss Shared Technology Vulnerabilities, or Leakage, Account, Service, Traffic Hijacking and Unknown Risk Profile

  5. Asynchronous Communication: Investigating the Influences of Relational Elements and Background on the Framing Structure of Emails

    OpenAIRE

    Mohammad Awad AlAfnan

    2015-01-01

    This study explored the influences of relational elements and the background of communicators on the framing structure of email messages that were exchanged in an educational Institute in Malaysia. The investigation revealed that social distance played a more significant role than power relations as Malaysian respondents are, generally, more polite to distant colleagues than they are to close colleagues regardless of their organizational position. It was also revealed that the ethnic backgrou...

  6. Helping Students with Cognitive Disabilities Improve Social Writing Skills through Email Modeling and Scaffolding

    Science.gov (United States)

    Wang, Xiao-lei; Eberhard, Dominique; Voron, Mike; Bernas, Ronan

    2016-01-01

    The purpose of this study is to examine the effects of email modeling and scaffolding on the social writing quality of students with cognitive disabilities. Ten students from a university-affiliated lab school (mean age = 19.3; SD = 1.2) with an average of IQ of 55.30 (SD = 5.98) and 10 teacher candidates in a university teacher education…

  7. Online parenting support: Guiding parents towards empowerment through single session email consultation

    OpenAIRE

    Nieuwboer, C.C.

    2014-01-01

    Internet technology offers a lot of new opportunities for the dissemination of information, sharing of support and consultation of professionals. Innovating professionals from multiple disciplines have begun to exploit the new opportunities for parenting support. The studies presented in this book are meant to deepen our insights in the subject of online parenting support and investigate the feasibility to use single session email consultation to empower parents. This publication includes: - ...

  8. Helping Students with Cognitive Disabilities Improve Social Writing Skills through Email Modeling and Scaffolding

    Science.gov (United States)

    Wang, Xiao-lei; Eberhard, Dominique; Voron, Mike; Bernas, Ronan

    2016-01-01

    The purpose of this study is to examine the effects of email modeling and scaffolding on the social writing quality of students with cognitive disabilities. Ten students from a university-affiliated lab school (mean age = 19.3; SD = 1.2) with an average of IQ of 55.30 (SD = 5.98) and 10 teacher candidates in a university teacher education…

  9. MedlinePlus-based health information prescriptions: a comparison of email vs paper delivery

    Directory of Open Access Journals (Sweden)

    Emily Coberly

    2013-05-01

    Full Text Available Background The internet can provide evidence-based patient education to overcome time constraints of busy ambulatory practices. Health information prescriptions (HIPs can be effectively integrated into clinic workflow, but compliance to visit health information sites such as MedlinePlus is limited.Objective Compare the efficacy of paper (pHIP and email (eHIP links to deliver HIPs; evaluate patient satisfaction with the HIP process and MedlinePlus information; assess reasons for noncompliance to HIPs.Method Of 948 patients approached at two internal medicine clinics affiliated with an academic medical centre, 592 gave informed consent after meeting the inclusion criteria. In this randomised controlled trial, subjects were randomised to receive pHIP or eHIP for accessing an intermediate website that provided up to five MedlinePlus links for physician-selected HIP conditions. Patients accessing the intermediate website were surveyed by email to assess satisfaction with the health information. Survey non-responders were contacted by telephone to determine the reasons for no response.Results One hundred and eighty-one patients accessed the website, with significantly more ‘filling’ eHIP than pHIP (38% vs 23%; P < 0.001. Most (82% survey respondents found the website information useful, with 77% favouring email for future HIPs delivery. Lack of time, forgot, lost instructions or changed mind were reasons given for not accessing the websites.Conclusions Delivery of MedlinePlus-based HIPs in clinic is more effective using email prescriptions than paper. Satisfaction with the HIP information was high, but overall response was low and deserves further investigation to improve compliance and related outcomes.

  10. Compulsory registration of mail servers in order to accept e-mail from the Internet

    CERN Multimedia

    IT Department

    2008-01-01

    This announcement is intended only for administrators of a mail server (sendmail, postfix, etc.). It concerns e-mails sent from the Internet to addresses of the following type: somemailbox@somehost.cern.ch. Mail server managers are requested to register their servers so that they can accept e-mail from outside CERN. In future the CERN mail infrastructure will relay messages from outside CERN only to officially registered mail servers. This rule applies only to messages sent from the Internet. There will be NO change with respect to messages sent from inside CERN. If you are responsible for a mail server that accepts e-mails from outside CERN, please read the following page: http://cern.ch/mail/Help/?kbid=191090, where you can find information about the new rule and check if your host is already registered in the system. If you wish to register a mail server please send a message to: mailto:mail.support@cern.ch. This rule will be gradually enforced from 20 February 2008 onwards. Thank you for your cooperation...

  11. The Language of Business E-Mail: An Opportunity to Bridge Theory and Practice

    Directory of Open Access Journals (Sweden)

    Julio C. Gimenez

    2015-10-01

    Full Text Available The language of business email has attracted a great deal of attention in the last decade. Research studies on the language, style and register of business email have been published in many journals, books and other publications. However, many of these discussions have been theoretical in nature, failing to make a connection between theory and practice. It is then the task of the ESP teacher to make such a connection. This article argues that business communication lends itself well to bringing theory and practice closer together. To this end, the article first identifies relevant features which have started to emerge from main studies in the language of business email, a vital component in business communication. It then explores different possible pedagogical applications of these findings in the BE class. The article discusses the SAE (Selecting, Applying and Evaluating model which can be used to design and evaluate classroom activities. The article finally presents four activities which have been created following the main findings emerging from the research reviewed.

  12. Object Oriented Intelligent Multi-Agent System Data Cleaning Architecture To Clean Email Data

    Directory of Open Access Journals (Sweden)

    Dr. G. Arumugam,

    2010-11-01

    Full Text Available Agents are software programs that perform tasks on behalf of others and they can be used to mine data with their characteristics. Agents are task oriented with the ability to learn by themselves and they react to the situation. Learning characteristics of an agent is done by verifying its previous experience from its knowledgebase. An agent concept is a complementary approach to the Object Oriented paradigm with respect to the design and implementation of autonomous entities driven by beliefs, goals and plans. Email is one of the common means for communication via text. Email cleaning problem is formalized as non-text filtering and text normalization in a two step process. Agents incorporated in the architectural design of an Email data cleaning process combines both the features of Multi-Agent System (MAS Framework and MAS with learning (MASL Framework. MAS framework reduces the development time and the complexity of implementing thesoftware agents. The MAS-L framework incorporates the intelligence and learning properties of software agents. MAS-L Framework makes use of the Decision Tree learning and an evaluation function to decide thenext best decision that applies to the machine learning technique. This paper proposes the design for Multi- Agent based Data Cleaning Architecture that incorporates the structural design of agents into object model. The design of an architectural model for Multi-Agent based Data Cleaning inherits the features of the MAS and uses the MAS-L framework to design the intelligence and learning characteristics.

  13. SPONGY (SPam ONtoloGY): email classification using two-level dynamic ontology.

    Science.gov (United States)

    Youn, Seongwook

    2014-01-01

    Email is one of common communication methods between people on the Internet. However, the increase of email misuse/abuse has resulted in an increasing volume of spam emails over recent years. An experimental system has been designed and implemented with the hypothesis that this method would outperform existing techniques, and the experimental results showed that indeed the proposed ontology-based approach improves spam filtering accuracy significantly. In this paper, two levels of ontology spam filters were implemented: a first level global ontology filter and a second level user-customized ontology filter. The use of the global ontology filter showed about 91% of spam filtered, which is comparable with other methods. The user-customized ontology filter was created based on the specific user's background as well as the filtering mechanism used in the global ontology filter creation. The main contributions of the paper are (1) to introduce an ontology-based multilevel filtering technique that uses both a global ontology and an individual filter for each user to increase spam filtering accuracy and (2) to create a spam filter in the form of ontology, which is user-customized, scalable, and modularized, so that it can be embedded to many other systems for better performance.

  14. Evaluation of a social cognitive theory-based email intervention designed to influence the physical activity of survivors of breast cancer.

    Science.gov (United States)

    Hatchett, Andrew; Hallam, Jeffrey S; Ford, M Allison

    2013-04-01

    The aim of this study is to evaluate a 12-week social cognitive theory (SCT)-based email intervention designed to influence the physical activity of survivors of breast cancer. Seventy-four volunteers (intervention group, n = 36; control group, n = 38) were recruited by mass email and written letter solicitation. Participants completed a series of online questionnaires measuring demographic characteristics, physical activity readiness, level of physical activity and selected SCT variables at baseline, 6 and 12 weeks. The intervention group received email messages based on SCT designed specifically for breast cancer survivors and targeting physical activity. For the first 6 weeks of the intervention, participants assigned to the intervention group received messages weekly, from weeks 7 to 12, participants received messages every other week and had access to an e-counselor. The control group did not receive email messages, nor did they have access to an e-counselor. Significant differences in levels of self-reported vigorous physical activity were found between groups at 6 and 12 weeks. Significant differences were also found for self-reported moderate physical activity at 12 weeks. Email-based interventions based on SCT can significantly influence levels of self-reported physical activity of breast cancer survivors. Copyright © 2012 John Wiley & Sons, Ltd.

  15. Patient use of email for health care communication purposes across 14 European countries: an analysis of users according to demographic and health-related factors.

    Science.gov (United States)

    Newhouse, Nikki; Lupiáñez-Villanueva, Francisco; Codagnone, Cristiano; Atherton, Helen

    2015-03-06

    The use of the Internet for health purposes is growing steadily, yet the use of asynchronous communication tools for health care purposes remains undeveloped. The introduction of email as a method of communication in health care has the potential to impact on both patients and health care professionals. This study aims to describe the characteristics of people who have sent or received an email to or from their doctor, nurse, or health care organization, by country and in relation to demographics, health care resource use, and health status factors. We conducted a secondary analysis of data (N=14,000) collected from the online Citizens and Information Communication Technology for Health survey, a project undertaken in 2011 by the Institute for Prospective Technology Studies of the European Commission's Joint Research Centre. The survey was developed to understand and characterize European citizens' use of information communication technologies for health. Descriptive and statistical analyses of association were used to interpret the data. Denmark reported the highest level of emails sent/received (507/1000, 50.70%). The lowest level reported was by participants in France (187/1000, 18.70%). Men used email communication for health care more than women, as did respondents in the 16-24 age group and those educated to tertiary level or still within the education system. As self-reported health state worsens, the proportion of people reporting having sent or received an email within the context of health care increases. Email use, poor health, multimorbidity, and number of visits to a physician are positively correlated. The use of email communication within the context of European health care is extremely varied. The relationship between high email use, poor health, doctor visits, and multimorbidity is especially pertinent: provision of asynchronous communication for such groups is favored by policymakers. Low reported email use by country may not necessarily reflect

  16. Association between secure patient-clinician email and clinical services utilisation in a US integrated health system: a retrospective cohort study.

    Science.gov (United States)

    Meng, Di; Palen, Ted E; Tsai, Joanne; McLeod, Melanie; Garrido, Terhilda; Qian, Heather

    2015-11-09

    To assess associations between secure patient-clinician email use and clinical services utilisation over time. Retrospective cohort study between July 2010 and December 2013. Controlling for a utilisation surge around first secure email use, we analysed difference of differences between propensity score-matched groups of secure patient-clinician email users and non-users for utilisation 1-12 months before and 7-18 months after first email (users) or a randomly assigned index date (non-users). US integrated healthcare delivery system. 9345 adults with first secure email use between July 2011 and July 2012 and continuous enrolment for ≥30 months and 9345 adults without secure email use between July 2010 and July 2012 matched to users on demographics, health status, and baseline utilisation. Rates of office visits, patient-initiated phone calls, scheduled telephone visits, after-hours clinic visits, emergency department visits, and hospitalisations. After controlling for multiple factors, no statistically significant differences in utilisation between secure email users and non-users occurred. Utilisation transiently increased by 88-237% around first email use. Annual rates of patient-initiated phone calls decreased among secure email users, 0.2 fewer calls per person (95% CI -0.3 to -0.1), from a mean of 4.1 calls per person 1-12 months before first use to a mean of 3.8 calls per person 7-18 months after first use. Rates of patient-initiated phone calls also decreased among non-users, 0.1 fewer calls per person (95% CI -0.2 to 0.0), from a mean of 4.2 calls per person 1-12 months before the index date to mean of 4.1 calls per person 7-18 months after the index date. Compared with non-users, patient use of secure email with clinicians was not associated with statistically significant differences in clinical services utilisation 7-18 months after first use. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted

  17. Association between secure patient–clinician email and clinical services utilisation in a US integrated health system: a retrospective cohort study

    Science.gov (United States)

    Meng, Di; Palen, Ted E; Tsai, Joanne; McLeod, Melanie; Garrido, Terhilda; Qian, Heather

    2015-01-01

    Objective To assess associations between secure patient–clinician email use and clinical services utilisation over time. Design Retrospective cohort study between July 2010 and December 2013. Controlling for a utilisation surge around first secure email use, we analysed difference of differences between propensity score-matched groups of secure patient–clinician email users and non-users for utilisation 1–12 months before and 7–18 months after first email (users) or a randomly assigned index date (non-users). Setting US integrated healthcare delivery system. Participants 9345 adults with first secure email use between July 2011 and July 2012 and continuous enrolment for ≥30 months and 9345 adults without secure email use between July 2010 and July 2012 matched to users on demographics, health status, and baseline utilisation. Primary Outcome Measures Rates of office visits, patient-initiated phone calls, scheduled telephone visits, after-hours clinic visits, emergency department visits, and hospitalisations. Results After controlling for multiple factors, no statistically significant differences in utilisation between secure email users and non-users occurred. Utilisation transiently increased by 88–237% around first email use. Annual rates of patient-initiated phone calls decreased among secure email users, 0.2 fewer calls per person (95% CI −0.3 to −0.1), from a mean of 4.1 calls per person 1–12 months before first use to a mean of 3.8 calls per person 7–18 months after first use. Rates of patient-initiated phone calls also decreased among non-users, 0.1 fewer calls per person (95% CI −0.2 to 0.0), from a mean of 4.2 calls per person 1–12 months before the index date to mean of 4.1 calls per person 7–18 months after the index date. Conclusions Compared with non-users, patient use of secure email with clinicians was not associated with statistically significant differences in clinical services utilisation 7–18

  18. Increased demand for E-mail health consultation service: analysis of a Web survey.

    Science.gov (United States)

    Klinar, Ivana; Balazin, Ana; Basić, Martina; Plantas, Igor; Biskupić, Kresimir

    2010-06-01

    The aim of the study was to explore characteristics of the users of the Interactive Service "Your Questions" that is based on E-mail health consultations. We wanted to find out what motivated users to use it, were they satisfied with it and what were its impacts on their health behavior. Therefore, we developed a Web survey and invited 2,747 users to take part in it. 919 (33.5%) of users responded. Results showed that the majority of respondents were women (79.1%) and that most hold at least a college degree (52.4%). The Service was mostly used for obtaining information about certain medical symptoms or medical conditions (50.1%), for a second opinion on a diagnosis (18.6%) and for more information about medical treatment (14.4%). In terms of Service features, it was used because of its convenience with regard to time (38.7%) and a sense of privacy (25.7%). Before posting a question to the Service, 93.2% of the respondents searched for health articles on the PLIVAzdravlje portal while 90% of them read the Questions and Answers database. Over half of them (61.8%) posted their question after they already visited their physicians on that particular issue. Nevertheless, 48% of them were encouraged to visit their physicians after they received the answer. The results show an important trend of increased demand for e-mail health consultation and the need for reliable medical information, with one thousand questions submitted to the Service in the observed period of 40 days. If the source of medical information is reliable, as in case of our Service as well as other forms of e-mail health consultations, it can have positive impact on valuable physician-patient communication based on knowledge and mutual understanding.

  19. Polarity Determination using Opinion Mining in Stocks and Shares-advertising Unsolicited Bulk e-mails

    Directory of Open Access Journals (Sweden)

    Dr. Jatinderkumar R. Saini

    2012-04-01

    Full Text Available e-mail has become an important means of electronic communication but the viability of its usage is marred by Un-solicited Bulk e-mail (UBE messages. UBE consists of many types like pornographic, virus infected messages, ‘cry-for-help’ messages as well as fake and fraudulent offers/advertisements/promotions of stocks and shares, jobs, winnings, and medicines. UBE poses technical and socio-economic challenges to usage of e-mails. To meet this challenge and combat this menace, we need to understand UBE. Towards this end, a content-based textual analysis of more than 3100 stocks and shares-advertising unstructured UBE documents is presented. The paper is aimed at polarity determination of such UBE through its sentiment analysis. Technically, this is an application of Opinion Mining approached with help of Text Parsing, Tokenization, BOW and VSDM techniques. Sentiment Analysis is used to determine the polarity of the document because such UBE contain opinion of the spammer about specific stock symbol of share market. The Sentiment-depicting words are analyzed in the UBE corpus, scaled and extremes of positive and negative opinions are identified. An attempt has been made for polarity-based distribution of such UBE. It has been found that for almost 50�0of cases, the opinions expressed through such UBE have positive polarity, almost 30�0cases are negatively opined whereas almost 20�0cases contain neutral opinion. To the best knowledge and based on review of related literature, determination of UBE polarity using Opinion Mining for understanding spammer behaviour is a new concept.

  20. Impact of text and email messaging on the sexual health of young people: a randomised controlled trial.

    Science.gov (United States)

    Lim, Megan S C; Hocking, Jane S; Aitken, Campbell K; Fairley, Christopher K; Jordan, Lynne; Lewis, Jennifer A; Hellard, Margaret E

    2012-01-01

    To carry out a randomised controlled trial on the effect of a new method of health promotion-email and mobile phone text messages (short messaging service (SMS))-on young people's sexual health. 994 people aged 16-29 were recruited at a music festival to a non-blinded randomised controlled trial. Participants were randomised to either receive sexual health promotion messages (n=507) or the control group (n=487). The 12-month intervention included SMS (catchy sexually transmissible infections prevention slogans) and emails. Participants completed questionnaires at the festival at baseline and online after 3, 6 and 12 months. Outcomes were differences between the control and intervention groups in health-seeking behaviour, condom use with risky partners (new or casual partners or two or more partners within 12 months) and STI knowledge. 337 (34%) completed all three follow-up questionnaires and 387 (39%) completed the final questionnaire. At 12 months, STI knowledge was higher in the intervention group for both male (OR=3.19 95% CI 1.52 to 6.69) and female subjects (OR=2.36 95% CI 1.27 to 4.37). Women (but not men) in the intervention group were more likely to have had an STI test (OR=2.51, 95% CI 1.11 to 5.69), or discuss sexual health with a clinician (OR=2.92, 95% CI 1.66 to 5.15) than their control counterparts. There was no significant impact on condom use. Opinions of the messages were favourable. This simple intervention improved STI knowledge in both sexes and STI testing in women, but had no impact on condom use. SMS and email are low cost, popular and convenient, and have considerable potential for health promotion. Australian Clinical Trials Registry - ACTRN12605000760673.

  1. Pengaruh Aplikasi Bahan Pemutih Gigi Karbamid Peroksida 10% dan Hidrogen Peroksida 6% secara Home Bleaching terhadap Kekerasan Permukaan Email Gigi

    Directory of Open Access Journals (Sweden)

    Meiyestri Dwi Riani

    2015-05-01

    Full Text Available AbstrakHome bleaching adalah teknik pemutihan gigi vital yang dilakukan oleh pasien di rumah dalam pengawasan dokter gigi dengan konsentrasi karbamid peroksida 10-16% atau 3-6% hidrogen peroksida. Tujuan penelitian ini adalah untuk mengetahui pengaruh aplikasi bahan pemutih gigi karbamid peroksida 10% dan hidrogen peroksida 6% secara home bleaching terhadap kekerasan permukaan email gigi. Metode penelitian adalah true experimental dengan pretest-posttest control group design. Sampel berupa gigi premolar satu rahang atas yang sudah diekstraksi sebanyak 32 buah yang dibagi menjadi dua kelompok. Kelompok 1 adalah kelompok aplikasi bahan pemutih gigi karbamid peroksida 10% dengan lama aplikasi 1 jam perhari selama 14 hari dan kelompok II adalah kelompok aplikasi bahan pemutih gigi hidrogen peroksida 6% dengan lama aplikasi 10 menit perhari selama 14 hari. Selama aplikasi kedua sampel berada dalam inkubator 370C. Kekerasan permukaan email gigi diukur dengan alat Vickers Harndness Tester. Analisis data yang digunakan adalah uji t independen dan uji t dependen (p<0,05. Hasil uji statistik menunjukkan terjadinya penurunan yang sangat signifikan 0,000 (p<0,05 pada rerata nilai kekerasan permukaan email gigi antara sebelum dan setelah aplikasi bahan pemutih gigi. Kedua bahan pemutih gigi ini mempunyai perbandingan yang cenderung tidak signifikan 0,073 (p>0,05 terhadap kekerasan permukaan email gigi setelah aplikasi bahan pemutih gigi. Disimpulkan bahwa bahan pemutih gigi dapat menyebabkan penurunan kekerasan permukaan email gigi yang sangat signifikan karena terjadinya demineralisasi.Kata kunci: karbamid peroksida, hydrogen peroksida, home bleaching, kekerasan permukaan email gigiAbstractHome bleaching is whitening treatment of vital teeth conducted by a patient at home with under control of a dentist. The consentration of bleaching agents are 10-16% of carbamid peroxide or 3-6% of hidrogen peroxide. The objective of this study was to investigate the

  2. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Directory of Open Access Journals (Sweden)

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  3. A NOVEL GRAPH MODEL FOR E-MAIL FORENSICS: EVIDENCE ACTIVITY ANALYSIS GRAPH

    Directory of Open Access Journals (Sweden)

    Sridhar Neralla

    2013-10-01

    Full Text Available This work puts forward a novel technique for evidence analysis that assist cyber forensics expert for analyzing cyber crime episode in an effective manner. Novelty in Evidence Activity Analysis Graph is reflection of activities involved in the cyber crime that are represented as nodes along with stylometric analysis. In this pieceof work email based cyber crime incident is considered for study and that incident is represented in Evidence Activity Analysis Graph to fix the suspect. Comparisons between various graphs that are used in cyber forensics were also discussed in this paper. This model establishes relationships between various activities that were happened in the cyber crime.

  4. Feasibility of Medical Education through Email: Darsnameh e - Learning System as a National Pattern

    Directory of Open Access Journals (Sweden)

    Hamed - Basir Ghafouri

    2012-07-01

    Full Text Available Introduction: while internet and web could bridge over time and place barriers of educa-tion, some websites developed educational programs in different fields. The nation-wide Darsnameh e-Learning System is one of the accepted and popular services basically for ICT education and other miscellaneous topics. Here, we try to collect the characteristics of this system to assess the feasibility of its adaptation for medical education. Methods: we considered five aspects (infrastructure, registration, content, timing, and user and two criteria (user-friendliness and reliability to assess the adaptation of Darsnameh model for medical education. Assessment team consisted of a software engineer, a medical librarian, and a medical education expert each of them voluntarily and optionally registered in one of the Darsnameh courses and finished it. Passing each course took 43 days on average. Three two-hour meetings were held to assess the system in group discussions. All discus-sions were recorded and their contents were analyzed to form the assessment concepts and categories. To determine adoptability of the system for medical education, scores of 0-7 was considered. Results: in Categories of infrastructure, registration, content, timing, and users were scored 6, 2, 6, 4, and 4 respectively. Also, user-friendliness and reliability criteria were scored 6 and 1. Except reliability criteria, other characteristics were consi-dered as adoptable for medical education. But reliability of the registration information, content, exam results, course certification, and affiliation of developers remained unreliable. Conclusion: implementation of e-learning for medical education through email could be considered as a new developmental approach, however because of limitations of current study, it should be evaluated for a large number of subjects such as general practitioners.

  5. An evaluation of the role of email in promoting science investigative skills in primary rural schools in England

    Science.gov (United States)

    Jarvis, Tina; Hargreaves, Linda; Comber, Chris

    1997-06-01

    This project evaluated the effect of collaboration via email links on the quality of 10-11 year old students’ science investigative skills in six primary rural schools. After a joint planning meeting, sixty children collected, identified and shared information via email about moths in their area, in order to produce a joint booklet. All email traffic was monitored throughout the project. Indepth structured observations and interviews were carried out at the schools. Children completed daily diaries. The children demonstrated a variety of science skills, particularly observation and recording. Their competence and confidence in using computers, handling email and in manipulating a data base developed during the project. The project identified a number of important issues relating to teacher inservice training requirements, the importance of a suitable progression of IT experiences throughout the school, development in cooperative groupwork for children, and software design.

  6. PHS terminal 'TEGACKY' dedicated to e-mailing; Mail senyo PHS tanmatsu 'TEGACKY

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    The e-mail utilization rate at mobile communication terminals is increasing at a remarkable rate, as if to grow above the rate of communication by voice. Under the circumstances, a PHS (Personal Handyphone System) terminal 'TEGACKY' (type name: PM-T101) has been developed, designed exclusively for use for e-mailing. 'TEGACKY' is characterized in that its icons may be activated with pen, that input may be made by handwriting, and that its large screen allows a 48-character message consisting of 4 lines of 12 characters to be displayed at one time despite its compact size. It can also perform communication directly with other terminals or e-mail via center, and is provided with an information service function. 'TEGACKY' having such distinguished features has created a new category of terminals which are at once e-mailing tools. (translated by NEDO)

  7. Technical Perspective on Using Information Demand Pattern in a Collaborative Recommendation System for Improving E-Mail Communication

    Directory of Open Access Journals (Sweden)

    Dirk Stamer

    2015-04-01

    Full Text Available Today e-mail communication information is widely used in organizations to distribute information. The increasing volume of received e-mails hinders an efficient work. It becomes more and more difficult to identify relevant e-mails inside this enormous volume of information. This work presents a solution in a multi-user environment by improving an established e-mail client extension based on information demand pattern with a recommendation system. The contributions of this work are (1 the concept and implementation of the solution for a single-user environment using information demand pattern, (2 the concept and architecture to use the solution in a multi-user environment (3 a detailed technical description about the proposed solutions.

  8. Communications between volunteers and health researchers during recruitment and informed consent: qualitative content analysis of email interactions.

    Science.gov (United States)

    Townsend, Anne; Amarsi, Zubin; Backman, Catherine L; Cox, Susan M; Li, Linda C

    2011-10-13

    While use of the Internet is increasingly widespread in research, little is known about the role of routine electronic mail (email) correspondence during recruitment and early volunteer-researcher interactions. To gain insight into the standpoint of volunteers we analyzed email communications in an early rheumatoid arthritis qualitative interview study. The objectives of our study were (1) to understand the perspectives and motivations of individuals who volunteered for an interview study about the experiences of early rheumatoid arthritis, and (2) to investigate the role of emails in volunteer-researcher interactions during recruitment. Between December 2007 and December 2008 we recruited 38 individuals with early rheumatoid arthritis through rheumatologist and family physician offices, arthritis Internet sites, and the Arthritis Research Centre of Canada for a (face-to-face) qualitative interview study. Interested individuals were invited to contact us via email or telephone. In this paper, we report on email communications from 12 of 29 volunteers who used email as their primary communication mode. Emails offered insights into the perspective of study volunteers. They provided evidence prospectively about recruitment and informed consent in the context of early rheumatoid arthritis. First, some individuals anticipated that participating would have mutual benefits, for themselves and the research, suggesting a reciprocal quality to volunteering. Second, volunteering for the study was strongly motivated by a need to access health services and was both a help-seeking and self-managing strategy. Third, volunteers expressed ambivalence around participation, such as how far participating would benefit them, versus more general benefits for research. Fourth, practical difficulties of negotiating symptom impact, medical appointments, and research tasks were revealed. We also reflect on how emails documented volunteer-researcher interactions, illustrating typically

  9. Problems and risks of unsolicited e-mails in patient-physician encounters in travel medicine settings.

    Science.gov (United States)

    Sing, A; Salzman, J; Sing, D

    2001-01-01

    International travel and use of modern information technology are expressions of modern life style. Seeking on-line travel health advice via E-mail for preventive (teleprevention) or diagnostic reasons may become increasingly popular among patients with financial resources and Internet access. This study was undertaken to compare the behavior of travel clinic or tropical medicine physicians and other providers of travel-related medical information services toward unsolicited E-mails from fictitious patients in pretravel and post-travel scenarios. We also wanted to test the potential of E-mail advice for preventive medicine (teleprevention), and to find out how the "Good Samaritan Law" is observed. Two different E-mails were posted to E-mail addresses of 171 physicians (members of travel health and/or tropical medicine societies) and services offering advice on travel health issues identified by an AltaVista search. These E-mails, from two different fictitious travelers, were asking for advice regarding malaria prophylaxis in a pretravel scenario and describing symptoms suggesting acute malaria. Of the contacted addresses 43.3% and 49.7% respectively, replied to the pre- and post-travel E-mail. Of those suggesting antimalarial chemoprophylaxis in the pretravel scenario, 13.2% proposed inadequate regimens, and at least 3.5% of the post-travel replies were inappropriate. The "Good Samaritan Law" was observed by a significant number of physicians. Both patients and physicians have to be aware of the limitations of E-mail communication. Guidelines protecting physicians against legal and ethical consequences of this new communication technology are urgently needed.

  10. Gambaran Histopatologik Lesi Karies pada Email dengan Aplikasi Fluor In Vitro

    Directory of Open Access Journals (Sweden)

    Agoeng Tjahjani

    2015-11-01

    Full Text Available Tahap dini karies telah lama dikenal dengan istilah bercak putih. Untuk mengetahui terjadinya lesi karies di bawah permukaan email in vivo, maka dilakukan penelitian secara in vitro dengan merendam gigi Premolar dengan dan tanpa aplikasi fluor dalam perbenihan kuman Streptococcus mutans FA-1 (ATCC 16495. Enam puluh empat gigi Preolar tanpa karies dibagi dalam 2 kelompok. Pada kelompok perlakuan, gigi diaplikasi dengan fluor sedang pada kelompok kontrol gigi tanpa aplikasi fluor. Semua gigi dimasukkan dalam perbenihan tioglikolat air yang ke dalamnya telah ditanam Streptococcus mutans FA-4 (ATCC 16495 selama 4 dan 8 minggu. Pembentukan bercah putih diamati dengan mikroskop 'zoom-stereo'. Sedang besarnya porusitas di bawah permukaan email diaamti dengan mikroskop polarisasi. Pada akhir minggu ke-4 dan ke-8 pada kedua kelompok ditemukan peningkatan jumlah gigi dengan pembentukan bercak putih dan peningkatan nilai rata-rata kedalaman lapisan badan lesi. Uji statistik dengan chi-square test menunjukkan perbedaan bermakna pada p<0.05. Berdasarkan penelitian tersebut di atas disimpulkan bahwa (1 aplikasi NaF hanya menghambat sebagian pembentukan lesi karies dan (2 sistem perbenihan kuman yang digunakan tidak dapat mencerminkan keadaan mulut yang sebenarnya.

  11. Pattern analysis of directed graphs using DEDICOM: an application to Enron email.

    Energy Technology Data Exchange (ETDEWEB)

    Bader, Brett William; Harshman, Richard A. (University of Western Ontario London, Ontario, Canada); Kolda, Tamara Gibson (Sandia National Labs, Livermore, CA)

    2006-12-01

    DEDICOM is a linear algebra model for analyzing intrinsically asymmetric relationships, such as trade among nations or the exchange of emails among individuals. DEDICOM decomposes a complex pattern of observed relations among objects into a sum of simpler patterns of inferred relations among latent components of the objects. Three-way DEDICOM is a higher-order extension of the model that incorporates a third mode of the data, such as time, giving it stronger uniqueness properties and consequently enhancing interpretability of solutions. In this paper, we present algorithms for computing these decompositions on large, sparse data as well as a variant for computing an asymmetric nonnegative factorization. When we apply these techniques to adjacency arrays arising from directed graphs with edges labeled by time, we obtain a smaller graph on latent semantic dimensions and gain additional information about their changing relationships over time. We demonstrate these techniques on the Enron email corpus to learn about the social networks and their transient behavior. The mixture of roles assigned to individuals by DEDICOM showed strong correspondence with known job classifications and revealed the patterns of communication between these roles. Changes in the communication pattern over time, e.g., between top executives and the legal department, were also apparent in the solutions.

  12. Wireless Controlled Methods via Voice and Internet (e-mail for Home Automation System

    Directory of Open Access Journals (Sweden)

    R.A.Ramlee

    2013-08-01

    Full Text Available This paper presents a wireless Home Automation System (HAS that mainly performed by computer. The system is designed with several control methods in order to control the target electrical appliances. This various control methods implemented to fulfill the needs of users at home even at outside. The computer application is designed in Microsoft Windows OS that integrated with speech recognition voice control by using Microsoft Speech Application Programming Interface (SAPI. The voice control method provides more convenience especially to the blind and paralyzed users at home. This system is designed to perform short distance control by using wireless Bluetooth technology and long distance control by using Simple Mail Transfer Protocol (SMTP email control method. The short distance control is considered as the control that performed inside the house. Moreover, the long distance control can be performed at everywhere by devices that installed with browser or email application, and also with the internet access. The system intended to control electrical appliances at home with relatively low cost design, user-friendly interface and ease of installation.

  13. How connected are people with schizophrenia? Cell phone, computer, email, and social media use.

    Science.gov (United States)

    Miller, Brian J; Stewart, Adriana; Schrimsher, John; Peeples, Dale; Buckley, Peter F

    2015-02-28

    Technologies such as Internet based social media network (SMN) websites are becoming an important part of many adult lives; however, less is known about their use in patients with schizophrenia. We need to determine (1) how "connected" are patients with schizophrenia?, (2) do these technologies interfere with the patient׳s illness?, and (3) do patients envision these technologies being involved in their treatment? We recruited 80 inpatients and outpatients age 18-70 with schizophrenia to complete a brief survey on the prevalence and frequency of cell phone, text messaging, computer, email, and SMN use, and associated attitudes. 56% of subjects use text messaging, 48% have an email account, and 27% of subjects use SMN sites daily, with Facebook being the most popular. Many current users agreed that these technologies help them interact/socialize more, expressed interest in receiving text messages from their doctors, and disagreed that these technologies make symptoms worse. These preliminary findings should be investigated in larger samples, but suggest that these technologies afford a unique opportunity to engage and improve treatment for some patients with schizophrenia.

  14. Impact of smartphone digital photography, email, and media communication on emergency room visits post-hypospadias repair.

    Science.gov (United States)

    Chua, Michael E; Saunders, Megan A; Bowlin, Paul R; Ming, Jessica M; Lopes, Roberto Iglesias; Farhat, Walid A; Dos Santos, Joana

    2017-01-01

    Advances in communication technology are shaping our medical practice. To date, there is no clear evidence that this mode of communication will have any effect on unnecessary postoperative emergency room (ER) visits. We aim to evaluate the effect of email and media communication with application of smartphone digital photography on post-hypospadias repair ER visit rates. This prospective cohort study included all patients who underwent hypospadias repair performed by a single surgeon from October 2014 to November 2015. Patients were categorized into two groups: Group A consented for smartphone photography and email communication and Group B declined. Reason for ER visits within 30 days postoperatively was assessed by another physician, who was blinded of patient group assignment. The reasons were categorized as: unnecessary ER visit, indicated ER visit, or visit unrelated to hypospadias surgery. Chi-square test and T-test were used for statistical analysis. Relative risk (RR) and corresponding 95% confidence interval (CI) were also calculated. Statistical significance was set at pdigital photography significantly reduced the number of unnecessary ER visits for post-hypospadias wound checks.

  15. Diabetes NetPLAY: A physical activity website and linked email counselling randomized intervention for individuals with type 2 diabetes

    Directory of Open Access Journals (Sweden)

    Courneya Kerry S

    2009-03-01

    Full Text Available Abstract Background - This pilot study evaluated the feasibility (recruitment, retention, adherence and satisfaction and preliminary efficacy of a 12-week website and email-linked counselling intervention on physical activity behaviour change in individuals with type 2 diabetes. Methods - A total of 49 individuals with type 2 diabetes (59% female, average age 54.1 years were randomized to the Diabetes NetPLAY intervention or control condition. The intervention condition received information grounded in the Social Cognitive Theory (SCT, personalized weekly emails, an on-line logbook and message board. Key outcomes included physical activity behaviour and related cognition changes. The control condition was provided links to the Canadian Diabetes Association's Clinical Practice Guidelines for Physical Activity and Canada's Guide to Physical Activity. Results - Intervention participants indicated high levels of satisfaction for this mode of delivery and study results demonstrated the feasibility of web-based mediums for the delivery of physical activity information in this population. The intervention group demonstrated a significant improvement in total vigorous and moderate minutes of physical activity (p = 0.05 compared to the control group over the 12-week study. Among the SCT variables, behavioural capacity, showed a significant increase (p Conclusion - Web-based interventions for individuals with type 2 diabetes are feasible and show promise for improving positive physical activity outcomes.

  16. 基于Hadoop平台的电子邮件分类%Email Classification Method Based on Hadoop Platform

    Institute of Scientific and Technical Information of China (English)

    邵叶秦

    2014-01-01

    To detect spams from the massive emails, an email classification method based on Hadoop platform is proposed. Differ⁃ent from the traditional context-based spam detection, the proposed method statistically analyze the email records by MapRe⁃duce framework to extract behavioral features of each email account. Then Random Forests classifier is implemented in parallel by MapReduce framework. Based on the samples with extracted behavioral features, Random Forests classifier is trained and uti⁃lized to classify emails. Experimental results show that, the Hadoop based email classification method largely increases the efficien⁃cy of massive email classification.%为了从大量的电子邮件中检测垃圾邮件,提出了一个基于Hadoop平台的电子邮件分类方法。不同于传统的基于内容的垃圾邮件检测,通过在MapReduce框架上统计分析邮件收发记录,提取邮件账号的行为特征。然后使用MapReduce框架并行的实现随机森林分类器,并基于带有行为特征的样本训练分类器和分类邮件。实验结果表明,基于Hadoop平台的电子邮件分类方法大大提高了大规模电子邮件的分类效率。

  17. Apakah Kepribadian Menentukan Pemilihan Media Komunikasi? Metaanalisis Terhadap Hubungan Kepribadian Extraversion, Neuroticism, dan Openness to Experience dengan Penggunaan Email

    Directory of Open Access Journals (Sweden)

    Nelia Ramdhani

    2013-05-01

    Full Text Available As communication technologies such as e-mail have becoming indispensable for business communication, the study of the use and effects of technologies is increasingly relevant. This study is aimed at analyzing the correlation between personality traits and the choice of communication media. Research data from 22 studies published in the journals and the articles posted in the internet in the years of 1999 – 2006 were analyzed using meta analysis technique. The total of 4267 participants were involved in the research. Analysis was focused only on the correlation between three personality traits: extraversion, neuroticism, openness to experience, and the use of email. Two statis¬tical technique error corrections were applied in analyzing the data, namely sampling error correction and measurement error correction. It was found that after sampling error correction was calculated the correlation between extraversion and email usage was (ř = 0,33. Further, when measurement error was also calculated, the correlation between those two variables increased to (ρ = 0,38. When sampling error corection was applied, the correlation between neuroticism and email usage was (ř = 0,13. Similar to extra¬version when measurement error was cor¬rect¬ed, the correlation between these two variables increased to (ρ = 0,14. The corre¬la¬tion between openness to experience with email usage was (ř = 0,30 when sampling error correction was calculated. Further when the measurement error correction was applied the coeficient correlation was increas¬ed to (ρ = 0,33. These findings indi¬cated that personality traits correlate with email usage. Keywords: meta analisis, extraversion, neu¬ro-ticism, openness to experience, email

  18. IntegraTUM Teilprojekt E-Mail: Rezentralisierung von E-Mail-Services

    Science.gov (United States)

    Diehn, Max; Haarer, Ado; Schreiner, Alexander; Storz, Michael

    Das Teilprojekt E-Mail hatte ursprünglich die Aufgabe einen zentralen Mailservice mit verteilter Administration der Mailadressen für die TUM aufzubauen und diesen durch Anti-Spam- und Anti-Viren-Maßnahmen zu schützen. Auf diesen Mailservice sollten sowohl die am LRZ gehosteten Maildomains als auch die vielen lokal betriebenen Mailserver - soweit von deren Betreibern gewünscht - migriert werden. Neben einigen Rückschlägen und Hindernissen kam es im Laufe des Projektes auch zu einer Änderung der Anforderungen, sodass zum Ende des Projektes statt eines reinen Mailsystems ein Doppelsystem mit "shared SMTP address space" bestehend aus einem klassischen Message-Store mit POP/IMAP-Zugriff auf Basis von Postfix + Dovecot und einem Groupware-System auf Basis von Microsoft Exchange in Produktion ging, wobei jeder Mitarbeiter und Student der TUM wählen kann, auf welchem der beiden Systeme sich seine Mailbox befindet.

  19. SMEmail - A New Protocol for the Secure E-mail in Mobile Environments

    CERN Document Server

    Toorani, Mohsen

    2010-01-01

    The electronic mail plays an unavoidable role in the humankind communications. With the great interest for the connection via mobile platforms, and the growing number of vulnerabilities and attacks, it is essential to provide suitable security solutions regarding the limitations of resource restricted platforms. Although some solutions such as PGP and S/MIME are currently available for the secure e-mail over the Internet, they are based on traditional public key cryptography that involves huge computational costs. In this paper, a new secure application-layer protocol, called SMEmail, is introduced that provides several security attributes such as confidentiality, integrity, authentication, non-repudiation, and forward secrecy of message confidentiality for the electronic mails. SMEmail offers an elliptic curve-based public key solution that uses public keys for the secure key establishment of a symmetric encryption, and is so suitable for the resource restricted platforms such as mobile phones.

  20. The effectiveness of personalized e-mail newsletters and the role of personal characteristics.

    Science.gov (United States)

    Maslowska, Ewa; Putte, Bas van den; Smit, Edith G

    2011-12-01

    Personalizing communication means creating persuasive messages that refer to aspects of a person's self. Although the use of personalization is increasing, research on its effectiveness is limited and the results are mixed. This study examined the persuasiveness of personalized e-mail newsletters in terms of increased attention, cognitive activity, evaluation, attitude, intention, and behavior by means of an experiment (n=109). Participants randomly received either a personalized or a generic newsletter advertising a sports center. Personalization triggered a more positive evaluation of the message; however, it did not influence the other effect variables. The effects were moderated by consumers' need for uniqueness, trust, and privacy concerns, suggesting that personalization is a good strategy to increase message evaluation only among individuals who have a high need for uniqueness.

  1. The institutional genre email in building a socio-rhetorical discourse community

    Directory of Open Access Journals (Sweden)

    Marco Aurelio Silva SOUZA

    2016-07-01

    Full Text Available In this study we analyze the institutional e-mail, one of the most produtive genres in digital communications. The definitions of gender and socio-rhetorical discourse community are based on the studies of Swales (2008 and Freedman (1999. The data consist on 125 messages received by a service provider with requests for social activities related to the context of the tasks to be performed. The opening and closing patterns demonstrate the social function of this genre. The results show that the institutionalized talk, even with the presence of linguistic elements of synchronous genres, entails the formation of a socio-rhetorical discourse community, according to the assumptions that characterize it.

  2. Write, read and answer emails with a dry 'n' wireless brain-computer interface system.

    Science.gov (United States)

    Pinegger, Andreas; Deckert, Lisa; Halder, Sebastian; Barry, Norbert; Faller, Josef; Käthner, Ivo; Hintermüller, Christoph; Wriessnegger, Selina C; Kübler, Andrea; Müller-Putz, Gernot R

    2014-01-01

    Brain-computer interface (BCI) users can control very complex applications such as multimedia players or even web browsers. Therefore, different biosignal acquisition systems are available to noninvasively measure the electrical activity of the brain, the electroencephalogram (EEG). To make BCIs more practical, hardware and software are nowadays designed more user centered and user friendly. In this paper we evaluated one of the latest innovations in the area of BCI: A wireless EEG amplifier with dry electrode technology combined with a web browser which enables BCI users to use standard webmail. With this system ten volunteers performed a daily life task: Write, read and answer an email. Experimental results of this study demonstrate the power of the introduced BCI system.

  3. Physician assessments of the value of therapeutic information delivered via e-mail.

    Science.gov (United States)

    Grad, Roland; Pluye, Pierre; Repchinsky, Carol; Jovaisas, Barbara; Marlow, Bernard; Marques Ricarte, Ivan L; Galvão, Maria Cristiane Barbosa; Shulha, Michael; de Gaspé Bonar, James; Moscovici, Jonathan L

    2014-05-01

    Although e-learning programs are popular and access to electronic knowledge resources has improved, raising awareness about updated therapeutic recommendations in practice continues to be a challenge. To raise awareness about and document the use of therapeutic recommendations. In 2010, family physicians evaluated e-Therapeutics (e-T) Highlights with a Web-based tool called the Information Assessment Method (IAM). The e-T Highlights consisted of information found in the primary care reference e-Therapeutics+. Each week, family physicians received an e-mail containing a link to 1 Highlight from a different chapter of e-Therapeutics+. Family physicians received continuing medical education credits for each Highlight they rated with the IAM. Of the 5346 participants, 85% of them were full-time or part-time practitioners. A total of 31 429 Highlights ratings were received in 2010 (median of 2 ratings per participant, range 1 to 49). Among participants who rated more than 2 Highlights, the median number of ratings was 7 (mean 11.9). The relevance of the information from individual Highlights varied widely; however, for 90% of the rated Highlights participants indicated total or partial relevance of the information for at least 1 patient. For 41% of rated Highlights, participants expected patient health benefits to result from implementing the recommendation, such as avoiding an unnecessary or inappropriate treatment, or a preventive intervention. This continuing medical education program stimulated family physicians to rate therapeutic recommendations that were delivered weekly via e-mail. The process of rating e-T Highlights with the IAM raised awareness about treatment recommendations and documented self-reported use of this information in practice. Copyright© the College of Family Physicians of Canada.

  4. Which online format is most effective for assisting Baby Boomers to complete advance directives? A randomised controlled trial of email prompting versus online education module.

    Science.gov (United States)

    Bradley, Sandra L; Tieman, Jennifer J; Woodman, Richard J; Phillips, Paddy A

    2017-08-29

    Completion of Advance Directives (ADs), being financial and healthcare proxy or instructional documents, is relatively uncommon in Australia. Efforts to increase completion rates include online education and prompting which past literature suggests may be effective. The aim of this randomized controlled trial was to assess computer-based online AD information and email prompting for facilitating completion of ADs by Australian Baby Boomers (b.1946-1965) as well as factors which may impede or assist completion of these documents by this generation when using the online environment. Two hundred eighty-two men and women aged 49-68 years at the time of the trial were randomly assigned to one of 3 intervention groups: education module only; email prompt only; email prompt and education module; and a control group with no education module and no email prompt. The randomized controlled trial was undertaken in participants' location of choice. Randomization and allocation to trial group were carried out by a central computer system. The primary analysis was based on a final total of 189 participants who completed the trial (n = 52 education module only; n = 44 email prompt only; n = 46 email prompt and education module; and n = 47 control). The primary outcome was the number of individuals in any group completing any of the 4 legal ADs in South Australia within 12 months or less from entry into the trial. Frequency analysis was conducted on secondary outcomes such as reasons for non-completion. Mean follow-up post-intervention at 12 months showed that 7% of overall participants completed one or more of the 4 legal ADs but without significant difference between groups (delta = 1%, p = .48 Prompt/Non-Prompt groups, delta = 5%, p = .44 education/non-education groups). Reasons offered for non-completion were too busy (26%) and/or it wasn't the right time (21%). Our results suggest that neither email prompting nor provision of additional educational material

  5. "While you still think, I already type": experienced social power reduces deliberation during e-mail communication.

    Science.gov (United States)

    Scholl, Annika; Sassenberg, Kai

    2014-11-01

    E-mail allows individuals to deliberate on their communication before sending it off. For instance, communication partners can easily take their time to ponder how best to frame a request before they actually send a message. Individuals at times strategically exploit this opportunity to deliberate in order to tailor messages to their communication partner, such as when communicating with a relatively more powerful person. As social power reduces concerns about impression management, we predicted that individuals deliberate more while composing e-mail messages under low (vs. high) power. This assumption was tested with well-established power priming. As such, we expected that experienced power in one context would diminish deliberation times during a subsequent e-mail communication. An experiment manipulating the experience of (low vs. high) power and measuring deliberation times during e-mail composition supported this hypothesis. The findings thus indicate how social power alters deliberation times. More importantly, the results show that individuals not only strategically deliberate during e-mail communication in line with their current situation, but also in line with their social standing in a previous situation (here, their experience of power).

  6. Human communication dynamics in digital footsteps: a study of the agreement between self-reported ties and email networks.

    Science.gov (United States)

    Wuchty, Stefan; Uzzi, Brian

    2011-01-01

    Digital communication data has created opportunities to advance the knowledge of human dynamics in many areas, including national security, behavioral health, and consumerism. While digital data uniquely captures the totality of a person's communication, past research consistently shows that a subset of contacts makes up a person's "social network" of unique resource providers. To address this gap, we analyzed the correspondence between self-reported social network data and email communication data with the objective of identifying the dynamics in e-communication that correlate with a person's perception of a significant network tie. First, we examined the predictive utility of three popular methods to derive social network data from email data based on volume and reciprocity of bilateral email exchanges. Second, we observed differences in the response dynamics along self-reported ties, allowing us to introduce and test a new method that incorporates time-resolved exchange data. Using a range of robustness checks for measurement and misreporting errors in self-report and email data, we find that the methods have similar predictive utility. Although e-communication has lowered communication costs with large numbers of persons, and potentially extended our number of, and reach to contacts, our case results suggest that underlying behavioral patterns indicative of friendship or professional contacts continue to operate in a classical fashion in email interactions.

  7. Human communication dynamics in digital footsteps: a study of the agreement between self-reported ties and email networks.

    Directory of Open Access Journals (Sweden)

    Stefan Wuchty

    Full Text Available Digital communication data has created opportunities to advance the knowledge of human dynamics in many areas, including national security, behavioral health, and consumerism. While digital data uniquely captures the totality of a person's communication, past research consistently shows that a subset of contacts makes up a person's "social network" of unique resource providers. To address this gap, we analyzed the correspondence between self-reported social network data and email communication data with the objective of identifying the dynamics in e-communication that correlate with a person's perception of a significant network tie. First, we examined the predictive utility of three popular methods to derive social network data from email data based on volume and reciprocity of bilateral email exchanges. Second, we observed differences in the response dynamics along self-reported ties, allowing us to introduce and test a new method that incorporates time-resolved exchange data. Using a range of robustness checks for measurement and misreporting errors in self-report and email data, we find that the methods have similar predictive utility. Although e-communication has lowered communication costs with large numbers of persons, and potentially extended our number of, and reach to contacts, our case results suggest that underlying behavioral patterns indicative of friendship or professional contacts continue to operate in a classical fashion in email interactions.

  8. Human Communication Dynamics in Digital Footsteps: A Study of the Agreement between Self-Reported Ties and Email Networks

    Science.gov (United States)

    Wuchty, Stefan; Uzzi, Brian

    2011-01-01

    Digital communication data has created opportunities to advance the knowledge of human dynamics in many areas, including national security, behavioral health, and consumerism. While digital data uniquely captures the totality of a person's communication, past research consistently shows that a subset of contacts makes up a person's “social network” of unique resource providers. To address this gap, we analyzed the correspondence between self-reported social network data and email communication data with the objective of identifying the dynamics in e-communication that correlate with a person's perception of a significant network tie. First, we examined the predictive utility of three popular methods to derive social network data from email data based on volume and reciprocity of bilateral email exchanges. Second, we observed differences in the response dynamics along self-reported ties, allowing us to introduce and test a new method that incorporates time-resolved exchange data. Using a range of robustness checks for measurement and misreporting errors in self-report and email data, we find that the methods have similar predictive utility. Although e-communication has lowered communication costs with large numbers of persons, and potentially extended our number of, and reach to contacts, our case results suggest that underlying behavioral patterns indicative of friendship or professional contacts continue to operate in a classical fashion in email interactions. PMID:22114665

  9. Adult Willingness to Use Email and Social Media for Peer-to-Peer Cancer Screening Communication: Quantitative Interview Study.

    Science.gov (United States)

    Cutrona, Sarah L; Roblin, Douglas W; Wagner, Joann L; Gaglio, Bridget; Williams, Andrew E; Torres Stone, Rosalie; Field, Terry S; Mazor, Kathleen M

    2013-11-28

    Adults over age 40 are increasing their use of email and social media, raising interest in use of peer-to-peer Internet-based messaging to promote cancer screening. The objective of our study was to assess current practices and attitudes toward use of email and other e-communication for peer-to-peer dialogues on cancer screening. We conducted in-person interviews with 438 insured adults ages 42-73 in Georgia, Hawaii, and Massachusetts. Participants reported on use of email and other e-communication including social media to discuss with peers routine health topics including breast and colorectal cancer (CRC). We ascertained willingness to share personal CRC screening experiences via conversation, postcard, email, or other e-communication. Health literacy scores were measured. Email had been used by one-third (33.8%, 148/438) to discuss routine health topics, by 14.6% (64/438) to discuss breast cancer screening, and by 12.6% (55/438) to discuss CRC screening. Other e-communication was used to discuss routine health topics (11.6%, 51/438), screening for breast cancer (3.9%, 17/438), and CRC (2.3%, 10/438). In the preceding week, 84.5% (370/438) of participants had used email, 55.9% (245/438) had used e-communication of some type; 44.3% (194/438) text, 32.9% (144/438) Facebook, 12.3% (54/438) instant message, 7.1% (31/438) video chat, and 4.8% (21/438) Twitter. Many participants were willing to share their CRC screening experiences via email (32.4%, 142/438 might be willing; 36.3%, 159/438 very willing) and via other e-communication (15.8%, 69/438 might be willing; 14.4%, 63/438 very willing). Individuals willing to send CRC screening emails scored significantly higher on tests of health literacy compared to those willing to send only postcards (Pcommunication to promote cancer screening to peers. Optimal approaches for encouraging peer-to-peer transmission of accurate and appropriate cancer screening messages must be studied.

  10. Providing cell phone numbers and e-mail addresses to patients: The patient’s perspective, a cross sectional study

    Directory of Open Access Journals (Sweden)

    Peleg Roni

    2012-08-01

    Full Text Available Abstract Background Today patients can consult with their treating physician by cell phone or e-mail. These means of communication enhance the quality of medical care and increase patient satisfaction, but they can also impinge on physicians’ free time and their patient schedule while at work. The objective of this study is to assess the attitudes and practice of patients on obtaining the cell phone number or e-mail address of their physician for the purpose of medical consultation. Methods Personal interviews with patients, 18 years of age or above, selected by random sampling from the roster of adults insured by Clalit Health Services, Southern Division. The total response rate was 41%. The questionnaire included questions on the attitude and practice of patients towards obtaining their physician’s cell phone number or e-mail address. Comparisons were performed using Chi-square tests to analyze statistically significant differences of categorical variables. Two-tailed p values less than 0.05 were considered statistically significant, with a power of 0.8. Results The study sample included 200 patients with a mean age of 46.6 ± 17.1, of whom 110 were women (55%. Ninety-three (46.5% responded that they would be very interested in obtaining their physician’s cell phone number, and an additional 83 (41.5% would not object to obtaining it. Of the 171 patients (85.5% who had e-mail addresses, 25 (14.6% said they would be very interested in obtaining their physician’s e-mail address, 85 (49.7% said they would not object to getting it, and 61 (35.7% were not interested. In practice only one patient had requested the physician’s e-mail address and none actually had it. Conclusions Patients favored cell phones over e-mail for consulting with their treating physicians. With new technologies such as cell phones and e-mail in common use, it is important to determine how they can be best used and how they should be integrated into the flow

  11. The Additional Value of an E-Mail to Inform Healthcare Professionals of a Drug Safety Issue: A Randomized Controlled Trial in the Netherlands.

    Science.gov (United States)

    Piening, Sigrid; de Graeff, Pieter A; Straus, Sabine M J M; Haaijer-Ruskamp, Flora M; Mol, Peter G M

    2013-09-01

    The usefulness and the impact of Direct Healthcare Professional Communications (DHPCs, or 'Dear Doctor letters') in changing the clinical behaviour of physicians have been debated. Changes in the current risk communication methods should preferably be based on the preferences of the healthcare professionals, to optimize the uptake of the message. The aim of this study was to assess whether safety issues are communicated more effectively with an additional e-mail sent by the Dutch Medicines Evaluation Board (MEB) than with the DHPC only. A randomized controlled trial was conducted amongst ophthalmologists and hospital pharmacists in the Netherlands, who were the target group of a DHPC that was issued for pegaptanib, a drug that is administered intra-ocularly in patients with macular degeneration. The intervention group (N = 110) received the pegaptanib DHPC, as well as the MEB e-mail. The control group (N = 105) received the traditional paper-based DHPC only. Two weeks later, the study population received an invitation to fill out an online questionnaire. Questions were asked about the respondents' knowledge and attitude regarding the pegaptanib issue, and any action they had consequently taken. Additional questions were asked about their satisfaction with the DHPC and the e-mail, and their preferred source of such information. Forty respondents (18.6%) completed the questionnaire. Eighty-one percent of the respondents in the intervention group (N = 21) and 47% of the control group (N = 19) correctly indicated that a serious increase in intra-ocular pressure could be caused by pegaptanib injections (Fishers' exact test, p = 0.046). Nine respondents in the intervention group versus none of the control group respondents indicated that they had taken action in response to the pegaptanib safety issue (Fishers' exact test, p = 0.01). The majority of both the intervention group and the control group confirmed that they would like to receive an MEB e-mail with safety

  12. Is email an effective method for hospital discharge communication? A randomized controlled trial to examine delivery of computer-generated discharge summaries by email, fax, post and patient hand delivery.

    Science.gov (United States)

    Chen, Yufei; Brennan, Nicholas; Magrabi, Farah

    2010-03-01

    To examine the effectiveness of delivering of computer-generated discharge summaries to general practice by email, fax, post and patient hand delivery. Blinded, randomized controlled trial. A pre-study audit ascertaining baseline statistics and a follow-up survey were conducted with general practice to determine preferred medium for receiving discharge communication. 196 geriatric patients who were admitted to the aged care ward of a 300-bed metropolitan teaching hospital. Twenty-eight patients were lost to follow-up and 52 general practices participated in the final survey. The pre-study audit followed 63 discharges from the same ward. 168 eligible patients were randomly assigned to have their electronic discharge summary sent by email (n=40), fax (n=48), post (n=40) or patient hand delivery (n=40). Receipt of discharge summary by the general practice clinic within 7 days of patient discharge from hospital. The receipt rates for email (73.9%, n=17) and fax were comparable (69.4%, n=25; chi(2)=0.137, df=1, P=0.712), and significantly higher (chi(2)=19.86, df=3, Pemail offers the most effective method of communicating with primary care physicians, as long as accurate contact information is available. Although fax is still the most preferred, email has many advantages that could potentially allow it to replace fax as a standard mode for delivery of discharge communication. Crown Copyright 2010. Published by Elsevier Ireland Ltd. All rights reserved.

  13. Phase 1 pilot study of e-mail support for people with long term conditions using the Internet

    Directory of Open Access Journals (Sweden)

    Williamson Graham R

    2011-04-01

    Full Text Available Abstract Background Use of the Internet for people with Long Term Conditions (LTCs can have a positive effect on knowledge, social support, behavioural and clinical outcomes, yet there is concern that a 'digital divide' prevents some patients from benefitting. While some patients do not have access to the Internet, others that do may still lack expertise or the confidence to make full use of it. The aim of this pilot study was to develop an intervention and test methods for a definitive randomised controlled trial (RCT of anonymous personal online email support for patients in this latter group. Methods Recruitment success was evaluated by the number and appropriateness of participants recruited. A personalised e-health support intervention was developed. The provisional primary outcome was the extent to which the Internet affected the participants' confidence in dealing with their LTC. Primary outcome, seven process measures and two secondary outcomes measures were evaluated for completeness of data and sensitivity to detect changes. Results Thirty nine participants were recruited, 29 after personally receiving a leaflet, seven via email advertising, and three via leaflets left in waiting areas. Most participants (61% were aged over 60. The majority (21/38 rated themselves as experienced Internet users although only 5/38 had used discussion forums for their LTC. Piloting the intervention identified support needed as: (i technical help with some websites, (ii advice about issues such as anonymity, (iii help in judging information quality, (iv identification of relevant information (via 'Information Prescriptions', (v motivational support to try new sites. Attrition was fairly high: 20/39 completed follow up questionnaires. Three process measures showed ceiling effects and two had too many missing values to be useable. Conclusion E-health support is a promising way of addressing the problems faced by older generation e-health seekers. Face

  14. Directly e-mailing authors of newly published papers encourages community curation.

    Science.gov (United States)

    Bunt, Stephanie M; Grumbling, Gary B; Field, Helen I; Marygold, Steven J; Brown, Nicholas H; Millburn, Gillian H

    2012-01-01

    Much of the data within Model Organism Databases (MODs) comes from manual curation of the primary research literature. Given limited funding and an increasing density of published material, a significant challenge facing all MODs is how to efficiently and effectively prioritize the most relevant research papers for detailed curation. Here, we report recent improvements to the triaging process used by FlyBase. We describe an automated method to directly e-mail corresponding authors of new papers, requesting that they list the genes studied and indicate ('flag') the types of data described in the paper using an online tool. Based on the author-assigned flags, papers are then prioritized for detailed curation and channelled to appropriate curator teams for full data extraction. The overall response rate has been 44% and the flagging of data types by authors is sufficiently accurate for effective prioritization of papers. In summary, we have established a sustainable community curation program, with the result that FlyBase curators now spend less time triaging and can devote more effort to the specialized task of detailed data extraction. Database URL: http://flybase.org/

  15. Online-Jugendberatung. Eine kommunikationswissenschaftliche Arbeit über eMail-, Chat- und Forenberatung

    Directory of Open Access Journals (Sweden)

    Selina Englmayer

    2006-03-01

    Full Text Available Gegenstand dieser kommunikationswissenschaftlichen Diplomarbeit sind eMail-, Chat- und Foren-Beratung für Jugendliche in Österreich. Nach einer Auseinandersetzung mit herkömmlichen Formen von Beratung (face-to-face- und Telefonberatung sowie Ratgeberjournalismus geht es um Definition und Formen der Online-Beratung. Des weiteren werden u.a. spezifische Beratungsstrategien und -methoden aus Theorie und Praxis, AkteurInnen und Rollen, Vor- und Nachteile sowie Qualitätskriterien dieser Beratungsform thematisiert. Weiters setzt sich die Autorin mit Jugendlichen und Internet (Nutzungsverhalten, Mediensozialisation, soziale Beziehungen im Internet auseinander. In der Folge geht es um herkömmliche und computervermittelte Kommunikation (CvK: Kommunikationsformen und -typen, Mediencharakteristika und Spezifika, Modelle der CVK etc. sind in diesem Zusammenhang unter besonderer Berücksichtigung der Online-Jugendberatung Thema. Abschließend stellt die Autorin in Reflexion auf den vorangegangenen theoretischen Teil drei österreichische Fallbeispiele der Online-Beratung für Jugendliche vor. Dabei handelt es sich um eine eMail-Beratungseinrichtung (ChEck iT!, einen Beratungschat (Kinderschutzzentrum Wien sowie ein Online-Forum (wienXtra.

  16. Long-Term Evolution of Email Networks: Statistical Regularities, Predictability and Stability of Social Behaviors.

    Science.gov (United States)

    Godoy-Lorite, Antonia; Guimerà, Roger; Sales-Pardo, Marta

    2016-01-01

    In social networks, individuals constantly drop ties and replace them by new ones in a highly unpredictable fashion. This highly dynamical nature of social ties has important implications for processes such as the spread of information or of epidemics. Several studies have demonstrated the influence of a number of factors on the intricate microscopic process of tie replacement, but the macroscopic long-term effects of such changes remain largely unexplored. Here we investigate whether, despite the inherent randomness at the microscopic level, there are macroscopic statistical regularities in the long-term evolution of social networks. In particular, we analyze the email network of a large organization with over 1,000 individuals throughout four consecutive years. We find that, although the evolution of individual ties is highly unpredictable, the macro-evolution of social communication networks follows well-defined statistical patterns, characterized by exponentially decaying log-variations of the weight of social ties and of individuals' social strength. At the same time, we find that individuals have social signatures and communication strategies that are remarkably stable over the scale of several years.

  17. Politeness Accommodation in E-Mail Requests among Iranian Postgraduate Students of EFL

    Directory of Open Access Journals (Sweden)

    Muhammed Parviz

    2012-11-01

    Full Text Available Computer-mediated communication (CMC offers us a chance to understand how social relationships are built and maintained in an environment in which interlocutors not only lack the paralinguistic features that are vital to face-to- face conversation, but are participating in a medium which has had little time to develop rules of conduct. The present study was an attempt to determine politeness accommodation in e-mail messages among Iranian postgraduate students of EFL. One hundred EFL learners, aged 22-26, participated in this study. Four different message types were constructed and sent to the participants, i.e. messages with verbal politeness markers; messages with structural politeness elements (e. g., salutation and closing remarks; messages with both verbal and structural politeness indicators; finally messages with neither verbal nor structural politeness indicators. Further, the messages varied in their degree of politeness; however, their content was the same. Results showed that the participants accommodated significantly to verbal politeness indicators in the body of a message, and to structural politeness indicators of greeting/salutation. When such indicators were included in messages, the participants responded with significantly more polite messages (greeting and body than when the indicators were absent. The results boost our understanding of CMC with reference to politeness markers, and how they are used by Iranian EFL learners.Keywords: Computer-mediated communication, Politeness, Negative politeness, Positive politeness, Face

  18. E-mail as the Appropriate Method of Communication for the Decision-Maker When Soliciting Advice for an Intellective Decision Task.

    Science.gov (United States)

    Prahl, Andrew; Dexter, Franklin; Swol, Lyn Van; Braun, Michael T; Epstein, Richard H

    2015-09-01

    For many problems in operating room and anesthesia group management, there are tasks with optimal decisions, and yet experienced personnel tend to make decisions that are worse or no better than random chance. Such decisions include staff scheduling, case scheduling, moving cases among operating rooms, and choosing patient arrival times. In such settings, operating room management leadership decision-making should typically be autocratic rather than participative. Autocratic-style decision-making calls for managers to solicit and consider feedback from stakeholders in the decision outcome but to make the decision themselves using their expert knowledge and the facts received. For this to be effective, often the manager will obtain expert advice from outside the organization (e.g., health system). In this narrative review, we evaluate the advantages and disadvantages of using prompt asynchronous written communication (i.e., e-mail) as a communication channel for such interaction between a decision-maker (manager) and advisor. A detailed Appendix (Supplemental Digital Content, http://links.lww.com/AA/B72) lists each observational and experimental result. We find that the current ubiquitous role of e-mail for such communication is appropriate. Its benefits include improved time management via asynchronicity, low cognitive load (e.g., relative to Web conferencing), the ability to hide undesirable and irrelevant cues (e.g., physical appearance), the appropriateness of adding desirable cues (e.g., titles and degrees), the opportunity to provide written expression of confidence, and the ability for the advisor to demonstrate the answer for the decision-maker. Given that the manager is e-mailing an advisor whose competence the manager trusts, it is unnecessary to use a richer communication channel to develop trust. Finally, many of the limitations of e-mail can be rectified through training. We expect that decades from now, e-mail (i.e., asynchronous writing) between an

  19. Hedges Used in Business Emails: A Corpus Study on the Language Strategy of International Business Communication Online

    Science.gov (United States)

    Yue, Siwei; Wang, Xuefei

    2014-01-01

    Based on a corpus of 296 authentic business emails produced in computer-mediated business communication from 7 Chinese international trade enterprises, this paper addresses the language strategy applied in CMC (Computer-mediated Communication) by examining the use of hedges. With the emergence of internet, a wider range of hedges are applied…

  20. You've Got Mail … ! Using Email Interviews to Gather Academics' Narratives of Their Working Lives

    Science.gov (United States)

    James, Nalita

    2017-01-01

    The paper explores how computer-mediated communication offers space for academics to think and make sense of their experiences in the qualitative research encounter. It draws on a research study that used email interviewing to generate online narratives to understand academic lives and identities through research encounters in virtual space. The…

  1. RDA Implementation and Training Issues across United States Academic Libraries: An In-Depth E-Mail Interview Study

    Science.gov (United States)

    Park, Jung-ran; Tosaka, Yuji

    2015-01-01

    This study aims at providing in-depth perspectives on the ways in which cataloging and metadata professionals have coped with RDA training and implementation through an e-mail interview method. Results show that the performance-based, "learn-as-you-go," peer learning method is found by practitioners to be most effective in acquiring and…

  2. "Die guten ins Töpfchen, die schlechten ins ..." - Filter für E-Mail

    OpenAIRE

    Richter, Frank

    2001-01-01

    Gemeinsamer Workshop von Universitaetsrechenzentrum und Professur "Rechnernetze und verteilte Systeme" der Fakultaet fuer Informatik der TU Chemnitz. Workshop-Thema: Mobilitaet Es werden Filtermöglichkeiten für E-Mails vorgestellt, um die E-Mail-Bearbeitung zu automatisieren und Spam-Mails und Mails mit gefährlichem Inhalt abzuwehren.

  3. E-mail service provided by Virginia Tech's server (pop.vt.edu, imap.vt.edu) is offline

    OpenAIRE

    Hincker, Lawrence

    2007-01-01

    E-mail service provided by Virginia Tech's server (pop.vt.edu or imap.vt.edu) is offline. The server has experienced a failure for two of its three power supplies. The maintenance contractor expects to have the repair components at Virginia Tech by midday Monday, March 5, 2007.

  4. Assessing the Factors Affecting the Amount of E-Mail Spam Delivery in a Public School District

    Science.gov (United States)

    Yasenchock, David A.

    2013-01-01

    Eighty to ninety percent of e-mail is considered unsolicited commercial communication, or spam. Not only does spam violate the privacy of users, but it also incurs societal costs associated with time-related losses, serves as a vehicle for cyber-crime, and threatens the success of e-commerce by lowering consumer confidence. This quantitative…

  5. Cyber-Communic@tion Etiquette: The Interplay between Social Distance, Gender and Discursive Features of Student-Faculty Email Interactions

    Science.gov (United States)

    Boshrabadi, Abbas Mehrabi; Sarabi, Sepideh Bataghva

    2016-01-01

    Purpose: Research has shown that the discursive patterns students use in their email interactions with their teachers are not linguistically and socio-culturally appropriate. Accordingly, the purpose of this paper is to try to explore how socio-cultural conventions influence the Iranian English as a foreign language (EFL) learners' choices of…

  6. Students Writing Emails to Faculty: An Examination of E-Politeness among Native and Non-Native Speakers of English

    Science.gov (United States)

    Biesenbach-Lucas, Sigrun

    2007-01-01

    This study combines interlanguage pragmatics and speech act research with computer-mediated communication and examines how native and non-native speakers of English formulate low- and high-imposition requests to faculty. While some research claims that email, due to absence of non-verbal cues, encourages informal language, other research has…

  7. Managing Discourse in Intercultural Business Email Interactions: A Case Study of a British and Italian Business Transaction

    Science.gov (United States)

    Incelli, Ersilia

    2013-01-01

    This paper investigates native speaker (NS) and non-native speaker (NNS) interaction in the workplace in computer-mediated communication (CMC). Based on empirical data from a 10-month email exchange between a medium-sized British company and a small-sized Italian company, the general aim of this study is to explore the nature of the intercultural…

  8. Cyber-Communic@tion Etiquette: The Interplay between Social Distance, Gender and Discursive Features of Student-Faculty Email Interactions

    Science.gov (United States)

    Boshrabadi, Abbas Mehrabi; Sarabi, Sepideh Bataghva

    2016-01-01

    Purpose: Research has shown that the discursive patterns students use in their email interactions with their teachers are not linguistically and socio-culturally appropriate. Accordingly, the purpose of this paper is to try to explore how socio-cultural conventions influence the Iranian English as a foreign language (EFL) learners' choices of…

  9. Social media, text messaging, and email-preferences of asthma patients between 12 and 40 years old.

    Science.gov (United States)

    Baptist, Alan P; Thompson, Michael; Grossman, Karla Stoermer; Mohammed, Layla; Sy, Annie; Sanders, Georgiana M

    2011-10-01

    Electronic media such as social media (Facebook, Twitter, MySpace), email, and text messaging could be useful in the management of asthma. However, patient use and preferences for electronic media in asthma management is currently unknown. A survey was sent to asthma patients between 12-40 years of age. The survey collected demographic information, use of electronic media, interest in using electronic media to receive asthma information, and interest in using electronic media to communicate with a health care provider about asthma. Free text entries were encouraged. 145 completed surveys were returned. Text messaging, email, and Facebook were used at least weekly by a majority of respondents (82%, 77%, and 65%, respectively). Email was clearly the most preferred method to receive asthma information and to communicate with a physician. There was some interest in using Facebook or text messaging, whereas Myspace and Twitter had minimal interest. On logistic regression analysis, female and Black or Hispanic participants were more likely to have an interest in the use of electronic media for asthma care. Frequent users (>1X/week) of each electronic media type had greater enthusiasm for their incorporation into asthma care. Free text entries revealed that many participants felt social media sites were for connecting with friends rather than for health care, and privacy concerns were also raised. Electronic media offers a novel way to improve asthma care. Email was the most preferred method, though text messaging and social media sites like Facebook may be appropriate for certain patients.

  10. A Cross-Cultural Pragmatic Study of Rapport-Management Strategies in Chinese and English Academic Upward Request Emails

    Science.gov (United States)

    Zhu, Wuhan

    2017-01-01

    This article discusses and compares how Chinese and English postgraduate students manage a harmonious relationship with university instructors by managing rapport and doing relational work in their academic request emails. The rapport-management strategies were explored and then further evaluated in relation to the taxonomies of relational work…

  11. You've Got Mail … ! Using Email Interviews to Gather Academics' Narratives of Their Working Lives

    Science.gov (United States)

    James, Nalita

    2017-01-01

    The paper explores how computer-mediated communication offers space for academics to think and make sense of their experiences in the qualitative research encounter. It draws on a research study that used email interviewing to generate online narratives to understand academic lives and identities through research encounters in virtual space. The…

  12. Assessing the Factors Affecting the Amount of E-Mail Spam Delivery in a Public School District

    Science.gov (United States)

    Yasenchock, David A.

    2013-01-01

    Eighty to ninety percent of e-mail is considered unsolicited commercial communication, or spam. Not only does spam violate the privacy of users, but it also incurs societal costs associated with time-related losses, serves as a vehicle for cyber-crime, and threatens the success of e-commerce by lowering consumer confidence. This quantitative…

  13. Virtual Collaborations in the Spanish Class: From E-Mail to Web Design and CD-ROM Development.

    Science.gov (United States)

    Hellebrandt, Josef

    1999-01-01

    Modern technologies can provide language students with authentic content and contextualized, collaborative learning situations. This article illustrates how e-mail exchanges, Web exercises, and CD-ROM development between students in the United States and organizations in Ecuador can promote contextualized and authentic practice of Spanish language…

  14. Authorship Attribution in the E-mail Domain: A Study of the Effect of Size of Author Corpus and Topic on Accuracy of Identification

    Science.gov (United States)

    2011-03-01

    cyber bullying via e-mail, SMS, and social media outlets such as Facebook and Twitter. Cyber bullies can create an anonymous bully account and proceed...the senders of anonymous derogatory e-mails and reducing cyber bullying . Machine Learning, Supervised Learning Unclassified Unclassified Unclassified...identifying the senders of anonymous derogatory e-mails and reducing cyber bullying . v THIS PAGE INTENTIONALLY LEFT BLANK vi Table of Contents 1 Introduction

  15. PreciseMail anti-spam gateway allows users more control over spam definitions; unwanted email is eliminated with no false positives

    CERN Multimedia

    ten Bruggencate, J

    2003-01-01

    "PreciseMail Anti-Spam Gateway uses a combination of proven heuristic (rules-based) and artificial intelligence technologies that eliminates unwanted spam e-mail at an Internet gateway without filtering critical e-mail messages. Its highly effective filtering engine identifies spam and allows multiple levels of tuning and customization to meet each user's personal e-mail spam filtering requirements" (1 page).

  16. STUDENTS WRITING EMAILS TO FACULTY: AN EXAMINATION OF E-POLITENESS AMONG NATIVE AND NON-NATIVE SPEAKERS OF ENGLISH

    Directory of Open Access Journals (Sweden)

    Sigrun Biesenbach-Lucas

    2007-02-01

    Full Text Available This study combines interlanguage pragmatics and speech act research with computer-mediated communication and examines how native and non-native speakers of English formulate low- and high-imposition requests to faculty. While some research claims that email, due to absence of non-verbal cues, encourages informal language, other research has claimed the opposite. However, email technology also allows writers to plan and revise messages before sending them, thus affording the opportunity to edit not only for grammar and mechanics, but also for pragmatic clarity and politeness.The study examines email requests sent by native and non-native English speaking graduate students to faculty at a major American university over a period of several semesters and applies Blum-Kulka, House, and Kasper’s (1989 speech act analysis framework – quantitatively to distinguish levels of directness, i.e. pragmatic clarity; and qualitatively to compare syntactic and lexical politeness devices, the request perspectives, and the specific linguistic request realization patterns preferred by native and non-native speakers. Results show that far more requests are realized through direct strategies as well as hints than conventionally indirect strategies typically found in comparative speech act studies. Politeness conventions in email, a text-only medium with little guidance in the academic institutional hierarchy, appear to be a work in progress, and native speakers demonstrate greater resources in creating e-polite messages to their professors than non-native speakers. A possible avenue for pedagogical intervention with regard to instruction in and acquisition of politeness routines in hierarchically upward email communication is presented.

  17. A Study on Learning Pre-Algebra Using Interactive Multimedia Courseware Within Collaborative Learning Set-Up and E-Mail Interactions

    Directory of Open Access Journals (Sweden)

    Mohd Sazali Khalid

    2012-04-01

    Full Text Available Many students at diploma level are weak in mathematics even after spending eleven years in Malaysian education system. However, throughout the world there are research studies been done with mixed results using technology and collaborative learning. The objective of this paper is to analyze the effect of learning pre-algebra using interactive courseware with collaborative learning by using STAD set ups with interactive courseware using e-mail facilities during team discussion only. Quasi experimental type research was used. The gain score (differences between post and pre test between the two equivalent groups were obtained. Diploma Information Technology first year students in two different intake years 2009 and 2010 in UTHM were employed. ‘t-test’ results revealed the second group using e-mail is statistically significantly inferior to the group using purelyinteractive multimedia courseware CDiCL only with STAD team discussion. On average participants experienced higher gain scores in the first group (Mean = 3.28, SE=0.433, than participants in thesecond group (M=0.77, SE=0.354. This difference was statistically significant (t (74 = 4.51, p<0.05; however, it did show a medium effect size of r = 0.45. Some clinical interviews and audiovideorecordings were taken to support that teams prefer using conventional collaborative learning method with more group discussions rather than e-mails and facebook in solving problem.

  18. Ways of Expressing Apologies and Thanks in French and Japanese Personal Emails: a Comparison of Politeness

    Directory of Open Access Journals (Sweden)

    - Шанталь Клодель

    2015-12-01

    Full Text Available This article examines the ways in which politeness is used in French and Japanese personal emails (i.e. from one person to another. The data for the study consist of 411 emails from both communities and regrouped by criteria such as the correspondents’ gender, age and relationship (close vs distant; hierarchical vs equal. Two widely studied acts, very present in the French and Japanese data, namely thanking and apologising, are analysed. First of all, the notion of politeness is examined as it is understood in French and Japanese cultures, followed by a discussion of the positioning adopted by the various established approaches to this notion. This leads us to reconsider the concept of face as it is understood in Europe and Asia, the notion of discernment (Ide and the theory of the territory of information (Kamio, as well as to re-examine the approach of politeness in the light of recent research findings. Following this overview, the paper proposes a framework where a distinction between politeness and civility is advocated. In this perspective, the means used to express politeness ( politeness in its broader meaning are based on personal choices: either due to politeness (in a specific meaning or according to social obligations ascribable to civility. More specifically, politeness (in it specific meaning in one side is linked to personal choice. In French for instance, this can result from language used: formal language vs common language ( convier vs inviter ; verbal choices (conditional verbs instead of indicative tenses: je voudrais vs je veux ; syntax (inversion of the subject or not in questions, etc. In Japanese, politeness can be detected through the choice to use of the suffix desu ( kawaii desu ( it is cute when neutral or common language could be suitable ( kawaii ( it is cute . In the other side, civility refers to the obligation to respect social norms. In French, the speaker may have to use the pronoun of address vous (vs tu as

  19. Comparison of face-to-face versus email guided self-help for binge eating: study protocol for a randomised controlled trial.

    Science.gov (United States)

    Jenkins, Paul E; Luck, Amy; Burrows, Alison; Boughton, Nicky

    2014-05-22

    Guided self-help is a recommended first-step treatment for bulimia nervosa, binge eating disorder and atypical variants of these disorders. Further research is needed to compare guided self-help that is delivered face-to-face versus via email. This clinical trial uses a randomised, controlled design to investigate the effectiveness of providing guided self-help either face-to-face or via e-mail, also using a delayed treatment control condition. At least 17 individuals are required per group, giving a minimum N of 51. Symptom outcomes will be assessed and estimates of cost-effectiveness made. Results are proposed to be disseminated locally and internationally (through submission to conferences and peer-reviewed journals), and will hopefully inform local service provision. The trial has been approved by an ethics review board and was registered with ClinicalTrials.gov NCT01832792 on 9 April 2013.

  20. Effectiveness of an email-based intervention helping parents to enhance alcohol-related parenting skills and reduce their children's alcohol consumption: A randomised controlled trial

    NARCIS (Netherlands)

    Wurdak, M.; Kuntsche, E.N.; Wolstein, J.

    2017-01-01

    Aims: Developing and evaluating an email-based intervention (EBI) to enhance alcohol-related parenting skills and reduce alcohol consumption among adolescents. Methods: Over four weeks, participating parents received a weekly email containing scientific findings, practical advice and exercises in

  1. Unsolicited email, does Europe allow spam? : The state of the art of the European legislation with regard to unsolicited commercial communications

    NARCIS (Netherlands)

    Schaub, M.Y.

    2002-01-01

    Unsolicited commercial emails, also referred to as junk-mail or spam, is considered a rude and irritating form of marketing. The sending of unsolicited commercial emails has appeared on the European political agenda more then once. The discussion on this issue evolves around the question whether an

  2. "You Are Such a Great Teacher and I Hate to Bother You But...": Instructors' Perceptions of Students and Their Use of Email Messages with Varying Politeness Strategies

    Science.gov (United States)

    Bolkan, San; Holmgren, Jennifer Linn

    2012-01-01

    In this study we examined the impact of polite student emails on instructors' motivation to work with students and both their perceptions of students' competence and potential for success. Participants were 125 university instructors exposed to one of five hypothetical emails utilizing various politeness strategies accompanying a special request.…

  3. Unsulicited email: does Europe allow spam? : the state of the art of the European legislation with regard to unsolicited commercial communications

    NARCIS (Netherlands)

    Schaub, M.Y.

    2002-01-01

    Unsolicited commercial emails, also referred to as junk-mail or spam, is considered a rude and irritating form of marketing. The sending of unsolicited commercial emails has appeared on the European political agenda more then once. The discussion on this issue evolves around the question whether an

  4. Promoting Linguistic Complexity, Greater Message Length and Ease of Engagement in Email Writing in People with Aphasia: Initial Evidence from a Study Utilizing Assistive Writing Software

    Science.gov (United States)

    Thiel, Lindsey; Sage, Karen; Conroy, Paul

    2017-01-01

    Background: Improving email writing in people with aphasia could enhance their ability to communicate, promote interaction and reduce isolation. Spelling therapies have been effective in improving single-word writing. However, there has been limited evidence on how to achieve changes to everyday writing tasks such as email writing in people with…

  5. An explanatory study of the use of e-mail investor communication by South African listed companies

    Directory of Open Access Journals (Sweden)

    Roelof Baard

    2016-04-01

    Full Text Available Background: Although research shows that almost all listed companies have corporate websites with dedicated investor relations (IR sections that enable companies to ‘push’ information to investors, it was argued that such an asymmetrical approach to communication is insufficient for companies wishing to exercise good IR. The purpose of this study was to test the effectiveness of the Internet to act as a mechanism to achieve more interactive communication between companies and investors.Objectives: The objectives of the study were to measure the responsiveness, timeliness and relevance of companies’ responses to e-mail requests, and to test for the determinants (size, market-to-book ratio, profitability, leverage and liquidity thereof.Method: The mystery investor approach and a content analysis were used to study the e-mail handling performance of companies. The associations between company-specific characteristics were statistically tested.Results: It was found that the e-mail handling performance of companies in this study was poor compared with previous studies. Significant relationships between company size and responsiveness and relevance, and between market-to-book ratio and relevance were reported, as well as between the contact method used to request information and relevance and the use of social media and timeliness.Conclusion: Specific areas where companies could improve their investor communications were identified. The need for further research was discussed to explain some of the relationships found, as well as those not found, in contrast to what was expected. Future research is warranted to examine the relationship between the e-mail handling performance of companies and information asymmetry and the cost of equity of companies.

  6. Self-Help for Depression via E-mail: A Randomised Controlled Trial of Effects on Depression and Self-Help Behaviour.

    Directory of Open Access Journals (Sweden)

    Amy J Morgan

    Full Text Available Self-help or self-management strategies are commonly used to deal with depression, but not all are thought to be helpful. A previous study found that sub-threshold depression symptoms were improved by an e-mail intervention that encouraged the use of evidence-based self-help strategies.To investigate whether these e-mails were effective for adults with a range of depression symptomatology including major depression.The study was a parallel-group randomised controlled trial. Adult participants with any level of depressive symptoms were recruited over the internet from the United Kingdom, Australia, Canada, Ireland, New Zealand and the United States. Participants were randomised to receive a series of e-mails either promoting the use of evidence-based self-help strategies or containing depression information as a control. E-mails were sent automatically twice a week for six weeks. Depression symptoms were assessed with the self-rated Patient Health Questionnaire depression scale (PHQ-9.1736 participants with a wide range of symptom severity were recruited and assigned to active (n = 862 and control (n = 874 groups. However, there was a significant attrition rate, with 66.9% lost to follow-up at post-intervention. Both groups showed large improvements in depression symptoms overall, with no significant difference in improvement at the end of the study (mean difference in improvement 0.35 points, 95% CI: -0.57 to 1.28, d = 0.11, 95% CI: -0.06 to 0.27, although there was a small effect at the study mid-point. Results were similar for the sub-group of participants with major depression. The active group showed small to moderate improvements in self-help behaviour (d = 0.40, 95% CI: 0.23 to 0.56.These results suggest that the e-mails were able to increase participants' use of evidence-based self-help, but that this did not improve depression more than an attention control.NCT01399502.

  7. When my eyes bring pain to my soul, and vice versa: facing preconceptions in email and face-to-face interviews.

    Science.gov (United States)

    Bjerke, Trond N

    2010-12-01

    What are the factors influencing the trustworthiness of data produced in email interviews? The main purpose of this article is to reflect on this issue by discussing two examples from my own experience of conducting email interviews in combination with face-to-face interviews. The main questions were: What different premises guide and shape the interpretation and analysis of subjects as text or as embodiment when interviews are conducted face-to-face or by email? Is the researcher more or less a victim of his or her own imagination and preconceptions when interviewing people via email, relying solely on the written text to understand who the Other is? From a constructivist-inspired interaction perspective, I suggest that other possible strategies of visibility emerge in the interaction between the interviewer and participant in email interviews. These strategies are rooted in the researcher's personal and embodied knowledge of the field under investigation.

  8. Getting better byte by byte: a pilot randomised controlled trial of email therapy for bulimia nervosa and binge eating disorder.

    Science.gov (United States)

    Robinson, Paul; Serfaty, Marc

    2008-03-01

    One hundred and ten people in an university population responded to emailed eating disorder questionnaires. Ninty-seven fulfilling criteria for eating disorders (bulimia nervosa (BN), binge eating disorder (BED), EDNOS) were randomised to therapist administered email bulimia therapy (eBT), unsupported Self directed writing (SDW) or Waiting list control (WLC). Measures were repeated at 3 months. Diagnosis, Beck depression inventory (BDI) and Bulimia investigatory test (BITE) scores were recorded. Follow-up rate was 63% and results must be interpreted cautiously. However significantly fewer participants who had received eBT or SDW fulfilled criteria for eating disorders at follow up compared to WLC. There was no significant difference between eBT and SDW in the analysis of variance (ANOVA), although in separate analyses, eBT was significantly superior to WLC (p < 0.02) and the difference for SDW approached significance (p = 0.06). BDI and BITE scores showed no significant change. For eBT participants there was a significant positive correlation between words written and improvement in BITE severity score. BN, BED and EDNOS can be treated via email.

  9. After critical care: patient support after critical care. A mixed method longitudinal study using email interviews and questionnaires.

    Science.gov (United States)

    Pattison, Natalie; O'Gara, Geraldine; Rattray, Janice

    2015-08-01

    To explore experiences and needs over time, of patients discharged from ICU using the Intensive Care Experience (ICE-q) questionnaire, Hospital Anxiety and Depression Scale (HADS) and EuroQoL (EQ-5D), associated clinical predictors (APACHE II, TISS, Length of stay, RIKER scores) and in-depth email interviewing. A mixed-method, longitudinal study of patients with >48hour ICU stays at 2 weeks, 6 months, 12 months using the ICE-q, HADS, EQ-5D triangulated with clinical predictors, including age, gender, length of stay (ICU and hospital), APACHE II and TISS. In-depth qualitative email interviews were completed at 1 month and 6 months. Grounded Theory analysis was applied to interview data and data were triangulated with questionnaire and clinical data. Data was collected from January 2010 to March 2012 from 77 participants. Both mean EQ-5D visual analogue scale, utility scores and HADS scores improved from 2 weeks to 6 months, (p=Email interviews offer a convenient method of gaining in-depth interview data and could be used as part of ICU follow-up. Crown Copyright © 2015. Published by Elsevier Ltd. All rights reserved.

  10. Patient Use of Email, Facebook, and Physician Websites to Communicate with Physicians: A National Online Survey of Retail Pharmacy Users.

    Science.gov (United States)

    Lee, Joy L; Choudhry, Niteesh K; Wu, Albert W; Matlin, Olga S; Brennan, Troyen A; Shrank, William H

    2016-01-01

    Patient-physician communication often occurs outside the clinic setting; many institutions discourage electronic communication outside of established electronic health record systems. Little empirical data are available on patient interest in electronic communication and Web-based health tools that are technically feasible but not widely available. To explore patient behavior and interest in using the Internet to contact physicians. National cross-sectional online survey. A sample of 4,510 CVS customers with at least one chronic condition in the household was used to target patients with chronic conditions and their caregivers. Subjects were identified from a national panel of over 100,000 retail pharmacy customers. Of those sampled, 2,252 responded (50.0 % response rate). Survey measures included demographic and health information, patient use of email and Facebook to contact physicians, and patient interest in and use of Web-based tools for health. A total of 37 % of patients reported contacting their physicians via email within the last six months, and 18 % via Facebook. Older age was negatively associated with contacting physicians using email (OR 0.57 [95 % CI 0.41-0.78]) or Facebook (OR 0.28 [0.17-0.45]). Non-white race (OR 1.61 [1.18-2.18] and OR 1.82 [1.24-2.67]) and caregiver status (OR 1.58 [1.27-1.96] and OR 1.71 [1.31- 2.23]) were positively associated with using email and Facebook, respectively. Patients were interested in using Web-based tools to fill prescriptions, track their own health, and access health information (37-57 %), but few were currently doing so (4-8 %). In this population of retail pharmacy users, there is strong interest among patients in the use of email and Facebook to communicate with their physicians. The findings highlight the gap between patient interest for online communication and what physicians may currently provide. Improving and accelerating the adoption of secure Web messaging systems is a possible solution that

  11. 电子邮件长期保存的困扰%Some Confusions in E-mail Long-Term Preservation

    Institute of Scientific and Technical Information of China (English)

    臧国全; 张晓彤

    2015-01-01

    Compared with other digital resources, e-mail has its own characteristics. There are some confusions during the e-mail long-term preservation that includes the following aspects : (1) e-mail capturing confusions, which come from the diverse locations of e-mail storage because of the system operating mechanism; (2) e-mail metadata confusions, which come from the dififculties in implementing both the authenticity of automatically assigned value to some metadata elements and the integrity of e-mail threads; (3) e-mail body preservation confusions, which come from the dififcult choices of the format information's preservation; (4)legal confusions, which come from the separation of e-mail preservation rights and the lack of e-mail preservation laws and regulations; (5)e-mail system policy confusions, which come from the break of e-mail threads as a result of the automatic deletion of messages; (6)e-mail user behavior confusions, which come from the diverse uses of the e-mail account.%与其他类型数字资源相比,电子邮件有其自身的特殊性,对其实施长期保存面临诸多困扰.这些困扰包括:邮件获取的困扰,产生于邮件系统运行机制导致邮件存放位置的多元化;邮件元数据的困扰,产生于多个元素自动取值的真实性以及邮件线程的完整性难以保障;邮件正文的保存困扰,产生于格式信息保存的选择困难;法律困扰,产生于该类数字资源保存权的分散且法律法规的缺失;邮件系统方针的困扰,产生于邮件自动删除的方针导致邮件线程建立的困难;邮件用户行为的困扰,产生于用户使用邮件账户的多样化.

  12. Use of email, cell phone and text message between patients and primary-care physicians: cross-sectional study in a French-speaking part of Switzerland.

    Science.gov (United States)

    Dash, Jonathan; Haller, Dagmar M; Sommer, Johanna; Junod Perron, Noelle

    2016-10-05

    Physicians' daily work is increasingly affected by the use of emails, text messages and cell phone calls with their patients. The aim of this study was to describe their use between primary-care physicians and patients in a French-speaking part of Switzerland. A cross-sectional mail survey was conducted among all primary-care physicians of Geneva canton (n = 636). The questionnaire focused on the frequency of giving access to, type of use, advantages and disadvantages of email, cell phone calls and text messages communication between physicians and patients. Six hundred thirty-six questionnaires were mailed, 412 (65 %) were returned and 372 (58 %) could be analysed (37 refusals and three blanks). Seventy-two percent physicians gave their email-address and 74 % their cell phone number to their patients. Emails were used to respond to patients' questions (82 %) and change appointments (72 %) while cell phone calls and text messages were used to follow patients' health conditions. Sixty-four percent of those who used email communication never discussed the rules for email exchanges, and 54 % did not address confidentiality issues with their patients. Most commonly identified advantages of emails, cell phone calls and text messages were improved relationship with the patient, saving time (for emails) and improving the follow-up (for cell phone and text messages). The main disadvantages included misuse by the patient, interference with private life and lack of reimbursement. These tools are widely used by primary-care physicians with their patients. More attention should be paid to confidentiality, documentation and reimbursement when using email communication in order to optimize its use.

  13. Periodic email prompts to re-use an internet-delivered computer-tailored lifestyle program: influence of prompt content and timing.

    Science.gov (United States)

    Schneider, Francine; de Vries, Hein; Candel, Math; van de Kar, Angelique; van Osch, Liesbeth

    2013-01-31

    Adherence to Internet-delivered lifestyle interventions using multiple tailoring is suboptimal. Therefore, it is essential to invest in proactive strategies, such as periodic email prompts, to boost re-use of the intervention. This study investigated the influence of content and timing of a single email prompt on re-use of an Internet-delivered computer-tailored (CT) lifestyle program. A sample of municipality employees was invited to participate in the program. All participants who decided to use the program received an email prompting them to revisit the program. A 2×3 (content × timing) design was used to test manipulations of prompt content and timing. Depending on the study group participants were randomly assigned to, they received either a prompt containing standard content (an invitation to revisit the program), or standard content plus a preview of new content placed on the program website. Participants received this prompt after 2, 4, or 6 weeks. In addition to these 6 experimental conditions, a control condition was included consisting of participants who did not receive an additional email prompt. Clicks on the uniform resource locator (URL) provided in the prompt and log-ins to the CT program were objectively monitored. Logistic regression analyses were conducted to determine whether prompt content and/or prompt timing predicted clicking on the URL and logging in to the CT program. Of all program users (N=240), 206 participants received a subsequent email prompting them to revisit the program. A total of 53 participants (25.7%) who received a prompt reacted to this prompt by clicking on the URL, and 25 participants (12.1%) actually logged in to the program. There was a main effect of prompt timing; participants receiving an email prompt 2 weeks after their first visit clicked on the URL significantly more often compared with participants that received the prompt after 4 weeks (odds ratio [OR] 3.069, 95% CI 1.392-6.765, P=.005) and after 6 weeks (OR 4

  14. The use of physician-patient email: a follow-up examination of adoption and best-practice adherence 2005-2008.

    Science.gov (United States)

    Menachemi, Nir; Prickett, Charles T; Brooks, Robert G

    2011-02-25

    Improved communication from physician- patient emailing is an important element of patient centeredness. Physician-patient email use has been low; and previous data from Florida suggest that physicians who email with patients rarely implement best-practice guidelines designed to protect physicians and patients. Our objective was to examine whether email use with patients has changed over time (2005-2008) by using two surveys of Florida physicians, and to determine whether physicians have more readily embraced the best-practice guidelines in 2008 versus 2005. Lastly, we explored the 2008 factors associated with email use with patients and determined whether these factors changed relative to 2005. Our pooled time-series design used results from a 2005 survey (targeting 14,921 physicians) and a separate 2008 survey (targeting 7003 different physicians). In both years, physicians practicing in the outpatient setting were targeted with proportionally identical sampling strategies. Combined data from questions focusing on email use were analyzed using chi-square analysis, Fisher exact test, and logistic regression. A combined 6260 responses were available for analyses, representing a participation rate of 28.2% (4203/14,921) in 2005 and 29.4% (2057/7003) in 2008. Relative to 2005, respondents in 2008 were more likely to indicate that they personally used email with patients (690/4148, 16.6% vs 408/2001, 20.4%, c(2) (1) = 13.0, P email with patients did not change from 2005 to 2008 (2.9% vs 59/2001, 2.9%). Interest among physicians in future email use with patients was lower in 2008 (58.4% vs 52.8%, c(2) (2) = 16.6, P email best practices remained low in 2008. When comparing 2005 and 2008 adherences with each of the individual guidelines, rates decreased over time in each category and were significantly lower for 4 of the 13 guidelines. Physician characteristics in 2008 that predicted email use with patients were different from 2005. Specifically, in multivariate analysis

  15. Efficacy of a nurse-led email reminder program for cardiovascular prevention risk reduction in hypertensive patients: a randomized controlled trial.

    Science.gov (United States)

    Cicolini, G; Simonetti, V; Comparcini, D; Celiberti, I; Di Nicola, M; Capasso, L M; Flacco, M E; Bucci, M; Mezzetti, A; Manzoli, L

    2014-06-01

    Many strategies have been evaluated to improve the prevention and control of cardiovascular (CVD) risk factors. Nursing telephonic and tele-counseling individualized lifestyle educational programs have been found to improve blood pressure control and adherence to lifestyle recommendation. This study tested the efficacy of a nurse-led reminder program through email (NRP-e) to improve CVD risk factors among hypertensive adults. All participants received usual CVD prevention and a guideline-based educational program. Subjects in the NRP-e group also received weekly email alerts and phone calls from a nurse care manager for 6 months. Emails contained a reminder program on the need for adherence with a healthy lifestyle based upon current guidelines. Follow-up visits were scheduled at 1, 3 and 6 months after enrollment; randomization was made centrally and blood samples were evaluated into a single laboratory. The final sample consisted of 98 (control) and 100 (NRP-e) subjects (mean age 59.0 ± 14.5 years; 51.0% males). After 6 months, the following CVD risk factors significantly improved in both groups: body mass index, alcohol and fruit consumption, cigarette smoking, adherence to therapy hours, systolic and diastolic blood pressure, fasting blood glucose, low-density lipoproteins (LDL) and total cholesterol, triglycerides, and physical activity. In the NRP-e group, however, the prevalence of several behaviors or conditions at risk decreased significantly more than in the control group: obesity (-16%), low fruit consumption (-24%), uncontrolled hypertension (-61%), LDL (-56%), and total cholesterol (-40%). The NRP-e improved a range of CVD risk factors. The program had low costs, required only an average of <20 min per day in addition to normal practice, and may deserve further evaluation for the inclusion among existing care management approaches. Copyright © 2013 Elsevier Ltd. All rights reserved.

  16. A Trusted Web E-mail Service System%可信Web电子邮件服务系统

    Institute of Scientific and Technical Information of China (English)

    程芳权; 宋伟; 任毅; 江小华; 黄小婷; 陈立; 彭智勇

    2011-01-01

    With the increasing importance of Web E-mail services for the exchange of information of people, the security of the privacy mail data has been an issue drawing attention widely. In the existing Web E-mail system, the mail data, which is out of the user's physical control, will suffer the attack from the external attacker on internet and the malicious system administrator. This paper shows a trusted Web E-mail service system where the mail data is locally encrypted and decrypted in the client by users, which ensures the data security in flying on network and resting on the service provider. The trusted data sharing, the efficient search over encrypted data and the use control of the privacy data are achieved through the combination of the key management, the cryptograph index and the privacy protection technologies. In a word, the privacy mail data can be controlled in security by the data owner and credibly managed by the service provider in trusted Web E-mail service system.%随着Web电子邮件服务对于人们重要信息交流越来越不可或缺,用户邮件数据的安全问题也备受关注.当前Web电子邮件服务系统中,脱离用户物理控制的邮件数据面临系统外部网络攻击者和系统内部不可信管理员两大威胁.展现了基于用户前端数据加解密的可信Web电子邮件服务系统,该系统确保了邮件数据在传输和存储过程的完全密文状态.并通过密钥管理、密文查询和隐私保护等技术的有机结合,保证邮件数据共享的彻底安全、查询的准确高效以及使用的隐私控制.最终实现了隐私邮件数据被拥有者用户安全控制和被邮件服务商可信管理.

  17. A MODALIZAÇÃO EM E-MAILS PRODUZIDOS EM AMBIENTE ORGANIZACIONAL: UMA ABORDAGEM SITUADA NO INTERACIONISMO SOCIODISCURSIVO

    OpenAIRE

    Garcia Klautau, Eneida; Pessoa, Fátima

    2012-01-01

    O objetivo geral deste artigo é abordar, com base no modelo descendente de produção e análise textual do interacionismo sociodiscursivo, a relação entre os parâmetros de um contexto organizacional de interlocução e as operações de gestão do texto realizadas pelo enunciador frente às suas representações acerca desses parâmetros. Especificamente, busca-se explicar a presença/ausência da modalização em e-mails produzidos em um ambiente organizacional regido por um sistema de ge...

  18. IntegraTUM Teilprojekt E-Mail: Aufbau eines mandantenfähigen Groupware-Services und seine Integration in Identity Management und E-Mail Infrastruktur der Technischen Universität München

    Science.gov (United States)

    Diehn, Max

    Die E-Mail-Infrastruktur an der Technischen Universität München (TUM) ist historisch bedingt sehr heterogen und komplex. Viele Einrichtungen müssen wertvolle Arbeitskraft auf die Administration eigener Mailserver verwenden. Auf der anderen Seite wird bei einigen Einrichtungen der Ruf nach Groupware-Funktionalitäten wie z.B. gemeinsame Kalender immer lauter. Das Teilprojekt E-Mail stellt einen zentralen Mail- und Groupware-Service bereit, der den Einrichtungen ermöglichen soll, den Betrieb eigener Server und zugehöriger Systeme (etwa lokaler Benutzerverwaltungen) für diesen Zweck aufzugeben und diese Dienste an das Teilprojekt E-Mail zu migrieren, ohne ihre Verwaltungshoheit oder ihre Maildomains aufgeben zu müssen. Dieser Service versteht sich als eine Ergänzung zur bestehenden Grundversorgung der TUM mit den Maildiensten des myTUM-Mailers, ist mandantenfähig aufgebaut und kann daher künftig neben der TUM auch weiteren Organisationen im Münchner Wissenschaftsnetz zur Verfügung gestellt werden.

  19. Mobilização política por e-mail: uma análise da Avaaz como ator-rede

    Directory of Open Access Journals (Sweden)

    Marcelo Castañeda

    2015-04-01

    Full Text Available The article analyzes the Avaaz (an organization that uses the internet intensively, their practices and operating flows in light of the actor-network theory developed by Bruno Latour. To do this, the paper begins by presenting this theoretical model that seeks to insert material objects in sociological analysis in order to characterize the organization of campaigns as a heterogeneous group composed of human and non-human that are configured to each campaign launched. The article focuses on the characterization of Avaaz members, their distribution around the world, e-mail alerts that are sent to members, the participation opportunities offered, the different themes and targets built each campaign.

  20. Social presence reinforcement and computer-mediated communication: the effect of the solicitor's photography on compliance to a survey request made by e-mail.

    Science.gov (United States)

    Guéguen, Nicolas; Jacob, Céline

    2002-04-01

    Personal information is scarce in computer-mediated communication. So when information about the sender is attached with an e-mail, this could induce a positive feeling toward the sender. An experiment was carried out where a male and a female student-solicitor, by way of an e-mail, requested a student-subject to participate in a survey. In half of the cases, a digital photograph of the solicitor appeared at the end of the e-mail. Results show that subjects agreed more readily to the request in the experimental condition than in the control condition where no digital photograph was sent with the e-mail. The importance of social information on computer-mediated communication is used to explain such results.

  1. Technique Development and Application:Construction of a Secure and Reliable E-mail System with Sendmail and InterScan

    Institute of Scientific and Technical Information of China (English)

    PANWei; CHENLiaoyuan; LIYongge

    2003-01-01

    Today, e-mail has become part of communication, and is the core of information publication among the enterprises. So as to can reach the rapid, low-cost and reliable email demand, many companies and individuals use the service offered by Linux as the solution satisfying the demands. Sondmail is a freeware which acts as mail server in Linux.The age-old development history of Sendmail ensures its transplantability, stability and the technique support.

  2. E-mail survey with an attached Form: an off-line data collection alternative via the internet

    Directory of Open Access Journals (Sweden)

    Alexandre Reis Graeml

    2008-09-01

    Full Text Available As people start incorporating the Internet in their daily routine, using its resources to carry out their usual activities, it becomes easier to use the Web's environment also to collect data by means of electronic surveys. This paper reports the use of a quantitative research survey, which used an "intelligent" MS Word form, which was sent through e-mail to industrial manufacturers in the state of Sao Paulo - Brazil. The response speed was much better than usually achieved using the conventional procedure of sending the survey through regular mail. The return rate was satisfactory and the cost was much lower than usually incurred, due to the virtualization of the contact with the respondent. The initiative was so successful that the authors decided to share their experience with the academic community, contributing to the maturing of the e-mail survey methodology. Although the focus of this study was strictly academic, the authors believe that the adopted procedures are also suitable for market research, feedback gathering and other entrepreneurial needs.

  3. Impact of sending email reminders of the legal requirement for posting results on ClinicalTrials.gov: cohort embedded pragmatic randomized controlled trial.

    Science.gov (United States)

    Maruani, Annabel; Boutron, Isabelle; Baron, Gabriel; Ravaud, Philippe

    2014-09-19

    To evaluate the impact of sending an email to responsible parties of completed trials that do not comply with the Food and Drug Administration Amendments Act 801 legislation, to remind them of the legal requirement to post results. Cohort embedded pragmatic randomized controlled trial. Trials registered on ClinicalTrials.gov. 190 out of 379 trials randomly selected by computer generated randomization list to receive the intervention (personalized emails structured as a survey and sent by one of us to responsible parties of the trials, indirectly reminding them of the legal requirement and potential penalties for non-compliance). The primary outcome was the proportion of results posted on ClinicalTrials.gov at three months. The secondary outcome was the proportion posted at six months. In a second step, two assessors blinded to the intervention group collected the date of the first results being received on ClinicalTrials.gov. A post hoc sensitivity analysis excluding trials wrongly included was performed. Among 379 trials included, 190 were randomized to receive the email intervention. The rate of posting of results did not differ at three months between trials with or without the intervention: 36/190 (19%) v 24/189 (13%), respectively (relative risk 1.5, 95% confidence interval 0.9 to 2.4, P=0.096) but did at six months: 46/190 (24%) v 27/189 (14%), 1.7, 1.1 to 2.6, P=0.014. In the sensitivity analysis, which excluded 48/379 trials (13%), 26/190 (14%) and 22/189 (12%), respectively, results were significant at three months (relative risk 5.1, 1.1 to 22.9, P=0.02) and at six months (4.1, 1.3 to 10.6, P=0.001). Sending email reminders about the FDA's legal requirement to post results at ClinicalTrials.gov improved significantly the posting rate at six months but not at three months.Trial registration ClinicalTrials.gov NCT01658254. © Maruani et al 2014.

  4. A Comparative Study of the Perceptions of End Users in the Eastern, Western, Central, Southern and Northern Regions of Saudi Arabia About Email Spam and Dealing with it

    Directory of Open Access Journals (Sweden)

    Hasan Alkahtani

    2015-05-01

    Full Text Available This paper presents the results of a survey of email users in different regions of Saudi Arabia about email SPAM. The survey investigated the nature of email SPAM, how email users in the eastern, western, central, southern and northern dealt with it, and the efforts made to combat it. It also investigated the effectiveness of existing Anti-SPAM filters in detecting Arabic and English email SPAM. 1,500 participants located in the eastern, western, central, southern and northern regions of Saudi Arabia were surveyed and completed surveys were collected from 1,020 of the participants. The results showed that there were different definitions for email SPAM based on different users’ opinions in Saudi Arabia. The results showed that the participants in the central and western regions were more aware of SPAM than the participants in other regions. The results revealed that the volume of email SPAM was different from region to another and the volume of SPAM received by the participants in the northern and central regions was larger than that received in other regions. The results indicated that the majority of email SPAM received by the participants in different regions was written in English. The results showed that the most common type of email SPAM received in Arabic was emails related to forums and in English was phishing and fraud, and business advertisements. The results also showed that a few participants in all regions responded to SPAM and the average of the participants who responded to SPAM was larger in the southern region than other regions. The results showed that most of the participants were not aware of Anti-SPAM programs and the participants in the central region were more aware of Anti-SPAM programs than the participants in other regions. The results showed that the participants in all regions estimated that the existing Anti-SPAM programs were more effective in detecting English SPAM than Arabic SPAM. The results showed that most

  5. Research and Implementation of a Phishing Email Monitoring System%校园网钓鱼邮件监控系统的研究与实现

    Institute of Scientific and Technical Information of China (English)

    蔡洪民

    2013-01-01

    随着计算机网络的发展,垃圾邮件问题和邮件欺骗问题变得越来越严重,给广大网民带来巨大危害。为了保障网络公共安全,减轻垃圾邮件和钓鱼邮件对网络用户的危害,基于深度包检测技术设计实现了一个针对钓鱼邮件的监控系统。通过数据包捕获技术和协议解析技术对电子邮件进行还原,实现对邮件内容的检查,结合关键字匹配技术实现了对垃圾邮件和钓鱼邮件的检测和报警。实验证明,通过协议分析与数据包还原技术,可以对垃圾邮件和敏感邮件进行过滤。%With the development of Internet,the problem of spam and phishing email becomes more and more serious,it has done harm to cyber citizens. In order to strengthen the public network security,reduce the harm of spam and phishing email,design and realize a moni-toring system for phishing email based on DPI. Adopt the packet capturing technology and protocol analysis technology to email rever-ting,succeeding in inspecting the email content,then apply keywords matching technology to detect the phishing email and give a warning for it. The experiments show that it can detect the spam and phishing email by the protocol analysis technology and packet restoration technology.

  6. Email Marketing: Maximizing Potential%实现电子邮件营销效果最大化

    Institute of Scientific and Technical Information of China (English)

    李冉

    2007-01-01

    在互联网提供的服务中,电子邮件(Email)一直占据重要位置。不得不承认,Email对我们的工作和生活都产生了巨大的影响。而所谓的电子邮件营销(Email Marketng),是在用户事先许可的前提下,通过Email的方式向目标用户传递有价值信息的一种网络营销手段。与传统的营销方式相比有着低成本、高效率;范围广、速度快;针对性强、灵活性高的优点。

  7. RETENSI DAN INTRUNSI FLUOR PADA PERMUKAAN EMAIL SETELAH APLIKASI DENGAN SUBSTRAT IKAN TERI (Stolephorus sp.

    Directory of Open Access Journals (Sweden)

    Harun Asyiq Gunawan

    2015-08-01

    Full Text Available Background: Topical fluoridation recently is still the main caries prevention method. Fluoride application on enamel surface is aimed to convert the hydroxyapatite (HA crystal to fluoroapatite (FA or hydroxyfluoroapatite (HFA form. Fluoride retention and intrusion onto enamel after fluoride application, therefore, are the most important factors to ensure the formation of FA and HFA crystals. Natural fluoride sources can be obtained from sea fishes, like teri (anchovy fish. Teri medan (S baganesis and teri jengki (S insularis are the most popular teri fishes in Indonesia, and they are known to have high fluoride content, 17-34 ppm. This research objectives are to measure fluoride retention and intrusion on enamel surface after application using teri medan and teri jengki substrate. Material and Method : 8 extracted third impacted molars were used. During the research, those teeth are immersed in ono-ionic aquadest (aquadem. Each tooth were cut bucco-lingually and mesio-distally, to obtain 4 enamel specimens. The specimens (totally 32 the divided into 3 major groups. 12 each for EDS group, and intrusion groups, and 8 for control. The EDS group divided into 2 sub-groups for application with teri medan and teri jengki. Similar procedure were done for intrusion and control groups. All EDS and intrusion specimens, then, immersed in the 5% teri substrate for 5 minutes, flushed with aquadem, then stored in aquadem for 3 hours. Procedure above then repeated 26 times. Control specimens were immersed in saline for 5 minutes, before flush and stored in the aquadem solution. All the EDS specimens, examinated using LEø Scanning and micro analysis electron microscope. Intrusion groups evaluated with Olypus BX41TF fluorescence microscope. Results : Fluoride retention for teri jengki groups is 5,28% and for teri medan group is 3,26%, while for control group is 1,94%. Fluoride intrusion for teri jengki group is 11,48 µm, teri medan 8,74 µm, and for control

  8. PERBEDAAN PENYERAPAN FLUOR PADA EMAIL GIGI SULUNG ANTARA TUMPATAN SEMEN IONOMER KACA DAN KOMPOMER

    Directory of Open Access Journals (Sweden)

    Sandra Wibisono

    2015-07-01

    Full Text Available The purpose of this study was to determine fluor uptake difference in enamel of primary teeth between Glass Ionomer Cement and Compomer filling. The sample was 30 maxillary first incisors divided into 2 groups. Each group consisted of 15 teeth. The first group was filled with Glass Ionomer Cement (Fuji IX ART, GC and the second group was filled with Compomer (Dyract, Dentsply. The measurement was in percentage, using Energy Dispersive X-Ray Spectrophotometry. T test exhibited significant differenc of fluor uptake in enamel of primary teeth between Glass Ionomer and Compomer gilling (t=1.1, p= 0.0001. Fluor uptake of Glass Ionomer Cemeng filling in enamel of priary teeth much more compare to Compomer filling.

  9. Corrective feedback via e-mail on the correct use of past tense ...

    African Journals Online (AJOL)

    panah

    2015-11-09

    Nov 9, 2015 ... acquisition and retention of correct past form of irregular verbs by ... Since the seventies, Second Language Acquisition (SLA) researchers have investigated the role of .... the researcher to have a control group similar to.

  10. Factors That Impact Nurses’ Utilization of Electronic Mail (E-Mail).

    Science.gov (United States)

    1998-05-21

    is whether the data collected by the researcher reflects the truth (Polit & Hungler, 1995). Lincoln and Guba (1985) reference the term trustworthiness...involved the informal sharing of information and ideas with fellow research consultants playing the role, as suggested by Lincoln and Guba , of "the...groups. According to Lincoln and Guba (1985) it is not the goal of qualitative research to provide an index of transferability; however, it should

  11. Pengaruh Durasi Aplikasi Asam Fosfat 37% terhadap Kekuatan Geser Restorasi Resin Komposit pada Email Gigi Tetap

    Directory of Open Access Journals (Sweden)

    Juretta Sintawati

    2013-06-01

    Full Text Available Phosphoric acid etching has been widely used to achieve a strong and long lasting mechanical bonding between composite resin restoration and tooth structure. The aim of this study was to evaluate the bond strength between the enamel of permanent teeth and the composite resin restoration by measuring the shear bond strength after different durations of etching. In total 27 premolar teeth were divided into 3 groups where the enamel of the buccal surface was etched with 37% phosphoric acid for 5″, 15″, and 25″ before placing the composite resin restoration. After keeping the teeth inside an incubator for 24 hours, the shear bond strength was measured using a universal testing machine Shimazu AG-5000 at a crosshead speed of 0.5 mm/min. ANOVA was used for statistical analysis of the results, with p<0.05 assumed to imply significance. The mean shear bond strength after etching for 5″, 15″, and 25″ was 16.1 MPa, 17.3 MPa and 19.0 MPa, respectively. The results of ANOVA showed significant difference between the 3 groups. However, subsequent Tukey test showed significant difference between 5″ and 25″ of etching (p<0.05, but no significant difference between between the 5″ and 15″ groups nor between the 15″ and 25″ groups (p>0.05. Conclusion: Shear bond strength of the composite resin on the permanent teeth enamel increased with increasing etching time. Significant difference was showed between 5″ and 25″ of etching time.DOI: 10.14693/jdi.v15i2.65

  12. Pengaruh Durasi Aplikasi Asam Fosfat 37% terhadap Kekuatan Geser Restorasi Resin Komposit pada Email Gigi Tetap

    OpenAIRE

    Juretta Sintawati; Sri Harini Soemartono; Margaretha Suharsini

    2013-01-01

    Phosphoric acid etching has been widely used to achieve a strong and long lasting mechanical bonding between composite resin restoration and tooth structure. The aim of this study was to evaluate the bond strength between the enamel of permanent teeth and the composite resin restoration by measuring the shear bond strength after different durations of etching. In total 27 premolar teeth were divided into 3 groups where the enamel of the buccal surface was etched with 37% phosphoric acid for 5...

  13. The digital divide: Internet and e-mail use by the elderly.

    Science.gov (United States)

    Kiel, Joan M

    2005-03-01

    The elderly are the fastest growing population group. Along with their rise in numbers is their volume of use of health care services, in both number and intensity. Since many elderly live alone, can their independence be maintained such that health care costs can decrease? With the rise in technology utilization, specifically the Internet, can the elderly utilize the Internet for health care purposes? Survey methodologies conducted for this study showed that the elderly can learn to use computers and are looking for methods to stay connected and be informed. Further longitudinal research is needed to measure clinical outcomes.

  14. PENGARUH MUSIK TERHADAP PENURUNAN KADAR MINERAL PERMUKAAN EMAIL PADA KONDISI DEFISIENSI PROTEIN

    Directory of Open Access Journals (Sweden)

    Aynie Yunita

    2008-06-01

    Full Text Available Effect of Music on the Decreased Enamel-Surface Mineral Content of Rat Teeth with Protein Deficiency. Protein deficiency could lead to enamel hypoplasia and decreased level of Growth Hormone (GH. Cell proliferation and synthesis of enamel-matrix which affect the mineralization process of the tissue, are stimulated by GH. Music was reported to be able to increase GH. Objective: Analyzing the effect of music exposure since prenatal on the decreased Calcium (Ca and Phosphor (P content of the enamel-surface of rat-pups in protein-deficiency condition. Experiment: Thirty-two rats on the first day of gestation period were divided into groups with and without music. Music were given twice daily, lullabies every early morning, and classic, baroc, and romantic music every evening. At 2-days-old the rat-pups were further divided into groups with normal diet contained 19.5% protein, and groups with protein deficiency diet contained 7.5% protein. At 2- and 5-weeks-old, 6 rat pups from each group were randomly terminated, the mandibles were dissected out, cut into hemi-mandibles, cleaned, and dried. The percentage of Ca and P content of the lower-incisor enamel-surface was analyzed using Energy Dispersive X-ray (EDX, data were analyzed using One Way ANOVA with α 0.05. Results: At 2-weeks-old, the Ca (8.6% and P (10.6% contents of enamel-surface of pups with normal-diet and music were higher than the Ca (3.9% and P(7.9% contents of enamel-surface of pups with protein-deficiency with no music (P<0.029. Among 5-weeks-old pups with protein-deficiency, the P content (6.1% of enamel-surface of pups with music were higher than P content (2.8% of enamel-surface of pups with no music (P<0.034. Conclusion: Music has a potency to minimize the decreased Ca and P enamel content on the protein deficiency condition

  15. The effectiveness of email-based exercises in promoting psychological wellbeing and healthy lifestyle: a two-year follow-up study.

    Science.gov (United States)

    Torniainen-Holm, Minna; Pankakoski, Maiju; Lehto, Tuomas; Saarelma, Osmo; Mustonen, Pekka; Joutsenniemi, Kaisla; Suvisaari, Jaana

    2016-05-17

    Web-based interventions provide a possibility to enhance well-being in large groups of people. Only a few studies have studied the effectiveness of the interventions and there is no information on the sustainability of the effects. Study aims were to investigate both the short (2-month) and long-term (2-year) effects of email-based training for mental health and lifestyle. Persons who completed an 'Electronic Health Check', as advertised in a TV program, were offered a chance to participate in email-based interventions. The baseline questionnaire was completed by 73 054 people, with 42 761 starting interventions, and 16 499 people participating in at least one of the follow-ups. Persons who did not choose to start the interventions served as controls. At baseline, the intervention group had a higher level of stress and lower gratitude and confidence in the future than the control group. Both groups showed improvement in the level of stress, but improvement was more marked in the intervention group (P < .001 for both time points). In confidence in the future and gratitude, people who chose interpersonal interventions showed significant improvements at both time points (P < .001), whereas those choosing lifestyle interventions showed improvement only at the 2-month follow-up. Participants who had done the exercises according to instructions had the most sustained improvements in measures of psychological health at the 2-year follow-up. As for lifestyle, people who had started lifestyle interventions increased their exercise (P < .001 at both time points). Internet-based interventions are feasible for mental health promotion and should be available for people interested in improving their psychological well-being and lifestyle.

  16. Email-Based Informed Consent: Innovative Method for Reaching Large Numbers of Subjects for Data Mining Research

    Science.gov (United States)

    Lee, Lesley R.; Mason, Sara S.; Babiak-Vazquez, Adriana; Ray, Stacie L.; Van Baalen, Mary

    2015-01-01

    Since the 2010 NASA authorization to make the Life Sciences Data Archive (LSDA) and Lifetime Surveillance of Astronaut Health (LSAH) data archives more accessible by the research and operational communities, demand for data has greatly increased. Correspondingly, both the number and scope of requests have increased, from 142 requests fulfilled in 2011 to 224 in 2014, and with some datasets comprising up to 1 million data points. To meet the demand, the LSAH and LSDA Repositories project was launched, which allows active and retired astronauts to authorize full, partial, or no access to their data for research without individual, study-specific informed consent. A one-on-one personal informed consent briefing is required to fully communicate the implications of the several tiers of consent. Due to the need for personal contact to conduct Repositories consent meetings, the rate of consenting has not kept up with demand for individualized, possibly attributable data. As a result, other methods had to be implemented to allow the release of large datasets, such as release of only de-identified data. However the compilation of large, de-identified data sets places a significant resource burden on LSAH and LSDA and may result in diminished scientific usefulness of the dataset. As a result, LSAH and LSDA worked with the JSC Institutional Review Board Chair, Astronaut Office physicians, and NASA Office of General Counsel personnel to develop a "Remote Consenting" process for retrospective data mining studies. This is particularly useful since the majority of the astronaut cohort is retired from the agency and living outside the Houston area. Originally planned as a method to send informed consent briefing slides and consent forms only by mail, Remote Consenting has evolved into a means to accept crewmember decisions on individual studies via their method of choice: email or paper copy by mail. To date, 100 emails have been sent to request participation in eight HRP

  17. PENATALAKSANAAN GIGI HIPOPLASIA EMAIL

    Directory of Open Access Journals (Sweden)

    Iki Siti Indiarti

    2015-08-01

    Full Text Available Enamel hypoplasia is a defect in the formation of the enamel matrix, cause enamel surface defects and irregularities. The defective enamel formation may be caused by systemic or local factors. The clinical features of enamel hypoplasia may be thin enamel groove or pit of surface enamel. The conditions of the primary or permanent dentition considerably disturb for the tooth function, tooth sensitivity and poor esthetics. For the pediatric dentist, the long term aim of treatment is to maintain the maximum amount of hard dental tissue possible until the patient reaches an age at which advanced restorative techniques can be employed to rehabilitate the dentition. However, in the short term, it is frequently necessary to intervene to relieve the patient's symptoms o sensitivity, to improve esthetics, and to prevent the loss of vertical dimension.

  18. A content analysis of client e-mails in guided internet-based cognitive behavior therapy for depression

    Directory of Open Access Journals (Sweden)

    Natalie Svartvatten

    2015-05-01

    Full Text Available The relationship between what a client writes when communicating with an online therapist and treatment outcome in internet-based cognitive behavior therapy (ICBT is largely unknown. The aim of this study was to address if written correspondence from the client to the therapist correlates with outcome and treatment completion. A total of 29 participants with mild to moderate depression were included from an ongoing randomized controlled trial targeting depression. Content analysis involving ten categories was performed on all emails and module responses sent by the participants to their internet therapist. A total of 3756 meaning units were identified and coded. Significant positive correlations were found between change in depression and statements in the two categories “observing positive consequences” (r = .49 and “alliance” (r = .42. Treatment module completion correlated with seven categories. The result suggests that text dealing with alliance and observing positive consequences can be used as indicators of how the treatment is progressing. This study suggests that written correspondence from an online client can be divided into ten categories and the frequency of those can be used by internet therapists to individualize treatment and perhaps make ICBT more effective.

  19. The NASA Astrophysics Data System Free Access to the Astronomical Literature On-Line and through Email

    CERN Document Server

    Eichhorn, G; Grant, C S; Kurtz, M J; Murray, S S

    2001-01-01

    The Astrophysics Data System (ADS) provides access to the astronomical literature through the World Wide Web. It is a NASA funded project and access to all the ADS services is free to everybody world-wide.The ADS Abstract Service allows the searching of four databases with abstracts in Astronomy, Instrumentation, Physics/Geophysics, and the LANL Preprints with a total of over 2.2 million references. The system also provides access to reference and citation information, links to on-line data, electronic journal articles, and other on-line information. The ADS Article Service contains the articles for most of the astronomical literature back to volume 1. It contains the scanned pages of all the major journals (Astrophysical Journal, Astronomical Journal, Astronomy & Astrophysics, Monthly Notices of the Royal Astronomical Society, and Solar Physics), as well as most smaller journals back to volume 1. The ADS can be accessed through any web browser without signup or login. Alternatively an email interface is ...

  20. Serviço de orientação via e-mail: novas considerações

    Directory of Open Access Journals (Sweden)

    Ivelise Fortim

    Full Text Available Este artigo se propõe a analisar o aumento crescente da demanda do serviço de orientação psicológica via e-mail, desenvolvido pelo Núcleo de Pesquisa de Psicologia e Informática da Clínica Psicológica Ana Maria Poppovic, da Pontifícia Universidade Católica de São Paulo. Partindo de uma breve retrospectiva dos serviços do núcleo, do perfil dos usuários, dos tipos de pedidos e dos temas centrais das mensagens nos anos 2003 e 2004, este texto apresenta novas reflexões sobre uma área de pesquisa muito proeminente dentro da Psicologia, incluindo elementos atuais às hipóteses anteriormente formuladas. As recentes transformações e atualizações tecnológicas pedem constantes análises, que são necessárias à promoção de qualidade e ética no exercício da profissão mediado pelo computador.

  1. The Application of the Electronic Documentary Mining Technology to the E-mail Monitoring System%电子文档挖掘技术在电子邮件监控系统中的应用

    Institute of Scientific and Technical Information of China (English)

    蔡立军; 张大方

    2003-01-01

    The e-mail monitoring system is a real-time tool to monitor the content of the e-mail. However, the characteristics (the hypersensinve reformation) in the e-mail extracted systematically by the existing e-mail monitoring system can not sometimes perfectly reflect the practical conditions, meanwhile, the monitoring model established by it is not perfect enough. Therefore, it is easy to have wrong alarm or fail to alarm. According to such conditions, this paper discusses in great details the application of the electronic documentary mining technology in the e-mail monitoring system, and puts forward to adopt the structural model of the electronic documentary mining technology in the e-mail monitoring system.

  2. Speech-based interaction with in-vehicle computers: the effect of speech-based e-mail on drivers' attention to the roadway.

    Science.gov (United States)

    Lee, J D; Caven, B; Haake, S; Brown, T L

    2001-01-01

    As computer applications for cars emerge, a speech-based interface offers an appealing alternative to the visually demanding direct manipulation interface. However, speech-based systems may pose cognitive demands that could undermine driving safety. This study used a car-following task to evaluate how a speech-based e-mail system affects drivers' response to the periodic braking of a lead vehicle. The study included 24 drivers between the ages of 18 and 24 years. A baseline condition with no e-mail system was compared with a simple and a complex e-mail system in both simple and complex driving environments. The results show a 30% (310 ms) increase in reaction time when the speech-based system is used. Subjective workload ratings and probe questions also indicate that speech-based interaction introduces a significant cognitive load, which was highest for the complex e-mail system. These data show that a speech-based interface is not a panacea that eliminates the potential distraction of in-vehicle computers. Actual or potential applications of this research include design of in-vehicle information systems and evaluation of their contributions to driver distraction.

  3. A study of the effective factors on users’ loyalty towards email services: Investigating e-quality, e-satisfaction, and e-trust

    Directory of Open Access Journals (Sweden)

    Yaghoub Hosseini

    2014-03-01

    Full Text Available Nowadays, widespread use of email for interpersonal and business communication encourages the marketers to pay much more attention to the e-mail marketing usage. To reach this success, the retention and attraction of customers are matters of great importance. Therefore, considering the customers’ loyalty towards e-mail services is tremendously significant. This study aims at investigating the effective factors on the customers’ loyalty towards e-mails services. The study is an applied research and qualitative-survey type. To accomplish the research purpose, an appropriate questionnaire was designed and distributed among the students in Persian Gulf University. The obtained data were analyzed using path analysis. The findings show that the e-quality, e-satisfaction, and e-trust have the most positive effect on the customers’ e-loyalty respectively. Moreover, e-quality reveals a significant and positive effect on both e-satisfaction and e-trust. Finally, e-satisfaction has a significant impact on e-trust.

  4. Comparing Traditional Journal Writing with Journal Writing Shared over E-mail List Serves as Tools for Facilitating Reflective Thinking: A Study of Preservice Teachers

    Science.gov (United States)

    Kaplan, Diane S.; Rupley, William H.; Sparks, Joanne; Holcomb, Angelia

    2007-01-01

    To determine the conditions that would best encourage reflection in journal writing of preservice teachers in field-based reading internships, the degree of reflective content found in self-contained traditional journals was compared to the reflective content found in journal entries shared over e-mail list serves. Participants were 56 preservice…

  5. Communicating with Parents of Children with Special Needs in Saudi Arabia: Parents' and Teachers' Perceptions of Using Email for Regular and Ongoing Communication

    Science.gov (United States)

    Dubis, Snaa; Bernadowski, Carianne

    2015-01-01

    The purpose of this study, by Snaa Dubis from Salman Bin Abdu Aziz University, Saudi Arabia, and Robert Morris University, USA, and Carianne Bernadowski from Robert Morris University, was to investigate parents' and special education teachers' perceptions of using email as a component of parental involvement in the academic and/or behavioural…

  6. High mobile phone ownership, but low Internet and email usage among pregnant, HIV-infected women attending antenatal care in Johannesburg.

    Science.gov (United States)

    Clouse, Kate; Schwartz, Sheree R; Van Rie, Annelies; Bassett, Jean; Vermund, Sten H; Pettifor, Audrey E

    2015-03-01

    We investigated mobile phone usage amongst HIV-positive pregnant women attending antenatal services in a primary care clinic in Johannesburg (n = 50). We conducted a semi-structured interview and asked them about their mobile phone, Internet and email use. The median age of the women was 28 years, 36% had moved one or more times in the past year, and most were employed or recently employed, albeit earning low wages. Nearly all women (94%) reported that they did not share their phone and 76% of the SIM cards were registered to the woman herself. The median time with the current phone was one year (range 1 month-6 years) and the median time with the current phone number was three years (range 1 month-13 years). Even though 42% of the participants were from outside South Africa, they all had mobile phone numbers local to South Africa. About one-third of respondents reported Internet use (30%) and about one-fifth reported using email (18%). Overall, 20% accessed the Internet and 10% accessed email on their mobile phone. Mobile phone interventions are feasible amongst HIV-positive pregnant women and may be useful in prevention of mother-to-child transmission of HIV (PMTCT). Email and Internet-based interventions may not yet be appropriate. © The Author(s) 2015 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  7. 基于文本特征分析的钓鱼邮件检测%Detecting Phishing Email Based on Text Features Analysis

    Institute of Scientific and Technical Information of China (English)

    彭富明; 张卫丰; 彭寅

    2012-01-01

    A kind of phishing email detection based on text analysis is proposed. First, we deleted the non-text part of emails by email parsers. For the remaining part of the emails, we got the links and other contents,and extract ten features. According to the analysis of these features,the emails will be classified into ham and phishing by using machine learning method to train and forecast the emails. We improved the existed phishing detection which is based on the analysis of websites'links. By combining with the new trend of phishing emails development, we propose a method to extract some new features. The experiments shows that the proposed method demnonstrates a good performance in trems of recalling rate, false positive rate,and detection of phishing websites.%提出了一种基于邮件文本特征的钓鱼邮件检测方法.首先利用邮件解析器将邮件中非文本部分内容剔除,然后提取邮件剩余部分中存在的网站链接及其他内容,并在此基础上提取10种特征.针对这些特征,利用机器学习方法对其进行训练和预测,将邮件分类为普通邮件和钓鱼邮件.我们改进了以往一些针对网站链接分析的检测方法,并结合钓鱼邮件发展的新趋势,提出了6种新的特征.实验证明,本方法结合了新的钓鱼邮件特征,有效地提高了钓鱼邮件检测的召回率以及精准率,同时误判率有所降低.并且,本方法稍加改进以后就能用于钓鱼网站的检测.

  8. A produção escrita do gênero e-mail nos livros didáticos de língua inglesa

    Directory of Open Access Journals (Sweden)

    Sílvia Mônica Moura Lima

    2015-07-01

    Full Text Available Resumo: As interações sociais vêm proporcionando novas formas de comunicação impulsionadas pelas novas tecnologias. Gêneros como o e-mail tem nos proporcionados variações criativas na língua, sobretudo em sua escrita (CRYSTAL, 2006. Considerando o livro didático (LD como um gênero do discurso, e refletindo sobre essa conjuntura digital que incidem em nossas interações, objetivamos nesse trabalho analisar as atividades de escrita de e-mails em duas coleções didáticas de inglês para o ensino médio, no intuito de verificar nesses gêneros evidências sobre a relação de seus elementos regularizadores como propósitos, estilos, temas, papeis sociais, estrutura composicional e evento deflagrador, ou seja, propõe-se, em linhas gerais, verificar o comportamento do gênero e-mail nas atividades propostas pelos livros, refletindo sobre suas influências. Para dar sustentação a essa pesquisa, fundamentamo-nos nas leituras de Bakhtin (1997[1979], Miller (2012[1984], Swales (2004, Bazerman(2009, Devitt (2004, Bunzen (2008, dentre outros. Os resultados das analises evidenciaram que as atividades de escrita do e-mail são influenciadas pelos propósitos comunicativos do livro didático, os quais se regularizam em aspectos linguísticos e temáticos, refletindo sobremaneira nos demais elementos como estilos, papeis sociais, estrutura composicional e outros, dessa maneira, pouco espelhando a natureza sociorretórica do e-mail na vida social.

  9. Survey Email Scheduling and Monitoring in eRCTs (SESAMe): A Digital Tool to Improve Data Collection in Randomized Controlled Clinical Trials.

    Science.gov (United States)

    Skonnord, Trygve; Steen, Finn; Skjeie, Holgeir; Fetveit, Arne; Brekke, Mette; Klovning, Atle

    2016-11-22

    Electronic questionnaires can ease data collection in randomized controlled trials (RCTs) in clinical practice. We found no existing software that could automate the sending of emails to participants enrolled into an RCT at different study participant inclusion time points. Our aim was to develop suitable software to facilitate data collection in an ongoing multicenter RCT of low back pain (the Acuback study). For the Acuback study, we determined that we would need to send a total of 5130 emails to 270 patients recruited at different centers and at 19 different time points. The first version of the software was tested in a pilot study in November 2013 but was unable to deliver multiuser or Web-based access. We resolved these shortcomings in the next version, which we tested on the Web in February 2014. Our new version was able to schedule and send the required emails in the full-scale Acuback trial that started in March 2014. The system architecture evolved through an iterative, inductive process between the project study leader and the software programmer. The program was tested and updated when errors occurred. To evaluate the development of the software, we used a logbook, a research assistant dialogue, and Acuback trial participant queries. We have developed a Web-based app, Survey Email Scheduling and Monitoring in eRCTs (SESAMe), that monitors responses in electronic surveys and sends reminders by emails or text messages (short message service, SMS) to participants. The overall response rate for the 19 surveys in the Acuback study increased from 76.4% (655/857) before we introduced reminders to 93.11% (1149/1234) after the new function (P<.001). Further development will aim at securing encryption and data storage. The SESAMe software facilitates consecutive patient data collection in RCTs and can be used to increase response rates and quality of research, both in general practice and in other clinical trial settings.

  10. Supporting patients treated for prostate cancer: a video vignette study with an email-based educational program in general practice.

    Science.gov (United States)

    Jiwa, Moyez; Halkett, Georgia; Meng, Xingqiong; Pillai, Vinita; Berg, Melissa; Shaw, Tim

    2014-02-26

    Men who have been treated for prostate cancer in Australia can consult their general practitioner (GP) for advice about symptoms or side effects at any time following treatment. However, there is no evidence that such men are consistently advised by GPs and patients experience substantial unmet need for reassurance and advice. The intent of the study was to evaluate a brief, email-based educational program for GPs to manage standardized patients presenting with symptoms or side effects months or years after prostate cancer treatment. GPs viewed six pairs of video vignettes of actor-patients depicting men who had been treated for prostate cancer. The actor-patients presented problems that were attributable to the treatment of cancer. In Phase 1, GPs indicated their diagnosis and stated if they would prescribe, refer, or order tests based on that diagnosis. These responses were compared to the management decisions for those vignettes as recommended by a team of experts in prostate cancer. After Phase 1, all the GPs were invited to participate in an email-based education program (Spaced Education) focused on prostate cancer. Participants received feedback and could compare their progress and their performance with other participants in the study. In Phase 2, all GPs, regardless of whether they had completed the program, were invited to view another set of six video vignettes with men presenting similar problems to Phase 1. They again offered a diagnosis and stated if they would prescribe, refer, or order tests based on that diagnosis. In total, 64 general practitioners participated in the project, 57 GPs participated in Phase 1, and 45 in Phase 2. The Phase 1 education program was completed by 38 of the 57 (59%) participants. There were no significant differences in demographics between those who completed the program and those who did not. Factors determining whether management of cases was consistent with expert opinion were number of sessions worked per week (OR 0

  11. Foreign language learning using e-mail in a task-oriented perspective: Interuniversity experiments in communication and collaboration

    Science.gov (United States)

    Barson, John; Frommer, Judith; Schwartz, Michael

    1993-12-01

    From 1988 to 1990 several collaborative “cross-country” intermediate French classes at Harvard and Stanford became one class. Students combined their efforts and insights in the accomplishment of a semester-long task, in most cases the publication of a student newspaper or magazine, using the electronic mail (e-mail) network to contact each other, elaborate their plans, and bring their projects to successful conclusion. Additional experiments of a similar nature took place between Harvard and the University of Pittsburgh (in the spring of 1990) and between Stanford and the University of Pittsburgh during 1991 1993. This paper suggests that this type of task-oriented learning through distance-communication is applicable at many different course levels and has considerable merit as an approach to teaching and learning. The key phases of this task-based model are presented along with technological information regarding computers and networks, as a guide to colleagues interested in pursuing similar lines of experimental teaching. Also included are samples of student messages, with their varied and often highly colorful discourse features, which attest to the motivation of students and reveal the strong personal investment made by the participants as they join hands across the miles in a productive, communication-based enterprise. The language and learning styles generated by technology and computers fully deserve closer investigation by researchers and teaching practitioners alike. The authors summarize the experiments, discuss assessment, and present research issues, concluding that good pedagogy and quality technology must share a vision of what can be accomplished in this rapidly evolving educational work place.

  12. Impact of an automated email notification system for results of tests pending at discharge: a cluster-randomized controlled trial.

    Science.gov (United States)

    Dalal, Anuj K; Roy, Christopher L; Poon, Eric G; Williams, Deborah H; Nolido, Nyryan; Yoon, Cathy; Budris, Jonas; Gandhi, Tejal; Bates, David W; Schnipper, Jeffrey L

    2014-01-01

    Physician awareness of the results of tests pending at discharge (TPADs) is poor. We developed an automated system that notifies responsible physicians of TPAD results via secure, network email. We sought to evaluate the impact of this system on self-reported awareness of TPAD results by responsible physicians, a necessary intermediary step to improve management of TPAD results. We conducted a cluster-randomized controlled trial at a major hospital affiliated with an integrated healthcare delivery network in Boston, Massachusetts. Adult patients with TPADs who were discharged from inpatient general medicine and cardiology services were assigned to the intervention or usual care arm if their inpatient attending physician and primary care physician (PCP) were both randomized to the same study arm. Patients of physicians randomized to discordant study arms were excluded. We surveyed these physicians 72 h after all TPAD results were finalized. The primary outcome was awareness of TPAD results by attending physicians. Secondary outcomes included awareness of TPAD results by PCPs, awareness of actionable TPAD results, and provider satisfaction. We analyzed data on 441 patients. We sent 441 surveys to attending physicians and 353 surveys to PCPs and received 275 and 152 responses from 83 different attending physicians and 112 different PCPs, respectively (attending physician survey response rate of 63%). Intervention attending physicians and PCPs were significantly more aware of TPAD results (76% vs 38%, adjusted/clustered OR 6.30 (95% CI 3.02 to 13.16), pemail notification represents a promising strategy for managing TPAD results, potentially mitigating an unresolved patient safety concern. ClinicalTrials.gov (NCT01153451).

  13. Don't LOL at virtual visits. Technology is allowing more doctors and patients to consult via e-mail, and insurance companies are reimbursing for it.

    Science.gov (United States)

    Robeznieks, Andis

    2007-10-15

    In today's "I-gotta-know-now" society, many patients turn to e-mail to contact doctors on matters, as opposed to waiting for an in-person office visit. Now, some insurers are actually reimbursing doctors for their electronic time, which is also known as a "virtual visit." Internist Paul Tang, left, doesn't consider the practice mainstream yet. "No one is reimbursing us," he says.

  14. Research and Design of E-mail Safety Based on CORBA Technology%基于CORBA的电子邮件安全研究与设计

    Institute of Scientific and Technical Information of China (English)

    樊全会

    2012-01-01

    Based on the security issues of e-mail,this paper studies CORBA technology and e-mail deeply.Introduce CORBA technology into e-mail.Add CORBA interception mechanism at the server-side of e-mail and introduce filter mechanism of CORBA message notification during sending and receiving messages,which not only ensure e-mail reliability and security,but also prevent the sending of spam.%基于目前电子邮件安全问题,通过对CORBA技术及电子邮件的研究,把CORBA技术引入电子邮件中,在电子邮件服务器端引入CORBA拦截机制,在消息收发过程中引入CORBA通知服务的过滤机制,不仅是为了保证邮件的可靠安全,同时可以阻止垃圾邮件的发送。

  15. CORPORATE E-MAIL SERVICE GOOGLE APPS AS AN INSTRUMENT OF ACTIVITY OF ORGANIZATIONAL-EDUCATIONAL UNITS OF THE HIGHER EDUCATIONAL INSTITUTION

    Directory of Open Access Journals (Sweden)

    Кarpenko А.

    2017-03-01

    Full Text Available The advantages of usage of cloud technologies, particularly, of Gmail service Google Apps in work of organizational-educational units of higher educational institutions are analyzed in this work. The main accents are put concerning usage of corporate e-mail Gmail service Google Apps, with the help of which informational-analytical support of activity of organizational-educational units of the University is provided. The author of the publication underlines key advantages of Gmail and analyses its opportunities. Main characteristics of corporate e-mail Gmail service Google Apps are described. It is identified that implementation of corporate e-mail Gmail service Google Apps is a part of creation of certain information system, that will ensure united information space of a modern higher educational institution. Effective organization of educational process, that was used by methodist of organizational-educational units (Scientific-methodological centre of research, scientific projects and programs of Borys Grinchenko Kyiv University in the work of corporate mail Gmail service Google Aps is analyzed and presented. It is identified, that creation and improvement of mechanisms of building corporate content with the help of Gmail service Google Apps will allow the collaborators of organizational-educational units of the higher educational institution to plan and organize educational process. Such organization of educational process optimizes the activity of organizational-educational units of higher educational institutions.

  16. Exploring the reach and program use of hello world, an email-based health promotion program for pregnant women in the Netherlands

    Directory of Open Access Journals (Sweden)

    van Dongen Johanna M

    2012-09-01

    Full Text Available Abstract Background In 2006, the Dutch government initiated Hello World, an email-based program promoting healthy lifestyles among pregnant women through quizzes with pregnancy-related questions. In 2008, an updated version was released. The present study aimed to (1 examine the reach of Hello World and the representativeness of its users for all pregnant women in the Netherlands, (2 explore the relationship between program engagement and lifestyle characteristics, and (3 explore the relationship between the program content participants accessed (content on smoking, physical activity, and nutrition and their lifestyle characteristics. Methods Data from 4,363 pregnant women were included. After registration, women received an online questionnaire with demographic and lifestyle questions. To evaluate their representativeness, their demographic characteristics were compared with existing data for Dutch (pregnant women. Women were classified on the following lifestyle characteristics: smoking, nutrition, physical activity, and pre-pregnancy weight status. Program use was tracked and the relationships between lifestyle characteristics, program engagement, and the percentage of smoking, physical activity, and nutrition questions accessed after opening a quiz were explored using Mann–Whitney U tests and Kruskal-Wallis tests. Results Hello World reached ±4% of its target population. Ten percent of participants were low educated and 22% immigrants. On average, women received 6.1 (SD:2.8 quiz emails and opened 32% of the associated quizzes (2.0, SD:2.1. A significant positive association was found between the number of quizzes opened and the number of healthy lifestyle characteristics. After opening a quiz, women accessed most smoking, nutrition, and physical activity questions. Significant relationships were found between several lifestyle characteristics and the percentage of smoking, physical activity, and nutrition questions accessed. However

  17. Exploring the reach and program use of Hello World, an email-based health promotion program for pregnant women in the Netherlands.

    Science.gov (United States)

    van Dongen, Johanna M; van Poppel, Mireille N M; Milder, Ivon E J; van Oers, Hans A M; Brug, Johannes

    2012-09-22

    In 2006, the Dutch government initiated Hello World, an email-based program promoting healthy lifestyles among pregnant women through quizzes with pregnancy-related questions. In 2008, an updated version was released.The present study aimed to (1) examine the reach of Hello World and the representativeness of its users for all pregnant women in the Netherlands, (2) explore the relationship between program engagement and lifestyle characteristics, and (3) explore the relationship between the program content participants accessed (content on smoking, physical activity, and nutrition) and their lifestyle characteristics. Data from 4,363 pregnant women were included. After registration, women received an online questionnaire with demographic and lifestyle questions. To evaluate their representativeness, their demographic characteristics were compared with existing data for Dutch (pregnant) women. Women were classified on the following lifestyle characteristics: smoking, nutrition, physical activity, and pre-pregnancy weight status. Program use was tracked and the relationships between lifestyle characteristics, program engagement, and the percentage of smoking, physical activity, and nutrition questions accessed after opening a quiz were explored using Mann-Whitney U tests and Kruskal-Wallis tests. Hello World reached ±4% of its target population. Ten percent of participants were low educated and 22% immigrants. On average, women received 6.1 (SD:2.8) quiz emails and opened 32% of the associated quizzes (2.0, SD:2.1). A significant positive association was found between the number of quizzes opened and the number of healthy lifestyle characteristics. After opening a quiz, women accessed most smoking, nutrition, and physical activity questions. Significant relationships were found between several lifestyle characteristics and the percentage of smoking, physical activity, and nutrition questions accessed. However, between-group differences were small, quiz topics were

  18. 基于Email信箱的agent迁移和通信机制的设计和实现%Design and Implementation of an Email-Box-Based Mechanism of Agent Migration and Communication

    Institute of Scientific and Technical Information of China (English)

    张小蕾; 马勤; 张建莹; 陶先平; 吕建

    2003-01-01

    Mobile agent currently is a hot spot among research fields of Internet technology. The deployment of mo-bile agents over network usually needs extra infrastructure for agent migration and communication,which adds to thedifficulty of popularizing MA systems. We present in this paper an Email-box-based mechanism of agent migrationand communication,which is built on top of the formerly developed MOON-EAMS system. This mechanism,basedon Email formatting skills,utilizes Email for data transfer,and offers a loosely coupled option of agent migration andcommunication,which ,compared to related works ,obtains the advantage of easy implementation,and reduces the riskof network connection failure.

  19. Spam Filtering of Chinese Text Email Via Lasso%基于套索(Lasso)的中文垃圾邮件过滤

    Institute of Scientific and Technical Information of China (English)

    徐征; 刘遵雄; 张贤龙

    2014-01-01

    Text email data depicted with vector space model are of high dimensionality and sparsity, which are not suitable for establishing email filtering classification model. Generally, such data should be reduced before classifi-er training. Lasso regression is a multivariate linear model based on l1 regularization, which can estimate model pa-rameters while selecting the variables simultaneously. In this paper, the approaches to email classification based on Lasso are proposed. Also, the Lasso classification model and the logistical model with the selected term are es-tablished. Besides, simulation experiments with TREC06C are carried out, and the results show that logistic regres-sion model plus the term selected with Lasso achieves better performances.%使用向量空间模型表示的文本邮件数据高维而稀疏,不利于邮件过滤分类模型的建立,通常需在分类器训练前进行维数约减。Lasso回归是一种基于l1正则化的多元线性模型,其在模型参数估计的同时实现了变量选择。提出使用Lasso回归进行垃圾邮件过滤,建立Lasso回归邮件分类模型、Lasso回归词条选择结合逻辑回归的分类模型,结合中文文本垃圾邮件数据集TREC06C进行垃圾邮件过滤实验。实验结果表明Lasso回归词条选择结合逻辑回归的邮件分类模型性能更佳。

  20. Kurumsal Bilgi Kaynağı Olarak E-posta Yönetim Sistemleri = E-mail Management Systems as an Enterprise Information Resource

    Directory of Open Access Journals (Sweden)

    Külcü, Özgür

    2012-01-01

    Full Text Available Çalışmada, e-posta kullanımı ve yönetimine ilişkin uluslararası koşullar incelenmekte, bu çerçevede Türkiye’de 28 kurum örneğinde gerçekleştirilen anket verileri değerlendirilmektedir. Betimleme yönteminin kullanıldığı çalışmada literatür incelemesi ve anket tekniklerine dayanarak gerekli veriler elde edilmiştir. Araştırmada e-posta kullanımına ilişkin elde edilen verilerin, ilgili alanda sistemler geliştirmeye çalışan araştırmacılara yardımcı olması beklenmektedir. Kurumsal e-posta yönetimine ilişkin temel sorunlar arasında mesajların üretimi, düzenlenmesi, ayıklanması ve uzun süre korunmasını içeren e-posta yönetim sistemlerinin geliştirilmesi yer almaktadır. Ayrıca insan kaynakları, mali ve idari konuların yönetimi ile belge ve arşiv yönetimi çalışmalarını kapsamına alan, içerisine e-posta yönetiminin de dâhil olduğu sistemlerin bütünleştirilmesi güncel araştırma konuları arasındadır. / This study examines the universal usage and management of e-mail communication and compares with the data, gathered from 28 Turkish institutions. This is a descriptive research in nature and the quantitative data were collected through surveys. It is expected that the results one-mail communication and its usage styles will shed a ligth into researcher who are working on system development. One of the basic problems of organizational e-mail management systems are lack of e-mail systems including message creation, maintenance, disposition, and long term preservation. Furthermore, the results indicate that integration of human resources management, financial and administrative management systems and archival management systems with e-mail managment system is another major problem.

  1. Analytics the Scaling Behavior of Social Relations Pattern in Email Communication Records%基于电子邮件通信记录的社会关系模式标度行为研究

    Institute of Scientific and Technical Information of China (English)

    刘红玲; 郝进欣

    2013-01-01

    This article using the email communication database in a large community between people, analysis to explore the human dynamics on individual and group level. On Individual level, the studying finds the satistical properties of in-terevent time distribution by individual's email send, receive and reply in the community to meet the power-law distribution . On group level, separate the activity of group s email send, receive and reply in the community into three clusters; studying the scale feature of human behavior a in community cluster; found that the time characteristic of cluster shows the power-law index and activity in line with positive relationship. Analysis the power-law index in community member' s behavior of send email, it in line with the Gaussian distribution. The result obtain a more comprehensive understanding of hunman behavior satistical properties on the basis of previous analysis.%利用某大型社区人们之间电子邮件通信数据库,对人类动力学在个体和群体层面进行分析探究.个体层面,研究社区中个体发送、接收、回复电子邮件的时间间隔统计特性均满足幂律分布;群体层面,将社区人群根据接收、发送电子邮件活跃度分为3个集群,分析集群人类行为的标度特性,发现集群含时特性幂律指数与活跃度正相关,分析社区成员发送电子邮件行为幂律指数a值,符合高斯分布.此结论在前人分析基础上对人类行为统计特征获得更全面的认识.

  2. What a rude e-mail! Examining the differential effects of incivility versus support on mood, energy, engagement, and performance in an online context.

    Science.gov (United States)

    Giumetti, Gary W; Hatfield, Andrea L; Scisco, Jenna L; Schroeder, Amber N; Muth, Eric R; Kowalski, Robin M

    2013-07-01

    Existing research on workplace incivility has demonstrated an association with a host of negative outcomes, including increased burnout, turnover intentions, and physical symptoms. With the rise in Internet communication over the last decade, interpersonal mistreatment has spilled over to the Internet, but little is known about the impact of incivility communicated via e-mail on employee psychological and performance outcomes. The current study presents a within-subjects experiment wherein incivility and support were manipulated in a laboratory-based simulated workplace setting. Eighty-four participants completed a series of math tasks while interacting with either an uncivil or a supportive supervisor via e-mail. Data were collected on energy, cardiac activity, mood, task performance, and engagement. Findings indicate that participants reported higher levels of negative affect and lower levels of energy after working with the uncivil supervisor than with the supportive supervisor. Additionally, participants performed significantly worse on the math tasks and had lower engagement in the uncivil condition than the supportive condition, and these relationships were mediated by energy. No differences were found in cardiac activity between the two conditions. Results are discussed in terms of their implications for the 21st century world of work. PsycINFO Database Record (c) 2013 APA, all rights reserved.

  3. An e-mail delivered CBT for sleep-health program for college students: effects on sleep quality and depression symptoms.

    Science.gov (United States)

    Trockel, Mickey; Manber, Rachel; Chang, Vickie; Thurston, Alexandra; Taylor, Craig Barr; Tailor, Craig Barr

    2011-06-15

    We examined the effects of a cognitive behavioral self-help program (Refresh) to improve sleep, on sleep quality and symptoms of depression among first-year college students. Students in one residence hall (n = 48) participated in Refresh and students in another residence hall (n = 53) participated in a program of equal length (Breathe) designed to improve mood and increase resilience to stress. Both programs were delivered by e-mail in 8 weekly PDF files. Of these, 19 Refresh program participants and 15 Breathe program participants reported poor sleep quality at baseline (scores ≥ 5 on the Pittsburgh Sleep Quality Index [PSQI]). Participants completed the PSQI and the Center for Epidemiological Studies-Depression Scale (CES-D) at baseline and post-intervention. Among students with poor sleep (PSQI > 5) at baseline, participation in Refresh was associated with greater improvements in sleep quality and greater reduction in depressive symptoms than participation in Breathe. Among students with high sleep quality at baseline there was no difference in baseline to post-intervention changes in sleep (PSQI) or depressive symptom severity (CES-D). A cognitive behavioral sleep improvement program delivered by e-mail may be a cost effective way for students with poor sleep quality to improve their sleep and reduce depressive symptoms. An important remaining question is whether improving sleep will also reduce risk for future depression.

  4. Italian via email: from an online project of learning and teaching towards the development of a multi-cultural discourse community

    Directory of Open Access Journals (Sweden)

    Marina Mozzon-McPherson

    1996-12-01

    Full Text Available The project originally started in January 1994 and involved the creation of an email-based interactive Italian-speaking community (ISC in the form of a discussion list ('Due chiacchiere in amicizia'. It was initially limited to on-campus learners of Italian or 'real' Italians. When the project started, the aims were: • to provide online support for students who needed extra help in the learning process; • to support learning motivation through one-to-one communication with the tutor; • to provide the opportunity for additional language practice; • to encourage students to reflect on both the language process and content; • to provide a 'special niche' where learners from different nationalities, backgrounds and experiences could 'meet' with Italians and have the opportunity to explore the socio-cultural dimension.

  5. 基于AOP技术的邮件日志系统研究%An email log system based on AOP technology

    Institute of Scientific and Technical Information of China (English)

    刘新强; 韩阳峰

    2014-01-01

    大多数软件都采用日志记录系统的关键操作,而且把日志代码与业务代码交织在一起,并散布到关键操作的业务逻辑中。本人在研发邮件服务系统的过程中,采用面向方面编程(Aspect Oriented Programming,AOP)技术将邮件日志与邮件服务的业务逻辑分离,并把日志单独作为一个模块来实现,然后使用代理的方法将日志功能与业务联接在一起,组合成一个完整的软件系统。这种设计方法增强了日志模块的独立性和可重用性,提高了系统的灵活性与可维护性。%Most software uses the logging system to record the key operations, and the logging code is usually intertwined and spread into the critical business logic operations. In this paper, taking developing an email service system as an example, we use aspect-oriented programming (AOP) technology to implement the logging system which is separated from email service code and become a single module. Then we use the proxy method to join the logging function and the business operations, building a complete software system. This design paradigm enhance the independence, reusability of the logging module and improves the flexibility and maintainability of the system.

  6. Apprendere dagli studenti prima di entrare in classe. La comunicazione tra studenti delle superiori e insegnanti in formazione iniziale con l'email

    Directory of Open Access Journals (Sweden)

    Alison Cook-Sather

    2015-10-01

    Full Text Available Questo articolo presenta uno studio svolto nell’ambito di un progetto di ricerca in cui, nell’arco di un intero semestre accademica, è prevista la comunicazione sistematica per email fra studenti universitari e studenti della scuola superiore. I primi frequentano dei corsi di laurea tenuti da due college nel nordest degli Stati Uniti per poter ottenere l’abilitazione come docenti, mentre i secondi studiano presso delle scuole superiori di secondo livello situate nello stesso territorio. Dallo studio emerge che lo scambio di comunicazione fra i due gruppi, che avviene prima che gli studenti universitari comincino le prime esperienze pratiche in classe, genera una serie di risultati interessanti. Secondo entrambi i gruppi, le comunicazioni: (1 favoriscono le creazione di legami più personalizzati rispetto a quelli che generalmente si formano nei vincoli organizzativi e nei limiti dei ruoli tipici dei corsi universitari; 2 determinano, in modo più o meno positivo, le modalità di comunicazione proprie dei partecipanti; (3 favoriscono l’analisi critica e la riflessione; (4 offrono ai partecipanti la possibilità di capire meglio il punto di vista degli altri; e (5 costituiscono una traccia persistente delle interazioni. Gli scambi di email creano una specie di spazio liminale - una zona spazio-tempo intermedio in cui sia i futuri insegnanti che gli studenti svolgono ruoli diversi da quelli abituali - consentendo ai partecipanti al progetto di provare nuovi modi di essere, sviluppare nuovi modi di interagire e sperimentare dei ruoli diversi nell’ottica di capire meglio la loro idea personale di identità professionale.

  7. Corrective feedback via e-mail on the correct use of past tense among Iranian EFL learners

    Directory of Open Access Journals (Sweden)

    Fatemeh Alipanahi

    2015-11-01

    Full Text Available This study explores the differential effect of two types of corrective feedback strategies - explicit and implicit - on the acquisition and retention of correct past form of irregular verbs by Iranian English as Foreign Language (EFL learners. Sixty out of 80 pre-intermediate EFL learners were selected as the participants, based on their performance on Key English Test (KET; their scores were between one standard deviation (SD above and below the mean (M. Thereafter, they were randomly assigned into two experimental groups: the explicit group (N = 30 who received explicit corrective feedback and the implicit group (N = 30, who received implicit feedback. Results indicate that the explicit group outperformed the implicit group on the immediate and delayed post-tests. The findings of this study have theoretical and pedagogical implications for teachers. Feedback strategy provides teachers with information on effective teaching and student comprehension, and encourages them to use technology in a way that reduces anxiety and facilitates social learning.

  8. The effect of anchovy substrate application to fluor retention rate on Sprague Dawley rat tooth email (in vivo)

    Science.gov (United States)

    Zabrina, S.; Puspitawati, R.; Gunawan, H. A.

    2017-08-01

    Usage of anchovies (Stolephorus insularis), which contain a high fluoride concentration in a CaF2 compound, needs to be examined as a topical fluoridative agent. Aim: To study the effects of an anchovy substrate application, either by chewing or smearing, in increasing fluoride retention of enamel. Fourteen Sprague Dawley rats were divided into five groups: baseline, experimental (feeding and smearing), and negative controls. After 15 days, lower incisor teeth were extracted and fluoride retention on the enamel surface was measured using EDX. Data were analyzed by the independent samples t-test, the Mann-Whitney U test, and the Kruskal-Wallis test. There was a significant increase in fluoride retention on enamel from the experimental groups compared to the negative control group (p < 0.05). Fluoride retention levels of the experimental feeding group (6.823%) were slightly higher than those of the experimental smearing group (6.783%), though the difference was not statistically significant (p < 0.05). Anchovy substrate application, either by chewing or smearing, increases fluoride retention on tooth enamel.

  9. Alcohol email assessment and feedback study dismantling effectiveness for university students (AMADEUS-1: study protocol for a randomized controlled trial

    Directory of Open Access Journals (Sweden)

    McCambridge Jim

    2012-07-01

    Full Text Available Abstract Background Alcohol causes huge problems for population health and for society, which require interventions with individuals as well as populations to prevent and reduce harms. Brief interventions can be effective and increasingly take advantage of the internet to reach high-risk groups such as students. The research literature on the effectiveness of online interventions is developing rapidly and is confronted by methodological challenges common to other areas of e-health including attrition and assessment reactivity and in the design of control conditions. Methods/design The study aim is to evaluate the effectiveness of a brief online intervention, employing a randomized controlled trial (RCT design that takes account of baseline assessment reactivity, and other possible effects of the research process. Outcomes will be evaluated after 3 months both among student populations as a whole including for a randomized no contact control group and among those who are risky drinkers randomized to brief assessment and feedback (routine practice or to brief assessment only. A three-arm parallel groups trial will also allow exploration of the magnitude of the feedback and assessment component effects. The trial will be undertaken simultaneously in 2 universities randomizing approximately 15,300 students who will all be blinded to trial participation. All participants will be offered routine practice intervention at the end of the study. Discussion This trial informs the development of routine service delivery in Swedish universities and more broadly contributes a new approach to the study of the effectiveness of online interventions in student populations, with relevance to behaviors other than alcohol consumption. The use of blinding and deception in this study raise ethical issues that warrant further attention. Trial registration ISRCTN28328154

  10. Propagation Model of Email Worm-virus Based on Heterogeneous Networks%基于异质网络的邮件蠕虫病毒传播模型

    Institute of Scientific and Technical Information of China (English)

    项春霞; 蒋国平; 夏玲玲; 宋波

    2016-01-01

    文中根据现实生活中邮件蠕虫病毒发生后个体不同的行为机制,以及安装杀毒软件的概率和杀毒软件的查杀能力随时间变化的事实,结合邮件网络的结构特性,提出了一种改进的基于异质网络的邮件蠕虫病毒 SEIR(Susceptible-Ex-posed-Infected-Removed)传播模型。结合邮件蠕虫病毒的传播特点,利用相互作用的马尔可夫链方法推导出相应的 SEIR模型的动力学方程组,表征邮件蠕虫病毒的传播过程。通过蒙特卡罗方法对 SEIR 模型传播动力学过程进行实验仿真,探索影响邮件蠕虫病毒传播的基本因素。仿真结果表明,改进的邮件蠕虫病毒 SEIR 传播模型更加符合真实邮件网络上的蠕虫病毒传播过程,且快速地提高杀毒软件的安装概率以及杀毒软件的查杀能力能够有效地抑制邮件蠕虫病毒的传播。%Currently,email has become one of the most commonly communication in daily life,while email worm-virus constitutes one of the major Internet security threats and has attracted considerable attention. Therefore,the research on the spreading models of email worm-virus has a great significance in preventing and controlling the propagation of email viruses. The probability of installing antivirus soft-ware,and the virus-killing ability of antivirus software are time-varying when the email worm-virus outbreaks. According to the above factors and the different opening probability of suspicious email caused by individual differences,propose an improved email worm-virus spreading SEIR (Susceptible-Exposed-Infected-Removed) model in heterogeneous networks with consideration of the scale-free fea-ture of email networks. Use the Interaction of Markov Chains (IMC) method to derive the dynamical equations of SEIR model,represen-ting the process of email worm-virus propagation. Furthermore,Monte-Carlo method is used to explore the basic factors affecting the propagation of email worm

  11. A NÃO VIOLAÇÃO DO DIREITO À INTIMIDADE NA FISCALIZAÇÃO DO E-MAIL CORPORATIVO POR PARTE DO EMPREGADOR: A configuração de justa causa pelo uso indevido do e-mail corporativo pelo empregado

    Directory of Open Access Journals (Sweden)

    Ana Gabriela Santos

    2011-08-01

    Full Text Available O presente artigo tem como escopo realizar sucinta análise acerca dos entraves judiciais decorrentes da fiscalização do e-mail corporativo do empregado pelo empregador em contraponto ao direito constitucional à intimidade  e à privacidade, a partir de precedentes da Justiça do Trabalho. Justifica-se a relevância do tema, em razão da contínua e crescente problemática da violação destes direitos fundamentais pelos meios informáticos. Inclusive, decisões do TST ressaltam o ineditismo do problema em estudo. Trata-se, assim, de questão que envolve direitos fundamentais tutelados em nossa Constituição, e, portanto, não podem ser levianamente violados, devendo-se levar em conta, contudo, também a questão da proteção do empregador em face de atos inadequados do trabalhador no uso do email corporativo.

  12. USGS Sea Ice Email Script

    Data.gov (United States)

    U.S. Geological Survey, Department of the Interior — Daily sea ice imagery and charting benefits logistics and navigational planning in the Alaskan Arctic waters, yet access to these data often requires high bandwidth...

  13. The E-Mail Lab

    Science.gov (United States)

    Lederman, Judith; Gnanakkan, Dionysius; Bartels, Selina; Lederman, Norman

    2015-01-01

    Many students enter high school with some science knowledge and experience doing investigations but often know little about the nature of science (NOS) or how the knowledge is developed (i.e., science practices). As science teachers, we need to get students excited about science as quickly as possible with activities that introduce the practices…

  14. Globin gene server: a prototype E-mail database server featuring extensive multiple alignments and data compilation for electronic genetic analysis.

    Science.gov (United States)

    Hardison, R; Chao, K M; Schwartz, S; Stojanovic, N; Ganetsky, M; Miller, W

    1994-05-15

    The sequence of virtually the entire cluster of beta-like globin genes has been determined from several mammals, and many regulatory regions have been analyzed by mutagenesis, functional assays, and nuclear protein binding studies. This very large amount of sequence and functional data needs to be compiled in a readily accessible and usable manner to optimize data analysis, hypothesis testing, and model building. We report a Globin Gene Server that will provide this service in a constantly updated manner when fully implemented. The Server has two principal functions. The first (currently available) provides an annotated multiple alignment of the DNA sequences throughout the gene cluster from representatives of all species analyzed. The second compiles data on functional and protein binding assays throughout the gene cluster. A prototype of this compilation using the aligned 5' flanking region of beta-globin genes from five species shows examples of (1) well-conserved regions that have demonstrated functions, including cases in which the functional data are in apparent conflict, (2) proposed functional regions that are not well conserved, and (3) conserved regions with no currently assigned function. Such an electronic genetic analysis leads to many readily testable hypotheses that were not immediately apparent without the multiple alignment and compilation. The Server is accessible via E-mail on computer networks, and printed results can be obtained by request to the authors. This prototype will be a helpful guide for developing similar tools for many genomic loci.

  15. Research on Key Role Recognition in Email Relation Network%邮件关系网络中关键人物识别研究

    Institute of Scientific and Technical Information of China (English)

    陈立新

    2015-01-01

    E-mail is a widely used network communication tool currently. The mail relationship network can reflect the social relation of persons, so the key figures in the relationship network are the hot topics in the data mining field. Based on the Enron mail network datasets, the paper proposes a comprehensive evaluation algorithm to find out the organization structure of the Enron Corp and the key roles. The algorithm proves effective by ana-lyzing communication behaviors and mail contents.%电子邮件是当前广泛使用的网络通信工具,邮件关系网络反映了人物间的社会关系,因此利用邮件数据识别出关系网络中的关键人物是数据挖掘领域的热点课题.本文以安然公司(Enron)邮件网络数据集为研究对象,通过一种综合评价算法来找出安然公司高管的组织结构及关键人物,主要从通信行为和邮件内容两个方面进行分析并验证该算法的有效性.

  16. 基于邮件列表商务营销的分析与研究%BASED ON THE EMAIL LIST MARKETING ANALYSIS AND RESEARCH

    Institute of Scientific and Technical Information of China (English)

    张华南

    2012-01-01

    In the electronic commerce marketing, email list has a strong pertinence,marketing effect is outstanding characteristics are widely used, the mailing list is the user voluntary subscription to the premise, for the user to provide valuable information,at the same time with a number of related business information, to achieve the purpose of network marketing. Good use of mailing lists that business marketing tool, for mailing lists are created ,information publishing and management and mailing list business marketing strategy have in-depth study.%在电子商务营销中,电子邮件列表具有针对性强,营销效果出色的特点得到广泛应用,邮件列表是在用户自愿订阅的前提下,为用户提供有价值的信息,同时附带一定数量与之相关的商业信息,达到网络营销的目的。利用好邮件列表这一商务营销工具,需对邮件列表的创建,信息的发布与管理以及邮件列表商务营销策略有深入的研究。

  17. 图书馆邮件服务系统集成的设计与实现%Design and Implementation of Library E-mail Service System Integration

    Institute of Scientific and Technical Information of China (English)

    秦志华

    2011-01-01

    利用电子邮件开展读者服务已经成为图书馆日常服务的基本手段。但如何将图书馆多个读者服务系统通过电子邮件集成起来,实现一站式电子邮件服务,通过采用Jmail组件与PowerBuilder开发平台。实现了图书馆多个信息服务系统间的集成,有效地提高了图书馆读者电子邮件服务的质量与效率。%Using E-mail in reader service has become the basic daily method of library. But how to integrate multiple reader service by Email system, and realize one-stop Email service, is the focus of this article. The article realized the integration of the multiple library information service systems by using Jmail component and PowerBuilder development platform, and then effectively improved the library reader Email service quality and efficiency.

  18. Increasing Induction-Level Teachers' Positive-to-Negative Communication Ratio and Use of Behavior-Specific Praise through E-Mailed Performance Feedback and Its Effect on Students' Task Engagement

    Science.gov (United States)

    Rathel, Jeanna M.; Drasgow, Erik; Brown, William H.; Marshall, Kathleen J.

    2014-01-01

    The purpose of this study was to examine the effects of e-mailed specific performance feedback that included progress monitoring graphs on induction-level teachers' ratios of positive-to-negative communication behaviors and their use of behavior-specific praise in classrooms for students with emotional and behavioral disorders, mild…

  19. E-mail Fragment Carving Model and Algorithm Based on Set Theory%基于集合论的E-mail碎片雕刻模型及算法

    Institute of Scientific and Technical Information of China (English)

    李炳龙; 张传富; 韩宗达; 王清贤

    2014-01-01

    To acquire fragment E-mail evidence from storage medium, this paper analyzes the E-mail fragment file carving problem on the base of the set partition theory, determines the fragment file carving thought. According to the model, it designs E-mail fragment file carving algorithm model including preprocessing, E-mail file fragment subset determination, connected relation determination between E-mail fragments. By using hexadecimal editor, it expounds internal structure features of E-mail file, combined with the characteristics of fragment mail head and tail and embedded html files, discusses the fragment attributes in storage medium, and gives the adjacent rules among concentration characteristics, follow characteristics, linear properties and information characteristics from the fragments. Experimental results show that the algorithm can acquire E-mail evidence more effectively.%为获取存储介质中的碎片E-mail证据,利用集合论原理对邮件碎片文件雕刻问题进行分析,确定基于集合论划分思想的碎片文件雕刻思路。设计包含预处理、E-mail 文件碎片子集确定、E-mail 碎片间的连接关系确定等过程的邮件碎片文件雕刻算法模型。利用十六进制编辑器,阐述E-mail文件的内部结构特征,结合碎片邮件头尾和内嵌的html文件特征,论述存储介质上碎片的属性,给出碎片间的集中特性、跟随特性、线性特性以及信息特性的连接规则。实验结果表明,碎片邮件文件雕刻算法能更有效地获取邮件证据。

  20. Chinese English in as lingua franca in global business setting: A case study of ongoing emails of a foreign company in China

    Directory of Open Access Journals (Sweden)

    Wang Wenpu

    2016-01-01

    Full Text Available With the process of globalization, English has been increasingly become the lingua franca for people speaking different languages to communicate with each other, among whom the number of non-native speakers of English far outnumbers those native speakers in traditional sense. Against this background, the principle of taking the rules of native English speakers as the norms is undergoing challenges. The non-native speakers are claiming the ownership and rights of norm-providing to the English language (Crystal, 2003. In business setting, this is especially true (Charles, 2007. This paper intends to explore the use of Chinese English as lingua franca in business setting. Taking a foreign enterprise based in China as the case, this paper investigates over 400 ongoing business e-mails written in English by its Chinese employees, including the management and other staff. Four most salient patterns of Chinese English structures are identified, i.e., punctuations, absence of inflectional markers in number and tense, serial verb construction, and zero articles, which are then analyzed cultural, linguistic and social-linguistic perspectives. The effectiveness of such language patterns are proved according to the principle of “understandability” proposed by Kachru and Nelson (2006 from both intra-cultural and inter-cultural aspects. Based on the afore-said analysis, this paper concludes that Chinese English, during the process of language contact, has become a legitimate English variation, and has been providing new norms for the other countries to follow. It is suggested that business English users in China need to use their Chinese English with a confident stance, while business partners from other countries need to get familiar with this English variation in order for them to communicate effectively with their Chinese partners.