WorldWideScience

Sample records for university email system

  1. Employees' Perceptions of Email Communication, Volume and Management Strategies in an Australian University

    Science.gov (United States)

    Pignata, Silvia; Lushington, Kurt; Sloan, Jeremy; Buchanan, Fiona

    2015-01-01

    Despite email playing a central role in university business, little is known about the strategies used by staff to manage email and the factors contributing to email overload. In a mixed method study undertaken in one Australian university comparing academic (n = 193) and professional (n = 278) staff, we found that while email volume was higher in…

  2. FNAL central email systems

    Energy Technology Data Exchange (ETDEWEB)

    Schmidt, Jack; Lilianstrom, Al; Pasetes, Ray; Hill, Kevin; /Fermilab

    2004-10-01

    The FNAL Email System is the primary point of entry for email destined for an employee or user at Fermilab. This centrally supported system is designed for reliability and availability. It uses multiple layers of protection to help ensure that: (1) SPAM messages are tagged properly; (2) All mail is inspected for viruses; and (3) Valid mail gets delivered. This system employs numerous redundant subsystems to accomplish these tasks.

  3. Perceptions and use of e-mail among Universiti Utara Malaysia staff: A pilot study

    Science.gov (United States)

    Mohamed, Shafinah Farvin Packeer; Ku-Mahamud, Ku Ruhana; Ramli, Razamin; Abdullah, Kamarudin

    2017-10-01

    The use of e-mail has become common either for work purposes or personal usage. Despite its usefulness, complain about the overwhelming messages received which cause the users to have problem in managing those messages. Similar situation occurred among Universiti Utara Malaysia (UUM) staff. Thus, a pilot study was conducted to investigate its staff's perception and use of e-mail in order to improve the e-mail service provided to them. This paper discusses the findings from the pilot study, which involves 41 UUM staff. Self-administered questionnaires were used to gather the data, while descriptive statistical analysis was used for data analysis. The findings of the study reveal that UUM staff appreciate the e-mail service. However they faced problems like limited storage size and overwhelming e-mails. They think that UUM e-mail is being abused by the repeating advertisements and news sent to them. The output of this study can be used as a guideline by the UUM management in revising its e-mail policy to serve better quality of e-mail service.

  4. Fluctuations in email size

    Science.gov (United States)

    Matsubara, Yoshitsugu; Musashi, Yasuo

    2017-12-01

    The purpose of this study is to explain fluctuations in email size. We have previously investigated the long-term correlations between email send requests and data flow in the system log of the primary staff email server at a university campus, finding that email size frequency follows a power-law distribution with two inflection points, and that the power-law property weakens the correlation of the data flow. However, the mechanism underlying this fluctuation is not completely understood. We collected new log data from both staff and students over six academic years and analyzed the frequency distribution thereof, focusing on the type of content contained in the emails. Furthermore, we obtained permission to collect "Content-Type" log data from the email headers. We therefore collected the staff log data from May 1, 2015 to July 31, 2015, creating two subdistributions. In this paper, we propose a model to explain these subdistributions, which follow log-normal-like distributions. In the log-normal-like model, email senders -consciously or unconsciously- regulate the size of new email sentences according to a normal distribution. The fitting of the model is acceptable for these subdistributions, and the model demonstrates power-law properties for large email sizes. An analysis of the length of new email sentences would be required for further discussion of our model; however, to protect user privacy at the participating organization, we left this analysis for future work. This study provides new knowledge on the properties of email sizes, and our model is expected to contribute to the decision on whether to establish upper size limits in the design of email services.

  5. INTELLIGENT E-MAIL PERSONALIZATION SYSTEM

    Directory of Open Access Journals (Sweden)

    SHANMUGASUNDARAM HARIHARAN

    2011-02-01

    Full Text Available In Internet era E-mail has become the most important mode of communication in every day life. E-mail offers several advantages like secure delivery, speed, cheaper cost, acknowledgement report, transparent service, and distributed environment. As spammers try to induce large amount of spam or unsolicited mails, managing these E-mails’s in an efficient manner requires huge attention. This paper focus on personalizing the E-mail messages after eliminating the spam messages. The basic step starts with pre-processing the documents and classifying the contents into several folders or categories. The next step is to cluster the documents based on the relativeness they have using cosine similarity metric. This clustering approach is carried out using unsupervised method. The mail messages are the parsed through a filter that would identify the spam immediately. Studies on personalization of mails after spam identification, prioritizing the E-mail’s based on the importance and summarization of were also proposed. The results were quiet promising leading to efficient spam identification providing a platform for further improvements to build a domain independent personalizer system.

  6. COMMUNICATION TOPICS AND STRATEGIES IN E-MAIL CONSULTATION: COMPARISON BETWEEN AMERICAN AND INTERNATIONAL UNIVERSITY STUDENTS

    Directory of Open Access Journals (Sweden)

    Sigrun Biesenbach-Lucas

    2005-05-01

    Full Text Available On today's "wired" college campuses, students avail themselves in increasing numbers of electronic channels, most notably e-mail, as a means to consult with their professors. While some research has investigated the purposes for which university students communicate with their instructors via e-mail, little research has examined differences in e-mail use between American and international students. In the present study, e-mail messages sent by American and international students enrolled in a teacher-preparation program to their professor were collected over the course of one semester. The messages were examined for three major communication topics (facilitative, substantive, relational and communication strategies (requesting, negotiating, reporting. Results indicate quantitative and qualitative differences in American and international students' e-mail topics and strategies, suggesting, similar to findings for face-to-face academic advising sessions, that American students demonstrate greater initiative and ability to adapt to the spatial and temporal remoteness between interlocutors in e-mail interaction, especially when using e-mail to solicit face-to-face appointments and input on projects. Findings also show that messages from both groups of students contained substantial relational communication, perhaps in an attempt to compensate for the lack of visual and paralinguistic clues in the e-mail medium.

  7. You’ve Got Email: a Workflow Management Extraction System

    NARCIS (Netherlands)

    P. Chaipornkaew (Piyanuch); T. Prexawanprasut (Takorn); M.J. McAleer (Michael)

    2017-01-01

    textabstractEmail is one of the most powerful tools for communication. Many businesses use email as the main channel for communication, so it is possible that substantial data are included in email content. In order to help businesses grow faster, a workflow management system may be required. The

  8. Analyzing E-mail communication of prospective learners

    Directory of Open Access Journals (Sweden)

    Anurag SAXENA

    2005-10-01

    Full Text Available Analyzing E-mail communication of prospective learners Vibha JOSHIAnurag SAXENA Reader School of Management IGNOU, New Delhi, INDIA ABSTRACT Today, computer has replaced all means of communication significantly. E-mail is the most popular means of communication through computers. It has vanished the boundaries between the cities, countries and continents. Earlier Studies that used this medium, had shown evidence of higher quality of responses and also significant cost savings feature of this method (mainly for convenience of dispatch for research purposes. In this communication, an attempt has been made to utilize email responses of prospective learners in education discipline based programs offered through open learning system. The inception of this study is linked to the creation of website (http://www.ignou.ac.in/ and availability of information related to all activated and prospective programs of studies, various school of studies, faculty email addresses and faculty vis-à-vis program coordinator in the University. The present study analyzed 65 email responses received from July 2002 to till date by the researcher on her email ID. These respondents got the email ID from the University website and due to their eagerness to attain qualifications in the field of education/guidance/educational management, sent an e-mail to the program coordinator(s. These email responses were analyzed in order to visualize the learner profiles and viability of the ongoing as well as prospective programs of studies. This paper tries to analyze the e-mail responses of the people who either by surfing IGNOU’s website or from other sources came to know about the various programs of studies offered by the School of Education. The study validates that there is an amount of hidden information even in the curiosity of the learners.

  9. A Study of Jordanian University Students' Perceptions of Using Email Exchanges with Native English Keypals for Improving Their Writing Competency

    Science.gov (United States)

    Mahfouz, Safi Mahmoud

    2010-01-01

    English foreign language learners generally tend to consider email exchanges with native speakers (NSs) as an effective tool for improving their foreign language proficiency. This study investigated Jordanian university students' perceptions of using email exchanges with native English keypals (NEKs) for improving their writing competency. A…

  10. Students’ Use of Email and Facebook: A Comparative Perspective

    OpenAIRE

    Rahman, Synthia Bintey

    2013-01-01

    Facebook and email have become widely used communication media to Internet users. University students are a major part of Internet users and they use email and Facebook for multiple communication purposes. This research investigates the context of using Facebook and email by university students, the context of choosing any of the medium in respective communication over the last two years, and student perceptions with regard to Facebook and email as communication media. This study was accompli...

  11. Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years

    OpenAIRE

    De Wang; Danesh Irani; Calton Pu

    2014-01-01

    With the increasing dedication and sophistication of spammers, email spam is a persistent problem even today. Popular social network sites such as Facebook, Twitter, and Google+ are not exempt from email spam as they all interface with email systems. While some report predicts that email spam business is dying due to the decreasing volume of email spam. Whether email spam business is really dying is an interesting question. In this paper, we analyze email spam trends on Spam Archive dataset, ...

  12. Who sends the email? Using electronic surveys in violence research.

    Science.gov (United States)

    Sutherland, Melissa A; Amar, Angela F; Laughon, Kathryn

    2013-08-01

    Students aged 16-24 years are at greatest risk for interpersonal violence and the resulting short and long-term health consequences. Electronic survey methodology is well suited for research related to interpersonal violence. Yet methodological questions remain about best practices in using electronic surveys. While researchers often indicate that potential participants receive multiple emails as reminders to complete the survey, little mention is made of the sender of the recruitment email. The purpose of this analysis is to describe the response rates from three violence-focused research studies when the recruitment emails are sent from a campus office, researcher or survey sampling firm. Three violence-focused studies were conducted about interpersonal violence among college students in the United States. Seven universities and a survey sampling firm were used to recruit potential participants to complete an electronic survey. The sender of the recruitment emails varied within and across the each of the studies depending on institutional review boards and university protocols. An overall response rate of 30% was noted for the 3 studies. Universities in which researcher-initiated recruitment emails were used had higher response rates compared to universities where campus officials sent the recruitment emails. Researchers found lower response rates to electronic surveys at Historically Black Colleges or Universities and that other methods were needed to improve response rates. The sender of recruitment emails for electronic surveys may be an important factor in response rates for violence-focused research. For researchers identification of best practices for survey methodology is needed to promote accurate disclosure and increase response rates.

  13. Who Sends the Email? Using Electronic Surveys in Violence Research

    Directory of Open Access Journals (Sweden)

    Melissa A Sutherland

    2013-08-01

    Full Text Available Introduction: Students aged 16–24 years are at greatest risk for interpersonal violence and the resulting short and long-term health consequences. Electronic survey methodology is well suited for research related to interpersonal violence. Yet methodological questions remain about best practices in using electronic surveys. While researchers often indicate that potential participants receive multiple emails as reminders to complete the survey, little mention is made of the sender of the recruitment email. The purpose of this analysis is to describe the response rates from three violence-focused research studies when the recruitment emails are sent from a campus office, researcher or survey sampling firm. Methods: Three violence-focused studies were conducted about interpersonal violence among college students in the United States. Seven universities and a survey sampling firm were used to recruit potential participants to complete an electronic survey. The sender of the recruitment emails varied within and across the each of the studies depending on institutional review boards and university protocols.Results: An overall response rate of 30% was noted for the 3 studies. Universities in which researcher initiated recruitment emails were used had higher response rates compared to universities where campus officials sent the recruitment emails. Researchers found lower response rates to electronic surveys at Historically Black Colleges or Universities and that other methods were needed to improve response rates.Conclusion: The sender of recruitment emails for electronic surveys may be an important factor in response rates for violence-focused research. For researchers identification of best practices for survey methodology is needed to promote accurate disclosure and increase response rates. [West J Emerg Med. 2013;14(4:363–369.

  14. Is Email Business Dying?: A Study on Evolution of Email Spam Over Fifteen Years

    Directory of Open Access Journals (Sweden)

    De Wang

    2014-05-01

    Full Text Available With the increasing dedication and sophistication of spammers, email spam is a persistent problem even today. Popular social network sites such as Facebook, Twitter, and Google+ are not exempt from email spam as they all interface with email systems. While some report predicts that email spam business is dying due to the decreasing volume of email spam. Whether email spam business is really dying is an interesting question. In this paper, we analyze email spam trends on Spam Archive dataset, which contains 5.5 million spam emails over 15 years (1998 – 2013. We statistically analyze emails contents including header information (e.g. content type and embedded items (e.g. URL links. Also, we investigate topic drift using topic modeling technique. Moreover, we perform network analysis on sender-to-receiver IP routing networks. Our study shows the dynamic nature of email spam over one and a half decades and demonstrate that the email spam business is not dying but more capricious.

  15. A Generalized Email Classification System for Workflow Analysis

    NARCIS (Netherlands)

    P. Chaipornkaew (Piyanuch); T. Prexawanprasut (Takorn); C-L. Chang (Chia-Lin); M.J. McAleer (Michael)

    2017-01-01

    textabstractOne of the most powerful internet communication channels is email. As employees and their clients communicate primarily via email, much crucial business data is conveyed via email content. Where businesses are understandably concerned, they need a sophisticated workflow management

  16. Effects of text messaging in addition to emails on physical activity among university and college employees in the UK.

    Science.gov (United States)

    Suggs, Suzanne; Blake, Holly; Bardus, Marco; Lloyd, Scott

    2013-04-01

    To test the effects of adding text messages to weekly email communications on recipients' total physical activity (leisure-time; workplace; domestic and garden; and active transportation) in employees of universities and colleges in the UK. A randomised trial with two study groups (email only or email plus text messaging for 12 weeks) was implemented at five workplaces. Data were collected at baseline, immediately after, and four weeks after the intervention. Intervention effects on physical activity were evaluated using latent growth modelling. Total physical activity decreased over time in both groups but the decrease was non-significant. The only significant difference between groups was found for workplace physical activity, with the group receiving emails and text messages having a linear decrease of 2.81 Metabolic Equivalent h/week (β = -0.31, p = 0.035) compared to the email only group. Sending employees two additional text messages resulted in less physical activity. Further investigation is needed to understand whether text messaging may play a beneficial role in promoting physical activity in workplace settings. © The Author(s) 2013 Reprints and permissions: sagepub.co.uk/journalsPermissions.nav.

  17. Alcohol assessment & feedback by e-mail for university student hazardous and harmful drinkers: study protocol for the AMADEUS-2 randomised controlled trial.

    Science.gov (United States)

    McCambridge, Jim; Bendtsen, Marcus; Karlsson, Nadine; White, Ian R; Bendtsen, Preben

    2013-10-10

    Alcohol is responsible for a large and growing proportion of the global burden of disease, as well as being the cause of social problems. Brief interventions are one component of comprehensive policy measures necessary to reduce these harms. Brief interventions increasingly take advantage of the Internet to reach large numbers of high risk groups such as students. The research literature on the efficacy and effectiveness of online interventions is developing rapidly. Although many studies show benefits in the form of reduced consumption, other intervention studies show no effects, for reasons that are unclear. Sweden became the first country in the world to implement a national system in which all university students are offered a brief online intervention via an e-mail. This randomized controlled trial (RCT) aims to evaluate the effectiveness of this national system comprising a brief online intervention among university students who are hazardous and harmful drinkers. This study employs a conventional RCT design in which screening to determine eligibility precedes random allocation to immediate or delayed access to online intervention. The online intervention evaluated comprises three main components; assessment, normative feedback and advice on reducing drinking. Screening is confined to a single question in order to minimise assessment reactivity and to prevent contamination. Outcomes will be evaluated after 2 months, with total weekly alcohol consumption being the primary outcome measure. Invitations to participate are provided by e-mail to approximately 55,000 students in 9 Swedish universities. This RCT evaluates routine service provision in Swedish universities via a delay in offer of intervention to the control group. It evaluates effects in the key population for whom this intervention has been designed. Study findings will inform the further development of the national service provision. ISRCTN02335307.

  18. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Directory of Open Access Journals (Sweden)

    Javier Portela

    2016-11-01

    Full Text Available Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks.

  19. Estimation of Anonymous Email Network Characteristics through Statistical Disclosure Attacks

    Science.gov (United States)

    Portela, Javier; García Villalba, Luis Javier; Silva Trujillo, Alejandra Guadalupe; Sandoval Orozco, Ana Lucila; Kim, Tai-Hoon

    2016-01-01

    Social network analysis aims to obtain relational data from social systems to identify leaders, roles, and communities in order to model profiles or predict a specific behavior in users’ network. Preserving anonymity in social networks is a subject of major concern. Anonymity can be compromised by disclosing senders’ or receivers’ identity, message content, or sender-receiver relationships. Under strongly incomplete information, a statistical disclosure attack is used to estimate the network and node characteristics such as centrality and clustering measures, degree distribution, and small-world-ness. A database of email networks in 29 university faculties is used to study the method. A research on the small-world-ness and Power law characteristics of these email networks is also developed, helping to understand the behavior of small email networks. PMID:27809275

  20. Email-Set Visualization: Facilitating Re-Finding in Email Archives

    OpenAIRE

    Gorton, Douglas; Murthy, Uma; Vemuri, Naga Srinivas; Pérez-Quiñones, Manuel A.

    2007-01-01

    In this paper we describe ESVT – EmailSet Visualization Tool, an email archive tool that provides users a visualization to re-find and discover information in their email archive. ESVT is an end-to-end email archive tool that can be used from archiving a user’s email messages to visualizing queries on the email archive. We address email archiving by allowing import of email messages from an email server or from a standard existing email client. The central idea in ESVT’s visualization, an “em...

  1. Email based remote access and surveillance system for smart home infrastructure

    Directory of Open Access Journals (Sweden)

    Pooshkar Rajiv

    2016-09-01

    Full Text Available With the rapid rise of Internet of Things in public domain, people expect fast, reliable and on-demand home security via the Internet. However, existing remote home surveillance systems place a very rigid constraint on authentication and require customized hardware and software. In this paper we have proposed an ingenious and reliable internet based, home access system for smart homes that can be easily deployed on generic hardware. The proposed architecture uses popular email service providers to notify and update the user about the home access. It sends an email to the owner with the attached picture of the person who is at the door. It also incorporates a protected mechanism to give access of the door to a remote user by responding to that email. It essentially means that we can view and give access to the person at our door via sending and receiving an email. Furthermore, an image processing based mechanism has also been incorporated to provide access without email, to few selected personnel who are trusted by the owner. It works by capturing and comparing the visitor's image with the stored images in the database. Perceptual hashing or fingerprint matching algorithm is used for comparison purposes. Similarity percentage based on hamming distance was evaluated, and the similarity threshold for providing access was set. The simulations were performed in rigorous environment. The efficiency of the hashing algorithm was found to be 97% at the similarity threshold of 95%. The results validate that the average latency is only 155 ms with low standard deviation. The CPU utilization remained quite low with a minimum value of 10 MHz and a maximum value of 30 MHz when the payload size of the sent mail was increased to 1500 kB. Thus, the proposed system can be used for developing a larger low power infrastructure.

  2. EmailTime: visual analytics and statistics for temporal email

    Science.gov (United States)

    Erfani Joorabchi, Minoo; Yim, Ji-Dong; Shaw, Christopher D.

    2011-01-01

    Although the discovery and analysis of communication patterns in large and complex email datasets are difficult tasks, they can be a valuable source of information. We present EmailTime, a visual analysis tool of email correspondence patterns over the course of time that interactively portrays personal and interpersonal networks using the correspondence in the email dataset. Our approach is to put time as a primary variable of interest, and plot emails along a time line. EmailTime helps email dataset explorers interpret archived messages by providing zooming, panning, filtering and highlighting etc. To support analysis, it also measures and visualizes histograms, graph centrality and frequency on the communication graph that can be induced from the email collection. This paper describes EmailTime's capabilities, along with a large case study with Enron email dataset to explore the behaviors of email users within different organizational positions from January 2000 to December 2001. We defined email behavior as the email activity level of people regarding a series of measured metrics e.g. sent and received emails, numbers of email addresses, etc. These metrics were calculated through EmailTime. Results showed specific patterns in the use email within different organizational positions. We suggest that integrating both statistics and visualizations in order to display information about the email datasets may simplify its evaluation.

  3. New Secure E-mail System Based on Bio-Chaos Key Generation and Modified AES Algorithm

    Science.gov (United States)

    Hoomod, Haider K.; Radi, A. M.

    2018-05-01

    The E-mail messages exchanged between sender’s Mailbox and recipient’s Mailbox over the open systems and insecure Networks. These messages may be vulnerable to eavesdropping and itself poses a real threat to the privacy and data integrity from unauthorized persons. The E-mail Security includes the following properties (Confidentiality, Authentication, Message integrity). We need a safe encryption algorithm to encrypt Email messages such as the algorithm Advanced Encryption Standard (AES) or Data Encryption Standard DES, as well as biometric recognition and chaotic system. The proposed E-mail system security uses modified AES algorithm and uses secret key-bio-chaos that consist of biometric (Fingerprint) and chaotic system (Lu and Lorenz). This modification makes the proposed system more sensitive and random. The execution time for both encryption and decryption of the proposed system is much less from original AES, in addition to being compatible with all Mail Servers.

  4. Ethical Judgments Concerning Email Use in the Workplace: University Students' Perceptions.

    Science.gov (United States)

    Keith, Nancy; Perreault, Heidi; Sutliff, Kris

    2001-01-01

    A survey of 1,272 college students showed that most believed it appropriate to use company e-mail accounts for personal messages, but inappropriate to read others' e-mail or send messages with ethnic, racial, or sexual content. Students who participated in ethics discussions were less likely to rate certain behaviors as appropriate. (Contains 22…

  5. Evaluation Methodologies for Information Management Systems; Building Digital Tobacco Industry Document Libraries at the University of California, San Francisco Library/Center for Knowledge Management; Experiments with the IFLA Functional Requirements for Bibliographic Records (FRBR); Coming to Term: Designing the Texas Email Repository Model.

    Science.gov (United States)

    Morse, Emile L.; Schmidt, Heidi; Butter, Karen; Rider, Cynthia; Hickey, Thomas B.; O'Neill, Edward T.; Toves, Jenny; Green, Marlan; Soy, Sue; Gunn, Stan; Galloway, Patricia

    2002-01-01

    Includes four articles that discuss evaluation methods for information management systems under the Defense Advanced Research Projects Agency; building digital libraries at the University of California San Francisco's Tobacco Control Archives; IFLA's Functional Requirements for Bibliographic Records; and designing the Texas email repository model…

  6. The Impact of a Targeted Training Program on E-Mail System Processing Capabilities and Self-Perception of E-Mail Overload

    Science.gov (United States)

    Einstein, Michael M.

    2014-01-01

    As business e-mail volumes continue to grow and employees spend increasingly larger portions of their day processing e-mail, there is strong evidence of the negative impacts of e-mail processing, especially with respect to e-mail overload. This study sought to determine whether a training program focused on select e-mail features and processing…

  7. Troubleshooting Requests e-mail Confirmation

    CERN Multimedia

    TS Department

    2004-01-01

    In an ongoing effort to improve quality of the repair requests, a new e-mail confirmation automatic system will be implemented starting from the 21st October. All repair requests transmitted to the TCR (72201) or the FM Helpdesk (77777) will be confirmed in an e-mail to the requestor, provided that the latter has a valid e-mail address in the HR database. The e-mail will contain a reference number, a brief description of the problem, the location and a contact where more information can be obtained. A second e-mail will be sent when the processing of the repair request is finished. We hope that this initiative will improve the transparency and quality of our service. Helpdesk Troubleshooting Requests (reminder) We remind you that all the repair requests and other communication concerning the CERN machine buildings have to be transmitted to the TCR via 72201, whereas the ones concerning tertiary buildings are handled directly by the FM helpdesk under the phone number 77777, i.e. problems on systems and equ...

  8. Design and implementation of an automated email notification system for results of tests pending at discharge.

    Science.gov (United States)

    Dalal, Anuj K; Schnipper, Jeffrey L; Poon, Eric G; Williams, Deborah H; Rossi-Roh, Kathleen; Macleay, Allison; Liang, Catherine L; Nolido, Nyryan; Budris, Jonas; Bates, David W; Roy, Christopher L

    2012-01-01

    Physicians are often unaware of the results of tests pending at discharge (TPADs). The authors designed and implemented an automated system to notify the responsible inpatient physician of the finalized results of TPADs using secure, network email. The system coordinates a series of electronic events triggered by the discharge time stamp and sends an email to the identified discharging attending physician once finalized results are available. A carbon copy is sent to the primary care physicians in order to facilitate communication and the subsequent transfer of responsibility. Logic was incorporated to suppress selected tests and to limit notification volume. The system was activated for patients with TPADs discharged by randomly selected inpatient-attending physicians during a 6-month pilot. They received approximately 1.6 email notifications per discharged patient with TPADs. Eighty-four per cent of inpatient-attending physicians receiving automated email notifications stated that they were satisfied with the system in a brief survey (59% survey response rate). Automated email notification is a useful strategy for managing results of TPADs.

  9. Email Updates

    Science.gov (United States)

    ... of this page: https://medlineplus.gov/listserv.html Email Updates To use the sharing features on this ... view your email history or unsubscribe. Prevent MedlinePlus emails from being marked as "spam" or "junk" To ...

  10. RECEIVING UNWANTED EMAIL?

    CERN Multimedia

    Denise Heagerty

    2002-01-01

    Unsolicited email, commonly known as SPAM, is a growing problem across the Internet at large. You are recommended to delete it. If the email looks suspicious, do not even open it (from Outlook you can delete email using the right button of your mouse to select the message and then selecting delete). Viruses are often hidden inside attachments, so do not open attachments in unsolicited email. SPAM and virus emails can be disguised to trick you into reading the email and/or performing an action. Here are examples of some techniques to help you recognise them: fake email addresses: emails can appear to be from people you know or even from yourself. Your own email address can appear in emails which you did not send, resulting in non-delivery messages or unexpected replies. Fake addresses may be used to send viruses. If the email looks suspicious then delete it and do not open the attachments. If you are unsure then check with the sender first. enticing subjects: the email subject uses words to make you curious...

  11. Perancangan Email Client Dengan Pengklasifikasian Email Menggunakan Algoritma Vector Space Model

    OpenAIRE

    Christian, Moses

    2015-01-01

    On today's age of technology, widely used email to send information throughout the world. During the classification of the email is still done manually and less objective. So in this study, the authors apply the method of Vector Space Model (VSM) to make an automatic email classification and more objective. With this method of email classification can be done automatically based on address, subject, and body of an email that allows users to email in the organization of every incoming email in...

  12. Assessing e-mail intent and tasks in e-mail messages

    NARCIS (Netherlands)

    Sappelli, M.; Pasi, G.; Verberne, S.; Boer, M. de; Kraaij, W.

    2016-01-01

    In this paper, we analyze corporate e-mail messages as a medium to convey work tasks. Research indicates that categorization of e-mail could alleviate the common problem of information overload. Although e-mail clients provide possibilities of e-mail categorization, not many users spend effort on

  13. New method for assessing risks of email

    Science.gov (United States)

    Raja, Seyyed H.; Afrooz, Farzad

    2013-03-01

    E-mail technology, has become one of the requirements of human lives for correspondence between individuals. Given this, the important point is that the messages, server and client of e-mail and correspondences that exchanged between different people have acceptable security, to make people sure to use of this technology. In the information age, many of financial and non financial transactions are done electronically, data exchange takes place via the internet and theft and manipulation of data can make exorbitant cost in terms of integrity, financial, political, economic and culture. E-mail correspondence in there is same and it is very important. With review took place, a method that will focus on email system for risks assessment is not provided. We are examining ways of assessing for other systems and their strengths and weaknesses, then we use Mr Convery method for assessing email risks which it is for assessing network risks. At the end of paper we have offered special table for email risk assessment.

  14. Management and Archiving e-mail Messages in Governmental Organization

    OpenAIRE

    Ashraf Mohamed A.Mohsen

    2006-01-01

    The study deals great issue of digital preservation that is e-mail archiving, it covered all aspects of the topic; it discuss: e-mail system, components of e-mail message, advantages and disadvantages of e-mail, official e-mail messages, management of e-mail messages, organizing and arrangement of e-mail messages, keeping and deleting messages, archiving e-mail messages, and some related issues like: privacy and security.

  15. Transparent Proxy for Secure E-Mail

    Science.gov (United States)

    Michalák, Juraj; Hudec, Ladislav

    2010-05-01

    The paper deals with the security of e-mail messages and e-mail server implementation by means of a transparent SMTP proxy. The security features include encryption and signing of transported messages. The goal is to design and implement a software proxy for secure e-mail including its monitoring, administration, encryption and signing keys administration. In particular, we focus on automatic public key on-the-fly encryption and signing of e-mail messages according to S/MIME standard by means of an embedded computer system whose function can be briefly described as a brouter with transparent SMTP proxy.

  16. Use of email in communication between the Finnish primary healthcare system and general practitioners

    Directory of Open Access Journals (Sweden)

    Tuula Karhula

    2011-03-01

    Conclusion Especially during periods of change in the workplace, it is very important that management is conducted personally. Care must be taken so that disinformation does not spoil the informative value of email in the administration of primary health care. The needed technical assistance should be given to everyone in order to get the best advantage from the use of the email system.

  17. E-mail marketing

    OpenAIRE

    Jurnečková, Jana

    2014-01-01

    The thesis deals with e-mail marketing. It focuses on identifying factors that affect the behavior of users of e-mail and newsletter subscribers. It evaluates the role of e-mail marketing as a part of communication mix of companies and e-shops, current trends, e-mail campaigns, e-mail marketing software provider. To study the behavior of users of e-mail and newsletter subscribers a questionnaire survey was conducted on a sample of 610 respondents and in-depth interviews (n = 30). Content anal...

  18. Email shape analysis

    OpenAIRE

    Sroufe, Paul; Phithakkitnukoon, Santi; Dantu, Ram; Cangussu, João

    2010-01-01

    Email has become an integral part of everyday life. Without a second thought we receive bills, bank statements, and sales promotions all to our inbox. Each email has hidden features that can be extracted. In this paper, we present a new mechanism to characterize an email without using content or context called Email Shape Analysis. We explore the applications of the email shape by carrying out a case study; botnet detection and two possible applications: spam filtering, and social-context bas...

  19. Kurumsal Bilgi Kaynağı Olarak E-posta Yönetim Sistemleri = E-mail Management Systems as an Enterprise Information Resource

    Directory of Open Access Journals (Sweden)

    Külcü, Özgür

    2012-01-01

    Full Text Available Çalışmada, e-posta kullanımı ve yönetimine ilişkin uluslararası koşullar incelenmekte, bu çerçevede Türkiye’de 28 kurum örneğinde gerçekleştirilen anket verileri değerlendirilmektedir. Betimleme yönteminin kullanıldığı çalışmada literatür incelemesi ve anket tekniklerine dayanarak gerekli veriler elde edilmiştir. Araştırmada e-posta kullanımına ilişkin elde edilen verilerin, ilgili alanda sistemler geliştirmeye çalışan araştırmacılara yardımcı olması beklenmektedir. Kurumsal e-posta yönetimine ilişkin temel sorunlar arasında mesajların üretimi, düzenlenmesi, ayıklanması ve uzun süre korunmasını içeren e-posta yönetim sistemlerinin geliştirilmesi yer almaktadır. Ayrıca insan kaynakları, mali ve idari konuların yönetimi ile belge ve arşiv yönetimi çalışmalarını kapsamına alan, içerisine e-posta yönetiminin de dâhil olduğu sistemlerin bütünleştirilmesi güncel araştırma konuları arasındadır. / This study examines the universal usage and management of e-mail communication and compares with the data, gathered from 28 Turkish institutions. This is a descriptive research in nature and the quantitative data were collected through surveys. It is expected that the results one-mail communication and its usage styles will shed a ligth into researcher who are working on system development. One of the basic problems of organizational e-mail management systems are lack of e-mail systems including message creation, maintenance, disposition, and long term preservation. Furthermore, the results indicate that integration of human resources management, financial and administrative management systems and archival management systems with e-mail managment system is another major problem.

  20. Using Insights from Email Users to Inform Organisational Email Management Policy

    Science.gov (United States)

    Ramsay, Judith; Renaud, Karen

    2012-01-01

    One would expect email substantially to increase organisational productivity and efficiency. There is little empirical evidence of this since email use is such a complex tool that it would be well nigh impossible to attribute efficiency increases solely to email. There is anecdotal evidence of the positive aspects of email (Phillips, S.R. and…

  1. Location Is Everything: The Use and Marketing of Reference E-Mail

    Science.gov (United States)

    Collins, Susan L.

    2006-01-01

    Reference e-mail continues to be a vital reference service. This article studies the trends in reference e-mail use over an eight year period. Usage statistics are analyzed particularly in light of the marketing of the service via changes in the location of the service on the official university libraries' Web pages. Included are recommendations…

  2. Resident use of the Internet, e-mail, and personal electronics in the care of surgical patients.

    Science.gov (United States)

    Plant, Mathew A; Fish, Joel S

    2015-01-01

    The use of smartphones, e-mail, and the Internet has affected virtually all areas of patient care. Current university and hospital policies concerning the use of devices may be incongruent with day-to-day patient care. The goal was to assess the current usage patterns of the Internet, e-mail, and personal electronics for clinical purposes by surgical residents as well as their communication habits and preferences. Also assessed was residents' knowledge regarding the institutional policies surrounding these issues. Surgical residents (n = 294) at a large teaching institution were surveyed regarding their knowledge of university policies as well as daily use of various communication technologies. Communication preferences were determined using theoretical clinical scenarios. Our survey with a response rate of 54.7% (n = 161) revealed that 93.8% of participants indicated daily Internet use for clinical duties. Most respondents (72%) were either completely unaware of the existence of guidelines for its use or aware but had no familiarity with their content. Use of e-mail for clinical duties was common (85%), and 74% of the respondents rated e-mail as "very important" or "extremely important" for patient care. Everyone who responded had a mobile phone with 98.7% being "smartphones," which the majority (82.9%) stated was "very important" or "extremely important" for patient care. Text messaging was the primary communication method for 57.8% of respondents. The traditional paging system was the primary communication method for only 1.3% of respondents and the preferred method for none. Daily use of technology is the norm among residents; however, knowledge of university guidelines was exceedingly low. Residents need better education regarding current guidelines. Current guidelines do not reflect current clinical practice. Hospitals should consider abandoning the traditional paging system and consider facilitating better use of residents' mobile phones.

  3. E-mail marketing

    OpenAIRE

    TŮMOVÁ, Kateřina

    2012-01-01

    The aim of this work is to specify the e-mail marketing and in the practical application to evaluate the pros and cons of e-mail marketing as a tool of targeted marketing communication.Based on personal interviews with representatives of the company was described their existing e-mail marketing.Through the survey it was found, how customers perceive the company's e-mail marketing.Based on the survey, changes were proposed at the end of the thesis.

  4. Enter your email-address: how German internet users manage their email addresses

    NARCIS (Netherlands)

    Utz, S.

    2004-01-01

    Writing E-mail is the most popular Internet activity. Meanwhile, many people have more than one E-mail address. The question how people manage their E-mail addresses, more specifically, whether they use them deliberately for different purposes, is the central question of this paper. E-mail addresses

  5. Technical Perspective on Using Information Demand Pattern in a Collaborative Recommendation System for Improving E-Mail Communication

    Directory of Open Access Journals (Sweden)

    Dirk Stamer

    2015-04-01

    Full Text Available Today e-mail communication information is widely used in organizations to distribute information. The increasing volume of received e-mails hinders an efficient work. It becomes more and more difficult to identify relevant e-mails inside this enormous volume of information. This work presents a solution in a multi-user environment by improving an established e-mail client extension based on information demand pattern with a recommendation system. The contributions of this work are (1 the concept and implementation of the solution for a single-user environment using information demand pattern, (2 the concept and architecture to use the solution in a multi-user environment (3 a detailed technical description about the proposed solutions.

  6. Analysis of E-mail Transactions in Virtual Reference Services

    Directory of Open Access Journals (Sweden)

    Astutik Nur Qomariyah

    2018-01-01

    Full Text Available Today, the use of traditional reference desk in the academic libraries has been rarely used, thus expanding or even move to a virtual reference service. A minimum level of virtual reference services are provided in the academic library is currently in general is the electronic mail (e-mail. One of the academic library specifically provide virtual reference services via e-mail is a Petra Christian University (PCU Library (refdesk@petra.ac.id.. In such services librarians provide assistance to users in finding information and answer questions. This study aimed to analyze the transaction reference services virtually through e-mail at the PCU Library, with a view of the types of questions based on user background, the writing style of language communication interaction used based on user background, and cultural values are revealed behind the user in virtual reference services (e-mail. This study uses content analysis (content analysis of the transcript e-mail received librarians of reference services began March 10 until June 16, 2015. The results showed that the types of questions asked in reference service virtual (e-mail in the Library UK Petra include: specific search, access online resources, operation of online resources, policies and procedures for services, and library holdings with background the student (PCU and non-PCU, faculty, and librarians. Based on the background of users found that overall more types of questions asked in virtual reference services (e-mail is a problem of access to online resources, and generally submitted by the students. Then, the writing style of the user's language in interaction reference service virtual (e-mail tends to be formal, which includes the word greeting, the message will be delivered, and regards cover, either by the student (PCU and non-PCU, lecturer, or librarians. While cultural values that revealed the background behind the user in virtual reference services (e-mail is obedience, courtesy and

  7. E-mail: Outlook Express

    Directory of Open Access Journals (Sweden)

    Zainul Bakri

    2012-10-01

    Full Text Available Salah satu layanan Internet yang sangat penting adalah electronic mail atau sering hanya disebut sebagai e-mail. Untuk menggunakan e-mail, diperlukan piranti lunak khusus supaya pengguna dapat mengirim dan menerima e-mail. Jenis piranti lunak e-mail diantaranya adalah Outlook Express yang merupakan satu paket yang didistribusikan bersama Internet Explorer versi 4. Piranti lunak ini dijalankan pada PC yang mempunyai sistem operasi Windows 95 atau 98. Jenis piranti lunak e-mail yang lain adalah Eudora, Pegasus dan sebagainya. Bahkan ada yang diintegrasikan dengan Web Browser (alat untuk menelusuri situs Web misalnya IE,dan Netscape.Sebagai layaknya pelayanan pos, maka setiap pengguna e-mail mempunyai alamat tertentu yang tidak mungkin dipunyai oleh pengguna lainnya diseluruh dunia. Untuk keperluan pendistribusian, maka e-mail mempunyai semacam kantor pos yang ditempatkan dalam sebuah komputer server (mail server atau sering disebut sebagai host. 

  8. Detecting and combating malicious email

    CERN Document Server

    Ryan, Julie JCH

    2014-01-01

    Malicious email is, simply put, email with a malicious purpose. The malicious purpose could be fraud, theft, espionage, or malware injection. The processes by which email execute the malicious activity vary widely, from fully manual (e.g. human-directed) to fully automated. One example of a malicious email is one that contains an attachment which the recipient is directed to open. When the attachment is opened, malicious software is installed on the recipient's computer. Because malicious email can vary so broadly in form and function, automated detection is only marginally helpful. The education of all users to detect potential malicious email is important to containing the threat and limiting the damage. It is increasingly necessary for all email users to understand how to recognize and combat malicious email. Detecting and Combating Malicious Email describes the different types of malicious email, shows how to differentiate malicious email from benign email, and suggest protective strategies for both perso...

  9. Efektivitas Email Untuk Pemasaran

    OpenAIRE

    Oetomo, Budi Sutedjo Dharma

    2009-01-01

    Lebih dari 500 juta orang dan badan USAha telah tergabung di internet. Pada umumnya, mereka telah terbiasa untuk memanfaatkan fitur dan aplikasi yang tersedia di internet, seperti email, mailing list, web, blog dan situs jejaring sosial. Diantara fitur dan aplikasi internet itu yang hampir digunakan oleh setiap orang dan badan USAha adalah email, karena mereka telah memiliki alamat email, bahkan lebih dari satu buah. Kini, fitur email telah dimanfaatkan untuk kegiatan pemasaran, khususnya pro...

  10. Did You Get My E-Mail? Moving E-Mails beyond the Inbox

    Science.gov (United States)

    Ellis, Susan J.

    2011-01-01

    The challenge today is how to make e-mail and other forms of electronic communication effective in motivating volunteer action. Is it possible to make e-mails feel personal and welcoming? E-mail, instant messaging, texting, and social media are tools that allow individuals to communicate quickly and inexpensively, but they are lifeless without the…

  11. Hacked E-mail

    Science.gov (United States)

    ... your email address was “spoofed,” or faked, and hackers don’t actually have access to your account. ... use public Wi-Fi .) Tagged with: antivirus , email , hacker , imposter , password , phishing , scam , social networking July 2013 ...

  12. Analysis of E-mail Transactions in Virtual Reference Services

    Directory of Open Access Journals (Sweden)

    Astutik Nur Qomariyah

    2016-01-01

    Full Text Available Today, the use of traditional reference desk in the academic libraries has been rarely used, thus expanding or even move to a virtual reference service. A minimum level of virtual reference services are provided in the academic library is currently in general is the electronic mail (e-mail. One of the academic library specifically provide virtual reference services via e-mail is a Petra Christian University (PCU Library (ref-desk@petra.ac.id.. In such services librarians provide assistance to users in finding information and answer questions. This study aimed to analyze the transaction reference services virtually through e-mail at the PCU Library, with a view of the types of questions based on user background, the writing style of language communication interaction used based on user background, and cultural values are revealed behind the user in virtual reference services (e-mail. This study uses content analysis (content analysis of the transcript e-mail received librarians of reference services began March 10 until June 16, 2015. The results showed that the types of questions asked in reference service virtual (e-mail in the Library UK Petra include: specific search, access online resources, operation of online resources, policies and procedures for services, and library holdings with background the student (PCU and non-PCU, faculty, and librarians. Based on the background of users found that overall more types of questions asked in virtual reference services (e-mail is a problem of access to online resources, and generally submitted by the students. Then, the writing style of the user's language in interaction reference service virtual (e-mail tends to be formal, which includes the word greeting, the message will be delivered, and regards cover, either by the student (PCU and non-PCU, lecturer, or librarians. While cultural values that revealed the background behind the user in virtual reference services (e-mail is obedience, courtesy and

  13. On Successful E-Mail Writing

    Directory of Open Access Journals (Sweden)

    Vesna Vulić

    2009-12-01

    Full Text Available This article is intended to be a simplified guide for the efficient use of e-mail in business and private communication in English. E-mailing is frequently used as a substitute for other kinds of communication in today’s working environment, due in particular, to the fact that messages are transmitted instantly, irrespective of the distance of the recipient. Due to the speed and volume of e-mail, mastering the art of effective e-mail writing includes the knowledge of Network Etiquette or ‘Netiquette’ and it is therefore important that whether it be for business or private use, the basics of e-mail etiquette are followed. When writing an e-mail it is important to consider the recipient. Careful consideration will determine the content and style of the e-mail. No less important is knowing the points of detail in writing e-mail. That is, to be clear and concise in the specific information that the e-mail should contain. Furthermore, abbreviations, acronyms and emoticons are frequently found in e-mail and their use should also be considered. An e-mail is a valuable communication tool and it is essential to use it effectively in order to improve both professional and private communication.

  14. Changing a Course of Action: Teachers' E-mail Discussion.

    Science.gov (United States)

    Serafin, Ana Gil

    This study examined the e-mail interactions of teachers who were graduate students in an educational leadership program at a commuter university. Participants attended a 3-hour-per-week course. The instructor inserted into the course syllabus an assessment plan that required computer use, making the students responsible for accessing the…

  15. Email Negotiation

    OpenAIRE

    Bülow, Anne Marie

    2010-01-01

    This paper investigates a set of email negotiations in order to explain a high number of deadlocks. The paper argues that one reason is the combination of cognitive effort characteristic of the e-mail genre, and the argumentative pattern found when two parties simultaneously try to persuade the other of the justice of their cause. For a negotiation involving the wording of a contract, the evidence suggests that, while there is a distinct advantage in the features of reviewability and revis...

  16. Development of an E-mail Application Seemit and its Utilization in an Information Literacy Course

    Science.gov (United States)

    Kita, Toshihiro; Miyazaki, Makoto; Nakano, Hiroshi; Sugitani, Kenichi; Akiyama, Hidenori

    We have developed a simple e-mail application named Seemit which is designed for being used in information literacy courses. It has necessary and sufficient functionality of an e-mail application, and it has been developed for the purpose of learning basic operations and mechanisms of e-mail transfer easily. It is equipped with the function to automatically set the configuration of user's SMTP/POP servers and e-mail address, etc. The process of transferring e-mail via SMTP and POP can be demonstrated step by step showing actual messages passed during the client-server interaction. We have utilized Seemit in a university-wide information literacy course which holds about 1800 students.

  17. End of Interactive Emailing from the Technical Network

    CERN Multimedia

    2006-01-01

    According to the CNIC Security Policy for Control Systems (EDMS #584092), interactive emailing on PCs (and other devices) connected to the Technical Network is prohibited. Please note that from November 6th, neither reading emails nor sending emails interactively using e.g. Outlook or Pine mail clients on PCs connected to the Technical Network will be possible anymore. However, automatically generated emails will not be blocked and can still be sent off using CERNMX.CERN.CH as mail server. These restrictions DO NOT apply to PCs connected to any other network, like the General Purpose (or office) network. If you have questions, please do not hesitate to contact Uwe Epting, Pierre Charrue or Stefan Lueders (Technical-Network.Administrator@cern.ch). Your CNIC Working Group

  18. Data Leakage Prevention: E-Mail Protection via Gateway

    Science.gov (United States)

    Kaur, Kamaljeet; Gupta, Ishu; Singh, Ashutosh Kumar

    2018-01-01

    Protection of digital assets and intellectual property is becoming a challenge for most of the companies. Due to increasing availability of database services on internet, data may be insecure after passing through precarious networks. To protect intellectual property (IP) is a major concern for today's organizations, because a leakage that compromises IP means, sensitive information of a company is in the hands of biggest competitors. Electronic information processing and communication is replacing paper in many applications increasingly. Instead of paper, an email is being used for communication at workplace and from social media logins to bank accounts. Nowadays an email is becoming a mainstream business tool. An email can be misused to leave company’s sensitive data open to compromise. So, it may be of little surprise that attacks on emails are common. So, here we need an email protection system (EPS) that will protect information to leave organization via mail. In this paper, we developed an algorithm that will offer email protection via gateway during data transfer. This algorithm matches the patterns with the keywords stored in the database and then takes the actions accordingly to protect the data. This paper describes why email protection is important? How companies can protect their confidential information from being leaked by insiders.

  19. E-Mail at Work: Is it Really Private?

    Science.gov (United States)

    Rosenblum, Cindy

    This paper examines the controversy of e-mail privacy in the workplace. Once an employee uses an e-mail system that belongs to the employer, according to recent case law, their privacy rights are forfeited. Employers will now have to start creating policies to safeguard themselves from expensive litigation, and employees will have to be more…

  20. Email communication in a developing country: different family physician and patient perspectives.

    Science.gov (United States)

    Makarem, Nisrine N; Antoun, Jumana

    2016-01-01

    Email communication between physicians and patients could improve access to and delivery of health care. Most of the literature studies about email communication between physicians and patients have been conducted in developing countries. Therefore, this study aims to analyze the practices, attitudes, and barriers of both physicians' and patients' use of email within the same health care setting of a developing country. A cross-sectional paper-based survey was conducted among 39 physicians and 500 patients at the Family Medicine clinics of the American University of Beirut, a tertiary academic medical center. Most of the surveyed patients and physicians reported that they would like to communicate through email and agreed that it is useful. However, only 19% of the patients have ever communicated with their physicians via email, and only 5.1% of physicians have often communicated with their patients via email. Almost half of the patients surveyed were unaware of the possibility of this form of communication, and only 17% reported that their physician offered them his or her email address. In addition, physicians and patients did not agree on the services to be provided by email communication. For instance, almost half of the patients indicated consultation for an urgent medical matter as suitable for email communication. The use of email communication in health care is still scarce. Patients and physicians have different perspectives of its use and importance. Further rigorous research is needed to clarify the advantages and disadvantages of this form of communication, especially in the developing world. Interested physicians are encouraged to establish appropriate personal policies for email communication with adequate announcement and patient education plans.

  1. The Security Email Based on Smart Card

    Science.gov (United States)

    Lina, Zhang; Jiang, Meng Hai.

    Email has become one of the most important communication tools in modern internet society, and its security is an important issue that can't be ignored. The security requirements of Email can be summarized as confidentiality, integrity, authentication and non-repudiation. Recently many researches on IBE (identify based encrypt) have been carried out to solve these security problems. However, because of IBE's fatal flaws and great advantages of PKI (Public Key Infrastructure), PKI is found to be still irreplaceable especially in the applications based on smart card. In this paper, a construction of security Email is presented, then the design of relatively cryptography algorithms and the configuration of certificates are elaborated, and finally the security for the proposed system is discussed.

  2. Modeling Personalized Email Prioritization: Classification-based and Regression-based Approaches

    Energy Technology Data Exchange (ETDEWEB)

    Yoo S.; Yang, Y.; Carbonell, J.

    2011-10-24

    Email overload, even after spam filtering, presents a serious productivity challenge for busy professionals and executives. One solution is automated prioritization of incoming emails to ensure the most important are read and processed quickly, while others are processed later as/if time permits in declining priority levels. This paper presents a study of machine learning approaches to email prioritization into discrete levels, comparing ordinal regression versus classier cascades. Given the ordinal nature of discrete email priority levels, SVM ordinal regression would be expected to perform well, but surprisingly a cascade of SVM classifiers significantly outperforms ordinal regression for email prioritization. In contrast, SVM regression performs well -- better than classifiers -- on selected UCI data sets. This unexpected performance inversion is analyzed and results are presented, providing core functionality for email prioritization systems.

  3. Digital Literacies and Generational Micro-Cultures: Email Feedback in Lebanon

    Science.gov (United States)

    De Coursey, Christina; Dandashly, Nadine

    2015-01-01

    This study reports on the introduction of email feedback, in a private university in Lebanon with marked generational differences and a traditional instructor culture focused on grammar correction. The instructor profile showed insufficient ELT training and a disjuncture between those with low and those with long service. Instructors were trained,…

  4. On Successful E-Mail Writing

    OpenAIRE

    Vesna Vulić

    2009-01-01

    This article is intended to be a simplified guide for the efficient use of e-mail in business and private communication in English. E-mailing is frequently used as a substitute for other kinds of communication in today’s working environment, due in particular, to the fact that messages are transmitted instantly, irrespective of the distance of the recipient. Due to the speed and volume of e-mail, mastering the art of effective e-mail writing includes the knowledge of Network Etiquette o...

  5. Social networking through email : studying email usage patterns of persons with aphasia

    NARCIS (Netherlands)

    Al Mahmud, A.; Martens, J.B.O.S.

    2016-01-01

    Background: A social networking program has been developed by the Aphasia Union Netherlands (AVN) to enhance communication between older persons with aphasia (PWA) mutually and with their therapists. The medium of communication is email. Aims: The aim of the paper is to understand the email usage

  6. Etiquette for medical students' email communication with faculty members: a single-institution study.

    Science.gov (United States)

    Kim, Do-Hwan; Yoon, Hyun Bae; Yoo, Dong-Mi; Lee, Sang-Min; Jung, Hee-Yeon; Kim, Seog Ju; Shin, Jwa-Seop; Lee, Seunghee; Yim, Jae-Joon

    2016-04-27

    Email is widely used as a means of communication between faculty members and students in medical education because of its practical and educational advantages. However, because of the distinctive nature of medical education, students' inappropriate email etiquette may adversely affect their learning as well as faculty members' perception of them. Little data on medical students' competency in professional email writing is available; therefore, this study explored the strengths and weaknesses of medical students' email etiquette and factors that contribute to professional email writing. A total of 210 emails from four faculty members at Seoul National University College of Medicine were collected. An evaluation criteria and a scoring rubric were developed based on the various email-writing guidelines. The rubric comprised 10 items, including nine items for evaluation related to the email components and one item for the assessment of global impression of politeness. Three evaluators independently assessed all emails according to the criteria. Students were identified as being 61.0% male and 52.8% were in the undergraduate-entry program. The sum of each component score was 62.21 out of 100 and the mean value for global impression was 2.6 out of 4. The results demonstrated that students' email etiquettes remained low-to-mediocre for most criteria, except for readability and honorifics. Three criteria, salutation (r=0.668), closing (r=0.653), and sign-off (r=0.646), showed a strong positive correlation with the global impression of politeness. Whether a student entered a graduate-entry program or an undergraduate-entry program significantly contributed to professional email writing after other variables were controlled. Although students in the graduate-entry program demonstrated a relatively superior level of email etiquette, the majority of medical students did not write emails professionally. Educating all medical students in email etiquette may well contribute to

  7. Making Nuclear Malaysia Email Archives Portable

    International Nuclear Information System (INIS)

    Shaharum Ramli

    2013-01-01

    Nuclear Malaysia e-mails can be accessed from any computer and anywhere, even worldwide, via web access. However, this mobility is lost when the e-mails are moved to a personal computer into archive files such as Microsoft Outlook data files. Outlook e-mail archives can only be read on the computer where it is stored. This removal has to be done because of storage space constraints on the e-mail server. This paper shows how e-mail archives can be made portable, brought and read anywhere using a free portable e-mail client application such as Mozilla Thunderbird, Portable Edition. (author)

  8. THE DEVELOPMENT OF E-MAIL LITERACY: FROM WRITING TO PEERS TO WRITING TO AUTHORITY FIGURES

    Directory of Open Access Journals (Sweden)

    Chi-Fen Emily Chen

    2006-05-01

    Full Text Available Though e-mail has become a common interpersonal communication medium, it does not mean that this medium is used without difficulty. While people can write e-mails to peers in any manner they like, writing e-mails to authority figures requires higher pragmatic competence and critical language awareness of how discourse shapes and reflects power asymmetry in an institutional context. For L2 learners, the challenge of composing this type of e-mail can be greater due not only to their limited linguistic ability but also their unfamiliarity with the target culture's norms and values. To provide a deeper understanding of how an L2 learner develops e-mail literacy in the target language environment, this paper presents a longitudinal case study of a Taiwanese graduate student’s e-mail practice in English during her studies at a U.S. university for two and a half years. Using a critical discourse analysis approach, the study reveals the complexity of an L2 learner’s evolving e-mail practice and struggle for appropriateness, particularly in her e-mail communication with professors. Her development of e-mail literacy is discussed in relation to her evolving understanding of the e-mail medium, changing performance of student identity, increasing knowledge of student-professor interaction and realization of culture-specific politeness.

  9. Email medication counseling services provided by Finnish community pharmacies.

    Science.gov (United States)

    Pohjanoksa-Mäntylä, Marika K; Kulovaara, Heidi; Bell, J Simon; Enäkoski, Marianne; Airaksinen, Marja S

    2008-12-01

    The importance of email as a mode of communication between medication users and pharmacists is likely to increase. However, little is known about the email medication counseling practices of community pharmacies. To determine the prevalence of email medication counseling services in Finland and to assess the accuracy and comprehensiveness of responses by pharmacies providing the opportunity for email medication counseling to inquiries related to use of antidepressants. An inventory was made of all Finnish community pharmacies that provided the opportunity for email medication counseling. Data related to the accuracy and comprehensiveness of responses were collected, using a virtual pseudo-customer method with 3 scenarios related to common concerns of patients on antidepressants. Two inquiries were emailed to each pharmacy that provided the opportunity for email medication counseling in January and February 2005. The responses were content analyzed by 2 researchers, using a prestructured scoring system. Almost one-third (30%, n = 182) of Finnish community pharmacies maintained a working Web site, and 94% of those provided the opportunity for email medication counseling. An online "ask-the-pharmacist" service was offered by 13% (n = 23) of the pharmacies with a Web site. Pharmacies responded to 54% of the email inquiries sent by the virtual pseudo-customers. The response rate and the content score ratio between mean and maximum scores varied among the scenarios. The content score ratio was highest for the scenarios concerning the adverse effects of fluoxetine (0.53, n = 55) and interactions with mirtazapine (0.52, n = 63) and lowest for the scenario related to sexual dysfunction and weight gain associated with citalopram (0.38, n = 52). Community pharmacies are potential providers of email medication counseling services. However, more attention should be directed to responding to consumer inquiries and to the content of these responses.

  10. Computer-Mediated Communication in Psychology Teaching: Influence of Cultural Background on E-Mail Content and on Appraisal

    Science.gov (United States)

    Hansen, Miriam; Jucks, Regina

    2014-01-01

    A significant amount of communication between lecturers and students takes place via e-mail. This study provides evidence that two types of cultural cues contained in the e-mail impacts lecturers' linguistic adaptation to, and appraisal of, the student. A total of 186 psychology lecturers from universities in Germany answered a fictitious…

  11. Two Minute Training in Class Significantly Increases the Use of Professional Formatting in Student to Faculty Email Correspondence

    Science.gov (United States)

    Aguilar-Roca, Nancy; Williams, Adrienne; Warrior, Rahul; O'Dowd, Diane K.

    2009-01-01

    Many university faculty value email as an important tool for communicating with colleagues, but express frustration with a high incidence of unprofessional email correspondence from students. The goals of this study were to document the frequency of specific formatting mistakes that contribute to faculty's unfavorable perception of student emails…

  12. (Mis)Use of Email in Student-Faculty Interaction: Implications for University Instruction in Germany, Saudi Arabia, and Japan

    Science.gov (United States)

    Danielewicz-Betz, Anna

    2013-01-01

    This paper examines student-faculty communication by email and the lack of clear guidelines that leads to misuse of email in student-faculty interaction, whereby status-incongruent pragmatic markers are employed, resulting in impoliteness and inappropriateness. The main objective is to bridge the gap in research on other than requestive speech…

  13. Acceptability of a theory of planned behaviour email-based nutrition intervention.

    Science.gov (United States)

    Kothe, E J; Mullan, B A

    2014-03-01

    This study investigated feasibility and acceptability of a new email-delivered intervention promoting fruit and vegetable consumption in a university-based population of Australian young adults. The study explored whether there are differences in the reported feasibility and acceptability between demographic groups within the population of interest and at three levels of intervention intensity. The email-delivered intervention program consists of an implementation intention 'planning task' and between 3 and 15 short email messages over a 15-day study period. The intervention program was developed using the Theory of Planned Behaviour and was designed to modify perceived behavioural control. One hundred and ten participants (mean age = 19.21 years, 25.6% male) completed the feasibility and acceptability questionnaire at Day 15. This questionnaire contained items about all intervention components. High acceptability and feasibility scores were found for all intervention parts and at all levels of intervention intensity. There were few significant differences in the reported acceptability of items between key demographic sub-groups, and no differences in reported acceptability at different levels of intervention intensity. These results suggest that this email-delivered intervention is an acceptable and feasible tool for promoting fruit and vegetable consumption for participants in the target population.

  14. BEWARE OF OPENING ATTACHMENTS IN E-MAIL

    CERN Multimedia

    2000-01-01

    Following the recent e-mail viruses you are asked to be cautious when opening e-mail attachments on your PC. Attachments that are apparently harmless might hide active content producing nasty effects as soon as they are opened. Some of these so called 'Trojan horses' can conceal themselves in very attractive pictures and funny slide shows.On the PC Windows infrastructure, CERN runs software to protect users from known viruses, but new ones can sometimes arrive before our software recognises them. They can enter your system when you open an attachment. To remove them it may be necessary to re-install the Windows software on your PC.

  15. Design and development of mobile Email system based on brew and IMAP4

    International Nuclear Information System (INIS)

    Chen Liangchen; Liu Shuzhen; Yan Xiaofei; Sun Gongxing

    2007-01-01

    In order to achieve IMAP4 support agreement in the mobile e-mail client application on the smart phone, using the Qualcomm introduced wireless devices designed for the BREW platform. Research on the BREW platform mobile and IMAP4 protocol, design and implement the 3G technology standard smart phone e-mail client based on the BREW platform. (authors)

  16. Clustering and classification of email contents

    Directory of Open Access Journals (Sweden)

    Izzat Alsmadi

    2015-01-01

    Full Text Available Information users depend heavily on emails’ system as one of the major sources of communication. Its importance and usage are continuously growing despite the evolution of mobile applications, social networks, etc. Emails are used on both the personal and professional levels. They can be considered as official documents in communication among users. Emails’ data mining and analysis can be conducted for several purposes such as: Spam detection and classification, subject classification, etc. In this paper, a large set of personal emails is used for the purpose of folder and subject classifications. Algorithms are developed to perform clustering and classification for this large text collection. Classification based on NGram is shown to be the best for such large text collection especially as text is Bi-language (i.e. with English and Arabic content.

  17. E-mail, decisional styles, and rest breaks.

    Science.gov (United States)

    Baker, James R; Phillips, James G

    2007-10-01

    E-mail is a common but problematic work application. A scale was created to measure tendencies to use e-mail to take breaks (e-breaking); and self-esteem and decisional style (vigilance, procrastination, buck-passing, hypervigilance) were used to predict the self-reported and actual e-mail behaviors of 133 participants (students and marketing employees). Individuals who were low in defensive avoidance (buck-passing) engaged in more e-mailing per week, both in time spent on e-mail and message volume. E-breakers were more likely to engage in behavioral procrastination and spent more time on personal e-mail.

  18. Huria: Journal of the Open University of Tanzania - Vol 18, No 1 (2014)

    African Journals Online (AJOL)

    Huria: Journal of the Open University of Tanzania. ... Convergence of Distance Education and Conventional Learning: ... Challenges of Implementing Quality Assurance Systems in Blended Learning in Uganda: ... Learning Programmes: A Case Study of the Institute of Adult Education · EMAIL FULL TEXT EMAIL FULL TEXT

  19. Legal and policy issues associated with monitoring employee E-mail

    Energy Technology Data Exchange (ETDEWEB)

    Segura, M.A.; Rither, A.C.

    1997-01-01

    This paper examines the legal issues involved with employer monitoring of employee e-mail. In addition to identifying pertinent legal issues, the paper provides guidelines that will help the Pacific Northwest National Laboratory (PNNL) establish a program for monitoring outgoing e-mail to insure compliance with company policies, particularly those regarding protection of trade secrets and proprietary information, and to comply with the Department of Energy`s (DOE) procedures for protecting Export Controlled Information (ECI). Electronic communication has allowed companies to enhance efficiency, responsiveness and effectiveness. E-mail allows employees to transmit all types of data to other individuals inside and outside of their companies. The ease with which information can be transmitted by e-mail has placed trade secrets, proprietary information, and other sensitive data at risk from inadvertent disclosure by employees. As employers attempt to protect their interests through measures such as monitoring e-mail, they may expose themselves to liability under federal and state laws for violating employee privacy. Business use of e-mail has proliferated so rapidly that the federal and state legal systems have not been able to adequately address the issues arising out of its use in the workplace.

  20. Mifrenz: Safe email for children

    Directory of Open Access Journals (Sweden)

    Tim Hunt

    Full Text Available Products currently available for monitoring children\\'s email usage are either considered to encourage dubious ethical behaviour or are time consuming for parents to administer. This paper describes the development of a new email client application for children called Mifrenz. This new application gives parents the ability to let their children safely use email, with the minimum of intervention. It was developed using mostly free software and also with the desire to provide real first hand programming examples to demonstrate to students.

  1. MedlinePlus Connect: Email List

    Science.gov (United States)

    ... MedlinePlus Connect → Email List URL of this page: https://medlineplus.gov/connect/emaillist.html MedlinePlus Connect: Email ... will change.) Old URLs New URLs Web Application https://apps.nlm.nih.gov/medlineplus/services/mpconnect.cfm? ...

  2. The Importance of Etiquette in School Email

    Science.gov (United States)

    Filippone, Monica; Survinski, Melissa

    2016-01-01

    This article investigates the appropriate use of email among secondary and postsecondary students and instructors and provides recommendations for proper email etiquette. A review of the current literature shows that poor email etiquette can impact the working relationship between teachers and students. Evidence indicates that email etiquette must…

  3. Helping Students with Cognitive Disabilities Improve Social Writing Skills through Email Modeling and Scaffolding

    Science.gov (United States)

    Wang, Xiao-lei; Eberhard, Dominique; Voron, Mike; Bernas, Ronan

    2016-01-01

    The purpose of this study is to examine the effects of email modeling and scaffolding on the social writing quality of students with cognitive disabilities. Ten students from a university-affiliated lab school (mean age = 19.3; SD = 1.2) with an average of IQ of 55.30 (SD = 5.98) and 10 teacher candidates in a university teacher education…

  4. 77 FR 33895 - Universal Service Contribution Methodology; a National Broadband Plan for Our Future

    Science.gov (United States)

    2012-06-07

    ... contribution system in an effort to promote efficiency, fairness, and sustainability. The Commission seeks... improved; and recovery of universal service contributions from consumers. DATES: Comments are due on or... print, electronic files, audio format), send an email to [email protected] or call the Consumer...

  5. Common Knowledge in Email Exchanges

    NARCIS (Netherlands)

    Sietsma, F.; Apt, K.R.

    We consider a framework in which a group of agents communicates by means of emails, with the possibility of replies, forwards and blind carbon copies (BCC). We study the epistemic consequences of such email exchanges by introducing an appropriate epistemic language and semantics. This allows us to

  6. Common knowledge in email exchanges

    NARCIS (Netherlands)

    Sietsma, F.; Apt, K.R.

    2011-01-01

    We consider a framework in which a group of agents communicates by means of emails, with the possibility of replies, forwards and blind carbon copies (BCC). We study the epistemic consequences of such email exchanges by introducing an appropriate epistemic language and semantics. This allows us to

  7. CORPORATE E-MAIL SERVICE GOOGLE APPS AS AN INSTRUMENT OF ACTIVITY OF ORGANIZATIONAL-EDUCATIONAL UNITS OF THE HIGHER EDUCATIONAL INSTITUTION

    Directory of Open Access Journals (Sweden)

    Кarpenko А.

    2017-03-01

    Full Text Available The advantages of usage of cloud technologies, particularly, of Gmail service Google Apps in work of organizational-educational units of higher educational institutions are analyzed in this work. The main accents are put concerning usage of corporate e-mail Gmail service Google Apps, with the help of which informational-analytical support of activity of organizational-educational units of the University is provided. The author of the publication underlines key advantages of Gmail and analyses its opportunities. Main characteristics of corporate e-mail Gmail service Google Apps are described. It is identified that implementation of corporate e-mail Gmail service Google Apps is a part of creation of certain information system, that will ensure united information space of a modern higher educational institution. Effective organization of educational process, that was used by methodist of organizational-educational units (Scientific-methodological centre of research, scientific projects and programs of Borys Grinchenko Kyiv University in the work of corporate mail Gmail service Google Aps is analyzed and presented. It is identified, that creation and improvement of mechanisms of building corporate content with the help of Gmail service Google Apps will allow the collaborators of organizational-educational units of the higher educational institution to plan and organize educational process. Such organization of educational process optimizes the activity of organizational-educational units of higher educational institutions.

  8. Association between secure patient-clinician email and clinical services utilisation in a US integrated health system: a retrospective cohort study.

    Science.gov (United States)

    Meng, Di; Palen, Ted E; Tsai, Joanne; McLeod, Melanie; Garrido, Terhilda; Qian, Heather

    2015-11-09

    To assess associations between secure patient-clinician email use and clinical services utilisation over time. Retrospective cohort study between July 2010 and December 2013. Controlling for a utilisation surge around first secure email use, we analysed difference of differences between propensity score-matched groups of secure patient-clinician email users and non-users for utilisation 1-12 months before and 7-18 months after first email (users) or a randomly assigned index date (non-users). US integrated healthcare delivery system. 9345 adults with first secure email use between July 2011 and July 2012 and continuous enrolment for ≥30 months and 9345 adults without secure email use between July 2010 and July 2012 matched to users on demographics, health status, and baseline utilisation. Rates of office visits, patient-initiated phone calls, scheduled telephone visits, after-hours clinic visits, emergency department visits, and hospitalisations. After controlling for multiple factors, no statistically significant differences in utilisation between secure email users and non-users occurred. Utilisation transiently increased by 88-237% around first email use. Annual rates of patient-initiated phone calls decreased among secure email users, 0.2 fewer calls per person (95% CI -0.3 to -0.1), from a mean of 4.1 calls per person 1-12 months before first use to a mean of 3.8 calls per person 7-18 months after first use. Rates of patient-initiated phone calls also decreased among non-users, 0.1 fewer calls per person (95% CI -0.2 to 0.0), from a mean of 4.2 calls per person 1-12 months before the index date to mean of 4.1 calls per person 7-18 months after the index date. Compared with non-users, patient use of secure email with clinicians was not associated with statistically significant differences in clinical services utilisation 7-18 months after first use. Published by the BMJ Publishing Group Limited. For permission to use (where not already granted

  9. Detection of Illegitimate Emails using Boosting Algorithm

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah; Wiil, Uffe Kock

    2011-01-01

    and spam email detection. For our desired task, we have applied a boosting technique. With the use of boosting we can achieve high accuracy of traditional classification algorithms. When using boosting one has to choose a suitable weak learner as well as the number of boosting iterations. In this paper, we......In this paper, we report on experiments to detect illegitimate emails using boosting algorithm. We call an email illegitimate if it is not useful for the receiver or for the society. We have divided the problem into two major areas of illegitimate email detection: suspicious email detection...

  10. Email communication at the medical primary-secondary care interface: a qualitative exploration.

    Science.gov (United States)

    Sampson, Rod; Barbour, Rosaline; Wilson, Philip

    2016-07-01

    There is little published research into the influence of email communication between primary and secondary care clinicians on patient care. To explore the use of email communication between clinicians across the primary- secondary care interface, and how this may relate to patient care. A qualitative study involving primary and secondary care services in the NHS Highland Health Board area, Scotland. Ten GPs and 12 hospital consultants were purposively sampled to reflect diversity. Eligible clinicians were invited to take part in a semi-structured interview. Data were analysed using a thematic analysis approach. Key themes that emerged for clinicians included general perceptions of email; using email in practice (managing workload, impact on patient journeys, and 'quick answers'); system issues (variability and governance); relational aspects; and email skills. Email communication between primary and secondary care clinicians generally has a positive impact on patient access to specialist expertise. Governance issues around the use of clinical email need to be defined. There may currently be a two-tier health service for those patients (and their GPs) requiring 'quick answers'. © British Journal of General Practice 2016.

  11. Voting-based Classification for E-mail Spam Detection

    Directory of Open Access Journals (Sweden)

    Bashar Awad Al-Shboul

    2016-06-01

    Full Text Available The problem of spam e-mail has gained a tremendous amount of attention. Although entities tend to use e-mail spam filter applications to filter out received spam e-mails, marketing companies still tend to send unsolicited e-mails in bulk and users still receive a reasonable amount of spam e-mail despite those filtering applications. This work proposes a new method for classifying e-mails into spam and non-spam. First, several e-mail content features are extracted and then those features are used for classifying each e-mail individually. The classification results of three different classifiers (i.e. Decision Trees, Random Forests and k-Nearest Neighbor are combined in various voting schemes (i.e. majority vote, average probability, product of probabilities, minimum probability and maximum probability for making the final decision. To validate our method, two different spam e-mail collections were used.

  12. Email Negotiation

    DEFF Research Database (Denmark)

    Bülow, Anne Marie

    the other of the justice of their cause. For a negotiation involving the wording of a contract, the evidence suggests that, while there is a distinct advantage in the features of reviewability and revisablity, the email format allows selective attention to the other party’s arguments, which can be shown...

  13. Save our inboxes! Use e-mail wisely

    CERN Multimedia

    Achintya Rao

    2013-01-01

    At CERN, with collaborators all over the world, e-mail is inevitably the primary means of communication: we use it for everything from coordinating projects to organising lunches. But e-mail can also be one of the most inefficient means of communication we have! Here's how to fix it.   Let’s get straight to the point: we receive too many e-mails. Think about all the e-mails that you deleted without a second thought. Think about the times you’ve unnecessarily been in CC. Take a look at the unread e-mails sitting in your inbox at this very moment, ones that you have no intention of ever looking at. You can, however, tame this overload with a few simple measures and turn e-mail into an important communication and productivity tool. Many recommendations for improving e-mail etiquette suggest an abrasive approach riddled with bullet points. In a vastly multi-cultural setting such as CERN, however this approach may fail. So, here are a few dos and don’ts based o...

  14. Nottingham Trent University and Makerere University School of Public Health partnership: experiences of co-learning and supporting the healthcare system in Uganda.

    Science.gov (United States)

    Musoke, David; Gibson, Linda; Mukama, Trasias; Khalil, Yesmean; Ssempebwa, John C

    2016-03-28

    Partnerships between developed and developing country institutions are increasingly becoming important in addressing contemporary global health challenges faced by health systems. Inter-university health collaboration such as the Nottingham Trent University (UK) and Makerere University School of Public Health (Uganda) partnership provide opportunities for working together in training, research and service delivery while strengthening health systems. This paper shares the experiences, achievements and opportunities of this partnership in co-learning and supporting the health system in Uganda. This includes a project being implemented to strengthen the training, supervision and motivation of community health workers in rural Uganda. Training and research are a key focus of the partnership and have involved both staff and students of both institutions including guest lectures, seminars and conference presentations. The partnership's collaboration with stakeholders such as the Ministry of Health (Uganda) and local health authorities has ensured participation necessary in supporting implementation of sustainable interventions. The partnership uses several channels such as email, telephone, Skype, Dropbox and WhatsApp which have been useful in maintaining constant and effective communication. The challenges faced by the partnership include lack of funding to support student mobility, and varying academic schedules of the two institutions. The experiences and prospects of this growing partnership can inform other collaborations in similar settings.

  15. DESCRIPTIVE STUDY OF HONORIFIC USE IN KOREAN EMAIL DISCOURSE

    Directory of Open Access Journals (Sweden)

    Jaegu Kim

    2016-07-01

    Full Text Available It is a relatively new field that examines how Korean culture affects Korean language use in terms of age difference in a corpus of computer mediated email discourse. The purpose of this descriptive study and experiment is to prove the close relationship between Korean language and culture. This paper shows the descriptive study of Korean culture in relation to language use. Korean culture acknowledges an inherent hierarchy with regard to age, and considers [+age] as relating socially to [+power]. When younger Koreans converse with older ones, they express different morpho-syntactic patterns, which is an age complex. The main task of the experiment was to examine the way through which the age complex is reflected by Korean honorific linguistic system in email discourse. I asked 15 Korean native speakers between the ages of 20 to 25 to write emails expressing an impositive request to [+age (46-50 years old], [-age (below 25 years old] and [=age] recipients. The results show significant differences in the use of grammatical features in emails written to [+age] recipients, as compared to emails written to [-age] and [=age] recipients. The implication of the findings is that the cultural values that are attached to age and aging in the Korean society affects Koreans’ language use, which means Korean language and culture are closely intermingled.

  16. A User Authentication Based on Personal History- A User Authentication System Using E-mail History -

    Directory of Open Access Journals (Sweden)

    Masakatsu Nishigaki

    2007-04-01

    Full Text Available This paper proposes a user authentication using personal history of each user. Here, authentication is done by giving answers to questions about the history of user's daily life. Users do not have to memorize any password, since the passwords are what users already know by experience. In addition, everyday-life experience increases day by day, and thus the question could change on every authentication trial. In this paper, a user authentication system using user's e-mail history is shown as a prototype of our proposal, and some basic experiments to evaluate the availability of the system are carried out.

  17. Conversation Threads Hidden within Email Server Logs

    Science.gov (United States)

    Palus, Sebastian; Kazienko, Przemysław

    Email server logs contain records of all email Exchange through this server. Often we would like to analyze those emails not separately but in conversation thread, especially when we need to analyze social network extracted from those email logs. Unfortunately each mail is in different record and those record are not tided to each other in any obvious way. In this paper method for discussion threads extraction was proposed together with experiments on two different data sets - Enron and WrUT..

  18. Email communication at the medical primary–secondary care interface: a qualitative exploration

    Science.gov (United States)

    Sampson, Rod; Barbour, Rosaline; Wilson, Philip

    2016-01-01

    Background There is little published research into the influence of email communication between primary and secondary care clinicians on patient care. Aim To explore the use of email communication between clinicians across the primary– secondary care interface, and how this may relate to patient care. Design and setting A qualitative study involving primary and secondary care services in the NHS Highland Health Board area, Scotland. Ten GPs and 12 hospital consultants were purposively sampled to reflect diversity. Method Eligible clinicians were invited to take part in a semi-structured interview. Data were analysed using a thematic analysis approach. Results Key themes that emerged for clinicians included general perceptions of email; using email in practice (managing workload, impact on patient journeys, and ‘quick answers’); system issues (variability and governance); relational aspects; and email skills. Conclusion Email communication between primary and secondary care clinicians generally has a positive impact on patient access to specialist expertise. Governance issues around the use of clinical email need to be defined. There may currently be a two-tier health service for those patients (and their GPs) requiring ‘quick answers’. PMID:27162209

  19. Understanding email communication of persons with aphasia

    NARCIS (Netherlands)

    Al Mahmud, A.; Martens, J.B.O.S.

    2011-01-01

    An email program has been developed by the Aphasia Union Netherlands (AVN) to enhance communication between aphasics mutually and with their therapists. In this paper we report intermediate evaluation results of the AVN email program. We evaluated the email program in two ways: a. by analyzing the

  20. Publication’s e-mail marketing procedure

    OpenAIRE

    Ebrahim, Nader Ale

    2016-01-01

    Your research findings and publications have to reach thousands of your peers and colleagues by sending an email. If you have recently published a study that would be of interest to others in your field, market it through email. “E-mail marketing” allow the researchers to increase the research impact and citations for their publications. This workshop will provide various techniques to increase the visibility and enhance the impact of researcher’s output by employing the publications E-mail m...

  1. Decisional style, mood and work communication: email diaries.

    Science.gov (United States)

    Shirren, S; Phillips, J G

    2011-10-01

    To understand the use of technology to support interpersonal interaction, a theory of decisional style was applied to email use within the workplace. Previous research has used self-report and rating scales to address employee email behaviours, but this falls short of management's capability to monitor the actual behaviour. Thirty-nine employed individuals completed a five-day communication diary recording their actual behaviour upon receiving personal and work-related emails as well as the Melbourne Decision Making Questionnaire and the Depression Anxiety Stress Scales. It was found that vigilant individuals were more likely to use email in an efficient manner by deleting personal email and being less likely to open email later. Procrastinators, buckpassers and people experiencing high levels of negative affect were all more likely to delay dealing with email, which could be viewed as dealing with email in a less efficient manner. STATEMENT OF RELEVANCE: This work offers insights as to how people receive and process emails and is thus relevant to the development and implementation of collaborative technologies. Whilst other studies use individual's self-reports, this study uses a more accurate communication diary. Decisional style can predict the monitoring and response to electronic communication.

  2. Email Adaptation for Conflict Handling

    DEFF Research Database (Denmark)

    Lee, Joyce Yi‐Hui; Panteli, Niki; Bülow, Anne Marie

    2018-01-01

    This paper explores the context of email‐based communication in anestablished but fragile, inter‐organisational partnership, which wasoften overlain with conflict. Drawing upon adaptation theory, thisstudy explores how participants adapt to the use of email to handleconflict. Extensive data were...... obtained during a 6‐month field studyof a case of cross‐border inter‐organisational collaboration in EastAsia. We observed that the individuals involved in the cross‐borderpartnership used email as a lean form of communication to stopcovert conflict from explicitly emerging. In contrast to prior researchon...... the leanness of email in managing conflict, we found that underthe described conflict situation the very leanness of emailwas appreciated and thus, exploited by those concerned tomanage the conflict situation. Specifically, we identified 4 keyconflict‐triggered adaptation strategies, namely...

  3. Investigasi Forensik Pada E-Mail Spoofing Menggunakan Metode Header Analysis

    OpenAIRE

    Hoiriyah, Hoiriyah; Sugiantoro, Bambang; Prayudi, Yudi

    2016-01-01

    Email merupakan salah satu fasilitas internet yang banyak digunakan untuk komunikasi dan bertukar informasi. Hal ini memungkinkan pihak ketiga menyalahgunakan email untuk mendapatkan informasi secara ilegal dengan mengubah identitas pengirim email dan menjadikannya seperti email yang berasal dari email yang sah (legitimate email), aktivitas tersebut biasa dikenal dengan istilah email spoofing. Untuk dapat mendeteksi adanya email spoofing, maka perlu adanya investigasi forensik email terhadap ...

  4. The role of email addresses and email contact in encouraging web response in a mixed mode design

    OpenAIRE

    Cernat, Alexandru; Lynn, Peter

    2014-01-01

    We examine whether propensity to participate in a web-CAPI mixed-mode survey is influenced by being contacted by email in addition to mail. In panel surveys, researchers can ask at each wave for an email address, but there is little evidence regarding the value of doing so. Using data from a large sample with an experimental design (IP5) we find that using a respondent-supplied email address to send additional invites and reminders does not affect response rates compared to using mailed invit...

  5. Factors that impact nurses' use of electronic mail (e-mail).

    Science.gov (United States)

    Hughes, J A; Pakieser, R A

    1999-01-01

    As electronic applications are used increasingly in healthcare, nurses are being challenged to adopt them. Electronic mail (e-mail) is an electronic tool with general as well as healthcare uses. E-mail use may be an opportunity to learn a tool that requires skills similar to those used in other applications. This study aimed to identify barriers and facilitators that impact nurses' use of e-mail in the workplace. Data for this study were gathered using focus group methodology. Content analysis identified and labeled factors into seven major categories. Specific factors identified were generally consistent with those previously described in the literature as affecting use of computers in general. However, there were several additional factors identified that were not reported in other previous studies: lack of face-to-face communication, individual writing skills, recency of any educational experience, volume of mail received, password integrity, and technical support. Findings from this study provide information for any individual involved in introducing or updating an e-mail system in a healthcare environment.

  6. CEAI: CCM based Email Authorship Identification Model

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah

    2013-01-01

    In this paper we present a model for email authorship identification (EAI) by employing a Cluster-based Classification (CCM) technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature-set to include some...... more interesting and effective features for email authorship identification (e.g. the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell). We also included Info Gain feature selection based...... reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM)-based models, as well as the models proposed by Iqbal et al. [1, 2]. The proposed model attains an accuracy rate of 94% for 10...

  7. Patient perceptions of text-messages, email, and video in dermatologic surgery patients.

    Science.gov (United States)

    Hawkins, Spencer D; Barilla, Steven; Williford, Phillip Williford M; Feldman, Steven R; Pearce, Daniel J

    2017-04-14

    We developed dermatology patient education videos and a post-operative text message service that could be accessed universally via web based applications. A secondary outcome of the study was to assess patient opinions of text-messages, email, and video in the health care setting which is reported here. An investigator-blinded, randomized, controlled intervention was evaluated in 90 nonmelanoma MMS patients at Wake Forest Baptist Dermatology. Patients were randomized 1:1:1:1 for exposure to: 1) videos with text messages, 2) videos only, 3) text messages-only, or 4) standard of care. Assessment measures were obtained by the use of REDCap survey questions during the follow up visit. 1) 67% would like to receive an email with information about the procedure beforehand 2) 98% of patients reported they would like other doctors to use educational videos as a form of patient education 3) 88% of our patients think it is appropriate for physicians to communicate to patients via text message in certain situations. Nearly all patients desired physicians to use text-messages and video in their practice and the majority of patients preferred to receive an email with information about their procedure beforehand.

  8. Email for clinical communication between healthcare professionals.

    Science.gov (United States)

    Goyder, Clare; Atherton, Helen; Car, Mate; Heneghan, Carl J; Car, Josip

    2015-02-20

    Email is one of the most widely used methods of communication, but its use in healthcare is still uncommon. Where email communication has been utilised in health care, its purposes have included clinical communication between healthcare professionals, but the effects of using email in this way are not well known. We updated a 2012 review of the use of email for two-way clinical communication between healthcare professionals. To assess the effects of email for clinical communication between healthcare professionals on healthcare professional outcomes, patient outcomes, health service performance, and service efficiency and acceptability, when compared to other forms of communicating clinical information. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 9 2013), MEDLINE (OvidSP) (1946 to August 2013), EMBASE (OvidSP) (1974 to August 2013), PsycINFO (1967 to August 2013), CINAHL (EbscoHOST) (1982 to August 2013), and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched November 2013). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies, and interrupted time series studies examining interventions in which healthcare professionals used email for communicating clinical information in the form of: 1) unsecured email, 2) secure email, or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two authors independently assessed studies for inclusion, assessed the included studies' risk of bias, and extracted data. We contacted study authors for additional information and have reported all measures as per the study report. The previous version of this review included one randomised controlled

  9. Theoretical Approaches on Successful Email Marketing Campaigns

    Directory of Open Access Journals (Sweden)

    Camelia Budac

    2016-01-01

    This paper aims to bring some clarifications on what could bring success to email marketingcampaigns. Responses are related to how sent emails can draw the attention of people (ie how theycan be observed, given that, users’ inboxes are invaded by messages of all kinds, how to measurethe results of a campaign and which are the best practices through which we can get higher returnsfrom email marketing campaigns.

  10. E-mail marketing grows up: a primer for the managed care industry.

    Science.gov (United States)

    Dysart, J

    2000-02-01

    Managed care plans are jumping onto the electronic marketing bandwagon in a big way, taking advantage of not only the basic E-mail system but also expanding on that medium and developing creative vehicles to send the health plan's message. In this article, the author describes how E-mail technology is being used to hone the marketing edge in MCOs.

  11. Using viral e-mails to distribute tobacco control advertisements: an experimental investigation.

    Science.gov (United States)

    Carter, Owen B J; Donovan, Robert; Jalleh, Geoffrey

    2011-08-01

    The authors' objective was to conduct a trial of viral e-mail marketing as a distribution method for tobacco control advertisements. University students (n = 200) in the state of Western Australia were randomly allocated to receive 1 of 2 e-mails with hyperlinks to tobacco control advertisements ("Toilet" and "Rubbish") emphasizing the disgusting nature of smoking. Recipients followed a hyperlink to a Web page playing Toilet or Rubbish on endless loop. Viewers were encouraged to forward the e-mail to their friends and invited to complete an online survey about the advertisement. Unique downloads for each advertisement were identified by internet provider (IP) location and tallied by date and geographical location to assess subsequent dissemination beyond the initial 200 students. There were 826 unique viewings of the advertisements averaging 26.9 viewings per day for the first fortnight, followed by a lower average of 4.1 hits per day for the next 3.5 months. IP addresses identified hits from 3 other Australian states and 7 other countries. Online surveys were completed by 103 respondents (12.5% of total hits) but included few smokers (n = 9). Significantly more respondents rated Toilet as "funny" compared with Rubbish (40% vs. 11%; p e-mail sent but daily hits rapidly deteriorated over time. Entertainment appears to facilitate viral e-mails being forwarded onwards but only exceptionally compelling tobacco control materials are ever likely to become self-perpetuating.

  12. Effectiveness and Limitations of E-Mail Security Protocols

    OpenAIRE

    M. Tariq Banday

    2011-01-01

    Simple Mail Transport Protocol is the most widely adopted protocol for e-mail delivery. However, it lackssecurity features for privacy, authentication of sending party, integrity of e-mail message, nonrepudiationand consistency of e-mail envelope. To make e-mail communication secure and private,e-mail servers incorporate one or more security features using add-on security protocols. The add-onsecurity protocols provide a reasonable security but have several limitations. This paper discussesli...

  13. INVESTIGATION OF E-MAIL TRAFFIC BY USING ZERO-INFLATED REGRESSION MODELS

    Directory of Open Access Journals (Sweden)

    Yılmaz KAYA

    2012-06-01

    Full Text Available Based on count data obtained with a value of zero may be greater than anticipated. These types of data sets should be used to analyze by regression methods taking into account zero values. Zero- Inflated Poisson (ZIP, Zero-Inflated negative binomial (ZINB, Poisson Hurdle (PH, negative binomial Hurdle (NBH are more common approaches in modeling more zero value possessing dependent variables than expected. In the present study, the e-mail traffic of Yüzüncü Yıl University in 2009 spring semester was investigated. ZIP and ZINB, PH and NBH regression methods were applied on the data set because more zeros counting (78.9% were found in data set than expected. ZINB and NBH regression considered zero dispersion and overdispersion were found to be more accurate results due to overdispersion and zero dispersion in sending e-mail. ZINB is determined to be best model accordingto Vuong statistics and information criteria.

  14. Detection of Spam Email by Combining Harmony Search Algorithm and Decision Tree

    Directory of Open Access Journals (Sweden)

    M. Z. Gashti

    2017-06-01

    Full Text Available Spam emails is probable the main problem faced by most e-mail users. There are many features in spam email detection and some of these features have little effect on detection and cause skew detection and classification of spam email. Thus, Feature Selection (FS is one of the key topics in spam email detection systems. With choosing the important and effective features in classification, its performance can be optimized. Selector features has the task of finding a subset of features to improve the accuracy of its predictions. In this paper, a hybrid of Harmony Search Algorithm (HSA and decision tree is used for selecting the best features and classification. The obtained results on Spam-base dataset show that the rate of recognition accuracy in the proposed model is 95.25% which is high in comparison with models such as SVM, NB, J48 and MLP. Also, the accuracy of the proposed model on the datasets of Ling-spam and PU1 is high in comparison with models such as NB, SVM and LR.

  15. Are You Managing Your Email - Or is Email Managing You? An Analysis of Email Among Personnel Within Army Project Management Offices

    National Research Council Canada - National Science Library

    Baroni, Brian; Cook, Linda; Keitelman, Marian; Miller, Steven; Wardle, Adelia

    2005-01-01

    Based on a class project that developed leadership communication competencies for seven levels of Army civilians, email was found to be the most prevalent means of communication, regardless of leadership level...

  16. PENGIRIMAN E-MAIL SPAM SEBAGAI KEJAHATAN CYBER DI INDONESIA

    Directory of Open Access Journals (Sweden)

    Eka Nugraha Putra

    2018-01-01

    Full Text Available The Internet is part of the development of technology, where the internet provides many impacts, both positive and negative. Currently, privacy issues on the internet have also become a complicated legal issue, this is due to quite a number of privacy-related issues, but not all countries in the world manage privacy issues on the internet. As a means of communicating the Internet has introduced e-mail that provides convenience and practicality. But in its development e-mail has an adverse impact on its users in the form of e-mail spam. In terms of its actions, sending spam e-mail is quite a disadvantage, even violate the privacy. Some countries have also set it to one type of cybercrime (cybercrime. This research will discuss e-mail spam in Indonesia, how the legislation in Indonesia see the action of this spam e-mail, is there any possibility of spam e-mail is criminalized as a cybercrime. The research will also look at how spam e-mails violate privacy and review and analyze internet privacy settings in Indonesia in relation to the criminalization of spam email.

  17. Reaching consumers: How the tobacco industry uses email marketing.

    Science.gov (United States)

    Brock, Betsy; Carlson, Samantha C; Moilanen, Molly; Schillo, Barbara A

    2016-12-01

    Tobacco companies are restricted from engaging in many traditional forms of marketing. Direct marketing is one way tobacco companies can reach consumers while complying with regulation and avoiding negative public perception. There is little research on this type of opt-in marketing, which includes mail marketing, email marketing, web marketing, and mobile marketing, and its impact is not well understood. This study examined 6990 tobacco company emails received by individuals living in the state of Minnesota, US between January 2010 and May 2015 to determine email frequency by brand. These emails were gathered as part of ongoing surveillance of tobacco industry direct marketing. A subset of these emails received between October 2014 and May 2015 (n = 1646) were content analyzed to identify the purpose of the email communication along with type of product promoted. Tobacco companies use email to communicate with consumers on a regular basis. This communication was observed to be as frequent as nine times per month. Emails are most commonly used to promote contests (54.1%), content on tobacco company websites (39.1%), and tobacco coupons (15.7%). Email promotion of menthol-flavored tobacco products was common and was associated with promotion of coupons. Emails promoting menthol had a 1.9 times higher prevalence of also promoting coupons (95% CI: 1.52-2.37). Little is known about tobacco company email marketing and this study fills an identified research gap. A deeper understanding of this type of marketing is needed in order to counter tobacco industry messaging and advance tobacco control.

  18. Reaching consumers: How the tobacco industry uses email marketing

    Directory of Open Access Journals (Sweden)

    Betsy Brock

    2016-12-01

    Full Text Available Tobacco companies are restricted from engaging in many traditional forms of marketing. Direct marketing is one way tobacco companies can reach consumers while complying with regulation and avoiding negative public perception. There is little research on this type of opt-in marketing, which includes mail marketing, email marketing, web marketing, and mobile marketing, and its impact is not well understood. This study examined 6990 tobacco company emails received by individuals living in the state of Minnesota, US between January 2010 and May 2015 to determine email frequency by brand. These emails were gathered as part of ongoing surveillance of tobacco industry direct marketing. A subset of these emails received between October 2014 and May 2015 (n = 1646 were content analyzed to identify the purpose of the email communication along with type of product promoted. Tobacco companies use email to communicate with consumers on a regular basis. This communication was observed to be as frequent as nine times per month. Emails are most commonly used to promote contests (54.1%, content on tobacco company websites (39.1%, and tobacco coupons (15.7%. Email promotion of menthol-flavored tobacco products was common and was associated with promotion of coupons. Emails promoting menthol had a 1.9 times higher prevalence of also promoting coupons (95% CI: 1.52–2.37. Little is known about tobacco company email marketing and this study fills an identified research gap. A deeper understanding of this type of marketing is needed in order to counter tobacco industry messaging and advance tobacco control.

  19. Using Email to Improve Parental Involvement in Middle School

    Science.gov (United States)

    Radin, Benjamin Theodore

    2013-01-01

    The purpose of this study was to test the relationship between the type of school-to-home communication (regularly sent, structured emails versus ad hoc emails), the originator of these emails (teacher or student), and Parental Involvement (PI) as measured according to the frequency of email contact and distribution of student and parent emails…

  20. Teaching Email Politeness in the EFL/ESL Classroom

    Science.gov (United States)

    Economidou-Kogetsidis, Maria

    2015-01-01

    Writing status-congruent emails is a skill that requires high pragmatic competence and awareness of the politeness conventions and email etiquette that need to be followed. Planning and composing such emails pose a greater challenge for EFL learners who use English in "lingua franca" communication (ELF), as they not only often struggle…

  1. Email and Epistolary technologies: Presence, Intimacy, Disembodiment

    Directory of Open Access Journals (Sweden)

    Esther Milne

    2003-01-01

    Full Text Available A key problem for critical media practice is how to assess accurately the technological impact, historical significance and cultural consequences of a particular change in a communications system. Contemporary theorising about the impact of electronic, digitally networked culture is often articulated within an eschatological narrative of apocalypse and last things. The old is cast as naive and redundant while the new appears triumphant, conquering and redemptive. Washing away the sins of the old, the new technology arrives, it seems, out of nowhere. In response to such socio-technological representations, this paper argues that the dialectic between old and new communication systems is more complex than has been assumed by contemporary media theory. Rather than a narrative of radical changes, decisive shifts and abrupt breaks, the relation between epistolary and email technology reveals certain continuities. Specifically, tropes of presence and intimacy are traced through three media sites: a "virtual community" of British nineteenth-century letter writers, the postcard correspondence of an Australian First World War soldier and a twenty first century email discussion list. Mapping these sites reveals a central paradox of technological and discursive cultural practice, namely, that material signifiers can be used to produce incorporeal presence.

  2. CEAI: CCM-based email authorship identification model

    Directory of Open Access Journals (Sweden)

    Sarwat Nizamani

    2013-11-01

    Full Text Available In this paper we present a model for email authorship identification (EAI by employing a Cluster-based Classification (CCM technique. Traditionally, stylometric features have been successfully employed in various authorship analysis tasks; we extend the traditional feature set to include some more interesting and effective features for email authorship identification (e.g., the last punctuation mark used in an email, the tendency of an author to use capitalization at the start of an email, or the punctuation after a greeting or farewell. We also included Info Gain feature selection based content features. It is observed that the use of such features in the authorship identification process has a positive impact on the accuracy of the authorship identification task. We performed experiments to justify our arguments and compared the results with other base line models. Experimental results reveal that the proposed CCM-based email authorship identification model, along with the proposed feature set, outperforms the state-of-the-art support vector machine (SVM-based models, as well as the models proposed by Iqbal et al. (2010, 2013 [1,2]. The proposed model attains an accuracy rate of 94% for 10 authors, 89% for 25 authors, and 81% for 50 authors, respectively on Enron dataset, while 89.5% accuracy has been achieved on authors’ constructed real email dataset. The results on Enron dataset have been achieved on quite a large number of authors as compared to the models proposed by Iqbal et al. [1,2].

  3. The Educational Impact of E-Mail: Extraverted versus Introverted Students.

    Science.gov (United States)

    Kunderewicz, Larisa; Michener, Stacey; Chambliss, Catherine

    College students (N=151) completed surveys assessing the relationship between e-mail use and extraversion. The variables studied included time spent on e-mail; the frequency of e-mail usage; and the purposes e-mail served for each student. The results suggest that extraverts use e-mail as a form of procrastination more than introverts, and that…

  4. Anticipating hidden text salting in emails (extended abstract)

    OpenAIRE

    Lioma, Christina; Moens, Marie-Francine; Gomez, Juan Carlos; De Beer, Jan; Bergholz, Andre; Paass, Gerhard; Horkan, Patrick

    2008-01-01

    Salting is the intentional addition or distortion of content, aimed to evade automatic filtering. Salting is usually found in spam emails. Salting can also be hidden in phishing emails, which aim to steal personal information from users. We present a novel method that detects hidden salting tricks as visual anomalies in text. We solely use these salting tricks to successfully classify emails as phishing (F-measure >90%).

  5. Using Rhythms of Relationships to Understand Email Archives

    National Research Council Canada - National Science Library

    Perer, Adam; Shneiderman, Ben; Oard, Douglas W

    2005-01-01

    ...: analyzing the temporal rhythms of social relationships. We provide methods for constructing meaningful rhythms from the email headers by identifying relationships and interpreting their attributes. With these visualization techniques, email archive explorers can uncover insights that may have been otherwise hidden in the archive. We apply our methods to an individual's fifteen-year email archive, which consists of about 45,000 messages and over 4,000 relationships.

  6. Technology Corner: Analysing E-mail Headers For Forensic Investigation

    Directory of Open Access Journals (Sweden)

    M. Tariq Banday

    2011-06-01

    Full Text Available Electronic Mail (E-Mail, which is one of the most widely used applications of Internet, has become a global communication infrastructure service.  However, security loopholes in it enable cybercriminals to misuse it by forging its headers or by sending it anonymously for illegitimate purposes, leading to e-mail forgeries. E-mail messages include transit handling envelope and trace information in the form of structured fields which are not stripped after messages are delivered, leaving a detailed record of e-mail transactions.  A detailed header analysis can be used to map the networks traversed by messages, including information on the messaging software and patching policies of clients and gateways, etc. Cyber forensic e-mail analysis is employed to collect credible evidence to bring criminals to justice. This paper projects the need for e-mail forensic investigation and lists various methods and tools used for its realization. A detailed header analysis of a multiple tactic spoofed e-mail message is carried out in this paper. It also discusses various possibilities for detection of spoofed headers and identification of its originator. Further, difficulties that may be faced by investigators during forensic investigation of an e-mail message have been discussed along with their possible solutions.

  7. Direct e-mail marketing: Case of Serbia

    Directory of Open Access Journals (Sweden)

    Končar Jelena A.

    2005-01-01

    Full Text Available Direct e-mail marketing refers to approaching customers directly, without employing intermediaries. It represents a direct mode of communication with the target population, which affects the creation of stronger and more loyal relationships with prospective customers, compared to traditional direct marketing resources (TV, radio, print and advertising panels, etc. The main goal of direct e-mail marketing is building long-term "one to one" relationships with current and prospective customers. Direct e-mail marketing is not aimed at momentary sale, but at boosting certain product preferences due to the engagement of numerous electronic media.

  8. The impact of e-mail in acquiring and retaining whole-blood donors: a comparative analysis of the Puget Sound Blood Center donor e-mail communication program.

    Science.gov (United States)

    Geyer, Maria Elena

    2005-12-01

    With the emergence of e-mail as a common form of communication, it is important to understand the role and impact e-mail can have on acquiring and retaining whole-blood donors. Whole-blood donors who opted in to receive e-mail communications (n = 43,232) from the Puget Sound Blood Center (PSBC) and as a result participated in one or more of five e-mail marketing campaigns between July 2002 and March 2003 were studied. New donors with e-mail addresses grew by 74 percent over the measurement period compared with 2 percent growth of those without e-mail addresses. Nearly 15,000 prospective donors were reached as a result of donors passing along e-mails they received from PSBC to friends and family. Nearly 5 percent of PSBC e-mail campaign recipients registered to donate online. PSBC e-mail campaigns have outperformed e-mail marketing industry mean open rates by 44 percent and click-through rates by 36 percent. E-mail is now a mainstream communication medium. It has proven to be an effective method of reaching new donors and generating new donation registrations. Donors respond more favorably to e-mail communications from PSBC compared with e-mail they receive from other organizations. Deeper understanding of how different segments of blood donors use e-mail may help blood centers adjust their donor acquisition and retention programs. New recruitment methods are needed to grow the overall donor base, and e-mail appears to have the potential to make a significant contribution to meeting this objective.

  9. Communicating with Parents of Children with Special Needs in Saudi Arabia: Parents' and Teachers' Perceptions of Using Email for Regular and Ongoing Communication

    Science.gov (United States)

    Dubis, Snaa; Bernadowski, Carianne

    2015-01-01

    The purpose of this study, by Snaa Dubis from Salman Bin Abdu Aziz University, Saudi Arabia, and Robert Morris University, USA, and Carianne Bernadowski from Robert Morris University, was to investigate parents' and special education teachers' perceptions of using email as a component of parental involvement in the academic and/or behavioural…

  10. SPAM: Beware of emails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and must never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake emails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake email message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, however future cases may still occur. Users need to be vigilant for any requests for passwords or personal data. Fake emails should be immediately deleted. In case of questions on this topic, you may contact helpdesk@cern.ch. CERN IT Department

  11. Application for automatic e-mail forwarding

    OpenAIRE

    Skupek, Rok

    2010-01-01

    The diploma thesis has two main goals: the first objective is to develop a dynamic library, which will contain methods able to download e-mail messages from mail server using POP3 protocol. The second objective involves development of application for processing and distribution of e-mail messages. Introduction cointains presentation of a practical application example in real time situation. Here are described procedures used for development of server - client communication library, which u...

  12. Internet and Email Use Among STD Clinic Patients

    Science.gov (United States)

    Mark, Karen E.; Wald, Anna; Drolette, Linda; Golden, Matthew R.

    2009-01-01

    Background Little data exist on Internet and email use among STD clinic patients for research and clinical care communication. Methods An anonymous cross-sectional survey of STD clinic patients aged ≥ 18 years in Seattle, Washington, March 13–22, 2006. Results Of 489 study period patients, 251 (51%) completed the questionnaire. Participants had a median age of 30 (range 18–66) years and were 69% male, 56% White, 19% African-American, 9% Hispanic, and 7% Asian/Pacific Islander. 75% had some post-secondary education but half reported an annual income of email that they check at least 3 times a week, and 144 (57%) were willing to receive an email reminding them to come back for a follow-up appointment if diagnosed with an STD. MSM were more likely than women and heterosexual men to be regular Internet and email users (92% versus 70%, p = 0.001) and to have met a sex partner over the Internet during the past year (69% versus 11%, p email use, as was racial/ethnic background (86% of Whites, 48% of African-Americans, 73% of Hispanics, 100% of Asians/Pacific Islanders, and 57% of others, p email use are common and acceptable to many STD clinic patients for research and clinical purposes. PMID:18685548

  13. Comparison of e-mail communication skills among first- and fourth-year dental students.

    Science.gov (United States)

    Oakley, Marnie; Horvath, Zsuzsa; Weinberg, Seth M; Bhatt, Jaya; Spallek, Heiko

    2013-11-01

    As e-mail and other forms of electronic communication increase in popularity, it is important for dental schools to consider a curriculum that prepares their graduates to understand and apply effective electronic communication strategies to their patients. Reflecting this shift in communication behavior, the American Medical Association has developed specific e-mail communication guidelines. Some behavioral examples in these guidelines include protecting patients' protected health information (PHI), ensuring proper record keeping, and using professional, courteous, and understandable language. In this study, a sample of first- and fourth-year dental students (n=160) at the University of Pittsburgh School of Dental Medicine participated in an assignment assessing their patient-provider e-mail communication skills. A rubric was used to evaluate and compare the data between dental student classes. The results reveal a generalized lack of compliance with several of these guidelines by both classes (e.g., failure to protect PHI), despite efforts to expose students to these concepts in the curriculum. In an effort to train emerging dentists to function in a rapidly changing technological environment, these findings suggest a need for growth and development of curricula and perhaps guidelines/recommendations for behavioral competencies regarding dental students' use of electronic communication in the patient care environment.

  14. Email Related Crimes%电子邮件犯罪

    Institute of Scientific and Technical Information of China (English)

    王小刚

    2006-01-01

    @@ Email has fast emerged as the world's most preferred form of communication. Billions of email messages traverse1 the globe daily. Like any other form of communication, email is also misused by criminal elements. The ease, speed and relative anonymity2 of email has made it a powerful tool for criminals.

  15. Enhancement of Email Security in Nuclear Malaysia

    International Nuclear Information System (INIS)

    Mohd Fauzi Haris; Raja Murzaferi Raja Moktar; Saaidi Ismail; Mohd Dzul Aiman Aslan; Mohamad Safuan Sulaiman

    2013-01-01

    Task to protect network and data security is not simple and easy. The more advance ICT technology available in the market, the more dependability to the knowledge, skills and appropriate tools would be in order one to cater these threats. Cyber security threats can be considered almost impossible to be demolished or at least to be avoided totally and what we really need is technical capabilities that may include appropriate knowledge and tools to reduce the cyber threats in the organization. Email is one of the important today's application that is being used by many people all around the globe either they are in corporate organizations, government bodies, students and teachers. The total number of worldwide email accounts is expected to increase from 3.3 billion accounts in 2012 to over 4.3 billion accounts by year-end 2016. This represents an average annual growth rate of 6% over the next four years [1]. Parallel with the increment of the usage, number of abusive and misuse of the email is also reported either in the form of spamming, delivery of malicious file attachments, phishing and others. These show the importance to tighten up the security of the email. This paper will discuss and share actions that have been taken by IT Center to enhance the security of official email application. (author)

  16. Becoming Known through Email: A Case of Woman, Leadership, and an Awfully Familiar Strange Land

    Science.gov (United States)

    Drake, Pat

    2015-01-01

    This project explores women and educational leadership from the perspective of an individual who moved from the UK to Australia in order to take up the position of Dean of an education grouping in a university. Emails sent by the Dean to the group are analysed after nine months in post and categorised according to the requirements of the position…

  17. A Cross-Cultural Pragmatic Study of Rapport-Management Strategies in Chinese and English Academic Upward Request Emails

    Science.gov (United States)

    Zhu, Wuhan

    2017-01-01

    This article discusses and compares how Chinese and English postgraduate students manage a harmonious relationship with university instructors by managing rapport and doing relational work in their academic request emails. The rapport-management strategies were explored and then further evaluated in relation to the taxonomies of relational work…

  18. Advantages and Disadvantages of Educational Email Alerts for Family Physicians: Viewpoint

    Science.gov (United States)

    Badran, Hani; Grad, Roland

    2015-01-01

    Background Electronic knowledge resources constitute an important channel for accredited Continuing Medical Education (CME) activities. However, email usage for educational purposes is controversial. On the one hand, family physicians become aware of new information, confirm what they already know, and obtain reassurance by reading educational email alerts. Email alerts can also encourage physicians to search Web-based resources. On the other hand, technical difficulties and privacy issues are common obstacles. Objective The purpose of this discussion paper, informed by a literature review and a small qualitative study, was to understand family physicians’ knowledge, attitudes, and behavior in regard to email in general and educational emails in particular, and to explore the advantages and disadvantages of educational email alerts. In addition, we documented participants’ suggestions to improve email alert services for CME. Methods We conducted a qualitative descriptive study using the “Knowledge, Attitude, Behavior” model. We conducted semi-structured face-to-face interviews with 15 family physicians. We analyzed the collected data using inductive-deductive thematic qualitative data analysis. Results All 15 participants scanned and prioritized their email, and 13 of them checked their email daily. Participants mentioned (1) advantages of educational email alerts such as saving time, convenience and valid information, and (2) disadvantages such as an overwhelming number of emails and irrelevance. They offered suggestions to improve educational email. Conclusions The advantages of email alerts seem to compensate for their disadvantages. Suggestions proposed by family physicians can help to improve educational email alerts. PMID:25803184

  19. Advantages and disadvantages of educational email alerts for family physicians: viewpoint.

    Science.gov (United States)

    Badran, Hani; Pluye, Pierre; Grad, Roland

    2015-02-27

    Electronic knowledge resources constitute an important channel for accredited Continuing Medical Education (CME) activities. However, email usage for educational purposes is controversial. On the one hand, family physicians become aware of new information, confirm what they already know, and obtain reassurance by reading educational email alerts. Email alerts can also encourage physicians to search Web-based resources. On the other hand, technical difficulties and privacy issues are common obstacles. The purpose of this discussion paper, informed by a literature review and a small qualitative study, was to understand family physicians' knowledge, attitudes, and behavior in regard to email in general and educational emails in particular, and to explore the advantages and disadvantages of educational email alerts. In addition, we documented participants' suggestions to improve email alert services for CME. We conducted a qualitative descriptive study using the "Knowledge, Attitude, Behavior" model. We conducted semi-structured face-to-face interviews with 15 family physicians. We analyzed the collected data using inductive-deductive thematic qualitative data analysis. All 15 participants scanned and prioritized their email, and 13 of them checked their email daily. Participants mentioned (1) advantages of educational email alerts such as saving time, convenience and valid information, and (2) disadvantages such as an overwhelming number of emails and irrelevance. They offered suggestions to improve educational email. The advantages of email alerts seem to compensate for their disadvantages. Suggestions proposed by family physicians can help to improve educational email alerts.

  20. Using Mobile-Based Email for English Foreign Language Learners

    Science.gov (United States)

    Alzu'bi, Mohammad Akram mohammad; Sabha, Muhannad Rushdi Nimer

    2013-01-01

    This study aimed at investigating the role of Mobile-based Email in improving Ajloun College English Students' Achievement. It attempts to answer the following questions: What is the potential contribution of mobile-based email exchanged to writing skills? What is the potential contribution of mobile-based email exchanged to vocabulary…

  1. 36 CFR 1250.76 - May I email my FOIA appeal?

    Science.gov (United States)

    2010-07-01

    ... 36 Parks, Forests, and Public Property 3 2010-07-01 2010-07-01 false May I email my FOIA appeal... email my FOIA appeal? Yes, you may submit a FOIA appeal via email to http://www.archives.gov/global_pages/inquire_form.html. You must put the words “FOIA Appeal” in the subject line of your email message...

  2. SPONGY (SPam ONtoloGY): email classification using two-level dynamic ontology.

    Science.gov (United States)

    Youn, Seongwook

    2014-01-01

    Email is one of common communication methods between people on the Internet. However, the increase of email misuse/abuse has resulted in an increasing volume of spam emails over recent years. An experimental system has been designed and implemented with the hypothesis that this method would outperform existing techniques, and the experimental results showed that indeed the proposed ontology-based approach improves spam filtering accuracy significantly. In this paper, two levels of ontology spam filters were implemented: a first level global ontology filter and a second level user-customized ontology filter. The use of the global ontology filter showed about 91% of spam filtered, which is comparable with other methods. The user-customized ontology filter was created based on the specific user's background as well as the filtering mechanism used in the global ontology filter creation. The main contributions of the paper are (1) to introduce an ontology-based multilevel filtering technique that uses both a global ontology and an individual filter for each user to increase spam filtering accuracy and (2) to create a spam filter in the form of ontology, which is user-customized, scalable, and modularized, so that it can be embedded to many other systems for better performance.

  3. SPONGY (SPam ONtoloGY: Email Classification Using Two-Level Dynamic Ontology

    Directory of Open Access Journals (Sweden)

    Seongwook Youn

    2014-01-01

    Full Text Available Email is one of common communication methods between people on the Internet. However, the increase of email misuse/abuse has resulted in an increasing volume of spam emails over recent years. An experimental system has been designed and implemented with the hypothesis that this method would outperform existing techniques, and the experimental results showed that indeed the proposed ontology-based approach improves spam filtering accuracy significantly. In this paper, two levels of ontology spam filters were implemented: a first level global ontology filter and a second level user-customized ontology filter. The use of the global ontology filter showed about 91% of spam filtered, which is comparable with other methods. The user-customized ontology filter was created based on the specific user’s background as well as the filtering mechanism used in the global ontology filter creation. The main contributions of the paper are (1 to introduce an ontology-based multilevel filtering technique that uses both a global ontology and an individual filter for each user to increase spam filtering accuracy and (2 to create a spam filter in the form of ontology, which is user-customized, scalable, and modularized, so that it can be embedded to many other systems for better performance.

  4. SPONGY (SPam ONtoloGY): Email Classification Using Two-Level Dynamic Ontology

    Science.gov (United States)

    2014-01-01

    Email is one of common communication methods between people on the Internet. However, the increase of email misuse/abuse has resulted in an increasing volume of spam emails over recent years. An experimental system has been designed and implemented with the hypothesis that this method would outperform existing techniques, and the experimental results showed that indeed the proposed ontology-based approach improves spam filtering accuracy significantly. In this paper, two levels of ontology spam filters were implemented: a first level global ontology filter and a second level user-customized ontology filter. The use of the global ontology filter showed about 91% of spam filtered, which is comparable with other methods. The user-customized ontology filter was created based on the specific user's background as well as the filtering mechanism used in the global ontology filter creation. The main contributions of the paper are (1) to introduce an ontology-based multilevel filtering technique that uses both a global ontology and an individual filter for each user to increase spam filtering accuracy and (2) to create a spam filter in the form of ontology, which is user-customized, scalable, and modularized, so that it can be embedded to many other systems for better performance. PMID:25254240

  5. Deception Detection: Study of Information Manipulation Through Electronic Identity Theft - Email Forgery in the U.S. Military

    National Research Council Canada - National Science Library

    Rockwell, Roy

    2002-01-01

    ... their ability to detect email forgery. The results did determine that government computer users are extremely vulnerable to email forgery and that new security measures need to be adapted to protect these systems from this type...

  6. Detection of Fraudulent Emails by Employing Advanced Feature Abundance

    DEFF Research Database (Denmark)

    Nizamani, Sarwat; Memon, Nasrullah; Glasdam, Mathies

    2014-01-01

    In this paper, we present a fraudulent email detection model using advanced feature choice. We extracted various kinds of features and compared the performance of each category of features with the others in terms of the fraudulent email detection rate. The different types of features...... are incorporated step by step. The detection of fraudulent email has been considered as a classification problem and it is evaluated using various state-of-the art algorithms and on CCM [1] which is authors' previous cluster based classification model. The experiments have been performed on diverse feature sets...... and the different classification methods. The comparison of the results is also presented and the evaluations shows that for the fraudulent email detection tasks, the feature set is more important regardless of classification method. The results of the study suggest that the task of fraudulent emails detection...

  7. Therapeutic emails

    Directory of Open Access Journals (Sweden)

    Sinkule Jennifer

    2007-02-01

    Full Text Available Abstract Background In this paper, we show how counselors and psychologists can use emails for online management of substance abusers, including the anatomy and content of emails that clinicians should send substance abusers. Some investigators have attempted to determine if providing mental health services online is an efficacious delivery of treatment. The question of efficacy is an empirical issue that cannot be settled unless we are explicitly clear about the content and nature of online treatment. We believe that it is not the communications via internet that matters, but the content of these communications. The purpose of this paper is to provide the content of our online counseling services so others can duplicate the work and investigate its efficacy. Results We have managed nearly 300 clients online for recovery from substance abuse. Treatment included individual counseling (motivational interviewing, cognitive-behavior therapy, relapse prevention assignments, participation in an electronic support group and the development of a recovery team. Our findings of success with these interventions are reported elsewhere. Our experience has led to development of a protocol of care that is described more fully in this paper. This protocol is based on stages of change and relapse prevention theories and follows a Motivational Interviewing method of counseling. Conclusion The use of electronic media in providing mental health treatment remains controversial due to concerns about confidentiality, security and legal considerations. More research is needed to validate and generalize the use of online treatment for mental health problems. If researchers have to build on each others work, it is paramount that we share our protocols of care, as we have done in this paper.

  8. Teleradiology with DICOM e-mail: recommendations of rate at GIT; Teleradiologie mit DICOM E-mail: Empfehlungen der rate at GIT

    Energy Technology Data Exchange (ETDEWEB)

    Mildenberger, P.; Kaemmerer, M.; Klos, G.; Schuetze, B. [Klinik und Poliklinik fuer Radiologie, Johannes Gutenberg-Univ. Mainz (Germany); Engelmann, U. [Deutsches Krebsforschungszentrum, Abt. Medizinische und Biologische Informatik, Heidelberg (Germany); Ruggiero, S.; Runa, A.; Weisser, G. [Inst. fuer Klinische Radiologie, Universitaetsklinikum Mannheim (Germany); Schroeter, A. [CHILI GmbH, Heidelberg (Germany); Walz, M. [TUeV Industrie Service GmbH, TUeV-SUeD-Gruppe, Aerztliche Stelle fuer Qualitaetssicherung in der Radiologie, Eschborn (Germany)

    2005-05-01

    E-mail is ideal for ad-hoc connections in teleradiology. The DICOM standard offers the possibility to append DICOM data types as a MIME attachment to any e-mail, thus ensuring the transmission of the original DICOM data. Nevertheless, there are additional requirements (e.g. protection of data privacy) which must be obeyed. Because of the lack of given standards which would grant interoperability as well as manufacturer independence, teleradiology has not been established in Germany until today. Therefore, the IT-Team (Arbeitsgemeinschaft fuer Informationstechnologie, rate at GIT) of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) set up an initiative to standardise telemedicine by using e-mail. Its members agreed that an e-mail-based variant would be the most practicable way to a communication solution - as easy to implement as to use. In their opinion, e-mail represents the smallest common denominator for a safe data interchange that would fulfill the legal advantages for telemedicine in Germany. (orig.)

  9. Identifying spam e-mail messages using an intelligence algorithm

    Directory of Open Access Journals (Sweden)

    Parichehr Ghaedi

    2014-06-01

    Full Text Available During the past few years, there have been growing interests in using email for delivering various types of messages such as social, financial, etc. There are also people who use email messages to promote products and services or even to do criminal activities called Spam email. These unwanted messages are sent to different target population for different purposes and there is a growing interest to develop methods to filter such email messages. This paper presents a method to filter Spam email messages based on the keyword pattern. In this article, a multi-agent filter trade based on the Bayes rule, which has benefit of using the users’ interest, keywords and investigation the message content according to its topic, has been used. Then Nested Neural Network has been used to detect the spam messages. To check the authenticity of this proposed method, we test it for a couple of email messages, so that it could determine spams and hams from each other, effectively. The result shows the superiority of this method over the previous ones including filters with Multi-Layer Perceptron that detect spams.

  10. Improving email strategies to target stress and productivity in clinical practice.

    Science.gov (United States)

    Armstrong, Melissa J

    2017-12-01

    Physician burnout is gaining increased attention in medicine and neurology and often relates to hours worked and insufficient time. One component of this is administrative burden, which relates to regulatory requirements and electronic health record tasks but may also involve increased time spent processing emails. Research in academic medical centers demonstrates that physicians face increasing inbox sizes related to mass distribution emails from various sources on top of emails required for patient care, research, and teaching. This commentary highlights the contribution of administrative tasks to physician burnout, research to date on email in medical contexts, and corporate strategies for reducing email burden that are applicable to neurology clinical practice. Increased productivity and decreased stress can be achieved by limiting the amount one accesses email, managing inbox size, and utilizing good email etiquette. Department and practice physician leaders have roles in decreasing email volume and modeling good practice.

  11. Manipulating E-Mail Server Feedback for Spam Prevention

    Directory of Open Access Journals (Sweden)

    O. A. Okunade

    2017-08-01

    Full Text Available The cyber criminals who infect machines with bots are not the same as the spammers who rent botnets to distribute their messages. The activities of these spammers account for the majority of spam emails traffic on the internet. Once their botnets and campaigns are identified, it is not enough to keep on filtering the spam emails, it is necessary to deploy techniques that will carry the fight to their end. It is observed that spammers also take into account server feedback (for example to detect and remove non-existent recipients from email address lists. We can take advantage of this observation by returning fake information, thereby poisoning the server feedback on which the spammers rely. The results of this paper show that by sending misleading information to a spammer, it is possible to prevent recipients from receiving subsequent spam emails from that same spammer.

  12. E-mail to SMS service change

    CERN Multimedia

    IT Department

    2010-01-01

    If you have a CERN e-mail account, you have probably already used one of the popular services that CERN’s IT Department offers to CERN users: the mail2SMS service. It allows any CERN e-mail account holder to send short messages (SMS) free of charge to CERN GSM phone numbers. Further to recent negotiations with our GSM operator, this service has been extended. It is now possible to send short messages free of charge to any Swiss mobile number. This extension of service aims at replacing the similar service that was made available by SWITCH(1) to CERN users (address: mobilenumber@sms.switch.ch). Because of repeated abuse, this service will be definitively stopped for CERN users on 15th January 2010. Please keep in mind that CERN’s e-mail to SMS service still has some restrictions: messages can only be sent from CERN mail accounts, and not from personal ones, such as GMAIL, MSN, Yahoo; the maximum length of the message is 160 characters (standard maximum SMS length); and only Swiss mobile...

  13. Detection of fraudulent emails by employing advanced feature abundance

    Directory of Open Access Journals (Sweden)

    Sarwat Nizamani

    2014-11-01

    Full Text Available In this paper, we present a fraudulent email detection model using advanced feature choice. We extracted various kinds of features and compared the performance of each category of features with the others in terms of the fraudulent email detection rate. The different types of features are incorporated step by step. The detection of fraudulent email has been considered as a classification problem and it is evaluated using various state-of-the art algorithms and on CCM (Nizamani et al., 2011 [1] which is authors’ previous cluster based classification model. The experiments have been performed on diverse feature sets and the different classification methods. The comparison of the results is also presented and the evaluation show that for the fraudulent email detection tasks, the feature set is more important regardless of classification method. The results of the study suggest that the task of fraudulent emails detection requires the better choice of feature set; while the choice of classification method is of less importance.

  14. The impacts of email reminder/recall on adolescent influenza vaccination.

    Science.gov (United States)

    Dombkowski, Kevin J; Cowan, Anne E; Reeves, Sarah L; Foley, Matthew R; Dempsey, Amanda F

    2017-05-25

    We sought to: (1) explore the feasibility of using email for seasonal influenza vaccination reminders to parents of adolescents and (2) assess influenza vaccination rates among adolescents whose parents were randomized to either receive or not receive email reminders. Email addresses were obtained for parents of patients 10-18years from 4 practices in Michigan. Addresses were randomized to either receive email reminders, or not. Reminder messages were sent during October 2012-March 2013 (Season 1) and October 2013-March 2014 (Season 2). Vaccination status was determined 60days following the last email reminder for each season using the statewide Michigan Care Improvement Registry (MCIR); per protocol bivariate and multivariate logistic regression analyses were conducted to evaluate reminder notification. After email cleaning, testing, and matching with MCIR, approximately half of email addresses (2348 of 5312 in Season 1; 3457 of 6549 in Season 2) were randomized. Bivariate analyses found that influenza vaccination within 60days after notification date was similar among those notified (34%) versus not notified (29%) in both Season 1 (p=0.06) and Season 2 (39% vs. 37%, p=0.20). However, multivariate models adjusted for season, site, and receipt of notification in two seasons found a higher likelihood of influenza vaccination among children that received notification (aOR=1.28, 95% CI=1.09, 1.51); in addition, differences in influenza vaccination were also observed between practice sites (range: p=0.15 to pemail influenza vaccine reminders to parents of adolescents are feasible, but not without complications. Our study demonstrates that email reminders from practices can yield increases in influenza vaccination rates among adolescents. Practices should consider email as an option for influenza reminders and establish business practices for collecting and maintaining patient email addresses. This study is registered at www.ClinicalTrials.gov id #NCT01732315. Copyright

  15. Direct e-mail marketing: Case of Serbia

    OpenAIRE

    Končar Jelena A.; Vukmirović Goran; Katai Žita

    2005-01-01

    Direct e-mail marketing refers to approaching customers directly, without employing intermediaries. It represents a direct mode of communication with the target population, which affects the creation of stronger and more loyal relationships with prospective customers, compared to traditional direct marketing resources (TV, radio, print and advertising panels, etc). The main goal of direct e-mail marketing is building long-term "one to one" relationships with current and prospective customers....

  16. University of Dar es Salaam Library Journal - Vol 9, No 1 (2007)

    African Journals Online (AJOL)

    Gender Analysis Of Electronic Information Resource Use: The Case Of The University Of Dar Es Salaam, Tanzania · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT DOWNLOAD FULL ... A Bibliometric Study Of Research On Dar Es Salaam Region: 1980 To 2003 · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  17. Assessment of email communication skills of rheumatology fellows: a pilot study

    Science.gov (United States)

    Dhuper, Sonal; Siva, Chokkalingam; Fresen, John L; Petruc, Marius; Velázquez, Celso R

    2010-01-01

    Physician–patient email communication is gaining popularity. However, a formal assessment of physicians' email communication skills has not been described. We hypothesized that the email communication skills of rheumatology fellows can be measured in an objective structured clinical examination (OSCE) setting using a novel email content analysis instrument which has 18 items. During an OSCE, we asked 50 rheumatology fellows to respond to a simulated patient email. The content of the responses was assessed using our instrument. The majority of rheumatology fellows wrote appropriate responses scoring a mean (±SD) of 10.6 (±2.6) points (maximum score 18), with high inter-rater reliability (0.86). Most fellows were concise (74%) and courteous (68%) but not formal (22%). Ninety-two percent of fellows acknowledged that the patient's condition required urgent medical attention, but only 30% took active measures to contact the patient. No one encrypted their messages. The objective assessment of email communication skills is possible using simulated emails in an OSCE setting. The variable email communication scores and incidental patient safety gaps identified, suggest a need for further training and defined proficiency standards for physicians' email communication skills. PMID:20962134

  18. SPAM: Beware of e-mails asking for passwords

    CERN Multimedia

    IT Department

    2008-01-01

    CERN’s Computing Rules (Operational Circular No. 5) require that passwords remain confidential and never be given to anyone, not even helpdesk or other support personnel. If you think that your password could have been exposed then you must immediately change it. Cybercriminals are making growing use of fake e-mail messages and Web sites to steal account and identity information from users. This technique is called ‘phishing’. The fake e-mails often look real and try to trick you into giving your password or other personal data. CERN has recently been targeted by a fake e-mail message which requested users to send their username, password and date of birth. This case was promptly blocked by the CERN Mail Service, but future cases may still occur. Users need to be vigilant regarding any requests for passwords or personal data. Fake e-mails should be immediately deleted. In case of questions on this topic, you may contact mailto:helpdesk@cern.ch. CERN IT Department

  19. Securing E-mail Communication Using Hybrid Cryptosystem on Android-based Mobile Devices

    Directory of Open Access Journals (Sweden)

    Andri Zakariya

    2012-12-01

    Full Text Available One of the most popular internet services is electronic mail (e-mail. By using mobile devices with internet connection, e-mail can be widely used by anyone to exchange information anywhere and anytime whether public or confidential. Unfortunately, there are some security issues with email communication; e-mail is sent in over open networks and e-mail is stored on potentially insecure mail servers. Moreover, e-mail has no integrity protection so the body can be undectected altered in transit or on the e-mail server. E-mail also has no data origin authentication, so people cannot be sure that the emails they receive are from the e-mail address owner. In order to solve this problem, this study proposes a secure method of e-mail communication on Android-based mobile devices using a hybrid cryptosystem which combines symmetric encryption, asymmetric encryption and hash function. The experimental results show that the proposed method succeeded in meeting those aspects of information security including confidentiality, data integrity, authentication, and non-repudiation.

  20. Improving University Ranking to Achieve University Competitiveness by Management Information System

    Science.gov (United States)

    Dachyar, M.; Dewi, F.

    2015-05-01

    One way to increase university competitiveness is through information system management. A literature review was done to find information system factors that affect university performance in Quacquarelli Symonds (QS) University Ranking: Asia evaluation. Information system factors were then eliminated using Delphi method through consensus of 7 experts. Result from Delphi method was used as measured variables in PLS-SEM. Estimation with PLS-SEM method through 72 respondents shows that the latent variable academic reputation and citation per paper have significant correlation to university competitiveness. In University of Indonesia (UI) the priority to increase university competitiveness as follow: (i) network building in international conference, (ii) availability of research data to public, (iii) international conference information, (iv) information on achievements and accreditations of each major, (v) ease of employment for alumni.

  1. Implementasi Algoritma Kriptografi RSA untuk Enkripsi dan Dekripsi Email

    Directory of Open Access Journals (Sweden)

    Albert Ginting

    2015-04-01

    Full Text Available In the world of Internet nothing is really safe. There's always a gap in any application made. Likewise in email delivery. To minimize attacks on the data transmission is usually applied cryptography. One fairly popular cryptographic algorithms are RSA algorithm. In this study will discuss the implementation of a cryptographic algorithm RSA encryption and decryption process email. To test created a java-based email client program with message encryption and decryption features messages. This application uses the Java programming language and Netbeans 7.4 as editor. Mail servers used is Google Mail. The initial step of this study was to download email from the Google server and encrypt the message. The second step is decrypt the message to verify whether the message is still the same as the original message before it is encrypted . Results from this study is the application that can encrypt and decrypt messages using RSA cryptographic algorithm. With this application is expected to mail delivery is much safer. Because encrypted email will generate a random decimal number of unknown value .

  2. Electronic Identities: The Strategic Use of Email for Impression Management.

    Science.gov (United States)

    Kersten, Larry; Phillips, Stephen R.

    Traditionally, e-mail (electronic mail) has been seen as an efficient communications medium for the transmission of simple, routine, unambiguous messages. More recent research has argued that the simple, efficient view of e-mail is incomplete. Future research should be extended into the strategic and symbolic functions of email, such as the use of…

  3. Email as a Data Collection Tool when Interviewing Older Adults

    Directory of Open Access Journals (Sweden)

    Mario A. Brondani DDS, MSc, PhD

    2011-09-01

    Full Text Available This article explores several aspects of electronic communication, specifically its advantages and disadvantages within the context of a brief experience using email to interview elders. Two older adults participated via email as the psychosocial impact of aging was collected using such venue. Our experiences are compared with published reports from others to analyze the benefits and limitations of email as a research tool. The email was spontaneous, comprehensive, interactive, efficient, confidential, and cost effective. The use of email within this exploratory study appeared to be an effective approach to collecting qualitative information about beliefs and behaviours from older adults who feel comfortable with this form of communication. The lack of similar studies limited the scope of discussion and comparison of findings; generalization is limited due to the small sample size. This investigation, however, suggested that the use of email as an interview tool may be considered in today's exploratory research arena as an alternative to conference calls or face-to-face interviews when time is a constraint.

  4. Email for clinical communication between patients/caregivers and healthcare professionals.

    Science.gov (United States)

    Atherton, Helen; Sawmynaden, Prescilla; Sheikh, Aziz; Majeed, Azeem; Car, Josip

    2012-11-14

    Email is a popular and commonly-used method of communication, but its use in health care is not routine. Where email communication has been demonstrated in health care this has included its use for communication between patients/caregivers and healthcare professionals for clinical purposes, but the effects of using email in this way is not known.This review addresses the use of email for two-way clinical communication between patients/caregivers and healthcare professionals. To assess the effects of healthcare professionals and patients using email to communicate with each other, on patient outcomes, health service performance, service efficiency and acceptability. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010) and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists, contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies examining interventions using email to allow patients to communicate clinical concerns to a healthcare professional and receive a reply, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two authors independently assessed the risk of bias of included studies and extracted data. We contacted study authors for additional information. We assessed risk of bias according to the Cochrane Handbook for Systematic Reviews of Interventions. For continuous measures, we report effect sizes as mean

  5. PHS terminal 'TEGACKY' dedicated to e-mailing; Mail senyo PHS tanmatsu 'TEGACKY

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2000-03-01

    The e-mail utilization rate at mobile communication terminals is increasing at a remarkable rate, as if to grow above the rate of communication by voice. Under the circumstances, a PHS (Personal Handyphone System) terminal 'TEGACKY' (type name: PM-T101) has been developed, designed exclusively for use for e-mailing. 'TEGACKY' is characterized in that its icons may be activated with pen, that input may be made by handwriting, and that its large screen allows a 48-character message consisting of 4 lines of 12 characters to be displayed at one time despite its compact size. It can also perform communication directly with other terminals or e-mail via center, and is provided with an information service function. 'TEGACKY' having such distinguished features has created a new category of terminals which are at once e-mailing tools. (translated by NEDO)

  6. Email for the coordination of healthcare appointments and attendance reminders.

    Science.gov (United States)

    Atherton, Helen; Sawmynaden, Prescilla; Meyer, Barbara; Car, Josip

    2012-08-15

    Email is a popular and commonly-used method of communication, but its use in health care is not routine. Where email communication has been utilised in health care, its purposes have included the coordination of healthcare appointments and attendance reminders, but the effects of using email in this way are not known. This review considers the use of email for the coordination of healthcare appointments and reminders for attendance; particularly scheduling, rescheduling and cancelling healthcare appointments, and providing prompts/reminders for attendance at appointments. To assess the effects of using email for the coordination of healthcare appointments and attendance reminders, compared to other forms of coordinating appointments and reminders, on outcomes for health professionals, patients and carers, and health services, including harms. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010),and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies of interventions that use email for scheduling health appointments, for reminders for a scheduled health appointment or for ongoing coordination of health appointments and that took the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two review authors independently assessed the titles and abstracts of retrieved

  7. Open-Rate Controlled Experiment in E-Mail Marketing Campaigns

    OpenAIRE

    Biloš, Antun; Turkalj, Davorin; Kelić, Ivan

    2016-01-01

    Purpose – The main purpose of this paper is to test the controlled experiment (A/B split) methodology in B2C oriented e-mail marketing campaigns. Design/Methodology/Approach – E-mail marketing techniques have been a substantial part of e-marketing methodology since the early Internet days of the mid-1990s. From the very beginning of Internet utilization for business purposes, e-mail was one of the most widely used communication techniques in B2B and B2C markets alike. Due to high volumes o...

  8. Computer Application Systems at the University.

    Science.gov (United States)

    Bazewicz, Mieczyslaw

    1979-01-01

    The results of the WASC Project at the Technical University of Wroclaw have confirmed the possibility of constructing informatic systems based on the recognized size and specifics of user's needs (needs of the university) and provided some solutions to the problem of collaboration of computer systems at remote universities. (Author/CMV)

  9. The relative efficacy of telephone and email reminders to elicit blood donation.

    Science.gov (United States)

    Germain, M; Godin, G

    2016-04-01

    The aim of the study was to test the relative efficacy of telephone and email reminders to trigger blood donation. A sample of 3454 donors was randomized to one of three conditions: phone only (n = 1176), email only (n = 1091) and phone + email (n = 1187). There was a higher proportion of donors who registered to give blood in the phone + email condition (18·45%) compared to the other two conditions (phone: 15·73%, P email: 13·20%; P email conditions did not differ significantly (P = 0·16), suggesting equivalent efficacy. © 2015 International Society of Blood Transfusion.

  10. Nnamdi Azikiwe University Journal of International Law and ...

    African Journals Online (AJOL)

    Nnamdi Azikiwe University Journal of International Law and Jurisprudence - Vol 9, No 2 (2018). Journal Home > Archives ... Attraction of business and restriction in legal practice in Nigeria and United States: need for globalization via legal education · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL ...

  11. Measuring Future Worker Productivity via Business Email Message Creation: Implications for Education

    Science.gov (United States)

    Hagler, Barbara E.; Erthal, Margaret; Walzer, Dona; Anderson, Marcia A.

    2009-01-01

    Objective: This research was conducted to determine if relationships exist among college students' business email message productivity score and (a) email message quality score, (b) text keying method used to create email message, and (c) self-reported college English grade. Background: Email is increasingly the communication channel preferred for…

  12. E-Mail Server and Traffic Control Management in 2012

    Directory of Open Access Journals (Sweden)

    Cosmin Catalin Olteanu

    2012-12-01

    Full Text Available Emails represents one of the most used communication system in world wide web for more than 15 years and “spam” messages are one of the most annoying and disturbing phenomena. All of us are aware that online marketers are trying to transmit their advertising messages to as many addresses they can. For such “unwanted” messages, adaptive systems must be assembled to review and mark what is wright and what is bad. Always these systems must adapt to consumers preferences to mark only that messages that are not in his white list. Surveys for more than 3000000 messages showed me that some criteria can be defined by start.

  13. Discourse strategies in professional e-mail negotiation

    DEFF Research Database (Denmark)

    Jensen, Astrid

    2009-01-01

    The purpose of this article is to report on some of the preliminary results of an on-going study on the use of discourse strategies in e-mail negotiation. The analysis aims at showing how relations between the participants develop through the use of specific discourse strategies in their e......-mail communication which covers a period of three months, during which the relationship progresses from initial contact to on-going business. Drawing on Hyland's (2005) concept of metadiscourse combined with Charles' (1996) categories of ‘old and new relationship negotiations', this study provides insights...

  14. SCT module testing system at Charles University in Prague

    CERN Document Server

    Broklova, Z; Dolezal, Z; Kodys, P; Kubik, P; Reznicek, P

    2003-01-01

    Detector control system (DCS) is built up to ensure adequate environment conditions during mass testing of silicon strip modules for ATLAS Inner Detector. DCS protects modules against damage and simplifies the whole testing procedure as well. In the automatic mode, the system measures several environmental parameters and checks them. In case of accident or unexpected situation, it alerts operator of the system (for example via email). It can safely stop all testing. The system also contains components for remote observation plus control of the testing status.

  15. The NASA Astrophysics Data System Free Access to the Astronomical Literature On-Line and through Email

    CERN Document Server

    Eichhorn, G; Grant, C S; Kurtz, M J; Murray, S S

    2001-01-01

    The Astrophysics Data System (ADS) provides access to the astronomical literature through the World Wide Web. It is a NASA funded project and access to all the ADS services is free to everybody world-wide.The ADS Abstract Service allows the searching of four databases with abstracts in Astronomy, Instrumentation, Physics/Geophysics, and the LANL Preprints with a total of over 2.2 million references. The system also provides access to reference and citation information, links to on-line data, electronic journal articles, and other on-line information. The ADS Article Service contains the articles for most of the astronomical literature back to volume 1. It contains the scanned pages of all the major journals (Astrophysical Journal, Astronomical Journal, Astronomy & Astrophysics, Monthly Notices of the Royal Astronomical Society, and Solar Physics), as well as most smaller journals back to volume 1. The ADS can be accessed through any web browser without signup or login. Alternatively an email interface is ...

  16. Effects of Mentioning the Incentive Prize in the Email Subject Line on Survey Response

    Directory of Open Access Journals (Sweden)

    Robert Janke

    2014-03-01

    Full Text Available Objective – This study examined the effects that mentioning the survey incentive prize in the subject line of a reminder email had on the response rate and data quality. To date, manipulation of the subject line, specifically in terms of mentioning the incentive prize, has received limited attention in the survey design literature. Methods – The delivery of the survey invitation is discussed in terms of the timing of the launch and reminder emails. Particular emphasis is given to the design of the email subject line and justification of the format. Weekly response rates from four LibQUAL+TM surveys were compared. In addition, weekly responses for one year were analyzed using SPSS to investigate if there were any between means differences in terms of three elements of data quality. The three elements were: length of time it took to complete the survey, the number of core questions with an N/A response, and the number of illogical responses where minimum scores were higher than desired. Results – The response rates for the second week were grouped together based on the presence or absence of the subject line manipulation. There was a significant difference between these means (4.75%, p 0.033. There was no statistical difference in regards to the measures of data quality as determined by a one-way ANOVA test. Conclusions – Reminding survey participants with an email that mentions the incentive prize in the subject line appears to increase response rates with no deleterious effects on data quality. The results of this investigation are encouraging, and those running the LibQUAL+TM survey in their universities should consider implementing this method to increase response rates. Further research to replicate these findings in other contexts and using an experimental design would be beneficial.

  17. 36 CFR 1250.24 - Will you accept a FOIA request through email?

    Science.gov (United States)

    2010-07-01

    ... request through email? 1250.24 Section 1250.24 Parks, Forests, and Public Property NATIONAL ARCHIVES AND... Access Records Under FOIA § 1250.24 Will you accept a FOIA request through email? Yes, send email FOIA... of your email message that you are sending a FOIA request. The body of the message must contain all...

  18. Email for the provision of information on disease prevention and health promotion.

    Science.gov (United States)

    Sawmynaden, Prescilla; Atherton, Helen; Majeed, Azeem; Car, Josip

    2012-11-14

    Email is a popular and commonly used method of communication, but its use in health care is not routine. Its application in health care has included the provision of information on disease prevention and health promotion, but the effects of using email in this way are not known. This review assesses the use of email for the provision of information on disease prevention and health promotion. To assess the effects of email for the provision of information on disease prevention and health promotion, compared to standard mail or usual care, on outcomes for healthcare professionals, patients and caregivers, and health services, including harms. We searched: the Cochrane Consumers and Communication Review Group Specialised Register (January 2010), the Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (1950 to January 2010), EMBASE (1980 to January 2010), CINAHL (1982 to February 2010), ERIC (1965 to January 2010) and PsycINFO (1967 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists, contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies examining interventions where email is used by healthcare professionals to provide information to patients on disease prevention and health promotion, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. We considered healthcare professionals or associated administrative staff as participants originating the email communication, and patients and caregivers as participants receiving the email communication, in all settings. Email communication was one-way from healthcare professionals or associated administrative staff originating the email communication, to patients or caregivers receiving the email communication. Two

  19. Private E-Mail Requests and the Diffusion of Responsibility.

    Science.gov (United States)

    Barron, Greg; Yechiam, Eldad

    2002-01-01

    Discussion of e-mail technology and requesting information from multiple sources simultaneously focuses on an experiment demonstrating that addressing e-mails simultaneously to multiple recipients may actually reduce the number of helpful responses. Discusses diffusion of responsibility and implications for the application of social cueing theory…

  20. Open-Rate Controlled Experiment in E-Mail Marketing Campaigns

    Directory of Open Access Journals (Sweden)

    Antun Biloš

    2016-06-01

    Full Text Available Purpose – The main purpose of this paper is to test the controlled experiment (A/B split methodology in B2C oriented e-mail marketing campaigns. Design/Methodology/Approach – E-mail marketing techniques have been a substantial part of e-marketing methodology since the early Internet days of the mid-1990s. From the very beginning of Internet utilization for business purposes, e-mail was one of the most widely used communication techniques in B2B and B2C markets alike. Due to high volumes of spamming and progression of online communication clutter, some practitioners began to question the usability of e-mail as a marketing communication channel, while others embarked on working on improving the message itself. Efforts were invested into improving message quality, as well as into better understanding user expectations. One of the most commonly used techniques to test specific e-mail message elements is the controlled experiment. Findings and implications – This paper explores several types of controlled experiments in a specific Croatian B2C market. Tests were run to determine subscriber behavior towards several newsletter components, including sending time, sending day, sender’s name, and subject line. Open and click rates for tested campaigns, and several other metrics were investigated using MailChimp software. An N − 1 two-proportion test using an adjusted Wald confidence interval around the difference in the proportions was used for comparing the open-rate measure in the controlled experiments between subjects. Limitation – Controlled experiments (A/B split tests showed a lot of potential as a way of measuring behavior and preferences of subscribers, although several apparent limitations (the data-set scope, comparability issues indicated a clear need for standardization on a managerial and scientific level. Originality – This paper provides an up-to-date e-mail marketing effectiveness literature review, describes and tests the

  1. STUDENTS WRITING EMAILS TO FACULTY: AN EXAMINATION OF E-POLITENESS AMONG NATIVE AND NON-NATIVE SPEAKERS OF ENGLISH

    Directory of Open Access Journals (Sweden)

    Sigrun Biesenbach-Lucas

    2007-02-01

    Full Text Available This study combines interlanguage pragmatics and speech act research with computer-mediated communication and examines how native and non-native speakers of English formulate low- and high-imposition requests to faculty. While some research claims that email, due to absence of non-verbal cues, encourages informal language, other research has claimed the opposite. However, email technology also allows writers to plan and revise messages before sending them, thus affording the opportunity to edit not only for grammar and mechanics, but also for pragmatic clarity and politeness.The study examines email requests sent by native and non-native English speaking graduate students to faculty at a major American university over a period of several semesters and applies Blum-Kulka, House, and Kasper’s (1989 speech act analysis framework – quantitatively to distinguish levels of directness, i.e. pragmatic clarity; and qualitatively to compare syntactic and lexical politeness devices, the request perspectives, and the specific linguistic request realization patterns preferred by native and non-native speakers. Results show that far more requests are realized through direct strategies as well as hints than conventionally indirect strategies typically found in comparative speech act studies. Politeness conventions in email, a text-only medium with little guidance in the academic institutional hierarchy, appear to be a work in progress, and native speakers demonstrate greater resources in creating e-polite messages to their professors than non-native speakers. A possible avenue for pedagogical intervention with regard to instruction in and acquisition of politeness routines in hierarchically upward email communication is presented.

  2. E-mail communication patterns and job burnout

    Science.gov (United States)

    2018-01-01

    A considerable body of research has documented the negative effects of job burnout on employees and their organizations, emphasizing the importance of the identification of early signs of the phenomenon for the purposes of prevention and intervention. However, such timely identification is difficult due to the time and cost of assessing the burnout levels of all employees in an organization using established scales. In this paper, we propose an innovative way to identify employees at risk of job burnout by analyzing their e-mail communication patterns. Building on the Job Demands–Resources model, we theorize about the relationship between e-mail communication patterns and levels of employee exhaustion and disengagement (two dimensions of burnout). We analyzed 52,190 e-mails exchanged between 57 employees of a medium sized R&D company over a five-month period. We then related these employees’ communication patterns to their levels of burnout, collected using an established scale (the OLBI–Oldenburg Burnout Inventory). Our results provide support for the overall proposition of the paper, that e-mail communications can be used to identify individuals at risk of job burnout. Our models explain up to 34% of the variance of burnout and up to 37% and 19% respectively of the variance of exhaustion and disengagement. They also successfully distinguish between employees with a higher risk of burnout and those with lower levels of risk (F1 score of 84% with recall of 100% and 73% precision). We discuss the implications of our results and present suggestions for future research. PMID:29518128

  3. Using E-mail in a Math/Computer Core Course.

    Science.gov (United States)

    Gurwitz, Chaya

    This paper notes the advantages of using e-mail in computer literacy classes, and discusses the results of incorporating an e-mail assignment in the "Introduction to Mathematical Reasoning and Computer Programming" core course at Brooklyn College (New York). The assignment consisted of several steps. The students first read and responded…

  4. Email networks and the spread of computer viruses

    Science.gov (United States)

    Newman, M. E.; Forrest, Stephanie; Balthrop, Justin

    2002-09-01

    Many computer viruses spread via electronic mail, making use of computer users' email address books as a source for email addresses of new victims. These address books form a directed social network of connections between individuals over which the virus spreads. Here we investigate empirically the structure of this network using data drawn from a large computer installation, and discuss the implications of this structure for the understanding and prevention of computer virus epidemics.

  5. A Discourse Analysis of School Counseling Supervisory E-Mail

    Science.gov (United States)

    Luke, Melissa; Gordon, Cynthia

    2011-01-01

    This article is a discourse analysis of weekly computer-mediated communications between 8 school counseling interns and their e-mail supervisor over a 16-week semester. Course-required e-mail supervision was provided as an adjunct to traditional face-to-face individual and group supervision. School counselor supervisees and supervisor enacted 3…

  6. Instruction and Pragmatic Change during Study Abroad Email Communication

    Science.gov (United States)

    Alcón-Soler, Eva

    2015-01-01

    The study deals with the effect of instruction and study abroad (SA) on pragmatic knowledge. More specifically, the focus is on gains in explicit knowledge of request mitigators, and whether learners draw on this knowledge when they perform email requests. Email requests produced by 60 Spanish students staying abroad (30 treatment/30 control…

  7. The Application of E-Mail to College English Teaching in China

    Science.gov (United States)

    Wang, Guofeng

    2010-01-01

    With the development of information technology in the past 10 years, e-mail has been widely used in the field of English teaching. This paper, based on an analysis of the ways of using e-mail in college English teaching in China, probes the feasibility and the benefits of application of e-mail to college English teaching.

  8. Maintaining confidentiality in prospective studies: anonymous repeated measurements via email (ARME) procedure.

    Science.gov (United States)

    Carli, Vladimir; Hadlaczky, Gergö; Wasserman, Camilla; Stingelin-Giles, Nicola; Reiter-Theil, Stella; Wasserman, Danuta

    2012-02-01

    Respecting and protecting the confidentiality of data and the privacy of individuals regarding the information that they have given as participants in a research project is a cornerstone of complying with accepted research standards. However, in longitudinal studies, establishing and maintaining privacy is often challenging because of the necessity of repeated contact with participants. A novel internet-based solution is introduced here, which maintains privacy while at the same time ensures linkage of data to individual participants in a repeated measures design. With the use of the anonymous repeated measurements via email (ARME) procedure, two separate one-way communication systems are established through ad hoc email accounts and a secure study website. Strengths and limitations of the approach are discussed.

  9. Student Perceptions of Peer Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Scafe, Marla G.; Wiechowski, Linda S.; Maier, David J.

    2013-01-01

    The purpose of this study was to evaluate students' perceptions of their peer's credibility based on email addresses. The survey was conducted at a community college in Michigan where all students were registered and actively taking at least one course. The survey results show that a student's selection of an email address does influence other…

  10. Student Perceptions of Faculty Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Scafe, Marla G.; Wiechowski, Linda S.

    2010-01-01

    The purpose of this study was to evaluate students' perceptions of faculty credibility based on email addresses. The survey was conducted at an upper division business school in Michigan where all students have completed at least two years of college courses. The survey results show that a faculty member's selection of an email address does…

  11. An Empirical Study of Email-Based Advertisement and its Influence on Consumers’ Attitude

    Directory of Open Access Journals (Sweden)

    Navid Behravan

    2012-07-01

    Full Text Available E-commerce becomes a cornerstone for many businesses over the recent years. Align with e-commerce activities, the marketing communication through online media plays a major role in achieving competitive advantageous. E-mail advertising in this context offers a cost effective, direct and reciprocal means for businesses overcoming time and geographical barriers. As so, this study discussed the advertising e-mail characteristics and its influences on customers' attitude about email-based advertisement. According to the research findings, entertainment and informativeness of advertising email content is strongly and positively affect customers’ attitude about email-based advertisement. On the other hand, the privacy of advertising e-mail is strongly, yet negatively influences the customers’ attitude towards email-based advertisement.

  12. A survey to evaluate patients' perspective concerning e-mail in an oncology practice

    International Nuclear Information System (INIS)

    Katzen, C.S.; Dicker, A.P.

    2001-01-01

    Purpose: Use of e-mail to improve physician-patient communication is becoming increasingly widespread, however, little research has been done to evaluate patients' interest and concerns regarding this technology. The goals of this study were to (1) evaluate the effectiveness of e-mail for communication between patients and their oncologist and (2) assess from the perspective of the patient the accessibility and usefulness of e-mail to facilitate medical treatment and advice as compared to conventional mail and telephone. E-mail as a clinical tool is a new trend in medicine that is growing quickly, however, there are few reports to date that evaluate the patients' perspective concerning e-mail usage. The use of e-mail in doctor-patient communication is potentially faster and more efficient than conventional mail and may reduce 'telephone tag'. E-mail initiated by the physician also allows for potential follow-up after treatment. Our study evaluated the types of transactions (personal medical questions, referrals, etc.) for which patients' preferred using e-mail in place of conventional communication methods. Materials and Methods: A self-administered survey (8 pages; 50 items) was mailed to 65 patients who were treated within the previous three years for prostate cancer in a radiation oncology practice. This survey explored the opinions and behaviors of patients with regard to online communication about general healthcare issues. The items included: patients' interest in e-mail, comfort in using e-mail, concerns about confidentiality, and access to e-mail. Patients' interest in using e-mail for specific situations were also evaluated, such as, making appointments, following up on treatment, or asking general health related questions. Patients' concerns about using email to communicate with healthcare organizations also were assessed. Results: The response rate to the survey was 63%, with a median age of 68 years (range 53-82), and the majority of respondents were

  13. Shared Semantics and the Use of Organizational Memories for E-Mail Communications.

    Science.gov (United States)

    Schwartz, David G.

    1998-01-01

    Examines the use of shared semantics information to link concepts in an organizational memory to e-mail communications. Presents a framework for determining shared semantics based on organizational and personal user profiles. Illustrates how shared semantics are used by the HyperMail system to help link organizational memories (OM) content to…

  14. What parents want from emails with their pediatrician: implications for teaching communication skills.

    Science.gov (United States)

    Schiller, Jocelyn H; Christner, Jennifer G; Stansfield, Robert Brent; Watnick, Caroline S; Mullan, Patricia B

    2013-07-01

    Physician-patient email communication is increasing but trainees receive no education on this communication medium. Research eliciting patient preferences about email communication could inform training. Investigators elicited parents' perspectives on physician-parent email communication and compared parent and faculty assessments of medical students' emails. This mixed methods study explored physician-parent email communication in 5 parent focus groups using qualitative analyses to identify themes. Differences between faculty and parent assessment scores for students' email responses were calculated using univariate general linear modeling. Themes that emerged were: (1) Building the Relationship, (2) Clarity of Communication and (3) Expectations. Parents criticized student's statements as condescending. The sum of assessment scores by parents and faculty were moderately correlated (r(44)=.407, Pparents gave students lower scores on "acknowledges validity/expresses empathy" (P=.01) and higher scores on "provides next steps" (PParents place value on students' abilities to communicate clearly and convey respect and empathy in email. Parent and faculty perspectives on email communication are similar but not the same. Differences between parental and faculty assessments of medical students' emails supports the need for the involvement of patients and families in email communication curriculum development. Copyright © 2013 Elsevier Ireland Ltd. All rights reserved.

  15. Faculty Perceptions of Student Credibility Based on Email Addresses

    Science.gov (United States)

    Livermore, Jeffrey A.; Wiechowski, Linda S.; Scafe, Marla G.

    2011-01-01

    The purpose of this study was to evaluate faculty perceptions of student credibility based on email addresses. The survey was conducted at an upper division business school in Michigan where all students have completed at least two years of college courses. The survey results show that a student's selection of an email address does influence the…

  16. Nnamdi Azikiwe University Journal of International Law and ...

    African Journals Online (AJOL)

    Principal Contact. Dr. Ikenga K.E. Oraegbunam Editor-in-chief. Nnamdi Azikiwe University. Department of International Law and Jurisprudence, Faculty of Law, Nnamdi Azikiwe University, P.M.B. 5025, Awka, Anambra State, Nigeria. Alternate E-Mail: ikengaken@gmail.com. Phone: +2348034711211

  17. The ubication of the physical universe | Nyasani | Journal of ...

    African Journals Online (AJOL)

    The ubication of the physical universe. Joseph M. Nyasani. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about AJOL ...

  18. Ombuds' corner: Code of Conduct and e-mails

    CERN Multimedia

    Vincent Vuillemin

    2011-01-01

    In this series, the Bulletin aims to explain the role of the Ombuds at CERN by presenting practical examples of misunderstandings that could have been resolved by the Ombuds if he had been contacted earlier. Please note that, in all the situations we present, the names are fictitious and used only to improve clarity.   Luke* holds a key position in the coordination of a large project. He is also a recognized expert in modeling complicated structures. Because of his expertise in the field, he receives a considerable number of e-mails every day which he has trouble responding to in addition to his responsibilities of management and development. Constantly interrupted, he tends to answer his emails quickly, sometimes even in an instinctive way, which leads to somewhat laconic messages. One day he receives an e-mail from Dave* challenging some of the decisions taken by the project’s management. Luke agrees with Dave’s remarks, which seem justified given his own expertise of the su...

  19. Using email reminders to engage physicians in an Internet-based CME intervention

    Directory of Open Access Journals (Sweden)

    Wall Terry

    2004-09-01

    Full Text Available Abstract Background Engaging practicing physicians in educational strategies that reinforce guideline adoption and improve the quality of healthcare may be difficult. Push technologies such as email offer new opportunities to engage physicians in online educational reinforcing strategies. The objectives are to investigate 1 the effectiveness of email announcements in engaging recruited community-based primary care physicians in an online guideline reinforcement strategy designed to promote Chlamydia screening, 2 the characteristics of physicians who respond to email announcements, as well as 3 how quickly and when they respond to email announcements. Methods Over a 45-week period, 445 recruited physicians received up to 33 email contacts announcing and reminding them of an online women's health guideline reinforcing CME activity. Participation was defined as physician log-on at least once to the website. Data were analyzed to determine participation, to compare characteristics of participants with recruited physicians who did not participate, and to determine at what point and when participants logged on. Results Of 445 recruited physicians with accurate email addresses, 47.2% logged on and completed at least one module. There were no significant differences by age, race, or specialty between participants and non-participants. Female physicians, US medical graduates and MDs had higher participation rates than male physicians, international medical graduates and DOs. Physicians with higher baseline screening rates were significantly more likely to log on to the course. The first 10 emails were the most effective in engaging community-based physicians to complete the intervention. Physicians were more likely to log on in the afternoon and evening and on Monday or Thursday. Conclusions Email course reminders may enhance recruitment of physicians to interventions designed to reinforce guideline adoption; physicians' response to email reminders may

  20. Email for communicating results of diagnostic medical investigations to patients.

    Science.gov (United States)

    Meyer, Barbara; Atherton, Helen; Sawmynaden, Prescilla; Car, Josip

    2012-08-15

    As medical care becomes more complex and the ability to test for conditions grows, pressure on healthcare providers to convey increasing volumes of test results to patients is driving investigation of alternative technological solutions for their delivery. This review addresses the use of email for communicating results of diagnostic medical investigations to patients. To assess the effects of using email for communicating results of diagnostic medical investigations to patients, compared to SMS/ text messaging, telephone communication or usual care, on outcomes, including harms, for health professionals, patients and caregivers, and health services. We searched: the Cochrane Consumers and Communication Review Group Specialised Register, Cochrane Central Register of Controlled Trials (CENTRAL, The Cochrane Library, Issue 1 2010), MEDLINE (OvidSP) (1950 to January 2010), EMBASE (OvidSP) (1980 to January 2010), PsycINFO (OvidSP) (1967 to January 2010), CINAHL (EbscoHOST) (1982 to February 2010), and ERIC (CSA) (1965 to January 2010). We searched grey literature: theses/dissertation repositories, trials registers and Google Scholar (searched July 2010). We used additional search methods: examining reference lists and contacting authors. Randomised controlled trials, quasi-randomised trials, controlled before and after studies and interrupted time series studies of interventions using email for communicating results of any diagnostic medical investigations to patients, and taking the form of 1) unsecured email 2) secure email or 3) web messaging. All healthcare professionals, patients and caregivers in all settings were considered. Two review authors independently assessed the titles and abstracts of retrieved citations. No studies were identified for inclusion. Consequently, no data collection or analysis was possible. No studies met the inclusion criteria, therefore there are no results to report on the use of email for communicating results of diagnostic medical

  1. Email use in elementary school: an analysis of exchange patterns and content

    NARCIS (Netherlands)

    van der Meij, Hans; Boersma, Kerst

    Email was embedded in a project in design and technology education in elementary school. During four lessons children worked in groups on building a flying object. These groups communicated through email with groups of children from another school. The analyses of the emails, as viewed from

  2. Orality and literacy, formality and informality in email communication

    Directory of Open Access Journals (Sweden)

    Carmen Pérez Sabater

    2008-04-01

    Full Text Available Approaches to the linguistic characteristics of computer-mediated communication (CMC have highlighted the frequent oral traits involved in electronic mail along with features of written language. But email is today a new communication exchange medium in social, professional and academic settings, frequently used as a substitute for the traditional formal letter. The oral characterizations and linguistic formality involved in this use of emails are still in need of research. This paper explores the formal and informal features in emails based on a corpus of messages exchanged by academic institutions, and studies the similarities and differences on the basis of their mode of communication (one-to-one or one-to-many and the sender’s mother tongue (native or nonnative. The language samples collected were systematically analyzed for formality of greetings and farewells, use of contractions, politeness indicators and non-standard linguistic features. The findings provide new insights into traits of orality and formality in email communication and demonstrate the emergence of a new style in writing for even the most important, confidential and formal purposes which seems to be forming a new sub-genre of letter-writing.

  3. Statistics-based email communication security behavior recognition

    Science.gov (United States)

    Yi, Junkai; Su, Yueyang; Zhao, Xianghui

    2017-08-01

    With the development of information technology, e-mail has become a popular communication medium. It has great significant to determine the relationship between the two sides of the communication. Firstly, this paper analysed and processed the content and attachment of e-mail using the skill of steganalysis and malware analysis. And it also conducts the following feature extracting and behaviour model establishing which based on Naive Bayesian theory. Then a behaviour analysis method was employed to calculate and evaluate the communication security. Finally, some experiments about the accuracy of the behavioural relationship of communication identifying has been carried out. The result shows that this method has a great effects and correctness as eighty-four percent.

  4. Deception Detection: Study of Information Manipulation Through Electronic Identity Theft - Email Forgery in the U.S. Military

    National Research Council Canada - National Science Library

    Rockwell, Roy

    2002-01-01

    This research describes the results of a field experiment which examines the effects of warnings on system trust and individual awareness in government computer systems through the use of email forgery...

  5. The Perceived Helpfulness of Rendering Emotional First Aid via Email

    Science.gov (United States)

    Gilat, Itzhak; Reshef, Eyal

    2015-01-01

    The present research examined the perceived helpfulness of an increasingly widespread mode of psychological assistance, namely, emotional first aid via email. The sample comprised 62 naturally occurring email interactions between distressful clients and trained volunteers operating within the framework of the Israeli Association for Emotional…

  6. Normative Data for Email Writing by Native Speakers of British English

    Directory of Open Access Journals (Sweden)

    Lindsey Thiel

    2015-05-01

    Full Text Available This dataset includes emails from forty two control participants ranging from 16 to 88 years of age (mean = 46 and 9 to 24 years of education (mean = 13. Three emails were produced by each participant (between 2011 and 2014, each within a time limit of three minutes. It is expected that this normative data will be useful for clinicians and researchers working with adults with acquired language disorders in assessing email writing.

  7. Normative Data for Email Writing by Native Speakers of British English

    OpenAIRE

    Thiel, Lindsey; Sage, Karen; Conroy, Paul

    2015-01-01

    This dataset includes emails from forty two control participants ranging from 16 to 88 years of age (mean = 46) and 9 to 24 years of education (mean = 13). Three emails were produced by each participant (between 2011 and 2014), each within a time limit of three minutes. It is expected that this normative data will be useful for clinicians and researchers working with adults with acquired language disorders in assessing email writing.

  8. Unraveling mulitple translatorship through an e-mail correspondence

    DEFF Research Database (Denmark)

    Jansen, Hanne

    2017-01-01

    The aim of this study is to shed light on questions of “multiple translatorship” and particularly on translation collaboration processes. The empirical material consists of more than three hundred e-mails exchanged between two co-translators who translated Claudio Magris’s novel Alla cieca (2005......) into Danish. The theoretical framework presents a double perspective through which the e-mail correspondence is studied: on the one hand, as an ethnographic “thick description” (focusing on translation as an event), with the aim of uncovering who the agents involved are, how they interact, and what...

  9. Experiences of using email for general practice consultations: a qualitative study.

    Science.gov (United States)

    Atherton, Helen; Pappas, Yannis; Heneghan, Carl; Murray, Elizabeth

    2013-11-01

    Reports suggest approximately 21-23% of GPs in the UK have consulted with patients using email, but little is known about the nature of this use and what it means for clinicians and patients in general practice. To understand the use of email consultation in general practice by investigating the experiences of existing users and views of experts. A qualitative study conducted in 2010 using purposive sampling and semi-structured interviews in general practice and community settings in some London boroughs. A maximum variation sample of GPs and patients who had used email for consultation in general practice were recruited, as were policy and/or implementation experts. Interviews continued until saturation was achieved. In total 10 GPs, 14 patients, and six experts were interviewed. Consultation by email was often triggered by logistic or practical issues; motivators for ongoing use were the benefits, such as convenience, for GPs and patients. Both GPs and patients reported concerns about safety and lack of guidance about the 'rules of engagement' in email consultations, with GPs also concerned about workload. In response, both groups attempted to introduce their own rules, although this only went some way to addressing uncertainty. Long term, participants felt there was a need for regulation and guidance. Consultations by email in general practice occur in an unregulated and unstructured way. Current UK policy is to promote consultations by email, making it crucial to consider the responsibility and workload faced by clinicians, and the changes required to ensure safe use; not doing so may risk safety breaches and result in suboptimal care for patients.

  10. E-mail security a pocket guide

    CERN Document Server

    Furnell, Steven

    2010-01-01

    This pocket guide will help businesses to address the most important issues. Its comprehensive approach covers both the technical and the managerial aspects of the subject, offering valuable insights for IT professionals, managers and executives, as well as for individual users of e-mail.

  11. Secure e-mail and Web browsing

    CERN Multimedia

    CERN. Geneva

    2009-01-01

    This is an entry-level 1.5-hour training course aimed to show how to detect and avoid typical security pitfalls encountered when e-mailing and browsing the Web. It is designed for non-technical users of Internet Explorer and Outlook. Register at CTA

  12. Teleradiology with DICOM e-mail: recommendations of rate at GIT

    International Nuclear Information System (INIS)

    Mildenberger, P.; Kaemmerer, M.; Klos, G.; Schuetze, B.; Engelmann, U.; Ruggiero, S.; Runa, A.; Weisser, G.; Schroeter, A.; Walz, M.

    2005-01-01

    E-mail is ideal for ad-hoc connections in teleradiology. The DICOM standard offers the possibility to append DICOM data types as a MIME attachment to any e-mail, thus ensuring the transmission of the original DICOM data. Nevertheless, there are additional requirements (e.g. protection of data privacy) which must be obeyed. Because of the lack of given standards which would grant interoperability as well as manufacturer independence, teleradiology has not been established in Germany until today. Therefore, the IT-Team (Arbeitsgemeinschaft fuer Informationstechnologie, rate at GIT) of the Radiological Society of Germany (Deutsche Roentgengesellschaft, DRG) set up an initiative to standardise telemedicine by using e-mail. Its members agreed that an e-mail-based variant would be the most practicable way to a communication solution - as easy to implement as to use. In their opinion, e-mail represents the smallest common denominator for a safe data interchange that would fulfill the legal advantages for telemedicine in Germany. (orig.)

  13. The Problem of Universals and the Limits of Conceptual Analysis ...

    African Journals Online (AJOL)

    The Problem of Universals and the Limits of Conceptual Analysis. Gonzalo Rodriguez-Pereyra. Abstract. Philosophical Papers Vol.31(1) 2002: 39-47. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · http://dx.doi.org/10.1080/05568640209485094 · AJOL African Journals ...

  14. The relevance of existing health communication models in the email age: An

    Science.gov (United States)

    Fage-Butler, Antoinette Mary; Jensen, Matilde Nisbeth

    2015-01-01

    Email communication is being integrated relatively slowly into doctor–patient communication. Patients have expressed enthusiasm for the medium, while doctors are generally more reluctant. As existing health communication models have characteristically assumed the co-presence of doctor and patient and primarily reflect medical practitioners’ perspectives, their suitability in relation to email communication and patients’ perspectives warrants further investigation. Following a two-step process and using the methodology of the integrative literature review, 29 articles from 2004–2014 are analysed with the aim of investigating the advantages and disadvantages of the medium of email from the patient’s perspective. The findings are compared to the health communication models of biomedicine, patient-centeredness, patient education and patient empowerment to investigate these models’ relevance for doctor–patient email communication. Results show that patients identify numerous advantages with email communication, including improved convenience and access, more detailed informational exchanges, greater reflection opportunities, freedom from the medical gaze and the potential to level out power imbalances, as well as a number of primarily medium-related disadvantages. The findings indicate that email can counteract some of the communicative problems associated with biomedicine and suggest the ongoing relevance of aspects of the models of patient empowerment, patient-centeredness and patient education for email communication.

  15. Providing cell phone numbers and email addresses to Patients: the physician's perspective

    Science.gov (United States)

    2011-01-01

    Background The provision of cell phone numbers and email addresses enhances the accessibility of medical consultations, but can add to the burden of physicians' routine clinical practice and affect their free time. The objective was to assess the attitudes of physicians to providing their telephone number or email address to patients. Methods Primary care physicians in the southern region of Israel completed a structured questionnaire that related to the study objective. Results The study population included 120 primary care physicians with a mean age of 41.2 ± 8.5, 88 of them women (73.3%). Physicians preferred to provide their cell phone number rather than their email address (P = 0.0007). They preferred to answer their cell phones only during the daytime and at predetermined times, but would answer email most hours of the day, including weekends and holidays (P = 0.001). More physicians (79.7%) would have preferred allotted time for email communication than allotted time for cell phone communication (50%). However, they felt that email communication was more likely to lead to miscommunication than telephone calls (P = 0.0001). There were no differences between male and female physicians on the provision of cell phone numbers or email addresses to patients. Older physicians were more prepared to provide cell phone numbers that younger ones (P = 0.039). Conclusions The attitude of participating physicians was to provide their cell phone number or email address to some of their patients, but most of them preferred to give out their cell phone number. PMID:21426591

  16. Providing cell phone numbers and email addresses to Patients: the physician's perspective

    Directory of Open Access Journals (Sweden)

    Freud Tamar

    2011-03-01

    Full Text Available Abstract Background The provision of cell phone numbers and email addresses enhances the accessibility of medical consultations, but can add to the burden of physicians' routine clinical practice and affect their free time. The objective was to assess the attitudes of physicians to providing their telephone number or email address to patients. Methods Primary care physicians in the southern region of Israel completed a structured questionnaire that related to the study objective. Results The study population included 120 primary care physicians with a mean age of 41.2 ± 8.5, 88 of them women (73.3%. Physicians preferred to provide their cell phone number rather than their email address (P = 0.0007. They preferred to answer their cell phones only during the daytime and at predetermined times, but would answer email most hours of the day, including weekends and holidays (P = 0.001. More physicians (79.7% would have preferred allotted time for email communication than allotted time for cell phone communication (50%. However, they felt that email communication was more likely to lead to miscommunication than telephone calls (P = 0.0001. There were no differences between male and female physicians on the provision of cell phone numbers or email addresses to patients. Older physicians were more prepared to provide cell phone numbers that younger ones (P = 0.039. Conclusions The attitude of participating physicians was to provide their cell phone number or email address to some of their patients, but most of them preferred to give out their cell phone number.

  17. [Mobile-phone e-mail use, social networks, and loneliness among Japanese high school students].

    Science.gov (United States)

    Ogata, Yasuko; Izumi, Yukiko; Kitaike, Tadashi

    2006-07-01

    The purposes of this study were to assess the loneliness of Japanese high school students who own and use a mobile phone, to clarify the relationships between students' loneliness and their social network and frequency of use of e-mail feature, and to demonstrate relationships with a student's social network and recognition of the benefits and drawbacks of mobile phone use. The participants were 227 students from two classes in each grade of a high school in the Kanto region of Japan. Participants answered a questionnaire covering the UCLA Loneliness Scale as well as questions pertaining to the circumstances of use of their mobile phones, their social networks (e.g., number of friends), and their perceptions of the benefits and drawbacks of mobile phone use. The questionnaires of students owning a mobile phone were analyzed. Total scores for the UCLA Loneliness Scale were calculated, and factor analysis was performed for the benefits and drawbacks. A total of 220 questionnaires were returned, for which 94.1 percent of respondents owned a mobile phone. The percentages of male and female respondents were 58% and 42%. Chronbach's alpha for the UCLA Loneliness Scale (total score) was 0.87, a result similar to previous studies with high school and university students. Factor analysis revealed five factors associated with the benefits and drawbacks of mobile phone use. Multiple-regression analysis showed that 42.9% of the variance in "frequency of e-mail use" was explained by grade level, frequency of mobile phone use, and two of the five factors from the benefits and drawbacks ("difficulty of communication," and "possible sleep loss due to nighttime e-mailing"). Stepwise multiple-regression analysis revealed that 24.4% of the variance in UCLA Loneliness Score was explained by gender, the frequency of e-mail use, the number of friends and the presence/absence of a girlfriend or boyfriend. Presence of an active social network and frequent e-mailing by mobile phone reduced

  18. Analysis of technical university information system

    Science.gov (United States)

    Savelyev, N. A.; Boyarkin, M. A.

    2018-05-01

    The paper covers a set and interaction of the existing higher education institution automated control systems in φ state budgetary educational institution of higher professional education "Industrial University of Tyumen ". A structural interaction of the existing systems and their functions has been analyzed which has become a basis for identification of a number of system-related and local (related to separate modules) drawbacks of the university activities automation. The authors suggested a new structure of the automated control system, consisting of three major subsystems: management support; training and methodology support; distance and supplementary education support. Functionality for each subsystem has been defined in accordance with the educational institution automation requirements. The suggested structure of the ACS will solve the challenges facing the university during reorganization and optimization of the processes of management of the institution activities as a whole.

  19. Promotion and communication through e-mail marketing campaigns

    Directory of Open Access Journals (Sweden)

    Raluca Dania TODOR

    2017-07-01

    Full Text Available The main purpose of this article is to try to emphasize the e-mail marketing campaigns importance and efficiency and the way they increase the interaction between a company and potential customers and to increase their interest in a company’s products and services and finally trigger the buying decision. Also the present paper’s aim is to exemplify how business can gain benefits by using marketing automation tools like e-mail marketing campaigns which is considered nowadays a form of direct marketing which is less expensive than the traditional direct marketing alternatives.

  20. OHSU web site readers have access to distinctive information. How to e-mail a child in the hospital; where to find a midwife.

    Science.gov (United States)

    Botvin, Judith D

    2005-01-01

    Oregon Health & Science University (OHSU), Portland, Ore., posts a web site which generously covers the various aspects of this complex organization. Visitors to www.osuhealth.com, can find a midwife, send an email to a child in the hospital, and learn about the benefits of living in Oregon.

  1. Compulsory registration of mail servers in order to accept e-mail from the Internet

    CERN Multimedia

    IT Department

    2008-01-01

    This announcement is intended only for administrators of a mail server (sendmail, postfix, etc.). It concerns e-mails sent from the Internet to addresses of the following type: somemailbox@somehost.cern.ch. Mail server managers are requested to register their servers so that they can accept e-mail from outside CERN. In future the CERN mail infrastructure will relay messages from outside CERN only to officially registered mail servers. This rule applies only to messages sent from the Internet. There will be NO change with respect to messages sent from inside CERN. If you are responsible for a mail server that accepts e-mails from outside CERN, please read the following page: http://cern.ch/mail/Help/?kbid=191090, where you can find information about the new rule and check if your host is already registered in the system. If you wish to register a mail server please send a message to: mailto:mail.support@cern.ch. This rule will be gradually enforced from 20 February 2008 onwards. Thank you for your cooperation...

  2. ‘Thank you in advance’: Slovenian Request Emails and Responses

    Directory of Open Access Journals (Sweden)

    Sara Orthaber

    2017-10-01

    Full Text Available Communication through email represents one of the most important forms of business communication, not just within a company but also externally with customers. The paper examines email interactions between the agents representing a Slovenian transport company and its customers. More specifically, the study examines specific aspects and elements of email production in a Slovenian customer service setting. It is hoped that the findings will help enhance the communication skills of learners of Slovenian as a foreign language and students of translation and increase their cultural awareness and their knowledge of technology-mediated customer service communication. Moreover, the findings could increase students’ understanding of the pragmatic motivations behind interactants’ linguistic choices.

  3. Smart information system for gachon university gil hospital.

    Science.gov (United States)

    Park, Dong Kyun; Jung, Eun Young; Jeong, Byung Hui; Moon, Byung Chan; Kang, Hyung Wook; Tchah, Hann; Han, Gi Seong; Cheng, Woo Sung; Lee, Young Ho

    2012-03-01

    In this research, the hospital information system of Gachon University Gil hospital is introduced and a future strategy for hospital information systems is proposed. This research introduces the development conditions of hospital information system at Gachon University Gil hospital, information about the development of the enterprise resource planning (ERP), a medical service process improvement system, and the personal health record (PHR) system. The medical service process and work efficiency were improved through the medical service process improvement system, which is the most common hospital information system at Gachon University Gil hospital and which includes an emergency medical service system, an online evaluation system and a round support system. Gachon University Gil hospital developed medical service improvement systems to increase work efficiency of medical team and optimized the systems to prove the availability of high-quality medical services for patients and their families. The PHR-based personalized health care solution is under development and will provide higher quality medical service for more patients in the future.

  4. Con Artists Attack Colleges with Fake Help-Desk E-Mail

    Science.gov (United States)

    Young, Jeffrey R.

    2008-01-01

    An e-mail scam has hit tens of thousands of users at dozens of colleges over the past few weeks, leaving network administrators scrambling to respond before campus computer accounts are taken over by spammers. Students, professors, and staff members at the affected colleges received e-mail messages that purported to come from the colleges' help…

  5. 49 CFR 37.25 - University transportation systems.

    Science.gov (United States)

    2010-10-01

    ... 49 Transportation 1 2010-10-01 2010-10-01 false University transportation systems. 37.25 Section 37.25 Transportation Office of the Secretary of Transportation TRANSPORTATION SERVICES FOR INDIVIDUALS WITH DISABILITIES (ADA) Applicability § 37.25 University transportation systems. (a...

  6. Pediatric caregiver attitudes toward email communication: survey in an urban primary care setting.

    Science.gov (United States)

    Dudas, Robert Arthur; Crocetti, Michael

    2013-10-23

    Overall usage of email communication between patients and physicians continues to increase, due in part to expanding the adoption of electronic health records and patient portals. Unequal access and acceptance of these technologies has the potential to exacerbate disparities in care. Little is known about the attitudes of pediatric caregivers with regard to their acceptance of email as a means to communicate with their health care providers. We conducted a survey to assess pediatric caregiver access to and attitudes toward the use of electronic communication modalities to communicate with health care providers in an urban pediatric primary care clinic. Participants were pediatric caregivers recruited from an urban pediatric primary care clinic in Baltimore, Maryland, who completed a 35-item questionnaire in this cross-sectional study. Of the 229 caregivers who completed the survey (91.2% response rate), 171 (74.6%) reported that they use email to communicate with others. Of the email users, 145 respondents (86.3%) stated that they would like to email doctors, although only 18 (10.7%) actually do so. Among email users, African-American caregivers were much less likely to support the expanded use of email communication with health care providers (adjusted OR 0.34, 95% CI 0.14-0.82) as were those with annual incomes less than US $30,000 (adjusted OR 0.26, 95% CI 0.09-0.74). Caregivers of children have access to email and many would be interested in communicating with health care providers. However, African-Americans and those in lower socioeconomic groups were much less likely to have positive attitudes toward email.

  7. New information technology and communication in health care: using e-mail for marketing services

    Directory of Open Access Journals (Sweden)

    Jorge Iván Martínez Espitia

    2015-01-01

    Full Text Available Research that was conducted was aimed to determine their use of e-mail independent health professionals. Email is one of the tools of information and communication that has shown great versatility and efciency as a means to improve the relationship between those who provide services or sell products users. Good communication is essential to keep current customers and attract new business prospects. To achieve the objective of the research a survey that measured the perception and use of email marketing by independent health professionals was conducted in Colombia. Four variables, including tenure email account, receiving these email accounts marketing of products or services, read marketing emails and use by marketing professionals were measured with email. The result of this study showed that independent health professionals in Colombia are familiar with this type of marketing. Generally interested incorporate it as one of your marketing tools, but do not know how to do this activity, which is described in a simple way how to do a marketing campaign with the use of emails to the users of health services.

  8. New information technology and communication in health care: using e-mail for marketing services

    Directory of Open Access Journals (Sweden)

    Jorge Iván Martínez Espitia

    2014-07-01

    Full Text Available Research that was conducted was aimed to determine their use of e-mail independent health professionals. Email is one of the tools of information and communication that has shown great versatility and efciency as a means to improve the relationship between those who provide services or sell products users. Good communication is essential to keep current customers and attract new business prospects. To achieve the objective of the research a survey that measured the perception and use of email marketing by independent health professionals was conducted in Colombia. Four variables, including tenure email account, receiving these email accounts marketing of products or services, read marketing emails and use by marketing professionals were measured with email. The result of this study showed that independent health professionals in Colombia are familiar with this type of marketing. Generally interested incorporate it as one of your marketing tools, but do not know how to do this activity, which is described in a simple way how to do a marketing campaign with the use of emails to the users of health services.

  9. Management of uterine fibroids at the University of Ilorin Teaching ...

    African Journals Online (AJOL)

    Management of uterine fibroids at the University of Ilorin Teaching Hospital: A 5 year review. A Aiyeyemi, AAG Jimoh, OR Balogun. Abstract. No Abstract. Full Text: EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · http://dx.doi.org/10.4314/nhp.v2i5.53441 · AJOL African Journals ...

  10. A Study of Preventing Email (Spear) Phishing by Enabling Human Intelligence

    NARCIS (Netherlands)

    M.S. Bargh; A. Padmos; R. Choenni; F. Jansen; N. Stembert

    2015-01-01

    Cyber criminals use phishing emails in high-volume and spear phishing emails in low volume to achieve their malicious objectives. Hereby they inflict financial, reputational, and emotional damages on individuals and organizations. These (spear) phishing attacks get steadily more sophisticated as

  11. an enhanced iris recognition and authentication system using ...

    African Journals Online (AJOL)

    Biu et al.

    1Department of Mathematical Sciences, Kaduna State University, Kaduna – Nigeria. (E-mail: ..... localization, the iris is in a circulation fashion then lastly, the image is saved into .... Conference on Computer Engineering Systems. Cleve, K.

  12. Information Systems for University Planning.

    Science.gov (United States)

    Robinson, Robert J.

    This paper proposes construction of a separate data base environment for university planning information, distinct from data bases and systems supporting operational functioning and management. The data base would receive some of its input from the management information systems (MIS)/transactional data bases and systems through a process of…

  13. Multitasking in the University Classroom

    Science.gov (United States)

    Burak, Lydia

    2012-01-01

    Although research evidence indicates that multitasking results in poorer learning and poorer performance, many students engage with text messaging, Facebook, internet searching, emailing, and instant messaging, while sitting in university classrooms. Research also suggests that multitasking may be related to risk behaviors. This study's purpose…

  14. Utilizing Multi-Field Text Features for Efficient Email Spam Filtering

    Directory of Open Access Journals (Sweden)

    Wuying Liu

    2012-06-01

    Full Text Available Large-scale spam emails cause a serious waste of time and resources. This paper investigates the text features of email documents and the feature noises among multi-field texts, resulting in an observation of a power law distribution of feature strings within each text field. According to the observation, we propose an efficient filtering approach including a compound weight method and a lightweight field text classification algorithm. The compound weight method considers both the historical classifying ability of each field classifier and the classifying contribution of each text field in the current classified email. The lightweight field text classification algorithm straightforwardly calculates the arithmetical average of multiple conditional probabilities predicted from feature strings according to a string-frequency index for labeled emails storing. The string-frequency index structure has a random-sampling-based compressible property owing to the power law distribution and can largely reduce the storage space. The experimental results in the TREC spam track show that the proposed approach can complete the filtering task in low space cost and high speed, whose overall performance 1-ROCA exceeds the best one among the participators at the trec07p evaluation.

  15. Getting better byte by byte: a pilot randomised controlled trial of email therapy for bulimia nervosa and binge eating disorder.

    Science.gov (United States)

    Robinson, Paul; Serfaty, Marc

    2008-03-01

    One hundred and ten people in an university population responded to emailed eating disorder questionnaires. Ninty-seven fulfilling criteria for eating disorders (bulimia nervosa (BN), binge eating disorder (BED), EDNOS) were randomised to therapist administered email bulimia therapy (eBT), unsupported Self directed writing (SDW) or Waiting list control (WLC). Measures were repeated at 3 months. Diagnosis, Beck depression inventory (BDI) and Bulimia investigatory test (BITE) scores were recorded. Follow-up rate was 63% and results must be interpreted cautiously. However significantly fewer participants who had received eBT or SDW fulfilled criteria for eating disorders at follow up compared to WLC. There was no significant difference between eBT and SDW in the analysis of variance (ANOVA), although in separate analyses, eBT was significantly superior to WLC (p < 0.02) and the difference for SDW approached significance (p = 0.06). BDI and BITE scores showed no significant change. For eBT participants there was a significant positive correlation between words written and improvement in BITE severity score. BN, BED and EDNOS can be treated via email. (c) 2007 John Wiley & Sons, Ltd and Eating Disorders Association

  16. Power Perceptions and Negotiations in a Cross-National Email Writing Activity

    Science.gov (United States)

    Liu, Yichun

    2011-01-01

    The present study investigates EFL students' perceptions of power differentials and their negotiation strategies when communicating with native English-speaking students via emails. The study involved 28 Taiwanese and American undergraduates who participated in a semester-long cross-national email writing activity. Findings show that students in…

  17. The place of theology in the modern university | Ross | Journal of ...

    African Journals Online (AJOL)

    The place of theology in the modern university. Kenneth R. Ross. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · AJOL African Journals Online. HOW TO USE AJOL... for Researchers · for Librarians · for Authors · FAQ's · More about ...

  18. Entrepreneurial universities in a world educational system

    Directory of Open Access Journals (Sweden)

    Iryna Kalenyuk

    2016-12-01

    Full Text Available This article analyzes modern development tendencies of university activities, it proved establishing of a global educational system, which shows increase of university education role, competition escalating and transformation of modern universities functions. It comprehensively studies the process when universities, both traditional and modern – business ones, are extending their functions. The article studied the development of scientists’ beliefs related to the essence and forms of entrepreneurial universities. On a basis of generalization of existing approaches, the authors give definition of the essence of entrepreneurial university as a subject of educational, scientific and other allied activities, which receives financial resources from diversified sources, extends fields of its activities and services. The foundation of the system of extended and main criteria for definition of entrepreneurial universities was laid. The main ones are the following: considerable financial autonomy and receiving of significant funding from non-governmental and diversified sources. Amounts and financial funding structure of the world leading universities were analyzed. It was proved that income from activities, which are allied with the main one (educational activity, increase. The article provides the amounts and the significance of international grants that ensure financial firmness, financial motivation of personnel, upgrades of facilities and resources, initiation and effectiveness of scientific-research activities of universities. Special attention was paid to research of such financial resources of the world leading universities as endowment funds, their scales, features and importance to boost economic capacities of higher education establishments. It was proved that it is important to consider world experience of entrepreneurial universities’ work within development and improving of competitive performance of Ukrainian higher education

  19. Re-connect: designing accessible email communication support for persons with aphasia

    NARCIS (Netherlands)

    Mahmud, Al A.; Martens, J.B.O.S.

    2010-01-01

    In this paper we present some preliminary outcomes concerning the design of an email communication tool for persons with expressive aphasia. The purpose of our design is to make email accessible for aphasics. It is based on interviews with persons with aphasia and their partners and has been

  20. Original Research Article Second-Hand Smoke in a University

    African Journals Online (AJOL)

    Erah

    staff and students concerning tobacco policies at a university campus in a ... to smoking and exposure to second-hand smoke on campus. A. 3-wave e-mailing was used to send the questionnaire. Results: ... smoke free policies on university campuses in North America. ... reported that cigarette smoking among fulltime.

  1. EMAIL MARKETING CAMPAIGNS: THE EASIEST PATH FROM ORGANIZATIONS TO CONSUMERS – AN EXPLORATORY ASSESSMENT

    Directory of Open Access Journals (Sweden)

    Pantea Carmen

    2010-07-01

    Full Text Available The email is a valuable marketing tool for conveying short, simple messages that call for action on behalf of the recipient. Usually companies develop email marketing campaigns for attracting new customers, persuading the existing customers to buy again, encourage customer loyalty, announce or remind about special offers or events. For an email marketing campaign to be efficient, it is wanted a greater number of responses from those in the target. The paper assesses in an exploratory manner the frequency in using the email accounts, the level of exposure to email marketing campaigns as well as the type of information wanted to be received by the Romanian users.

  2. E-mail Writing: Providing Background Information in the Core of Computer Assisted Instruction

    Directory of Open Access Journals (Sweden)

    Behzad NAZARI

    2015-01-01

    Full Text Available The present study highly supported the effective role of providing background information via e-mail by the teacher to write e-mail by the students in learners’ writing ability. A total number of 50 EFL advanced male students aged between 25 and 40 at different branches of Iran Language Institute in Tehran, Tehran. Through the placement test of Oxford English Language Placement Test (OELPT the students' proficiency level seems to be nearly the same. Participants were randomly assign into two groups of experimental and control, each consisting of 25 students. After the administration of the proficiency test, all groups were assigned to write topic 1 as the pre-test. Next, the teacher involved the learners in the new instruction (treatment. During writing topics 2, 3, 4, 5, 6, and 7 experimental group’s background knowledge was activated through e-mail before writing and e-mailing topics while the control group received no background knowledge activation through e-mail. After the treatment was given to the experimental group, the students in both groups were required to write another composition about the last topic, topic 8. Again, in this phase, none of the groups received any background information. The results indicated that providing background information via e-mail by the teacher to write e-mail by the students significantly improved learners’ writing ability.

  3. Sistema Automatizado de Emailing Marketing

    OpenAIRE

    Martínez López, Javier

    2010-01-01

    Projecte final de carrera realitzat en col.laboració amb E-xpertel S.A El presente proyecto describe el diseño e implementación de un sistema de automatización de campañas de marketing a través de email hacia clientes y/o clientes potenciales. Este sistema tiene como objetivos principales adquirir nuevos clientes y conseguir la delización de los mismos. El sistema se complementa con una plataforma CRM (Customer Relationship Management) para el mantenimiento de datos de empresa...

  4. Dissemination strategies and adherence predictors for web-based interventions-how efficient are patient education sessions and email reminders?

    Science.gov (United States)

    Schweier, R; Romppel, M; Richter, C; Grande, G

    2016-06-01

    The Internet offers the potential to efficaciously deliver health interventions at a low cost and with a low threshold across any distance. However, since many web-based interventions are confronted with low use and adherence, proactive dissemination strategies are needed. We, therefore, tested the efficacy of a 1-h patient education session as part of a rehabilitation program and an email reminder 4 weeks later on the publicity and use of a web-based intervention aimed at lifestyle changes in patients with either coronary heart disease or chronic back pain (CBP) and examined adherence predictors. The website www.lebensstil-aendern.de is a cost-free, German-language website providing more than 1000 patient narratives about successful lifestyle changes. To test the efficacy of the dissemination strategies and to examine adherence predictors, we conducted a sequential controlled trial with heart and CBP patients recruited from German inpatient rehabilitation centers. The dissemination strategies were found to be efficient. Use rates, however, remained low. The email reminder and internal health locus of control emerged as notable factors in motivating patients to participate in the web-based intervention. Other factors that have been suggested to be related to nonuse, e.g. sociodemographic characteristics and medical condition, did not predict use or adherence. © The Author 2016. Published by Oxford University Press. All rights reserved. For permissions, please email: journals.permissions@oup.com.

  5. Combining textual and non-textual features for e-mail importance estimation

    NARCIS (Netherlands)

    Sappelli, M.; Verberne, S.; Kraaij, W.

    2013-01-01

    In this work, we present a binary classification problem in which we aim to identify those email messages that the receiver will reply to. The future goal is to develop a tool that informs a knowledge worker which emails are likely to need a reply. The Enron corpus was used to extract training

  6. EVALUATION OF E-MAIL USAGE BY EXTENDED TECHNOLOGY ACCEPTANCE MODEL

    Directory of Open Access Journals (Sweden)

    Savaş Mutlu

    2013-01-01

    Full Text Available This study is performed to evaluate E-mail usage by Extended Technology Acceptance Model (TAM2 and to test the moderation effects of Espoused National Cultural Values between Subjective Norm (SN and E-mail usage Behavioral Intention (BI/Perceived Usefulness (PU. Survey was conducted in Adana Branches of an important Turkish State-Run Bank including 151 participants who have E-mail access for work purposes. As the results of the study; PU and Perceived Ease Of Use (PEOU have positive effects on BI, PEOU and SN both effect PU, Femininity (F shows positive moderating effect on the relationship between SN and PU as well as the relation between SN and BI, Collectivism (C shows positive moderation effect between SN and PU, moderation effect of SN on PU is higher for people who have higher tolerance to uncertainty.

  7. Phishtest: Measuring the Impact of Email Headers on the Predictive Accuracy of Machine Learning Techniques

    Science.gov (United States)

    Tout, Hicham

    2013-01-01

    The majority of documented phishing attacks have been carried by email, yet few studies have measured the impact of email headers on the predictive accuracy of machine learning techniques in detecting email phishing attacks. Research has shown that the inclusion of a limited subset of email headers as features in training machine learning…

  8. THE BPMN APPROACH OF THE UNIVERSITY INFORMATION SYSTEMS

    Directory of Open Access Journals (Sweden)

    Catalin STRȊMBEI

    2016-08-01

    Full Text Available In this article we provide a new vision about the enterprise modelling in the context of Business Process Model and Notation (BPMN and the university area. Although the flow objects, artefacts, connecting objects and swim lanes are very used in the process of Enterprise Modelling, they have specific roles in the university information systems. The paper will reveal a specific approach of BPMN in the context of university information systems based on a comparative analysis of some representative universities from United States and Central Europe. Our ideas are argued with a practical case study that includes 4 realistic and complex systems: study programs and curriculum, students’ admission, student roadmap, students’ exchange. The future directions of the article are some visions of BPMN orchestration of a SOA-based architecture for Student Record Systems.

  9. Facework in Non-Face-Threatening Emails by Native and Non-Native English Speakers

    Directory of Open Access Journals (Sweden)

    - Зохре Ислами Р

    2015-12-01

    Full Text Available The aim of this research is to investigate the speech act of assignment submission and presence of facework in submission emails sent to faculty members by native and nonnative English speaking graduate students. Brown and Levinson’s politeness theory (1987 and Spencer-Oatey’s (2002, 2008 rapport management framework were utilized to analyze the emails. The corpus consisted of 105 emails from 40 NES and NNES students. Drawing on speech event analysis approach (Merrison, Wilson, Davies, & Haugh, 2012, we analyze both submission head act as well as optional elements like openings, small talk and closings in an email. Our exploratory study revealed that, contrary to the argument that CMC is a lean medium (Duthler, 2006 in which it is difficult to achieve interpersonal communication, through the employment of opening, small talk and closing strategies, students attended to relational goals in their email communication.

  10. Email English with new social media section and phrase bank of useful expressions

    CERN Document Server

    Emmerson, Paul

    2013-01-01

    Email English will help students of English to write effective and convincing communications, whether for work or study, whether by email or via social media. Based on hundreds of real examples, Email English deals systematically with key language for constructing effective and convincing emails in English as well as developing an appropriate voice through social media. Basics, including opening and closing emails, giving information, making requests, arranging meetings and checking understanding. Specific situations, such as negotiating, asking for payment and dealing with a supplier or customer. Skills such as describing business trends, relating cause and effect and reporting. General grammar problems, for instance, sentence structure, verb forms, comparison and punctuation. Communication styles: formal and informal, direct and indirect, ways of seeming friendlier. A NEW social media section presents strategies, tips and key language and expressions for writing blogs and on social media platforms such as F...

  11. A qualitative analysis of email interactions of children who use augmentative and alternative communication.

    Science.gov (United States)

    Sundqvist, Anett; Rönnberg, Jerker

    2010-12-01

    The aim of this study was to introduce email as a form of interaction for a group of six children who used augmentative and alternative communication. In a 12-week exploratory study, aspects of the email messages sent were analyzed. The content of the messages was analyzed by an inductive qualitative method, and seven descriptive categories emerged. The most frequently occurring categories were Social Etiquette, Personal/Family Statistics and Personal Common Ground. The children utilized different email strategies that included use of most of the above-mentioned categories. Through the email writing practice, the children developed new social skills and increased their social participation. Email practice may be a good strategy to increase children's social networks.

  12. Pandora's electronic box: GPs reflect upon email communication with their patients

    Directory of Open Access Journals (Sweden)

    Felicity Goodyear-Smith

    2005-11-01

    Conclusion Study sample closely mirrored current NZ GP population. Although few GPs emailed with patients, many might once barriers are addressed. GPs had a collective view of the appropriate boundaries for email communication, routine tasks and the transmission of information. GPs would encourage professional debate regarding guidelines for good practice, managing demand and remuneration.

  13. Changes in the e-mail policy for people without CERN affiliation

    CERN Multimedia

    2012-01-01

    When affiliated with CERN, every computing account owner is entitled to have a CERN mail address (e.g. “John.Doe@cern.ch”). However, up to now, this mail address was still valid even after the end of a person's affiliation if the owner declared an external email address (e.g. “John.Doe@gmail.com”) to which all personal CERN emails (i.e. those sent to “John.Doe@cern.ch”) could be forwarded.*   As a result, to use our John Doe analogy, John could continue to write and receive emails ostensibly on behalf of CERN despite the fact that he is no longer a member of the personnel or subject to the CERN Staff Rules and Regulations and the Computing Rules. It is doubtful whether this makes sense. Therefore, in agreement with departments and LHC experiments at the last ITSRM meeting, all CERN email addresses of people whose affiliation has been terminated more than six months ago will be deactivated on 15 October 2012. For all others, incl...

  14. The STRENGTH Ezine: an application of e-mail for health promotion in adolescent girls.

    Science.gov (United States)

    Abroms, Lorien C; Fagan, Pebbles; Eisenberg, Marla E; Lee, Hye-Seung H; Remba, Natania; Sorensen, Glorian

    2004-01-01

    Few studies have investigated the efficacy of e-mail for promoting behavior change. This study evaluates the participation in and outcomes associated with an e-mail-based health promotion program. Adolescent girls aged 15 to 17 years were recruited at a shopping mall. Participants with an e-mail address were assigned to the interactive e-mail magazine (Ezine) group (n = 37), whereas those not reporting an e-mail address were assigned to the non-Ezine group (n = 33). Participants in the Ezine group received the health Ezine, which included a quiz and an advice column, on a weekly basis. Results indicate that among the Ezine group, there was a high recall of the Ezine (81.1%), and more than one third of the participants replied to Ezine volumes with quiz answers or an advice question (36.6%). Differences in health behavior change between the Ezine and non-Ezine groups were not significant. E-mails on health-related matters can generate moderate levels of involvement in adolescent girls. Given the widespread use of e-mail, more studies are needed on the effective application of e-mail for health behavior change.

  15. Machine Learning for Email Spam Filtering and Priority Inbox

    CERN Document Server

    Conway, Drew

    2011-01-01

    If you're an experienced programmer willing to crunch data, this concise guide will show you how to use machine learning to work with email. You'll learn how to write algorithms that automatically sort and redirect email based on statistical patterns. Authors Drew Conway and John Myles White approach the process in a practical fashion, using a case-study driven approach rather than a traditional math-heavy presentation. This book also includes a short tutorial on using the popular R language to manipulate and analyze data. You'll get clear examples for analyzing sample data and writing machi

  16. CORPORATE E-MAIL SERVICE GOOGLE APPS AS AN INSTRUMENT OF ACTIVITY OF ORGANIZATIONAL-EDUCATIONAL UNITS OF THE HIGHER EDUCATIONAL INSTITUTION

    OpenAIRE

    Кarpenko А.

    2017-01-01

    The advantages of usage of cloud technologies, particularly, of Gmail service Google Apps in work of organizational-educational units of higher educational institutions are analyzed in this work. The main accents are put concerning usage of corporate e-mail Gmail service Google Apps, with the help of which informational-analytical support of activity of organizational-educational units of the University is provided. The author of the publication underlines key advantages of Gmail and analyses...

  17. 78 FR 45910 - Proposed Information Collection; Comment Request; Current Population Survey (CPS) Email Address...

    Science.gov (United States)

    2013-07-30

    ... Population Survey (CPS) Email Address Collection Test Supplement AGENCY: U.S. Census Bureau, Commerce. ACTION... request clearance for the collection of data concerning the November 2013 Email Address Collection Test... tool to help increase response rates. We foresee that in the future, we could collect email addresses...

  18. Analysis of Naïve Bayes Algorithm for Email Spam Filtering across Multiple Datasets

    Science.gov (United States)

    Fitriah Rusland, Nurul; Wahid, Norfaradilla; Kasim, Shahreen; Hafit, Hanayanti

    2017-08-01

    E-mail spam continues to become a problem on the Internet. Spammed e-mail may contain many copies of the same message, commercial advertisement or other irrelevant posts like pornographic content. In previous research, different filtering techniques are used to detect these e-mails such as using Random Forest, Naïve Bayesian, Support Vector Machine (SVM) and Neutral Network. In this research, we test Naïve Bayes algorithm for e-mail spam filtering on two datasets and test its performance, i.e., Spam Data and SPAMBASE datasets [8]. The performance of the datasets is evaluated based on their accuracy, recall, precision and F-measure. Our research use WEKA tool for the evaluation of Naïve Bayes algorithm for e-mail spam filtering on both datasets. The result shows that the type of email and the number of instances of the dataset has an influence towards the performance of Naïve Bayes.

  19. Regional Maritime University Journal - Vol 1 (2011)

    African Journals Online (AJOL)

    Human errors and system variability in safety investigations of maritime casualties: an expression of systemic concerns · EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT. KT Ghirxi, 10-22 ...

  20. ENHANCING DISTANT LEARNING THROUGH EMAIL COMMUNICATION: A Case of BOU

    Directory of Open Access Journals (Sweden)

    K. M. Rezanur RAHMAN

    2008-04-01

    Full Text Available Today computer has replaced all means of traditional communication significantly. Many distant learning tools claim to be interactive, but few can offer two-way communication. Email is the most popular means of communication medium now-a-days. Therefore, it may be used as an educational tool for learning. In present socio-economic condition of Bangladesh, learners can afford computer, cell phone and Internet. We took this opportunity to investigate the prospective use of these tools for distant learning. The present survey has been carried out to understand the present status of Internet knowledge among the learners and their views for possible introduction of e-mail communication as supporting tool for learning. BOU’s available infrastructural facilities for providing Internet support have been investigated. Furthermore, possible solutions have been pointed out to provide e-mail facility to the learner in a cost effective way.

  1. Online Counseling Using Email: A Qualitative Study

    Science.gov (United States)

    Salleh, Amla; Hamzah, Ramlan; Nordin, Norazah; Ghavifekr, Simin; Joorabchi, Toktam Namyandeh

    2015-01-01

    Despite numerous studies in increasingly popular online mental health service, the nature of the relationship between online counselors and their clients, particularly in the email modality, deserves more attention. To enhance the knowledge in this area, this study was conducted to explore whether the online counseling relationship could be…

  2. Language Use in Computer-Mediated Communication: An Investigation into the Genre of Workplace Emails

    Directory of Open Access Journals (Sweden)

    Mohammad Awad AlAfnan

    2015-01-01

    Full Text Available This study investigated the moves and communicative purposes used in 522 email messages that were exchanged in a Malaysian private educational institute. Using Swales’s (1990 move approach, this study revealed that email writers used fourteen moves that are mainly six framing and eight content moves. Content moves included four main, one intertextual, one supporting and two follow-up moves. The four main content moves reflected the main communicative purposes of the emails that are discussing issues, enquiring about issues, couriering (delivering documents and informing about organizational and academic issues. The four communicative purposes varied in their structural organization, number of recipients and reaction to receiving the email. Keywords: Genre analysis; Email communication; Rhetorical moves; Communicative purposes; Discourse community

  3. Beemsterboer email discussion Jan. 10 - Mar. 4, 2014

    Science.gov (United States)

    A series of emails between Beemsterboer Slag Corp. and the Air Enforcement department of EPA Region 5 regarding site monitoring, and transportation of pet coke and met coke from facilities in Chicago, Illinois.

  4. The University Immune System: Overcoming Resistance to Change

    Science.gov (United States)

    Gilley, Ann; Godek, Marisha; Gilley, Jerry W.

    2009-01-01

    A university, similar to any other organization, has an immune system that erects a powerful barrier against change. This article discusses the university immune system and what can be done to counteract its negative effects and thereby allow change to occur.

  5. The effect of tertiary study at an English medium university on the ...

    African Journals Online (AJOL)

    The effect of tertiary study at an English medium university on the written English of speakers of Black South African English. J Parkinson. Abstract. No Abstract. Full Text: EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT · http://dx.doi.org/10.4314/tvl.v37i2.53847.

  6. A case for teaching English as a service subject at universities in ...

    African Journals Online (AJOL)

    A case for teaching English as a service subject at universities in Kenya. ... of this is that the learner is expected to acquire and utilize skills using a language he or she is not quite ... paper discusses the English language needs of Kenyan students at the time of entry to ... EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  7. Evaluating Usability of E-Learning Systems in Universities

    OpenAIRE

    Nicholas Kipkurui Kiget; Professor G. Wanyembi; Anselemo Ikoha Peters

    2014-01-01

    The use of e-learning systems has increased significantly in the recent times. E-learning systems are supplementing teaching and learning in universities globally. Kenyan universities have adopted e-learning technologies as means for delivering course content. However despite adoption of these systems, there are considerable challenges facing the usability of the systems. Lecturers and students have different perceptions in regard to the usability of e-learning systems. The aim of this study ...

  8. NASA University Program Management Information System

    Science.gov (United States)

    2000-01-01

    As basic policy, NASA believes that colleges and universities should be encouraged to participate in the nation's space and aeronautics program to the maximum extent practicable. Indeed, universities are considered as partners with government and industry in the nation's aerospace program. NASA:s objective is to have them bring their scientific, engineering, and social research competence to bear on aerospace problems and on the broader social, economic, and international implications of NASA's technical and scientific programs. It is expected that, in so doing, universities will strengthen both their research and their educational capabilities to contribute more effectively to the national well-being. NASA field codes and certain Headquarters program offices provide funds for those activities in universities which contribute to the mission needs of that particular NASA element. Although NASA has no predetermined amount of money to devote to university activities, the effort funded each year is substantial. This annual report is one means of documenting the NASA-university relationship, frequently denoted, collectively, as NASA's University Program. This report is consistent with agency accounting records, as the data is obtained from NASA:s Financial and Contractual Status (FACS) System, operated by the Financial Management Division and the Procurement Office. However, in accordance with interagency agreements, the orientation differs from that required for financial or procurement purposes. Any apparent discrepancies between this report and other NASA procurement or financial reports stem from the selection criteria for the data.* This report was prepared by the Education Division/FE, Office of Human Resources and Education, using a management information system which was modernized during FY 1993.

  9. Understanding Patient Experience Using Internet-based Email Surveys: A Feasibility Study at Mount Sinai Hospital.

    Science.gov (United States)

    Morgan, Matthew; Lau, Davina; Jivraj, Tanaz; Principi, Tania; Dietrich, Sandra; Bell, Chaim M

    2015-01-01

    Email is becoming a widely accepted communication tool in healthcare settings. This study sought to test the feasibility of Internet-based email surveys of patient experience in the ambulatory setting. We conducted a study of email Internet-based surveys sent to patients in selected ambulatory clinics at Mount Sinai Hospital in Toronto, Canada. Our findings suggest that email links to Internet surveys are a feasible, timely and efficient method to solicit patient feedback about their experience. Further research is required to optimally leverage Internet-based email surveys as a tool to better understand the patient experience.

  10. Classification of Phishing Email Using Random Forest Machine Learning Technique

    Directory of Open Access Journals (Sweden)

    Andronicus A. Akinyelu

    2014-01-01

    Full Text Available Phishing is one of the major challenges faced by the world of e-commerce today. Thanks to phishing attacks, billions of dollars have been lost by many companies and individuals. In 2012, an online report put the loss due to phishing attack at about $1.5 billion. This global impact of phishing attacks will continue to be on the increase and thus requires more efficient phishing detection techniques to curb the menace. This paper investigates and reports the use of random forest machine learning algorithm in classification of phishing attacks, with the major objective of developing an improved phishing email classifier with better prediction accuracy and fewer numbers of features. From a dataset consisting of 2000 phishing and ham emails, a set of prominent phishing email features (identified from the literature were extracted and used by the machine learning algorithm with a resulting classification accuracy of 99.7% and low false negative (FN and false positive (FP rates.

  11. Using PLSI-U To Detect Insider Threats from Email Traffic

    Science.gov (United States)

    Okolica, James; Peterson, Gilbert; Mills, Robert

    Despite a technology bias that focuses on external electronic threats, insiders pose the greatest threat to commercial and government organizations. Once information on a specific topic has gone missing, being able to quickly determine who has shown an interest in that topic can allow investigators to focus their attention. Even more promising is when individuals can be found who have an interest in the topic but who have never communicated that interest within the organization. An employee's interests can be discerned by data mining corporate email correspondence. These interests can be used to construct social networks that graphically expose investigative leads. This paper describes the use of Probabilistic Latent Semantic Indexing (PLSI) [4] extended to include users (PLSI-U) to determine topics that are of interest to employees from their email activity. It then applies PLSI-U to the Enron email corpus and finds a small number of employees (0.02%) who appear to have had clandestine interests.

  12. Communicative In-Betweens of E-mail Communication

    DEFF Research Database (Denmark)

    Hansen, Ejvind

    2009-01-01

    In this paper I seek to deconstruct internet-based communication. I highlight Derrida’s focus on the margins and in-betweens of communication, and relate it to the genre of e-mail. I argue (i) that the silence between the dialogic turns becomes more marked, while (ii) the separation of present an...

  13. Achieving Quality Assurance in Nigeria University System through ...

    African Journals Online (AJOL)

    This paper examines how quality assurance can be attained through Strategic Human Resources Development in Nigerian University system. The purpose is to ensure quality control and maintenance of acceptable standards in the University system. To seek solution to the problem, three research questions were posed.

  14. Comparing appropriateness and equivalence of email interviews to phone interviews in qualitative research on reproductive decisions.

    Science.gov (United States)

    Hershberger, Patricia E; Kavanaugh, Karen

    2017-10-01

    Despite an increasing use of qualitative email interviews by nurse researchers, there is little understanding about the appropriateness and equivalence of email interviews to other qualitative data collection methods, especially on sensitive topics research. The purpose is to describe our procedures for completing asynchronous, email interviews and to evaluate the appropriateness and equivalency of email interviews to phone interviews in two qualitative research studies that examined reproductive decisions. Content analysis guided the methodological appraisal of appropriateness and equivalency of in-depth, asynchronous email interviews to single phone interviews. Appropriateness was determined by: (a) participants' willingness to engage in email or phone interviews, (b) completing data collection in a timely period, and (c) participants' satisfaction with the interview. Equivalency was evaluated by: (a) completeness of the interview data, and (b) insight obtained from the data. Of the combined sample in the two studies (N=71), 31% of participants chose to participate via an email interview over a phone interview. The time needed to complete the email interviews averaged 27 to 28days and the number of investigator probe-participant response interchanges was 4 to 5cycles on average. In contrast, the phone interviews averaged 59 to 61min in duration. Most participants in both the email and phone interviews reported they were satisfied or very satisfied with their ability to express their true feelings throughout the interview. Regarding equivalence, 100% of the email and phone interviews provided insight into decision processes. Although insightful, two of the email and one phone interview had short answers or, at times, underdeveloped responses. Participants' quotes and behaviors cited within four published articles, a novel evaluation of equivalency, revealed that 20% to 37.5% of the citations about decision processes were from email participants, which is

  15. Placing the Solar System in its Universal Context

    Science.gov (United States)

    Grier, J. A.; Steel, S. J.; Dussault, M. E.; Reinfeld, E. L.; Gould, R. R.

    2004-11-01

    Data from surveys and evaluations of recent space science education programs show that both teachers and students use the terms 'solar system', 'galaxy' and 'universe' interchangeably. For some this merely represents a barrier in vocabulary, but for most, it is indicative of an underlying lack of structure within their internal models of the solar system and universe. Some of the misconceptions of size of the solar system, placement, distance, scale and hierarchy of objects in the galaxy and universe are introduced by not including the solar system in a consistent, coherent picture within the rest of the galaxy and universe. If these ideas and misconceptions are not addressed through a targeted educational experience, they can form barriers to developing new and more accurate internal models, and impede the assimilation of any new evidence or ideas within those models. We are developing focused educational products and experiences that allow students to encounter the topics of 'solar system', 'galaxy' and 'universe' as an integrated whole, showing the common and unique features, natural interrelationships, and hierarchies that allow students and teachers to develop more powerful internal models of their place in space and time. We have used this approach to enhance the learning experience at Girl Scouts 'Train the Trainer' Workshops, in the 'Modeling the Universe' Professional Development Workshops, and in several venues for urban public school teachers. We have also created activities such as the "Cosmic Timeline", and products such as the "How Big is the Universe?" booklet to support learning about size and scale from the Earth to the Sun, and then all the way out to the edge of space.

  16. University Library Virtual Reference Services: Best Practices and Continuous Improvement

    Science.gov (United States)

    Shaw, Kate; Spink, Amanda

    2009-01-01

    The inclusion or not of chat services within Virtual Reference (VR) is an important topic for university libraries. Increasingly, email supported by a Frequently Asked Questions (FAQ) database is suggested in the scholarly literature as the preferred, cost-effective means for providing university VR services. This paper examines these issues and…

  17. Network Analysis with the Enron Email Corpus

    Science.gov (United States)

    Hardin, J. S.; Sarkis, G.; URC, P. .

    2015-01-01

    We use the Enron email corpus to study relationships in a network by applying six different measures of centrality. Our results came out of an in-semester undergraduate research seminar. The Enron corpus is well suited to statistical analyses at all levels of undergraduate education. Through this article's focus on centrality, students can explore…

  18. Fighting Spam: Moving Email to the Cloud

    Science.gov (United States)

    Schrader, Andrew

    2011-01-01

    On average, more than 90% of email is unwanted junk mail--spam. Many spam messages include annoying promotions for irrelevant products, but others include viruses and pornographic content, which can pose a severe legal issue for schools. Spam puts districts in a difficult situation as schools try to enhance learning in the classroom with advanced…

  19. [Email in a dedicated headache clinic: experience gained over a five-year period].

    Science.gov (United States)

    Pedraza, M Isabel; Herrero-Velázquez, Sonia; López-Mesonero, Luis; Ruiz-Piñero, Marina; Posadas, Javier; Guerrero-Peral, Ángel L

    2015-06-16

    The use of email can facilitate communication between the different levels of an organisation. Our primary care physicians have had an email service in the dedicated headache clinic (DHC) since November 2009, and our aim is therefore to analyse the use of email over that five-year period. Data concerning the emails sent up until October 2014 were collected prospectively. The questions were classified as need for referral to the DHC (group 1), progress made by the cases seen in the DHC (group 2), training in headaches (group 3) or the treatment of the headaches suffered by primary care physicians themselves as patients (group 4). A total of 274 email messages were analysed. Monthly consultations have increased (from 1.5 per month during the first year to 7.5 per month during the fifth). Findings showed that 10.2% of the email messages came from rural health centres and 89.8% were sent from urban health centres. Replies were sent within 2 ± 2.8 days (range: 0-24 days). Altogether 130 consultations were classified as belonging to group 1 (47.4%), in which referral through the normal channel was recommended in 60 cases (46.2%), via the preferential channel in 47 (36.2%) and non-referral was suggested in 23 cases (17.6%). Group 2 included 125 emails (45.7%) and in 80 cases there was no need to make a new appointment or to bring forward the existing one (64%). Thirteen visits (4.7%) were classified into group 3 and six (2.2%) in group 4. Our primary care physicians are using the email of the DHC on an increasingly more frequent basis. Its use makes it possible to detect patients whose appointment -whether the first or a follow-up- needs to be brought forward, as well as allowing issues to be solved without the need for referral. It is effective for the treatment of physicians who themselves have headaches and as a tool for continuing education.

  20. Do family physicians retrieve synopses of clinical research previously read as email alerts?

    Science.gov (United States)

    Grad, Roland; Pluye, Pierre; Johnson-Lafleur, Janique; Granikov, Vera; Shulha, Michael; Bartlett, Gillian; Marlow, Bernard

    2011-11-30

    A synopsis of new clinical research highlights important aspects of one study in a brief structured format. When delivered as email alerts, synopses enable clinicians to become aware of new developments relevant for practice. Once read, a synopsis can become a known item of clinical information. In time-pressured situations, remembering a known item may facilitate information retrieval by the clinician. However, exactly how synopses first delivered as email alerts influence retrieval at some later time is not known. We examined searches for clinical information in which a synopsis previously read as an email alert was retrieved (defined as a dyad). Our study objectives were to (1) examine whether family physicians retrieved synopses they previously read as email alerts and then to (2) explore whether family physicians purposefully retrieved these synopses. We conducted a mixed-methods study in which a qualitative multiple case study explored the retrieval of email alerts within a prospective longitudinal cohort of practicing family physicians. Reading of research-based synopses was tracked in two contexts: (1) push, meaning to read on email and (2) pull, meaning to read after retrieval from one electronic knowledge resource. Dyads, defined as synopses first read as email alerts and subsequently retrieved in a search of a knowledge resource, were prospectively identified. Participants were interviewed about all of their dyads. Outcomes were the total number of dyads and their type. Over a period of 341 days, 194 unique synopses delivered to 41 participants resulted in 4937 synopsis readings. In all, 1205 synopses were retrieved over an average of 320 days. Of the 1205 retrieved synopses, 21 (1.7%) were dyads made by 17 family physicians. Of the 1205 retrieved synopses, 6 (0.5%) were known item type dyads. However, dyads also occurred serendipitously. In the single knowledge resource we studied, email alerts containing research-based synopses were rarely retrieved

  1. 49 CFR 551.63 - May a foreign manufacturer submit a designation by email or facsimile?

    Science.gov (United States)

    2010-10-01

    ... email or facsimile? 551.63 Section 551.63 Transportation Other Regulations Relating to Transportation... foreign manufacturer submit a designation by email or facsimile? No, the statute requires designation... designation documents submitted via email or facsimile, as they do not satisfy this requirement. ...

  2. University Program Management Information System

    Science.gov (United States)

    Gans, Gary (Technical Monitor)

    2004-01-01

    As basic policy, NASA believes that colleges and universities should be encouraged to participate in the nation's space and aeronautics program to the maximum extent practicable. Indeed, universities are considered as partners with government and industry in the nation's aerospace program. NASA's objective is to have them bring their scientific, engineering, and social research competence to bear on aerospace problems and on the broader social, economic, and international implications of NASA's technical and scientific programs. It is expected that, in so doing, universities will strengthen both their research and their educational capabilities to contribute more effectively to the national well being. This annual report is one means of documenting the NASA-university relationship, frequently denoted, collectively, as NASA's University Program. This report is consistent with agency accounting records, as the data is obtained from NASA's Financial and Contractual Status (FACS) System, operated by the Financial Management Division and the Procurement Office. However, in accordance with interagency agreements, the orientation differs from that required for financial or procurement purposes. Any apparent discrepancies between this report and other NASA procurement or financial reports stem from the selection criteria for the data.

  3. University Program Management Information System

    Science.gov (United States)

    2001-01-01

    As basic policy, NASA believes that colleges and universities should be encouraged to participate in the nation's space and aeronautics program to the maximum extent practicable. Indeed, universities are considered as partners with government and industry in the nation's aerospace program. NASA' objective is to have them bring their scientific, engineering, and social research competence to bear on aerospace problems and on the broader social, economic, and international implications of NASA's technical and scientific programs. It is expected that, in so doing, universities will strengthen both their research and their educational capabilities to contribute more effectively to the national well being. This annual report is one means of documenting the NASA-university relationship, frequently denoted, collectively, as NASA's University Program. This report is consistent with agency accounting records, as the data is obtained from NASA's Financial and Contractual Status (FACS) System, operated by the Financial Management Division and the Procurement Office. However, in accordance with interagency agreements, the orientation differs from that required for financial or procurement purposes. Any apparent discrepancies between this report and other NASA procurement or financial reports stem from the selection criteria for the data.

  4. The style of academic e-mails and conventional letters: contrastive analysis of four conversational routines

    Directory of Open Access Journals (Sweden)

    Clyde Ancarno

    2005-04-01

    Full Text Available This paper presents the results of a corpus-based study which investigates the genre of academic email and more specifically its pragmatic dimension. Four conversational routines (thank yous, apologies, requests, offers are analysed and compared in two channels: academic e-mails and conventional print letters. In addition, data from both native and non-native speakers of English is considered, which sheds light on some of the differences found in the academic e-mail writing of learners of English. The findings indicate that academic e-mail is a relatively formal type of correspondence which is still largely influenced, as is to be expected, by the genre of the academic letter, and that as a genre, academic e-mail is in the process of formation or semi-formation. Finally, native speakers of English are found to be more informal than non-native speakers of English in academic e-mails.

  5. Colleges Get out of E-Mail Business

    Science.gov (United States)

    Carnevale, Dan

    2008-01-01

    Frantic troubleshooting by an overworked staff versus someone else fixing problems smoothly. A sliver of server space per person versus a five-gigabyte chunk. Half a million dollars versus free. That's what colleges are faced with as they decide whether to continue running their own e-mail services or outsource them to a professional service like…

  6. University Program Management Information System: NASA's University Program Active Projects

    Science.gov (United States)

    Gans, Gary (Technical Monitor)

    2003-01-01

    As basic policy, NASA believes that colleges and universities should be encouraged to participate in the nation's space and aeronautics program to the maximum extent practicable. Indeed, universities are considered as partners with government and industry in the nation's aerospace program. NASA's objective is to have them bring their scientific, engineering, and social research competence to bear on aerospace problems and on the broader social, economic, and international implications of NASA's technical and scientific programs. It is expected that, in so doing, universities will strengthen both their research and their educational capabilities to contribute more effectively to the national well being. This annual report is one means of documenting the NASA-university relationship, frequently denoted, collectively, as NASA's University Program. This report is consistent with agency accounting records, as the data is obtained from NASA's Financial and Contractual Status (FACS) System, operated by the Financial Management Division and the Procurement Office. However, in accordance with interagency agreements, the orientation differs from that required for financial or procurement purposes. Any apparent discrepancies between this report and other NASA procurement or financial reports stem from the selection criteria for the data. This report was prepared by the Office of Education/N.

  7. How to Increase the Efficiency and Reach of Email Marketing: Case Onninen Finland

    OpenAIRE

    Nuutinen, Sami

    2015-01-01

    This thesis took an analytical and practical approach on email marketing, and studied it from the perspective of the case study company Onninen. The aim was at finding out how to increase the efficiency and reach of email marketing at the case company. The case company, Onninen, is a large Finnish distributor of HVACR, steel, and electrical goods. Email marketing can be one of the most effective tools for marketers to invest in. In order to find solutions to the aforementioned aim of the...

  8. Using Email to Enable E[superscript 3] (Effective, Efficient, and Engaging) Learning

    Science.gov (United States)

    Kim, ChanMin

    2008-01-01

    This article argues that technology that supports both noncognitive and cognitive aspects can make learning more effective, efficient, and engaging (e[superscript 3]-learning). The technology of interest in this article is email. The investigation focuses on characteristics of email that are likely to enable e[superscript 3]-learning. In addition,…

  9. Groundwork for Universal Canister System Development

    Energy Technology Data Exchange (ETDEWEB)

    Price, Laura L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Gross, Mike [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Prouty, Jeralyn L. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Rigali, Mark J. [Sandia National Lab. (SNL-NM), Albuquerque, NM (United States); Craig, Brian [Argonne National Lab. (ANL), Argonne, IL (United States); Han, Zenghu [Argonne National Lab. (ANL), Argonne, IL (United States); Lee, John Hok [Argonne National Lab. (ANL), Argonne, IL (United States); Liu, Yung [Argonne National Lab. (ANL), Argonne, IL (United States); Pope, Ron [Argonne National Lab. (ANL), Argonne, IL (United States); Connolly, Kevin [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Feldman, Matt [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Jarrell, Josh [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Radulescu, Georgeta [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Scaglione, John [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Wells, Alan [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States)

    2015-09-01

    The mission of the United States Department of Energy's Office of Environmental Management is to complete the safe cleanup of the environmental legacy brought about from five decades of nuclear weapons development and go vernment - sponsored nuclear energy re search. S ome of the waste s that that must be managed have be en identified as good candidates for disposal in a deep borehole in crystalline rock (SNL 2014 a). In particular, wastes that can be disposed of in a small package are good candidates for this disposal concept. A canister - based system that can be used for handling these wastes during the disposition process (i.e., storage, transfers, transportation, and disposal) could facilitate the eventual disposal of these wastes. This report provides information for a program plan for developing specifications regarding a canister - based system that facilitates small waste form packaging and disposal and that is integrated with the overall efforts of the DOE's Office of Nuclear Energy Used Fuel Dis position Camp aign's Deep Borehole Field Test . Groundwork for Universal Ca nister System Development September 2015 ii W astes to be considered as candidates for the universal canister system include capsules containing cesium and strontium currently stored in pools at the Hanford Site, cesium to be processed using elutable or nonelutable resins at the Hanford Site, and calcine waste from Idaho National Laboratory. The initial emphasis will be on disposal of the cesium and strontium capsules in a deep borehole that has been drilled into crystalline rock. Specifications for a universal canister system are derived from operational, performance, and regulatory requirements for storage, transfers, transportation, and disposal of radioactive waste. Agreements between the Department of Energy and the States of Washington and Idaho, as well as the Deep Borehole Field Test plan provide schedule requirements for development of the universal canister system

  10. Omen: identifying potential spear-phishing targets before the email is sent.

    Energy Technology Data Exchange (ETDEWEB)

    Wendt, Jeremy Daniel.

    2013-07-01

    We present the results of a two year project focused on a common social engineering attack method called "spear phishing". In a spear phishing attack, the user receives an email with information specifically focused on the user. This email contains either a malware-laced attachment or a link to download the malware that has been disguised as a useful program. Spear phishing attacks have been one of the most effective avenues for attackers to gain initial entry into a target network. This project focused on a proactive approach to spear phishing. To create an effective, user-specific spear phishing email, the attacker must research the intended recipient. We believe that much of the information used by the attacker is provided by the target organization's own external website. Thus when researching potential targets, the attacker leaves signs of his research in the webserver's logs. We created tools and visualizations to improve cybersecurity analysts' abilities to quickly understand a visitor's visit patterns and interests. Given these suspicious visitors and log-parsing tools, analysts can more quickly identify truly suspicious visitors, search for potential spear-phishing targeted users, and improve security around those users before the spear phishing email is sent.

  11. On the Universality and Non-Universality of Spiking Neural P Systems With Rules on Synapses.

    Science.gov (United States)

    Song, Tao; Xu, Jinbang; Pan, Linqiang

    2015-12-01

    Spiking neural P systems with rules on synapses are a new variant of spiking neural P systems. In the systems, the neuron contains only spikes, while the spiking/forgetting rules are moved on the synapses. It was obtained that such system with 30 neurons (using extended spiking rules) or with 39 neurons (using standard spiking rules) is Turing universal. In this work, this number is improved to 6. Specifically, we construct a Turing universal spiking neural P system with rules on synapses having 6 neurons, which can generate any set of Turing computable natural numbers. As well, it is obtained that spiking neural P system with rules on synapses having less than two neurons are not Turing universal: i) such systems having one neuron can characterize the family of finite sets of natural numbers; ii) the family of sets of numbers generated by the systems having two neurons is included in the family of semi-linear sets of natural numbers.

  12. An E-mail Service in a Military Adolescent Medicine Clinic: will teens ...

    African Journals Online (AJOL)

    The goal of this study was to determine utilization patterns of an Adolescent Medicine Clinic e-mail service. An e-mail service was offered to 6134 patients presenting for care to a military Adolescent Medicine Clinic in San Antonio, Texas over a 6-month period. Families had to complete an authorization form acknowledging ...

  13. Kajian Kesantunan dalam E-Mail Permohonan yang Ditulis oleh Penutur Jepang dan Pembelajar Indonesia

    Directory of Open Access Journals (Sweden)

    Hani Wahyuningtias

    2014-05-01

    Full Text Available Nowadays electronic mail (e-mail is a communication tool that is often used in everyday life. One of the utilizations of e-mail is used in practical purposes such as making a request. This paper provided views on linguistic politeness in submitting an e-mail containing the request based on e-mail data written by native speakers of Japanese (J and the Indonesian Japanese language learners (IJL. The data was analyzed using the theory of politeness expressed by Brown and Levinson. This paper focused on the strategy that what more likely was to be used by J and IJL in the expression of request. In the final part, it concluded the view about what should be considered in connection with the linguistic politeness in Japanese e-mail containing request. It was intended for learners of foreign language, especially Indonesian people, to know the limitation of politeness, so that IJL will not repeat the same mistakes in the future.

  14. Interviewing When You’re Not Face-To-Face: The Use of Email Interviews in a Phenomenological Study

    Directory of Open Access Journals (Sweden)

    Chandra Bowden

    2015-01-01

    Full Text Available As Internet usage becomes more commonplace, researchers are beginning to explore the use of email interviews. Email interviews have a unique set of tools, advantages, and limitations, and are not meant to be blind reproductions of traditional face-to-face interview techniques. Email interviews should be implemented when: 1 researchers can justify email interviews are useful to a research project; 2 there is evidence that the target population will be open to email interviewing as a form of data collection; and 3 the justification of the email interview supports the researchers’ theoretical perspective. The objective of this study was to develop an email interviewing methodology. As with other forms of qualitative interviewing, it is important that the researcher: 1 identifies constraints; 2 adequately prepares for the interview; 3 establishes rapport; 4 asks appropriate questions; 5 actively listens; and 6 ends the email interview appropriately.

  15. Organizational Behavior Analysis Focusing on the University of Texas System

    Science.gov (United States)

    Terry, Bobby K.

    2011-01-01

    This project analyzes the organizational behavior of the University of Texas System. The University of Texas System is comprised of nine academic and six health institutions. The University of Texas System has over 85,000 employees; the student enrollment is 202,240 with a budget of $2.25 billion dollars. This project has a total of four parts and…

  16. INFORMATION SYSTEM DESIGN OF PERFORMANCE ACHIEVEMENTS MONITORING IN THE UNIVERSITY: A CASE STUDY IN BINUS UNIVERSITY

    Directory of Open Access Journals (Sweden)

    Irma Irawati Ibrahim

    2012-05-01

    Full Text Available Dashboard is a computer interface that displays a variety of charts, graphs, tables, which are selected reports from various data that are considered important to display rapidly, with an attractive appearance, dynamic, and relevant so that it can immediately be seen quickly to analyze a condition. Dashboard information system is widely used in various companies as a support system for decision-making where Dashboard usually displays data business trends of the company or the achievement of KPI (Key Performance Indicator of a company. The method used is descriptive analysis by means of collecting information that areimportant for universities to be considered asthe Key Success Factors (KSF of the university, and then, the design of the dashboard is made in accordance with these important factors.The result of this study is a grand design of information systems for the university performance monitoring, starting from the reception of students, faculty performance, student academic achievement, effectiveness and efficiency of services, including graduates. It is expected that by the time the system has been fully implemented, the university can take action quickly and accurately with respect to the required conditions.Keywords: Information System Dashboard; Dashboard; Academic Dashboard; University Dashboard

  17. Nursing scholarship within the British university system.

    Science.gov (United States)

    Ramcharan, P; Ashmore, R; Nicklin, L; Drew, J

    This article is a review of how a school of nursing and midwifery might promote scholarship within the university system. It is argued that the emphasis on research in universities has undermined the importance of scholarship within education and practice. The difficulties of recognizing scholarly processes as opposed to products such as publications is outlined in relation to three areas of potential scholarship within nurse education, i.e. research, teaching and practice. Issues are raised about how scholarship might be promoted in these three areas in practical terms. It is argued that systems of recognition and reward should be equitably distributed between these wide areas of potential scholarship. This will mean universities accommodating different models of scholarship and nurses recognizing their responsibility to contribute to scholarly activity.

  18. A new remote-imaging diagnosis system at Komazawa University

    International Nuclear Information System (INIS)

    Shimada, Morio; Kohda, Eiichi; Yoshikawa, Kohki

    2007-01-01

    We developed a remote-imaging diagnosis system that links the highly experienced radiologists at Komazawa University with Fuji Electric Hospital, where no such radiologists are present. MRI or CT images from Fuji Electric hospital are transmitted to Komazawa University via private line (INS64). The radiologists at Komazawa University then read the MRI or CT images, and relay the results to Fuji Electric Hospital. We describe the advantages and disadvantages of this system. MRI or CT imaging data from 80 cases were used. The data were stored in the imaging system server at Fuji Electric Hospital and were evaluated by experienced radiologists at Komazawa University. The images were sent one by one to the diagnostic support system server at Komazawa University through the private INS64 line. We examined transmission time per case and the security of transmission. Transmission of MRI or CT images from the 80 cases required a mean duration of 63 minutes 30 seconds per image. The quality of all images was highly satisfactory. In addition, there was no evidence of weaknesses in security. A physician at Fuji Electric Hospital was able to readily explain to the patient the results of the images by referring to the findings written by a radiologist at Komazawa University. We were able to transmit MRI or CT images by using this system safely and readily. The primary disadvantage of this system was the slow transmission speed. This will be improved by upgrading to an optical fibers. (author)

  19. Developing National Systems of Innovation: University-Industry ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    2015-01-30

    Jan 30, 2015 ... Interactions between firms and universities are key building blocks of innovation systems. With a focus on developing countries, this book presents novel comparative research spanning three continents. The result is a more universal and dynamic view of the shaping and reshaping of interactions between ...

  20. Automated Podcasting System for Universities

    Directory of Open Access Journals (Sweden)

    Ypatios Grigoriadis

    2013-03-01

    Full Text Available This paper presents the results achieved at Graz University of Technology (TU Graz in the field of automating the process of recording and publishing university lectures in a very new way. It outlines cornerstones of the development and integration of an automated recording system such as the lecture hall setup, the recording hardware and software architecture as well as the development of a text-based search for the final product by method of indexing video podcasts. Furthermore, the paper takes a look at didactical aspects, evaluations done in this context and future outlook.

  1. Effect of Media Usage Selection on Social Mobilization Speed: Facebook vs E-Mail.

    Science.gov (United States)

    Wang, Jing; Madnick, Stuart; Li, Xitong; Alstott, Jeff; Velu, Chander

    2015-01-01

    Social mobilization is a process that enlists a large number of people to achieve a goal within a limited time, especially through the use of social media. There is increasing interest in understanding the factors that affect the speed of social mobilization. Based on the Langley Knights competition data set, we analyzed the differences in mobilization speed between users of Facebook and e-mail. We include other factors that may influence mobilization speed (gender, age, timing, and homophily of information source) in our model as control variables in order to isolate the effect of such factors. We show that, in this experiment, although more people used e-mail to recruit, the mobilization speed of Facebook users was faster than that of those that used e-mail. We were also able to measure and show that the mobilization speed for Facebook users was on average seven times faster compared to e-mail before controlling for other factors. After controlling for other factors, we show that Facebook users were 1.84 times more likely to register compared to e-mail users in the next period if they have not done so at any point in time. This finding could provide useful insights for future social mobilization efforts.

  2. Effect of Media Usage Selection on Social Mobilization Speed: Facebook vs E-Mail.

    Directory of Open Access Journals (Sweden)

    Jing Wang

    Full Text Available Social mobilization is a process that enlists a large number of people to achieve a goal within a limited time, especially through the use of social media. There is increasing interest in understanding the factors that affect the speed of social mobilization. Based on the Langley Knights competition data set, we analyzed the differences in mobilization speed between users of Facebook and e-mail. We include other factors that may influence mobilization speed (gender, age, timing, and homophily of information source in our model as control variables in order to isolate the effect of such factors. We show that, in this experiment, although more people used e-mail to recruit, the mobilization speed of Facebook users was faster than that of those that used e-mail. We were also able to measure and show that the mobilization speed for Facebook users was on average seven times faster compared to e-mail before controlling for other factors. After controlling for other factors, we show that Facebook users were 1.84 times more likely to register compared to e-mail users in the next period if they have not done so at any point in time. This finding could provide useful insights for future social mobilization efforts.

  3. On the Recommender System for University Library

    Science.gov (United States)

    Fu, Shunkai; Zhang, Yao; Seinminn

    2013-01-01

    Libraries are important to universities, and they have two primary features: readers as well as collections are highly professional. In this study, based on the experimental study with five millions of users' borrowing records, our discussion covers: (1) the necessity of recommender system for university libraries; (2) collaborative filtering (CF)…

  4. Globalizing Flexible Work in Universities: Socio-technical dilemmas in internationalizing education

    Directory of Open Access Journals (Sweden)

    Michael Singh

    2005-03-01

    Full Text Available We engage with and respond to the debate raised by this theme issue of the International Review of Research in Open and Distance Learning with a particular question in mind: namely, as universities are using new labor displacing technologies to export degrees to meet the international demand for higher education, how is this influencing – negatively and positively – the workers involved? Contemporary transitions in political and economic globalization are being used to press universities into becoming ‘transnational businesses,’ seemingly driven by a primary concern for marketing educational commodities. The neo-liberal politics driving these currents in universities are increasing the multiple online and offline networks. These local/ global meshworks engage the labors of a small but growing percentage of the world’s population (Singh, 2002, pp. 217-230. Writing this paper at Jilin University in China, we find that many of our academic colleagues and students have limited access to a personal desktop computer, the Internet, and email. They must pay for timed access to their email accounts and for downloading attachments. They do not have access to high-speed data networks. A timer indicates how long it will take to open and send emails. Around us, construction workers are building massive facilities to house the burgeoning on-campus student population. Their offline education is being supplemented – but not replaced by ever-advancing online technologies.

  5. Relationships between Emotional States and Emoticons in Mobile Phone Email Communication in Japan

    Science.gov (United States)

    Kato, Shogo; Kato, Yuuki; Scott, Douglass

    2009-01-01

    Three related studies conducted on the role of emotional transfer in email messages were studied in order to better understand Japanese college students' online communications and their broader participation in online communications. The first study investigated users' initiatives in preventing emotional misunderstandings when sending email.…

  6. ENGINEERING OF UNIVERSITY INTELLIGENT LEARNING SYSTEMS

    Directory of Open Access Journals (Sweden)

    Vasiliy M. Trembach

    2016-01-01

    Full Text Available In the article issues of engineering intelligent tutoring systems of University with adaptation are considered. The article also dwells on some modern approaches to engineering of information systems. It shows the role of engineering e-learning devices (systems in system engineering. The article describes the basic principles of system engineering and these principles are expanded regarding to intelligent information systems. The structure of intelligent learning systems with adaptation of the individual learning environments based on services is represented in the article.

  7. Information system for strategic planning the university sustainable development

    International Nuclear Information System (INIS)

    Drevs, Yu.G.

    2013-01-01

    Issues of designing the information system which helps the University principal's office to take decisions as concerns the strategic planning are discussed. The importance of having the University simulation model is emphasized; model representation in terms of system dynamics is given [ru

  8. BEBAN JARINGAN SAAT MENGAKSES EMAIL DARI BEBERAPA MAIL SERVER

    Directory of Open Access Journals (Sweden)

    Husni Thamrin

    2017-01-01

    Full Text Available Expensive internet facilities require prudent in its use both as a source of information and communication media. This paper discusses observations of the perceived burden of network bandwidth when accessing some of the mail server using a webmail application. Mail server in question consists of three commercial server and 2 non-commercial server. Data when it download home page, while logged in, open the email, and during idle logout recorded with sniffer Wireshark. Observations in various situations and scenarios indicate that access Yahoo email gives the network load is very high while the SquirrelMail gives the network load is very low than 5 other mail servers. For an institution, use a local mail server (institutional is highly recommended in the context of banddwidth savings.

  9. Le francais assiste par ordinateur des colleges et des universities du Canada (French CALL in Canadian Colleges and Universities).

    Science.gov (United States)

    Bougaieff, Andre

    This directory presents the results of a national survey of Canadian colleges and universities concerning faculty's use of computer-assisted French language instruction. The listings, arranged alphabetically by province or territory, and within these by institution, contain the responding faculty member's name, address, e-mail address, fax and…

  10. ACADEMIC INTEGRITY SUPPORT SYSTEM FOR UKRAINIAN UNIVERSITIES

    Directory of Open Access Journals (Sweden)

    V. G. Sherstjuk

    2017-04-01

    Full Text Available Purpose. Developing the methodology for providing academic integrity in the university. The methodology is based on Web-oriented academic integrity support system, developed by the authors, which enters into the information system of learning process control. Academic integrity support system is aimed at maintaining academic integrity as a basic institutional value, which will help to reduce corruption, plagiarism and other types of academic dishonesty. Methodology. The methodology of problem to solve is based on the development of the information system of education process control with the integral elements of quality control. The information subsystem of academic integrity support is its basic part. Findings. The proposed information system allows us to fulfill the following levels: educational process monitoring; audit of internal processes, which is necessary for developing the effective quality control system; assessment of achievements of educational process participants; formalization of the interaction of educational process participants. The system is aimed at the development of new academic society based on the following principles: open access to the information, at which the access of wide audience to the information provides participation, forming the sense of responsibility and social control; transparency of the information, by which its relevance, quality, reliability are meant; responsibility of all members of educational process; measurability, at which any action in educational process should be measured; detail of describing the actions, results and processes; support, which is meant by automatic tools of the realization of the principles of open access to the information, transparency of the information, responsibility of all participants of educational process, measurability, detail, support. The practical realization of information system is based on the development of a common repository of university information. The

  11. Hong Kong's Cross-System University Partnerships

    Science.gov (United States)

    Postiglione, Gerard A.; Yunyun, Qin; Te, Alice Y. C.

    2016-01-01

    The authors examine the special case of Hong Kong higher education's institutional partnerships in the Chinese mainland. After noting the rise of cross-system university partnership in Asia, it provides a neoinstitutional perspective on the differences between the two China higher education systems. Finally, a case study of the experience of the…

  12. The use of VB.NET in the business daily e-mail System%VB.NET在经营日报邮件系统中的应用

    Institute of Scientific and Technical Information of China (English)

    陈中

    2011-01-01

    The use of Visual Studio. NET 2003 technology development business daily e-mail system, to achieve the basic operating conditions of the daily data, key indicators and results of the audit, according tO different business needs analysis produced several reports by email daily sent to business leaders and department heads so that they can be the first time to understand the business situation, according to formulate policy responses to market changes. This principle of the system development, system features and design are introduced.%利用Visual Studio.NET 2003技术开发的经营日报邮件系统,实现了将每目的经营状况基本数据、关键指标和稽核结果,按照不同业务部门各种需求分析制作成多个报表,通过邮件方式每日发送给企业领导及部门负责人,让他们能在第一时间了解企业经营现状,根据市场变化制定应对政策。本文对该系统的开发原理、系统的功能特最和设计方案进行了介绍。

  13. Understanding Style, Language and Etiquette in Email Communication in Higher Education: A Survey

    Science.gov (United States)

    Lewin-Jones, Jenny; Mason, Victoria

    2014-01-01

    This study investigates academic staff and student attitudes to style and etiquette of emails. Data were collected through two online staff and student surveys. Reported use and acceptability of particular features of email style were assessed. Open-ended responses yielded four themes: the balance between formality and informality, relationships,…

  14. The Open Education System, Anadolu University, Turkey: E-Transformation in a Mega-University

    Science.gov (United States)

    Latchem, Colin; Ozkul, Ali Ekrem; Aydin, Cengiz Hakan; Mutlu, Mehmet Emin

    2006-01-01

    Anadolu University in Turkey is one of the world's largest and least known mega-universities. Well over one million students in Turkey, the European Union and Northern Cyprus are enrolled in its Open Education System and yet few accounts of this dual-mode provider appear in the international literature. This article describes the evolution of the…

  15. UNIVERSITY TURBINE SYSTEMS RESEARCH PROGRAM SUMMARY AND DIRECTORY

    Energy Technology Data Exchange (ETDEWEB)

    Lawrence P. Golan; Richard A. Wenglarz

    2004-07-01

    The South Carolina Institute for Energy Studies (SCIES), administratively housed at Clemson University, has participated in the advancement of combustion turbine technology for over a decade. The University Turbine Systems Research Program, previously referred to as the Advanced Gas Turbine Systems Research (AGTSR) program, has been administered by SCIES for the U.S. DOE during the 1992-2003 timeframe. The structure of the program is based on a concept presented to the DOE by Clemson University. Under the supervision of the DOE National Energy Technology Laboratory (NETL), the UTSR consortium brings together the engineering departments at leading U.S. universities and U.S. combustion turbine developers to provide a solid base of knowledge for the future generations of land-based gas turbines. In the UTSR program, an Industrial Review Board (IRB) (Appendix C) of gas turbine companies and related organizations defines needed gas turbine research. SCIES prepares yearly requests for university proposals to address the research needs identified by the IRB organizations. IRB technical representatives evaluate the university proposals and review progress reports from the awarded university projects. To accelerate technology transfer technical workshops are held to provide opportunities for university, industry and government officials to share comments and improve quality and relevancy of the research. To provide educational growth at the Universities, in addition to sponsored research, the UTSR provides faculty and student fellowships. The basis for all activities--research, technology transfer, and education--is the DOE Turbine Program Plan and identification, through UTSR consortium group processes, technology needed to meet Program Goals that can be appropriately researched at Performing Member Universities.

  16. Advanced Email Risk Classification and Recipient Decision Assistance

    Science.gov (United States)

    Estes, Aaron

    2016-01-01

    Email attacks comprise an overwhelming majority of the daily attacks on modern enterprise. "Phishing" is the leading attack vector for the world's most dangerous threats such as the so-called, Advanced Persistent Threat (APT), and hacktivist groups such as Anonymous and LulzSec. The leading mitigation strategy is a combination of user…

  17. Email Between Patient and Provider: Assessing the Attitudes and Perspectives of 624 Primary Health Care Patients.

    Science.gov (United States)

    Seth, Puneet; Abu-Abed, Mohamed Ismail; Kapoor, Vikram; Nicholson, Kathryn; Agarwal, Gina

    2016-12-22

    Email between patients and their health care providers can serve as a continuous and collaborative forum to improve access to care, enhance convenience of communication, reduce administrative costs and missed appointments, and improve satisfaction with the patient-provider relationship. The main objective of this study was to investigate the attitudes of patients aged 16 years and older toward receiving email communication for health-related purposes from an academic inner-city family health team in Southern Ontario. In addition to exploring the proportion of patients with a functioning email address and interest in email communication with their health care provider, we also examined patient-level predictors of interest in email communication. A cross-sectional study was conducted using a self-administered, 1-page survey of attitudes toward electronic communication for health purposes. Participants were recruited from attending patients at the McMaster Family Practice in Hamilton, Ontario, Canada. These patients were aged 16 years and older and were approached consecutively to complete the self-administered survey (N=624). Descriptive analyses were conducted using the Pearson chi-square test to examine correlations between variables. A logistic regression analysis was conducted to determine statistically significant predictors of interest in email communication (yes or no). The majority of respondents (73.2%, 457/624) reported that they would be willing to have their health care provider (from the McMaster Family Practice) contact them via email to communicate health-related information. Those respondents who checked their personal email more frequently were less likely to want to engage in this electronic communication. Among respondents who check their email less frequently (fewer than every 3 days), 46% (37/81) preferred to communicate with the McMaster Family Practice via email. Online applications, including email, are emerging as a viable avenue for patient

  18. Universality in Nonequilibrium Lattice Systems Theoretical Foundations

    CERN Document Server

    Ódor, Géza

    2008-01-01

    Universal scaling behavior is an attractive feature in statistical physics because a wide range of models can be classified purely in terms of their collective behavior due to a diverging correlation length. This book provides a comprehensive overview of dynamical universality classes occurring in nonequilibrium systems defined on regular lattices. The factors determining these diverse universality classes have yet to be fully understood, but the book attempts to summarize our present knowledge, taking them into account systematically.The book helps the reader to navigate in the zoo of basic m

  19. Email Reminders Increase the Frequency That Pet Owners Update Their Microchip Information

    Directory of Open Access Journals (Sweden)

    Katie Goodwin

    2018-01-01

    Full Text Available Stray animals with incorrect microchip details are less likely to be reclaimed, and unclaimed strays are at increased risk of euthanasia. A retrospective cohort study was performed using 394,747 cats and 904,909 dogs registered with Australia’s largest microchip database to describe animal characteristics, determine whether annual email reminders increased the frequency that owners updated their information, and to compare frequencies of microchip information updates according to pet and owner characteristics. More than twice as many dogs (70% than cats (30% were registered on the database; the most numerous pure-breeds were Ragdoll cats and Staffordshire Bull Terrier dogs, and the number of registered animals per capita varied by Australian state or territory. Owners were more likely (p < 0.001 to update their details soon after they were sent a reminder email, compared to immediately before that email, and there were significant (p < 0.001 differences in the frequency of owner updates by state or territory of residence, animal species, animal age, and socioeconomic index of the owner’s postcode. This research demonstrates that email reminders increase the probability of owners updating their details on the microchip database, and this could reduce the percentages of stray animals that are unclaimed and subsequently euthanized.

  20. Information system governance in Moroccan universities: case of ...

    African Journals Online (AJOL)

    Information system governance in Moroccan universities: case of student ... contribution of these systems to the overall performance of an organizational being. ... Keywords: Information System; Governance; Data Quality, Process Quality ...

  1. Computer Security: e-mail is broken and there is nothing we can do

    CERN Multimedia

    Stefan Lueders, Computer Security Team

    2016-01-01

    Have you ever received an e-mail from a friend or someone you know and been surprised or appalled by its contents? Or, worse, have you have received a response to an e-mail that wasn’t written by you? Maybe with similarly surprising or appalling contents? If yes, welcome to the insecurity of the mail protocol, where nothing is as it seems…   No, this time we are not talking about “phishing” or malicious attachments but the very basics of the e-mail protocol. “SMTP” aka the “Simple Mail Transfer Protocol” is exactly what it says: very simple! In many respects, e-mails are identical to physical hand-written letters: you cannot deduce from the sender’s address nor from the message text whether it has really been sent by that person. Impersonation has never been as easy as with the SMTP protocol. Due to its simple design, I can pretend to be Mickey Mouse, Harry Potter or anyone else, and send you text messages...

  2. International University Research Ventures: Implications for U.S. Economic Competitiveness National Security

    Science.gov (United States)

    2018-03-31

    NTERNATIONAL UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY The views, opinions and/or findings...UNIVERSITY RESEARCH VENTURES: IMPLICATIONS FOR US ECONOMIC COMPETITIVENESS AND NATIONAL SECURITY Report Term: 0-Other Email: mzak@gatech.edu...expected to inform political and economic theories about technology transfer, innovation, economic competitiveness, and democratization/civil

  3. The Impact of Using Email on Improving the Writing Skills among Iranian Students

    Science.gov (United States)

    Janfaza, Abusaied; Shahsavari, Khadijeh; Soori, Afshin

    2014-01-01

    The need for the application of technology in education has been increased. One of the new approaches in technology is using email for learning a second or a foreign language. The present study aimed at investigating the effectiveness of using email in improving writing skills among Iranian EFL students. The participants of the study were 42…

  4. E-Mail Writing: Providing Background Information in the Core of Computer Assisted Instruction

    Science.gov (United States)

    Nazari, Behzad; Ninknejad, Sahar

    2015-01-01

    The present study highly supported the effective role of providing background information via email by the teacher to write e-mail by the students in learners' writing ability. A total number of 50 EFL advanced male students aged between 25 and 40 at different branches of Iran Language Institute in Tehran, Tehran. Through the placement test of…

  5. Montana University System Fact Book.

    Science.gov (United States)

    Montana Univ. System, Helena. Office of the Commissioner of Higher Education.

    This report contains numerous figures and tables providing data about the Montana University System. The report is divided into 11 sections, with some preceded by a brief text summary, followed by data tables and figures. Sections cover: (1) total funds, (2) state appropriated funds, (3) funding sources, (4) enrollment, (5) employment, (6) state…

  6. Mass Communication and Journalism Faculty's Perceptions of the Effectiveness of Email Communication with College Students: A Nationwide Study

    Science.gov (United States)

    Yates, Bradford L.; Adams, Jennifer Wood; Brunner, Brigitta R.

    2009-01-01

    Nearly 700 US journalism and mass communication faculty (all teaching personnel) reported their perceptions of student email use via a web-based survey. This nationwide study focused on the content of email sent by faculty to students, email's effectiveness, and email's effect on student learning. Comparisons were made based on faculty gender,…

  7. NASA University Program Management Information System

    Science.gov (United States)

    1999-01-01

    As basic policy, NASA believes that colleges and universities should be encouraged to participate in the nation's space and aeronautics program to the maximum extent practicable. Indeed, universities are considered as partners with government and industry in the nation's aerospace program. NASA's objective is to have them bring their scientific, engineering, and social research competence to bear on aerospace problems and on the broader social, economic, and international implications of NASA's technical and scientific programs. It is expected that, in so doing, universities will strengthen both their research and their educational capabilities to contribute more effectively to the national well-being. NASA field codes and certain Headquarters program offices provide funds for those activities in universities which contribute to the mission needs of that particular NASA element. Although NASA has no predetermined amount of money to devote to university activities, the effort funded each year is substantial. (See the bar chart on the next page). This annual report is one means of documenting the NASA-university relationship, frequently denoted, collectively, as NASA's University Program. This report is consistent with agency accounting records, as the data is obtained from NASA's Financial and Contractual Status (FACS) System, operated by the Financial Management Division and the Procurement Office. However, in accordance with interagency agreements, the orientation differs from that required for financial or procurement purposes. Any apparent discrepancies between this report and other NASA procurement or financial reports stem from the selection criteria for the data.

  8. The Communicative Functions of Emoticons in Workplace E-Mails :-)

    DEFF Research Database (Denmark)

    Skovholt, Karianne; Grønning, Anette; Kankaanranta, Anne

    2014-01-01

    CMC research presents emoticons as visual representations of writers' emotions. We argue that the emoticons in authentic workplace e-mails do not primarily indicate writers' emotions. Rather, they provide information about how an utterance is supposed to be interpreted. We show that emoticons...

  9. Universities Earth System Scientists Program

    Science.gov (United States)

    Estes, John E.

    1995-01-01

    This document constitutes the final technical report for the National Aeronautics and Space Administration (NASA) Grant NAGW-3172. This grant was instituted to provide for the conduct of research under the Universities Space Research Association's (USRA's) Universities Earth System Scientist Program (UESSP) for the Office of Mission to Planet Earth (OMTPE) at NASA Headquarters. USRA was tasked with the following requirements in support of the Universities Earth System Scientists Programs: (1) Bring to OMTPE fundamental scientific and technical expertise not currently resident at NASA Headquarters covering the broad spectrum of Earth science disciplines; (2) Conduct basic research in order to help establish the state of the science and technological readiness, related to NASA issues and requirements, for the following, near-term, scientific uncertainties, and data/information needs in the areas of global climate change, clouds and radiative balance, sources and sinks of greenhouse gases and the processes that control them, solid earth, oceans, polar ice sheets, land-surface hydrology, ecological dynamics, biological diversity, and sustainable development; (3) Evaluate the scientific state-of-the-field in key selected areas and to assist in the definition of new research thrusts for missions, including those that would incorporate the long-term strategy of the U.S. Global Change Research Program (USGCRP). This will, in part, be accomplished by study and evaluation of the basic science needs of the community as they are used to drive the development and maintenance of a global-scale observing system, the focused research studies, and the implementation of an integrated program of modeling, prediction, and assessment; and (4) Produce specific recommendations and alternative strategies for OMTPE that can serve as a basis for interagency and national and international policy on issues related to Earth sciences.

  10. Mapping network development of international new ventures with the use of company e-mails

    NARCIS (Netherlands)

    Wakkee, I.A.M.

    2006-01-01

    International new ventures use e-mail frequently to communicate with globally dispersed contacts. In this paper we present and discuss a qualitative research method to map international network development based on company e-mails. Our approach also allows for combinations of inductive and deductive

  11. The impact of email as a communicative medium on the doctor-patient relationship

    DEFF Research Database (Denmark)

    Jensen, Matilde Nisbeth; Fage-Butler, Antoinette Mary

    Background and objective: Although theoretical perspectives on the doctor-patient relationship have characteristically assumed the temporal and physical co-presence of doctor and patient, the advent of email in doctor-patient communication has brought with it a different communicative reality. New...... technologies come with significant implications as, amongst other things, they impose practices and identities on participants (Malater 2007). The purpose of this integrative literature review is thus to investigate how the advent of email as a medium of communication affects the doctor-patient relationship...... of the medium, convenience, freedom from the clinical gaze, pseudo-anonymity and greater opportunities for reflection, whilst doctors express concerns about confidentiality, time and the challenge of conveying empathy electronically. Implications: The impact of email on the doctor-patient relationship has...

  12. Detecting Targeted Malicious Email through Supervised Classification of Persistent Threat and Recipient Oriented Features

    Science.gov (United States)

    Amin, Rohan Mahesh

    2010-01-01

    Targeted email attacks to enable computer network exploitation have become more prevalent, more insidious, and more widely documented in recent years. Beyond nuisance spam or phishing designed to trick users into revealing personal information, targeted malicious email (TME) facilitates computer network exploitation and the gathering of sensitive…

  13. Universities, regional innovation systems and the Bangalore experience

    DEFF Research Database (Denmark)

    Vang, Jan; Coenen, Lars; Chaminade, Christina

    2007-01-01

    This paper takes stock with one-size-fits-all models on the role of universities in regional innovation systems in Asia. It proposes a contextual and evolutionary perspective which focuses on the match between the specific competences and capabilities of the universities and the firms' particular...

  14. Health Literacy and Global Cognitive Function Predict E-Mail but Not Internet Use in Heart Failure Patients

    Directory of Open Access Journals (Sweden)

    Jared P. Schprechman

    2013-01-01

    Full Text Available Background. The internet offers a potential for improving patient knowledge, and e-mail may be used in patient communication with providers. However, barriers to internet and e-mail use, such as low health literacy and cognitive impairment, may prevent patients from using technological resources. Purpose. We investigated whether health literacy, heart failure knowledge, and cognitive function were related to internet and e-mail use in older adults with heart failure (HF. Methods. Older adults (N=119 with heart failure (69.84±9.09 years completed measures of health literacy, heart failure knowledge, cognitive functioning, and internet use in a cross-sectional study. Results. Internet and e-mail use were reported in 78.2% and 71.4% of this sample of patients with HF, respectively. Controlling for age and education, logistic regression analyses indicated that higher health literacy predicted e-mail (P<.05 but not internet use. Global cognitive function predicted e-mail (P<.05 but not internet use. Only 45% used the Internet to obtain information on HF and internet use was not associated with greater HF knowledge. Conclusions. The majority of HF patients use the internet and e-mail, but poor health literacy and cognitive impairment may prevent some patients from accessing these resources. Future studies that examine specific internet and email interventions to increase HF knowledge are needed.

  15. Writing for Business Purposes: Elements of Email Etiquette

    OpenAIRE

    Gabriela Dumbravă; Adriana Koronka

    2006-01-01

    Starting from the premise that electronic mail has experienced an explosive development throughout the world over the past few years, gaining substantial territory in the field of business communication, the paper focuses on the basic elements of email etiquette and on their importance in writing an effective and competitive electronic message. adapted to the context and purpose of professional writing.

  16. The Impact of Using Email on Improving the Writing Skills Among Iranian Students

    Directory of Open Access Journals (Sweden)

    Abusaied Janfaza

    2014-10-01

    Full Text Available The need for the application of technology in education has been increased. One of the new approaches in technology is using email for learning a second or a foreign language. The present study aimed at investigating the effectiveness of using email in improving writing skills among Iranian EFL students. The participants of the study were 42 pre-intermediate Iranian EFL students in an English language institute in Shiraz, Iran. The participants were randomly assigned into an experimental and a control group. Each group consisted of 21 participants. The treatment continued for three weeks and 3 sessions a week. The students in the experimental group used email for sending their assignments. These students were in contact with their teacher via email and asked writing questions. In contrast, the students in the control group taught writing without using the computer in traditional way. To be sure of homogeneity of the participants, a pre-test was administered before the treatment. After three weeks treatment, a post-test was administered to check the students’ improvement in writing. The findings revealed that the students in in the experimental group performed significantly better than the students in the control group.

  17. Rancang Bangun Aplikasi Enkripsi dan Dekripsi Email Dengan Menggunakan Algoritma Advanced Encryption Standard Dan Knapsack

    Directory of Open Access Journals (Sweden)

    Timothy John Pattiasina

    2014-07-01

    Full Text Available Advanced Encryption Standard (AES dan Knapsack adalah dua algoritma enkripsi simetris dan asimetris yang paling sering digunakan. Penelitian ini menganalisa kedua algoritma AES dan algoritma Knapsack. Prototipe aplikasi enkripsi email ini dirancang dengan menggabungkan karateristik algoritma AES dan Knapsack untuk memecahkan masalah keamanan email. Algoritma AES digunakan untuk mengenkripsi dan deskripsi email berupa teks atau file, sedangkan Algoritma Knapsack di gunakan untuk mengenkripsi kunci AES. Enkripsi hybrid yang diterapkan pada aplikasi bertujuan untuk menambah keamanan informasi dalam sebuah jaringan.

  18. University of Mauritius Research Journal - Vol 3 (1999)

    African Journals Online (AJOL)

    Modelling the nonlinearity of piezoelectric actuators in active vibration cancellation systems using neural networks · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT. Y Bissessur, 9-23 ...

  19. Information Systems in University Learning

    Directory of Open Access Journals (Sweden)

    Gheorghe SABAU

    2010-01-01

    Full Text Available The authors of this article are going to bring into light the significance, the place and the role of information systems in the university education process. At the same time they define the objectives and the target group of the subject named Economic Information Systems and state the competence gained by students by studying this subject. Special attention is given to the curriculum to be taught to students and to a suggestive enumeration of a series of economic applications that can be themes for laboratory practice and for students’ dissertation (graduation thesis.

  20. Tailored emails prompt electric vehicle owners to engage with tariff switching information

    Science.gov (United States)

    Nicolson, Moira; Huebner, Gesche M.; Shipworth, David; Elam, Simon

    2017-06-01

    The carbon intensity of the electricity used to charge an electric vehicle (EV) is dependent on when in the day charging occurs. However, persuading EV owners to adopt incentives to charge during off-peak hours is challenging. Here we show that governments could exploit the 'window of opportunity' created when people purchase their first EV to promote time-of-use tariffs. Email recipients (n = 7,038 EV owners) were more likely to click-through to an information webpage when the email emphasized specific reductions in home-charging costs versus general bill savings. However, the 'window of opportunity' for maximizing potential adoption is short; email open rates declined from over 70% immediately after purchase to 40% for recipients owning their EV for over three months. These results demonstrate the potential of prompts to change behaviours for which opt-out enrolment (where enrolment is automatic unless people explicitly opt out) would be unethical or less effective.

  1. Patient Use of Email, Facebook, and Physician Websites to Communicate with Physicians: A National Online Survey of Retail Pharmacy Users.

    Science.gov (United States)

    Lee, Joy L; Choudhry, Niteesh K; Wu, Albert W; Matlin, Olga S; Brennan, Troyen A; Shrank, William H

    2016-01-01

    Patient-physician communication often occurs outside the clinic setting; many institutions discourage electronic communication outside of established electronic health record systems. Little empirical data are available on patient interest in electronic communication and Web-based health tools that are technically feasible but not widely available. To explore patient behavior and interest in using the Internet to contact physicians. National cross-sectional online survey. A sample of 4,510 CVS customers with at least one chronic condition in the household was used to target patients with chronic conditions and their caregivers. Subjects were identified from a national panel of over 100,000 retail pharmacy customers. Of those sampled, 2,252 responded (50.0 % response rate). Survey measures included demographic and health information, patient use of email and Facebook to contact physicians, and patient interest in and use of Web-based tools for health. A total of 37 % of patients reported contacting their physicians via email within the last six months, and 18 % via Facebook. Older age was negatively associated with contacting physicians using email (OR 0.57 [95 % CI 0.41-0.78]) or Facebook (OR 0.28 [0.17-0.45]). Non-white race (OR 1.61 [1.18-2.18] and OR 1.82 [1.24-2.67]) and caregiver status (OR 1.58 [1.27-1.96] and OR 1.71 [1.31- 2.23]) were positively associated with using email and Facebook, respectively. Patients were interested in using Web-based tools to fill prescriptions, track their own health, and access health information (37-57 %), but few were currently doing so (4-8 %). In this population of retail pharmacy users, there is strong interest among patients in the use of email and Facebook to communicate with their physicians. The findings highlight the gap between patient interest for online communication and what physicians may currently provide. Improving and accelerating the adoption of secure Web messaging systems is a possible solution that

  2. Economic Impact of the North Dakota University System in 2011

    OpenAIRE

    Coon, Randal C.; Bangsund, Dean A.; Hodur, Nancy M.

    2012-01-01

    The North Dakota University System consists of the North Dakota University System Office and 11 college campuses located throughout the state. In addition to the 11 main campuses, numerous other university facilities, centers, and offices are located throughout the state. Institutions of higher education have an economic effect in their respective areas and across the state as those institutions acquire inputs, purchase services, and provide for payroll and employment at both the local and st...

  3. Biomass universal district heating systems

    Science.gov (United States)

    Soltero, Victor Manuel; Rodríguez-Artacho, Salvador; Velázquez, Ramón; Chacartegui, Ricardo

    2017-11-01

    In mild climate regions Directive 27/2012 EU application for developing sustainable district heating networks in consolidated urban nucleus is a challenge. In Spain most of the municipalities above 5,000 inhabitants have a reliable natural gas network and individual heating systems at homes. In this work a new heating network paradigm is proposed, the biomass universal heating network in rural areas. This model involves all the economic, legal and technical aspects and interactions between the different agents of the systems: provider company, individual and collective end-users and local and regional administration. The continental region in Spain has 588 municipalities with a population above 1,500 inhabitants close to forest biomass with renewable use. In many of these cases the regulation identifies the ownership of the forest resources use. The universal heating networks are a great opportunity for energy saving of 2,000 GWh, avoiding 2.7 million tons of CO2 emissions and with a global annual savings for end users of 61.8 million of euros. The presented model is easily extrapolated to other small municipalities in Europe. The real application of the model is presented for three municipalities in different locations of Spain where Universal Heating Networks are under development. The analysis show the interest of the integrated model for the three cases with different structural agents and relationships between them. The use of sustainable forest resources, extracted and managed by local companies, strengths circular economy in the region with a potential global economic impact above 200 M€.

  4. Patient use of email for health care communication purposes across 14 European countries: an analysis of users according to demographic and health-related factors.

    Science.gov (United States)

    Newhouse, Nikki; Lupiáñez-Villanueva, Francisco; Codagnone, Cristiano; Atherton, Helen

    2015-03-06

    The use of the Internet for health purposes is growing steadily, yet the use of asynchronous communication tools for health care purposes remains undeveloped. The introduction of email as a method of communication in health care has the potential to impact on both patients and health care professionals. This study aims to describe the characteristics of people who have sent or received an email to or from their doctor, nurse, or health care organization, by country and in relation to demographics, health care resource use, and health status factors. We conducted a secondary analysis of data (N=14,000) collected from the online Citizens and Information Communication Technology for Health survey, a project undertaken in 2011 by the Institute for Prospective Technology Studies of the European Commission's Joint Research Centre. The survey was developed to understand and characterize European citizens' use of information communication technologies for health. Descriptive and statistical analyses of association were used to interpret the data. Denmark reported the highest level of emails sent/received (507/1000, 50.70%). The lowest level reported was by participants in France (187/1000, 18.70%). Men used email communication for health care more than women, as did respondents in the 16-24 age group and those educated to tertiary level or still within the education system. As self-reported health state worsens, the proportion of people reporting having sent or received an email within the context of health care increases. Email use, poor health, multimorbidity, and number of visits to a physician are positively correlated. The use of email communication within the context of European health care is extremely varied. The relationship between high email use, poor health, doctor visits, and multimorbidity is especially pertinent: provision of asynchronous communication for such groups is favored by policymakers. Low reported email use by country may not necessarily reflect

  5. The use of physician-patient email: a follow-up examination of adoption and best-practice adherence 2005-2008.

    Science.gov (United States)

    Menachemi, Nir; Prickett, Charles T; Brooks, Robert G

    2011-02-25

    Improved communication from physician- patient emailing is an important element of patient centeredness. Physician-patient email use has been low; and previous data from Florida suggest that physicians who email with patients rarely implement best-practice guidelines designed to protect physicians and patients. Our objective was to examine whether email use with patients has changed over time (2005-2008) by using two surveys of Florida physicians, and to determine whether physicians have more readily embraced the best-practice guidelines in 2008 versus 2005. Lastly, we explored the 2008 factors associated with email use with patients and determined whether these factors changed relative to 2005. Our pooled time-series design used results from a 2005 survey (targeting 14,921 physicians) and a separate 2008 survey (targeting 7003 different physicians). In both years, physicians practicing in the outpatient setting were targeted with proportionally identical sampling strategies. Combined data from questions focusing on email use were analyzed using chi-square analysis, Fisher exact test, and logistic regression. A combined 6260 responses were available for analyses, representing a participation rate of 28.2% (4203/14,921) in 2005 and 29.4% (2057/7003) in 2008. Relative to 2005, respondents in 2008 were more likely to indicate that they personally used email with patients (690/4148, 16.6% vs 408/2001, 20.4%, c(2) (1) = 13.0, P email with patients did not change from 2005 to 2008 (2.9% vs 59/2001, 2.9%). Interest among physicians in future email use with patients was lower in 2008 (58.4% vs 52.8%, c(2) (2) = 16.6, P email best practices remained low in 2008. When comparing 2005 and 2008 adherences with each of the individual guidelines, rates decreased over time in each category and were significantly lower for 4 of the 13 guidelines. Physician characteristics in 2008 that predicted email use with patients were different from 2005. Specifically, in multivariate analysis

  6. E-mail et Web : pour une navigation sans risque

    CERN Multimedia

    CERN. Geneva

    2010-01-01

    Présentation orale en français, support visuel en anglais. À travers des exemples concrets, vous consoliderez vos connaissances et pourrez ainsi réajuster vos habitudes concernant l’utilisation sécurisée de votre boîte e-mail et de votre navigateur Web.

  7. Hesitative introduction of E-mail consultations in general practice.

    NARCIS (Netherlands)

    Verheij, R.; Ton, C.; Tates, K.

    2008-01-01

    Introduction: The Dutch Council for Public Health and Health Care reported in 2005 that 70% of internet users would want to have the opportunity to consult their own general practitioner by e-mail [1]. Since January 1, 2006, general practitioners in the Netherlands are reimbursed 4.50 euro for

  8. Is our universe an open system?

    International Nuclear Information System (INIS)

    Page, D.N.

    1983-01-01

    The author gives a brief summary of the arguments which might indicate the universe to be an open system. The arguments concern the formation and evaporation of black holes and the asymptotic completeness or incompleteness of the Hilbert space of quantum gravity. (Auth.)

  9. A workplace email-linked website intervention for modifying cancer-related dietary and lifestyle risk factors: rationale, design and baseline findings.

    Science.gov (United States)

    Ang, Y K; Mirnalini, K; Zalilah, M S

    2013-04-01

    The use of email and website as channels for workplace health information delivery is not fully explored. This study aims to describe the rationale, design, and baseline findings of an email-linked website intervention to improve modifiable cancer risk factors. Employees of a Malaysian public university were recruited by systematic random sampling and randomised into an intervention (n = 174) or control group (n = 165). A website was developed for the intervention and educational modules were uploaded onto the website. The intervention group received ten consecutive weekly emails with hypertext links to the website for downloading the modules and two individual phone calls as motivational support whilst the control group received none. Diet, lifestyle, anthropometric measurements, psychosocial factors and stages of change related to dietary fat, fruit and vegetable intake, and physical activity were assessed. Participants were predominantly female and in non-academic positions. Obesity was prevalent in 15% and 37% were at risk of co-morbidities. Mean intake of fats was 31%, fruit was -1 serving/day and vegetable was < 1 serving/day. Less than 20% smoked and drank alcohol and about 40% were physically inactive. The majority of the participants fell into the Preparation stage for decreasing fat intake, eating more fruit and vegetables, and increasing physical activity. Self-efficacy and perceived benefits were lowest among participants in the Precontemplation/Contemplation stage compared to the Preparation and Action/Maintenance stages. Baseline data show that dietary and lifestyle practices among the employees did not meet the international guidelines for cancer prevention. Hence the findings warrant the intervention planned.

  10. Email and All that Jazz: Training Staff to Use Electronic Communication Tools Professionally

    Science.gov (United States)

    Stephens, Karen

    2008-01-01

    There are many benefits of e-mails. Through e-mail, a person can relay specific details to any number of "need to know" persons at the press of a "send" key at any time of day, without playing endless phone tag or waking someone up on the wrong side of the time zone. A person can also get "newsy" information out fast and save printing money, too.…

  11. University of Dar es Salaam Library Journal - Vol 7, No 1 (2005)

    African Journals Online (AJOL)

    Access and use of information by primary health care providers in rural Uganda: an interaction-value model · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT ... Health Information Systems (HIS), the internet and telemedicine in the delivery of health care in Uganda · EMAIL FREE FULL TEXT EMAIL FREE FULL TEXT

  12. UNIVERSAL INTERFACE TO MULTIPLE OPERATIONS SYSTEMS

    DEFF Research Database (Denmark)

    Sonnenwald, Diane H.

    1986-01-01

    Alternative ways to provide access to operations systems that maintain, test, and configure complex telephone networks are being explored. It is suggested that a universal interface that provides simultaneous access to multiple operations systems that execute in different hardware and software...... environments, can be provided by an architecture that is based on the separation of presentation issues from application issues and on a modular interface management system that consists of a virtual user interface, physical user interface, and interface agent. The interface functionality that is needed...

  13. Health-system reform and universal health coverage in Latin America.

    Science.gov (United States)

    Atun, Rifat; de Andrade, Luiz Odorico Monteiro; Almeida, Gisele; Cotlear, Daniel; Dmytraczenko, T; Frenz, Patricia; Garcia, Patrícia; Gómez-Dantés, Octavio; Knaul, Felicia M; Muntaner, Carles; de Paula, Juliana Braga; Rígoli, Felix; Serrate, Pastor Castell-Florit; Wagstaff, Adam

    2015-03-28

    Starting in the late 1980s, many Latin American countries began social sector reforms to alleviate poverty, reduce socioeconomic inequalities, improve health outcomes, and provide financial risk protection. In particular, starting in the 1990s, reforms aimed at strengthening health systems to reduce inequalities in health access and outcomes focused on expansion of universal health coverage, especially for poor citizens. In Latin America, health-system reforms have produced a distinct approach to universal health coverage, underpinned by the principles of equity, solidarity, and collective action to overcome social inequalities. In most of the countries studied, government financing enabled the introduction of supply-side interventions to expand insurance coverage for uninsured citizens--with defined and enlarged benefits packages--and to scale up delivery of health services. Countries such as Brazil and Cuba introduced tax-financed universal health systems. These changes were combined with demand-side interventions aimed at alleviating poverty (targeting many social determinants of health) and improving access of the most disadvantaged populations. Hence, the distinguishing features of health-system strengthening for universal health coverage and lessons from the Latin American experience are relevant for countries advancing universal health coverage. Copyright © 2015 Elsevier Ltd. All rights reserved.

  14. [Smoking among undergraduate university students].

    Science.gov (United States)

    Barra C, Lisseth; Fernández P, Paola; Granada G, Felipe; Ávila C, Paula; Mallea M, Javier; Rodríguez M, Yeniffer

    2015-10-01

    Smoking is one of the major Public Health problems worldwide. To study the frequency of tobacco smoking among undergraduate students of a Chilean university. An opinion survey was sent by e-mail to all undergraduate students of a university, registering gender, age, study years, study area, smoking behavior, motivation (reason for smoking), intention to quit and tobacco law perception. 1,008 (57% females) out of 11,679 surveys were answered back. Prevalence of active smoking among respondents was 36%, without association with gender, age or years of study. However, students from scientific areas had a lower prevalence. Seventy seven percent of smokers manifested the intention to quit the habit or have started quitting already. Ninety six percent were acquainted with the tobacco law and by 73% agreed with it. Smoking is highly prevalent among university students. It is necessary to develop strategies for smoking cessation within universities that may prevent or reduce tobacco smoking among students.

  15. Universal bursty behavior in the air transportation system.

    Science.gov (United States)

    Ito, Hidetaka; Nishinari, Katsuhiro

    2015-12-01

    Social activities display bursty behavior characterized by heavy-tailed interevent time distributions. We examine the bursty behavior of airplanes' arrivals in hub airports. The analysis indicates that the air transportation system universally follows a power-law interarrival time distribution with an exponent α=2.5 and an exponential cutoff. Moreover, we investigate the mechanism of this bursty behavior by introducing a simple model to describe it. In addition, we compare the extent of the hub-and-spoke structure and the burstiness of various airline networks in the system. Remarkably, the results suggest that the hub-and-spoke network of the system and the carriers' strategy to facilitate transit are the origins of this universality.

  16. E-mail communication in pain practice: The importance of being earnest.

    Science.gov (United States)

    Ruiz, Irene Solera; García, Guadalupe Población; Riquelme, Irene

    2014-07-01

    Information technology can play a vital role in meeting patient needs and reinforcing the relationship among patients and their pain physicians. However, strong resistance remains on the medical side to this type of non-frontal care. The primary objective of this study was to assess the effectiveness of an E-mail intervention on customers' satisfaction. The secondary goals were to analyze the messages from patients to their clinician (not only the volume but also the content) and the impact on client, professional and health services outcomes. A prospective, non-randomized evaluation of patients undergoing treatment for chronic pain from September 2011 to May 2012. A private, specialty referral center in Spain. Participants were users visiting the Pain Management Unit evaluated by one physician. The E-mail address of the facility was written in every medical report provided. Patient satisfaction at the end of the 8-month trial period was assessed and outcomes recorded. Patients reported better communication with their therapist and greater satisfaction with overall care. 780 E-mails were read. Specialists received an average of 5 messages per day (standard deviation 0,3). None of them was unsuitable. This is a prospective, single center evaluation performed by one doctor. There was no control group due to ethical considerations. Electronic communication is a cheap, easy and feasible way to address a wide range of concerns, thus enhancing patients' satisfaction. More efforts are needed to implement routinely usage of this tool. If used appropriately, E-mail can facilitate physician-dependent interactions, promote access to care, save time and reduce costs. Concerns about billing, improper utilization, privacy and confidentiality might complicate its introduction and acceptance. Internet access remains a significant barrier to online patient-provider transference.

  17. E-mail communication in pain practice: The importance of being earnest

    Directory of Open Access Journals (Sweden)

    Irene Solera Ruiz

    2014-01-01

    Full Text Available Background: Information technology can play a vital role in meeting patient needs and reinforcing the relationship among patients and their pain physicians. However, strong resistance remains on the medical side to this type of non-frontal care. Objectives: The primary objective of this study was to assess the effectiveness of an E-mail intervention on customers′ satisfaction. The secondary goals were to analyze the messages from patients to their clinician (not only the volume but also the content and the impact on client, professional and health services outcomes. Study Design: A prospective, non-randomized evaluation of patients undergoing treatment for chronic pain from September 2011 to May 2012. Setting: A private, specialty referral center in Spain. Materials and Methods: Participants were users visiting the Pain Management Unit evaluated by one physician. The E-mail address of the facility was written in every medical report provided. Patient satisfaction at the end of the 8-month trial period was assessed and outcomes recorded. Results: Patients reported better communication with their therapist and greater satisfaction with overall care. 780 E-mails were read. Specialists received an average of 5 messages per day (standard deviation 0,3. None of them was unsuitable. Limitations: This is a prospective, single center evaluation performed by one doctor. There was no control group due to ethical considerations. Conclusion s : Electronic communication is a cheap, easy and feasible way to address a wide range of concerns, thus enhancing patients′ satisfaction. More efforts are needed to implement routinely usage of this tool. If used appropriately, E-mail can facilitate physician-dependent interactions, promote access to care, save time and reduce costs. Concerns about billing, improper utilization, privacy and confidentiality might complicate its introduction and acceptance. Internet access remains a significant barrier to online

  18. Performance Based Supplementary Payment System at University Hospitals in Turkey

    Directory of Open Access Journals (Sweden)

    Vahit YÝÐÝT

    2017-06-01

    Results: The result of the analysis has revealed that PBSP system encourage physicians who would like to receive financial incentives. PBSP system supports the individual performance, reduces waiting times in patients, increases revenues and decreases expenditures and increases in efficiency of department. However, this payment system increases work load, number of examinations and provokes the conflict among personals. Conclusions: University hospitals are academic institutions that perform important missions such as research, medical education and health services provision. Therefore, PBSP system should be revised so as to encourage performing these missions at university hospitals. There is also shortage of financial resources at the university hospitals. This situation leads to less additional payments to physicians. [J Contemp Med 2017; 7(2.000: 126-131

  19. Global Peace through the Global University System

    Directory of Open Access Journals (Sweden)

    Cengiz Hakan AYDIN

    2006-01-01

    Full Text Available Utopia is defined in Encarta Dictionary as “an ideal and perfect place or state, where everyone lives in harmony and everything is for the best.” Developments all around the world especially in the last decade have supported the idea that global peace is nothing but just a utopian dream. However, for centuries a group of believers have always been in search of global peace via different means. This book, titled as “Global Peace through the Global University System”, can be considered as one of the artifacts of this search.Actually this book is a collection of papers presented in working conference on the Global University System (GUS hosted by the University of Tampere, Finland in 1999. The main goal of the conference was bringing international experts to share their philosophy, past and present experiences about the GUS. The conference was held by the University of Tampere because UNESCO has an agreement with the University to establish the UNESCOChair in Global e-Learning.

  20. Universality in driven-dissipative quantum many-body systems

    International Nuclear Information System (INIS)

    Sieberer, L.M.

    2015-01-01

    Recent experimental investigations of condensation phenomena in driven-dissipative quantum many-body systems raise the question of what kind of novel universal behavior can emerge under non-equilibrium conditions. We explore various aspects of universality in this context. Our results are of relevance for a variety of open quantum systems on the interface of quantum optics and condensed matter physics, ranging from exciton-polariton condensates to cold atomic gases. In Part I we characterize the dynamical critical behavior at the Bose-Einstein condensation phase transition in driven open quantum systems in three spatial dimensions. Although thermodynamic equilibrium conditions are emergent at low frequencies, the approach to this thermalized low-frequency regime is described by a critical exponent which is specific to the non-equilibrium transition, and places the latter beyond the standard classification of equilibrium dynamical critical behavior. Our theoretical approach is based on the functional renormalization group within the framework of Keldysh non-equilibrium field theory, which is equivalent to a microscopic description of the open system dynamics in terms of a many-body quantum master equation. Universal behavior in the coherence properties of driven-dissipative condensates in reduced dimensions is investigated in Part II. We show that driven two-dimensional Bose systems cannot exhibit algebraic order as in thermodynamic equilibrium, unless they are sufficiently anisotropic. However, we find evidence that even isotropic systems may have a finite superfluidity fraction. In one-dimensional systems, non-equilibrium conditions are traceable in the behavior of the autocorrelation function. We obtain these results by mapping the long-wavelength condensate dynamics onto the Kardar-Parisi-Zhang equation. In Part III we show that systems in thermodynamic equilibrium have a specific symmetry, which makes them distinct from generic driven open systems. The novel

  1. Exploring the Digital Universe with Europe's Astrophysical Virtual Observatory

    Science.gov (United States)

    2001-12-01

    Information Centre Garching, Germany Tel.: +49-89-3200-6306 or +49-173-38-72-621 email: lars@eso.org Ray Footman The ASTROGRID Consortium/University of Edinburgh United Kingdom Tel.: +44-131-650-2249 email: r.footman@ed.ac.uk Philippe Chauvin Terapix/CDS CNRS, Delegation Paris A, IAP/INSU France Tel.: +33 1 44 96 43 36 email: philippe.chauvin@cnrs-dir.fr Agnes Villanueva University of Strasbourg France Tel.: +33 3 90 24 11 35 email: agnes.villanueva@adm-ulp.u-strasbg.fr Ian Morison University of Manchester/Jodrell Bank Observatory United Kingdom Tel.: +44 1477 572610 email: im@jb.man.ac.uk Appendix: Introduction to Europe's Astrophysical Virtual Observatory (AVO) The Digital Data Revolution Over the past thirty years, astronomers have moved from photographic and analogue techniques towards the use of high-speed, digital instruments connected to specialised telescopes to study the Universe. Whether these instruments are onboard spacecraft or located at terrestrial observatories, the data they produce are stored digitally on computer systems for later analysis. Two Challenges This data revolution has created two challenges for astronomers. Firstly, as the capability of digital detector systems has advanced, the volume of digital data that astronomical facilities are producing has expanded greatly. The rate of growth of the volume of stored data far exceeds the rate of increase in the performance of computer systems or storage devices. Secondly, astronomers have realised that many important insights into the deepest secrets in the Universe can come from combining information obtained at many wavelengths into a consistent and comprehensive physical picture . However, because the datasets from different parts of the spectrum come from different observatories using different instruments, the data are not easily combined. To unite data from different observatories, bridges must be built between digital archives to allow them to share data and "interoperate" - an important and

  2. Communications between volunteers and health researchers during recruitment and informed consent: qualitative content analysis of email interactions.

    Science.gov (United States)

    Townsend, Anne; Amarsi, Zubin; Backman, Catherine L; Cox, Susan M; Li, Linda C

    2011-10-13

    While use of the Internet is increasingly widespread in research, little is known about the role of routine electronic mail (email) correspondence during recruitment and early volunteer-researcher interactions. To gain insight into the standpoint of volunteers we analyzed email communications in an early rheumatoid arthritis qualitative interview study. The objectives of our study were (1) to understand the perspectives and motivations of individuals who volunteered for an interview study about the experiences of early rheumatoid arthritis, and (2) to investigate the role of emails in volunteer-researcher interactions during recruitment. Between December 2007 and December 2008 we recruited 38 individuals with early rheumatoid arthritis through rheumatologist and family physician offices, arthritis Internet sites, and the Arthritis Research Centre of Canada for a (face-to-face) qualitative interview study. Interested individuals were invited to contact us via email or telephone. In this paper, we report on email communications from 12 of 29 volunteers who used email as their primary communication mode. Emails offered insights into the perspective of study volunteers. They provided evidence prospectively about recruitment and informed consent in the context of early rheumatoid arthritis. First, some individuals anticipated that participating would have mutual benefits, for themselves and the research, suggesting a reciprocal quality to volunteering. Second, volunteering for the study was strongly motivated by a need to access health services and was both a help-seeking and self-managing strategy. Third, volunteers expressed ambivalence around participation, such as how far participating would benefit them, versus more general benefits for research. Fourth, practical difficulties of negotiating symptom impact, medical appointments, and research tasks were revealed. We also reflect on how emails documented volunteer-researcher interactions, illustrating typically

  3. Using an online quiz-based reinforcement system to teach healthcare quality and patient safety and care transitions at the University of California.

    Science.gov (United States)

    Shaikh, Ulfat; Afsar-Manesh, Nasim; Amin, Alpesh N; Clay, Brian; Ranji, Sumant R

    2017-10-01

    Implementing quality improvement (QI) education during clinical training is challenging due to time constraints and inadequate faculty development in these areas. Quiz-based reinforcement systems show promise in fostering active engagement, collaboration, healthy competition and real-time formative feedback, although further research on their effectiveness is required. An online quiz-based reinforcement system to increase resident and faculty knowledge in QI, patient safety and care transitions. Experts in QI and educational assessment at the 5 University of California medical campuses developed a course comprised of 3 quizzes on Introduction to QI, Patient Safety and Care Transitions. Each quiz contained 20 questions and utilized an online educational quiz-based reinforcement system that leveraged spaced learning. Approximately 500 learners completed the course (completion rate 66-86%). Knowledge acquisition scores for all quizzes increased after completion: Introduction to QI (35-73%), Patient Safety (58-95%), and Care Transitions (66-90%). Learners reported that the quiz-based system was an effective teaching modality and preferred this type of education to classroom-based lectures. Suggestions for improvement included reducing frequency of presentation of questions and utilizing more questions that test learners on application of knowledge instead of knowledge acquisition. A multi-campus online quiz-based reinforcement system to train residents in QI, patient safety and care transitions was feasible, acceptable, and increased knowledge. The course may be best utilized to supplement classroom-based and experiential curricula, along with increased attention to optimizing frequency of presentation of questions and enhancing application skills. © The Author 2017. Published by Oxford University Press in association with the International Society for Quality in Health Care. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com

  4. Anisotropic Bianchi-I universe with phantom field and cosmological ...

    Indian Academy of Sciences (India)

    India. *Corresponding author. E-mail: bcpaul@iucaa.ernet.in. MS received 23 May ... We study an anisotropic Bianchi-I universe in the presence of a phantom ... The phantom cosmology has been analysed adopting phase space analysis ... the second part we study the critical points corresponding to the set of autonomous.

  5. Views on the peer review system of biomedical journals: an online survey of academics from high-ranking universities

    Science.gov (United States)

    2013-01-01

    Background Peer review is the major method used by biomedical journals for making the decision of publishing an article. This cross-sectional survey assesses views concerning the review system of biomedical journals among academics globally. Methods A total of 28,009 biomedical academics from high-ranking universities listed by the 2009 Times Higher Education Quacquarelli Symonds (THE-QS) World University Rankings were contacted by email between March 2010 and August 2010. 1,340 completed an online survey which focused on their academic background, negative experiences and views on biomedical journal peer review and the results were compared among basic scientists, clinicians and clinician scientists. Results Fewer than half of the respondents agreed that the peer review systems of biomedical journals were fair (48.4%), scientific (47.5%), or transparent (25.1%). Nevertheless, 58.2% of the respondents agreed that authors should remain anonymous and 64.4% agreed that reviewers should not be disclosed. Most, (67.7%) agreed to the establishment of an appeal system. The proportion of native English-speaking respondents who agreed that the “peer review system is fair” was significantly higher than for non-native respondents (p = 0.02). Similarly, the proportion of clinicians stating that the “peer review system is fair” was significantly higher than that for basic scientists and clinician-scientists (p = 0.004). For females, (β = −0.1, p = 0.03), the frequency of encountering personal attacks in reviewers’ comments (β = −0.1, p = 0.002) and the frequency of imposition of unnecessary references by reviewers (β = −0.06, p = 0.04) were independently and inversely associated with agreement that “the peer review system is fair”. Conclusion Academics are divided on the issue of whether the biomedical journal peer review system is fair, scientific and transparent. A majority of academics agreed with the double-blind peer

  6. Free and Open Source Software in North African Universities | IDRC ...

    International Development Research Centre (IDRC) Digital Library (Canada)

    ... (such as e-mail), software for administration and software for online services, ... Project partners will come from the university, government, and the private and ... Organization for Women in Science for the Developing World (OWSD), IDRC is ... IWRA/IDRC webinar on climate change and adaptive water management.

  7. Patient Use of Email for Health Care Communication Purposes Across 14 European Countries: An Analysis of Users According to Demographic and Health-Related Factors

    Science.gov (United States)

    Lupiáñez-Villanueva, Francisco; Codagnone, Cristiano; Atherton, Helen

    2015-01-01

    Background The use of the Internet for health purposes is growing steadily, yet the use of asynchronous communication tools for health care purposes remains undeveloped. The introduction of email as a method of communication in health care has the potential to impact on both patients and health care professionals. Objective This study aims to describe the characteristics of people who have sent or received an email to or from their doctor, nurse, or health care organization, by country and in relation to demographics, health care resource use, and health status factors. Methods We conducted a secondary analysis of data (N=14,000) collected from the online Citizens and Information Communication Technology for Health survey, a project undertaken in 2011 by the Institute for Prospective Technology Studies of the European Commission’s Joint Research Centre. The survey was developed to understand and characterize European citizens’ use of information communication technologies for health. Descriptive and statistical analyses of association were used to interpret the data. Results Denmark reported the highest level of emails sent/received (507/1000, 50.70%). The lowest level reported was by participants in France (187/1000, 18.70%). Men used email communication for health care more than women, as did respondents in the 16-24 age group and those educated to tertiary level or still within the education system. As self-reported health state worsens, the proportion of people reporting having sent or received an email within the context of health care increases. Email use, poor health, multimorbidity, and number of visits to a physician are positively correlated. Conclusions The use of email communication within the context of European health care is extremely varied. The relationship between high email use, poor health, doctor visits, and multimorbidity is especially pertinent: provision of asynchronous communication for such groups is favored by policymakers. Low

  8. Teaching Email Requests in the Academic Context: A Focus on the Role of Corrective Feedback

    Science.gov (United States)

    Nguyen, Thi Thuy Minh; Do, Thi Thanh Ha; Nguyen, Anh Tuan; Pham, Thi Thanh Thuy

    2015-01-01

    As email requests from students to professors have become increasingly common in academic settings, research has also shown second-language (L2) students' unfamiliarity with email etiquette in L2 has adversely affected their communication with their professors. The present study examines whether giving corrective feedback on students' performance…

  9. E-Mail from Professor Enhances Student Motivation and Attitudes

    Science.gov (United States)

    Legg, Angela M.; Wilson, Janie H.

    2009-01-01

    Traditionally, professors use the first day of class to build rapport. However, current technology allows professors to contact students prior to the first day of class. This study assessed how the receipt of a welcoming e-mail from a female professor 1 week before the first day of class affected student motivation and attitudes toward the…

  10. Office of university affairs management information system: Users guide and documentation

    Science.gov (United States)

    Distin, J.; Goodwin, D.; Greene, W. A.

    1977-01-01

    Data on the NASA-University relationship are reported that encompass research in over 600 schools through several thousand grants and contracts. This user-driven system is capable of producing a variety of cyclical and query-type reports describing the total NASA-University profile. The capabilities, designed as part of the system, require a minimum of user maintenance in order to ensure system efficiency and data validity to meet the recurrent Statutory and Executive Branch information requirements as well as ad hoc inquiries from NASA general management, Congress, other Federal agencies, private sector organizations, universities and individuals. The data base contains information on each university, the individual projects and the financial details, current and historic, on all contracts and grants. Complete details are given on the system from its unique design features to the actual steps required for daily operation.

  11. Filtration Systems Design for Universal Oils in Agricultural Tractors

    Directory of Open Access Journals (Sweden)

    R. Majdan

    2017-12-01

    Full Text Available Three filtration systems using the tractor hydraulic circuit were proposed and verified during the tractors operation. Using the tractor-implement hydraulic system and filter body with accessories the universally useful filtration systems were designed. The designed filtration systems are the second stage of universal oil filtration whereas the first stage is the standard tractor filter. The decrease in the content of iron reached the values 25.53 %, 32.95 % and 41.55 % and the average decrease in oil contamination characterized by average value of decrease in content of iron, copper and silicium reached values 24.3 %, 24.7 % and 35.53 % in dependence on the filtration system and an oil contamination level. The decrease in contamination level verified the ability of designed filtration systems for agricultural tractors.

  12. O e-mail como ferramenta de marketing: uma revisão da literatura

    OpenAIRE

    Fortes, Nuno; Rita, Paulo

    2004-01-01

    Este artigo, assente exclusivamente em revisão bibliográfica, pretende apresentar as potencialidades do e-mail como uma ferramenta de comunicação de marketing. Em virtude do universo do e-mail marketing estar ensombrado por um crescente fenómeno de spam, são apresentadas duas abordagens alternativas, mas complementares - o marketing de permissão e o marketing viral-, capazes de manterem em níveis elevados os indicadores de eficácia das campanhas.

  13. Factors affecting acceptability of an email-based intervention to increase fruit and vegetable consumption.

    Science.gov (United States)

    Kothe, Emily J; Mullan, Barbara A

    2014-09-30

    Fresh Facts is a 30-day email-delivered intervention designed to increase the fruit and vegetable consumption of Australian young adults. This study investigated the extent to which the program was acceptable to members of the target audience and examined the relationships between participant and intervention characteristics, attrition, effectiveness, and acceptability ratings. Young adults were randomised to two levels of message frequency: high-frequency (n = 102), low-frequency (n = 173). Individuals in the high-frequency group received daily emails while individuals in the low-frequency group received an email every 3 days. Individuals in the high-frequency group were more likely to indicate that they received too many emails than individuals in the low-frequency group. No other differences in acceptability were observed. Baseline beliefs about fruit and vegetables were an important predictor of intervention acceptability. In turn, acceptability was associated with a number of indicators of intervention success, including change in fruit and vegetable consumption. The findings highlight the importance of considering the relationship between these intervention and participant factors and acceptability in intervention design and evaluation. Results support the ongoing use of email-based interventions to target fruit and vegetable consumption within young adults. However, the relationships between beliefs about fruit and vegetable consumption and acceptability suggest that this intervention may be differentially effective depending on individual's existing beliefs about fruit and vegetable consumption. As such, there is a pressing need to consider these factors in future research in order to minimize attrition and maximize intervention effectiveness when interventions are implemented outside of a research context.

  14. Cloud Computing E-Communication Services in the University Environment

    Science.gov (United States)

    Babin, Ron; Halilovic, Branka

    2017-01-01

    The use of cloud computing services has grown dramatically in post-secondary institutions in the last decade. In particular, universities have been attracted to the low-cost and flexibility of acquiring cloud software services from Google, Microsoft and others, to implement e-mail, calendar and document management and other basic office software.…

  15. Stochastic evolution of the Universe: A possible dynamical process ...

    Indian Academy of Sciences (India)

    C Sivakumar

    2017-12-11

    Dec 11, 2017 ... https://doi.org/10.1007/s12043-017-1491-z. Stochastic evolution of the Universe: A possible dynamical process leading to fractal structures. C SIVAKUMAR. Department of Physics, Maharaja's College, Ernakulam 682 011, India. E-mail: thrisivc@yahoo.com. MS received 6 July 2016; revised 26 June 2017; ...

  16. Rapid response: email, immediacy, and medical humanitarianism in Aceh, Indonesia.

    Science.gov (United States)

    Grayman, Jesse Hession

    2014-11-01

    After more than 20 years of sporadic separatist insurgency, the Free Aceh Movement and the Indonesian government signed an internationally brokered peace agreement in August 2005, just eight months after the Indian Ocean tsunami devastated Aceh's coastal communities. This article presents a medical humanitarian case study based on ethnographic data I collected while working for a large aid agency in post-conflict Aceh from 2005 to 2007. In December 2005, the agency faced the first test of its medical and negotiation capacities to provide psychiatric care to a recently amnestied political prisoner whose erratic behavior upon returning home led to his re-arrest and detention at a district police station. I juxtapose two methodological approaches-an ethnographic content analysis of the agency's email archive and field-based participant-observation-to recount contrasting narrative versions of the event. I use this contrast to illustrate and critique the immediacy of the humanitarian imperative that characterizes the industry. Immediacy is explored as both an urgent moral impulse to assist in a crisis and a form of mediation that seemingly projects neutral and transparent transmission of content. I argue that the sense of immediacy afforded by email enacts and amplifies the humanitarian imperative at the cost of abstracting elite humanitarian actors out of local and moral context. As a result, the management and mediation of this psychiatric case by email produced a bureaucratic model of care that failed to account for complex conditions of chronic political and medical instability on the ground. Copyright © 2014 Elsevier Ltd. All rights reserved.

  17. WEAKNESSES OF THE MANAGEMENT SYSTEM OF TRADITIONAL HUNGARIAN UNIVERSITIES

    Directory of Open Access Journals (Sweden)

    Gabriella KECZER

    2008-01-01

    Full Text Available Transformation of the management of traditional higher education institutionsemerged in Hungary following the change of the political system in 1990,however, an appropriate answer has not been found to date. The first step inthe management of reform is identification of the issues that need to beresolved through the implementation of changes.The present research has been aimed at identifying the present weaknessesof the inner management system of traditional Hungarian universities, thusfind a solid starting point for reforming it. I conducted in-depth interviews inthe course of research, with 10 top university managers who represent 9institutions, thus the majority of traditional Hungarian universities. Such aresearch has not been made at least for the last decade.In my paper first I present the current legal framework of the system ofuniversity management. Then I give an assessment of it on the basis of theinterviews, analysing the deficiencies, the external and internal obstacles toefficient management I conclude that the present leaders of theuniversities can exactly identify those deficiencies of the system and therelated external and internal circumstances that lead to disturbed operationand low efficiency. The results obtained through the interviews suggest that areform of the internal management should rearrange intra-university powerrelations and harmonize scopes of responsibility and competence. A shifttoward a stronger central, rectoral and a more limited faculty- and bodyrelatedmanagement appears necessary.

  18. Behavior change through automated e-mails: mediation analysis of self-help strategy use for depressive symptoms.

    Science.gov (United States)

    Morgan, Amy J; Mackinnon, Andrew J; Jorm, Anthony F

    2013-02-01

    To evaluate whether automated e-mails promoting effective self-help strategies for depressive symptoms were effective in changing self-help behavior, and whether this improved depression outcomes. 568 adults with sub-threshold depression participated in a randomized controlled trial and provided complete data. A series of 12 e-mails promoting the use of evidence-based self-help strategies was compared with e-mails providing non-directive depression information. Depression symptoms were assessed with the Patient Health Questionnaire depression scale (PHQ-9) and use of self-help strategies was assessed at baseline and post-intervention. We hypothesized that those receiving the self-help e-mails would increase their use of evidence-based self-help and this would be associated with improvements in depression. Mediation analyses were conducted using a non-parametric bootstrapping procedure. Total use of the self-help strategies promoted in the e-mails significantly mediated the effect of the intervention on depressive symptoms (B = -0.75, SE = 0.16, 95% CI: -1.06 to -0.48). The direct effect of the intervention on depressive symptoms was much smaller and not significant when the mediation path was included. The majority of the individual strategies also had a significant indirect effect on depressive symptoms. In adults with sub-threshold depression, automated e-mails based on behavior change principles can successfully increase use of self-help strategies, leading to a reduction in depressive symptoms. Copyright © 2012 Elsevier Ltd. All rights reserved.

  19. "While you still think, I already type": experienced social power reduces deliberation during e-mail communication.

    Science.gov (United States)

    Scholl, Annika; Sassenberg, Kai

    2014-11-01

    E-mail allows individuals to deliberate on their communication before sending it off. For instance, communication partners can easily take their time to ponder how best to frame a request before they actually send a message. Individuals at times strategically exploit this opportunity to deliberate in order to tailor messages to their communication partner, such as when communicating with a relatively more powerful person. As social power reduces concerns about impression management, we predicted that individuals deliberate more while composing e-mail messages under low (vs. high) power. This assumption was tested with well-established power priming. As such, we expected that experienced power in one context would diminish deliberation times during a subsequent e-mail communication. An experiment manipulating the experience of (low vs. high) power and measuring deliberation times during e-mail composition supported this hypothesis. The findings thus indicate how social power alters deliberation times. More importantly, the results show that individuals not only strategically deliberate during e-mail communication in line with their current situation, but also in line with their social standing in a previous situation (here, their experience of power).

  20. Formalized Conflicts Detection Based on the Analysis of Multiple Emails: An Approach Combining Statistics and Ontologies

    Science.gov (United States)

    Zakaria, Chahnez; Curé, Olivier; Salzano, Gabriella; Smaïli, Kamel

    In Computer Supported Cooperative Work (CSCW), it is crucial for project leaders to detect conflicting situations as early as possible. Generally, this task is performed manually by studying a set of documents exchanged between team members. In this paper, we propose a full-fledged automatic solution that identifies documents, subjects and actors involved in relational conflicts. Our approach detects conflicts in emails, probably the most popular type of documents in CSCW, but the methods used can handle other text-based documents. These methods rely on the combination of statistical and ontological operations. The proposed solution is decomposed in several steps: (i) we enrich a simple negative emotion ontology with terms occuring in the corpus of emails, (ii) we categorize each conflicting email according to the concepts of this ontology and (iii) we identify emails, subjects and team members involved in conflicting emails using possibilistic description logic and a set of proposed measures. Each of these steps are evaluated and validated on concrete examples. Moreover, this approach's framework is generic and can be easily adapted to domains other than conflicts, e.g. security issues, and extended with operations making use of our proposed set of measures.

  1. INFORMATION-ANALYTICAL LEARNING MANAGEMENT SYSTEM UNIVERSITIES

    Directory of Open Access Journals (Sweden)

    Yu. Tryus

    2016-12-01

    Full Text Available We consider conceptual approaches to creation of information systems, learning management school, which uses modern methods of decision-making and simulational modeling, web-technologies. The main criteria for the selection of development tools of the system are: openness, free of charge, easy to use and independence from system software and hardware. The chosen technology and the system itself satisfies such requirements as: focus on national and international standards in the field of higher education, adherence to service-oriented architecture, ensuring stable operation with a large number of users, support for a clear division of user rights to obtain and change information resources, software modularity the final product and its ability to integrate into the corporate information system of the university

  2. Redefining Technological Literacy in the Workplace: A Qualitative Study of Social Affordances in Workplace Email

    Science.gov (United States)

    Bacci, Tina Marie

    2011-01-01

    This dissertation examines the social affordances of workplace email use. Through group and individual interviews of six knowledge workers in a distributed real estate firm, it explores the extent workplace writers recognize and rely on extra-textual devices (i.e., copy, blind-copy, and forward devices) and email applications (i.e., email…

  3. A Comparative Analysis of E-Mail and Face-to-Face Communication in an Educational Environment

    Science.gov (United States)

    Lightfoot, Jay M.

    2006-01-01

    Electronic mail (e-mail) is an extremely important medium for Internet-based education. Due to its unique characteristics, there is reason to be concerned that students do not put appropriate care into writing messages that are sent via e-mail. This has significant implications for the effectiveness of online learning environments. This paper…

  4. Using Email Interviews in Qualitative Educational Research: Creating Space to Think and Time to Talk

    Science.gov (United States)

    James, Nalita

    2016-01-01

    The article explores how the Internet and email offer space for participants to think and make sense of their experiences in the qualitative research encounter. It draws on a research study that used email interviewing to generate online narratives to understand academic lives and identities through research encounters in virtual space. The…

  5. Design and Implementation of Online Booking System of University Sports Venues

    Directory of Open Access Journals (Sweden)

    Li Can

    2017-01-01

    Full Text Available To solve the imbalanced use of university sports venues, the online booking system of university sports venues based on the table tennis hall of Zhengzhou University is designed, combining the experience of the existing online booking systems, the main methods and the major ideal of building these systems both at home and aboard. The basic functions of the system are designed according to the general requirement analysis, including user’s registration and login, online venue booking, online payment, personal center, message board and database construction. The development of the system used Java programming language, JSP (a Web platform development technology, MySQL database processing technology, JDBC data access model, MyEclipse development platform and Tomcat server. The system has accomplished such functions as online booking, online payment and online message. The tests of the system are run in good conditions. The use of the system has made up for the current luck of sports venues management, solved the problems of the online booking function of university sports venues, improved the efficiency of the venues and meet the needs of efficient use of the venues. The system can be an experience of the management of the other college sports venues.

  6. Information Systems Audit for University Governance in Bucharest Academy of Economic Studies

    Directory of Open Access Journals (Sweden)

    Ion Gh. ROSCA

    2010-01-01

    Full Text Available Today's successful audit leaders never lose sight of the importance of continually assessing and improving the organizations' university governance structure. Focusing on small and large mission, and using practical exercises and individual activities, the auditors will help gain the skills necessary to review and improve university governance structure, while developing techniques to assess risk management activities. Attendees will leave with an understanding of legal and regulatory guidelines as they pertain to university governance and discuss in-depth issues such as business ethics, transparency and disclosure, IT governance and university risks management. Identification, evaluation and management of university risks, is an important element of the university governance system. Today, the Bucharest Academy of Economic Studies is in a complex process to realize a university governance integrate information system. In context of this paperwork there are presented the main aspects for developing and implementing in actual phase information systems audit, to recognize the risks and establish the necessary measures to eliminate them.

  7. Hierarchical and Matrix Structures in a Large Organizational Email Network: Visualization and Modeling Approaches

    OpenAIRE

    Sims, Benjamin H.; Sinitsyn, Nikolai; Eidenbenz, Stephan J.

    2014-01-01

    This paper presents findings from a study of the email network of a large scientific research organization, focusing on methods for visualizing and modeling organizational hierarchies within large, complex network datasets. In the first part of the paper, we find that visualization and interpretation of complex organizational network data is facilitated by integration of network data with information on formal organizational divisions and levels. By aggregating and visualizing email traffic b...

  8. Survey on university governance system in U.S.A. Case study in Stanford University; Beikoku ni okeru daigaku governance system no chosa. Stanford daigaku no case study

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    2001-03-01

    In order to provide reference for the university reformation policy of Japan, the features and strength of the U.S. university management and operation systems were put into order and analyzed through a case study in Stamford University in the United States. In the U.S. research universities, it is not only how high the quality is in the faculties and researchers, but also how far the structuring has been advanced in the systems to manage and operate them efficiently, which supports the infrastructures of research activities. The 'research management and operation staff' is knowledgeable in the system to manage the inside of a university and the system to procure research funds from the government and foundations. The staff enhances the productivity of research activities by professionally handling various operations taking place in research laboratories. In association with increase of the size of research projects, those who have been experienced in industries, or those who have acquired the doctor's degree exist in a large number in the projects as the research management staff. In Japanese universities, management staff posts with high specialty to undertake the research management do not exist. This facts results in young researchers consuming a great amount of time for this work. (NEDO)

  9. User Requirements Model for University Timetable Management System

    OpenAIRE

    Ahmad Althunibat; Mohammad I. Muhairat

    2016-01-01

    Automated timetables are used to schedule courses, lectures and rooms in universities by considering some constraints. Inconvenient and ineffective timetables often waste time and money. Therefore, it is important to investigate the requirements and potential needs of users. Thus, eliciting user requirements of University Timetable Management System (TMS) and their implication becomes an important process for the implementation of TMS. On this note, this paper seeks to propose a m...

  10. INTEGRATION CHALLENGES OF UNIVERSITY AND INFORMATION MANAGEMENT SYSTEM (UIMS TO MOODLE

    Directory of Open Access Journals (Sweden)

    Jyldyzbek J. Jakshylykov

    2016-06-01

    Full Text Available Introduction: in 2006 an International Ataturk Ala-Too University (IAAU began to adopt internationally recognised Bologna system, which was initiated by the Ministry of Science and Education of Kyrgyz Republic because of problems of managerial and educational problems at universities in Kyrgyzstan. Consequently, IAAU had to improve its information and grading system and created University Information and Manage¬ment System (UIMS, which was developed by the university professional team including the author. At the same time, the university began to apply a Moodle software, which delivers open source management system programs, in order to appropriately manage teaching proc esses and manage courses online. Materials and Methods: the methodological basis of the research are descriptive method, analysis, and comparison. Results: however, the IAAU faced some challenged issues in the application of the two innovation, which was the integration challenges of those Moodle and UIMS. Hence, the main purpose of this study is to demonstrate benefits of Moodle and UIMS linking challenges. at first, this paper informs Moodle functions, features, advantages and disadvantages in a shortly manner and UIMS management features and primary functions, which included six fundamentally crucial processes with some graphical representations. In addition, the analysis and methodologies of two systems through identifying advantages and disadvantages for the possible integ ration. Discussion and Conclusions: at the end, some challenged issues were identified from analysis results, also Moodle and UIMS benefits were demonstrated in the International Ataturk Ala-Too University.

  11. AN AUTOMATED IMPLEMENTATION OF INDIAN UNIVERSITY ADMISSION SYSTEM USING ARTIFICIAL NEURAL NETWORKS

    Directory of Open Access Journals (Sweden)

    B. Sankarasubramanian

    2014-04-01

    Full Text Available Indian University Admission is a complex phenomenon encompassing various factors both tangible and intangible. Apart from Merit - Caste, Community and Religion play a crucial role in getting admission to various courses offered by Universities. The Single Window Admission System followed by almost all Government Universities (for example: Anna University, Chennai is, so far, the best practice to offer Admission sought by student community. But, still, in Private Universities, the Admission process is done manually since number of students seeking a course is smaller in size. This manual process is fraught with some drawbacks: such as slower in time, cumbersome and costlier, bias by the Admission Officer, manual errors while processing, due to influence exercised by powerful people qualified students not getting their course of choice and unqualified students getting into their course of willingness and etc. This paper addresses these problems via neural network architecture based Admission system which will eliminate all the pitfalls and drawbacks inherent in the current system and offers a smooth, clearer, easier and cost effective way of student admission system implementation in Indian Universities.

  12. Computer Mediated Communication for Social and Academic Purposes: Profiles of Use and University Students' Gratifications

    Science.gov (United States)

    Vrocharidou, Anatoli; Efthymiou, Ilias

    2012-01-01

    The present study approaches the Internet as a social space, where university students make use of computer mediated communication (CMC) applications, i.e. e-mail, instant messaging and social network sites, in order to satisfy social and academic needs. We focus on university students, because they represent one of the most avid groups of CMC…

  13. Accreditation Role of the National Universities Commission and the Quality of the Educational Inputs into Nigerian University System

    Science.gov (United States)

    Ibijola; Yinka, Elizabeth

    2014-01-01

    The Accreditation role of the National Universities Commission (NUC) and the quality of the educational inputs into Nigerian university system was investigated in this work, using a descriptive research of survey design. The population consisted of public Universities in South-West, Nigeria. The sample was made up of 300 subjects, consisting of 50…

  14. World University Ranking Systems: An Alternative Approach Using Partial Least Squares Path Modelling

    Science.gov (United States)

    Jajo, Nethal K.; Harrison, Jen

    2014-01-01

    University rankings are key drivers in national and institutional strategic planning. The increase in the number of university ranking systems and the diversity of methods and indicators used by these systems necessitate the development of an index that can measure a university's performance in all these systems at once. This article presents…

  15. The Use of Email to Coach Preservice Early Childhood Teachers

    Science.gov (United States)

    Barton, Erin E.; Fuller, Elizabeth A.; Schnitz, Alana

    2016-01-01

    The purpose of this study was to examine the impact of performance feedback on preservice teachers' use of recommended practices within inclusive early childhood classrooms. A multiple baseline design across behaviors was used to examine the relation between performance feedback delivered via email and practicum students' use of target-recommended…

  16. Test of the Behavioral Perspective Model in the Context of an E-Mail Marketing Experiment

    Science.gov (United States)

    Sigurdsson, Valdimar; Menon, R. G. Vishnu; Sigurdarson, Johannes Pall; Kristjansson, Jon Skafti; Foxall, Gordon R.

    2013-01-01

    An e-mail marketing experiment based on the behavioral perspective model was conducted to investigate consumer choice. Conversion e-mails were sent to two groups from the same marketing database of registered consumers interested in children's books. The experiment was based on A-B-A-C-A and A-C-A-B-A withdrawal designs and consisted of sending B…

  17. The Language of Business E-Mail: An Opportunity to Bridge Theory and Practice

    Directory of Open Access Journals (Sweden)

    Julio C. Gimenez

    2015-10-01

    Full Text Available The language of business email has attracted a great deal of attention in the last decade. Research studies on the language, style and register of business email have been published in many journals, books and other publications. However, many of these discussions have been theoretical in nature, failing to make a connection between theory and practice. It is then the task of the ESP teacher to make such a connection. This article argues that business communication lends itself well to bringing theory and practice closer together. To this end, the article first identifies relevant features which have started to emerge from main studies in the language of business email, a vital component in business communication. It then explores different possible pedagogical applications of these findings in the BE class. The article discusses the SAE (Selecting, Applying and Evaluating model which can be used to design and evaluate classroom activities. The article finally presents four activities which have been created following the main findings emerging from the research reviewed.

  18. Universal formats for nonlinear ordinary differential systems

    International Nuclear Information System (INIS)

    Kerner, E.H.

    1981-01-01

    It is shown that very general nonlinear ordinary differential systems (embracing all that arise in practice) may, first, be brought down to polynomial systems (where the nonlinearities occur only as polynomials in the dependent variables) by introducing suitable new variables into the original system; second, that polynomial systems are reducible to ''Riccati systems,'' where the nonlinearities are quadratic at most; third, that Riccati systems may be brought to elemental universal formats containing purely quadratic terms with simple arrays of coefficients that are all zero or unity. The elemental systems have representations as novel types of matrix Riccati equations. Different starting systems and their associated Riccati systems differ from one another, at the final elemental level, in order and in initial data, but not in format

  19. Universal behavior of strongly correlated Fermi systems

    Energy Technology Data Exchange (ETDEWEB)

    Shaginyan, Vasilii R [B.P. Konstantinov St. Petersburg Institute of Nuclear Physics, Russian Academy of Sciences, Gatchina, Leningrad region, Rusian Federation (Russian Federation); Amusia, M Ya [A.F. Ioffe Physico-Technical Institute, Russian Academy of Sciences, St. Petersburg (Russian Federation); Popov, Konstantin G [Komi Scientific Center, Ural Branch of the Russian Academy of Sciences, Syktyvkar (Russian Federation)

    2007-06-30

    This review discusses the construction of a theory and the analysis of phenomena occurring in strongly correlated Fermi systems such as high-T{sub c} superconductors, heavy-fermion metals, and quasi-two-dimensional Fermi systems. It is shown that the basic properties and the universal behavior of strongly correlated Fermi systems can be described in the framework of the Fermi-condensate quantum phase transition and the well-known Landau paradigm of quasiparticles and the order parameter. The concept of fermion condensation may be fruitful in studying neutron stars, finite Fermi systems, ultra-cold gases in traps, and quark plasma. (reviews of topical problems)

  20. Universal behavior of strongly correlated Fermi systems

    International Nuclear Information System (INIS)

    Shaginyan, Vasilii R; Amusia, M Ya; Popov, Konstantin G

    2007-01-01

    This review discusses the construction of a theory and the analysis of phenomena occurring in strongly correlated Fermi systems such as high-T c superconductors, heavy-fermion metals, and quasi-two-dimensional Fermi systems. It is shown that the basic properties and the universal behavior of strongly correlated Fermi systems can be described in the framework of the Fermi-condensate quantum phase transition and the well-known Landau paradigm of quasiparticles and the order parameter. The concept of fermion condensation may be fruitful in studying neutron stars, finite Fermi systems, ultra-cold gases in traps, and quark plasma. (reviews of topical problems)

  1. Wireless GPS fleet tracking system at the University of Albany.

    Science.gov (United States)

    2014-07-01

    This report provides an overview of the project undertaken at the University at Albany to make alternative transportation a more : viable option by implementing a GPS Tracking System on the University bus fleet and broadcasting the bus locations to c...

  2. Enhancing Distant Learning through Email Communication: A Case of BOU

    Science.gov (United States)

    Rahman, K. M. Rezanur; Anwar, Sadat; Numan, Sharker Md.

    2008-01-01

    Today computer has replaced all means of traditional communication significantly. Many distant learning tools claim to be interactive, but few can offer two-way communication. Email is the most popular means of communication medium now-a-days. Therefore, it may be used as an educational tool for learning. In present socioeconomic condition of…

  3. Understanding the use of email consultation in primary care using a retrospective observational study with data of Dutch electronic health records

    Science.gov (United States)

    Huygens, Martine W J; Swinkels, Ilse C S; Verheij, Robert A; Friele, Roland D; van Schayck, Onno C P; de Witte, Luc P

    2018-01-01

    Objectives It is unclear why the use of email consultation is not more widespread in Dutch general practice, particularly because, since 2006, its costs can be reimbursed. To encourage further implementation, it is needed to understand the current use of email consultations. This study aims to understand the use of email consultation by different patient groups, compared with other general practice (GP) consultations. Setting For this retrospective observational study, we used Dutch routine electronic health record data obtained from NIVEL Primary Care Database for the years 2010 and 2014. Participants 200 general practices were included in 2010 (734 122 registered patients) and 434 in 2014 (1 630 386 registered patients). Primary outcome measures The number and percentage of email consultations and patient characteristics (age, gender, neighbourhood socioeconomic status and diagnoses) of email consultation users were investigated and compared with those who had a telephone or face-to-face consultation. General practice characteristics were also taken into account. Results 32.0% of the Dutch general practices had at least one email consultation in 2010, rising to 52.8% in 2014. In 2014, only 0.7% of the GP consultations were by email (the others comprised home visits, telephone and face-to-face consultations). Its use highly varied among general practices. Most email consultations were done for psychological (14.7%); endocrine, metabolic and nutritional (10.9%); and circulatory (10.7%) problems. These diagnosis categories appeared less frequently in telephone and face-to-face consultations. Patients who had an email consultation were older than patients who had a telephone or face-to-face consultation. In contrast, patients with diabetes who had an email consultation were younger. Conclusion Even though email consultation was done in half the general practices in the Netherlands in 2014, the actual use of it is extremely low. Patients who had an email consultation

  4. Canada's Industry-University Co-Op Education Accreditation System and Its Inspiration for the Evaluation of China's Industry-University-Institute Cooperative Education

    Science.gov (United States)

    Qiubo, Yang; Shibin, Wang; Zha, Qiang

    2016-01-01

    The high degree of interest that higher education systems around the world have in employability has driven the profound development of industry-university cooperative education. Canada's industry-university co-op education system has served as a model for global cooperative education, and its accreditation system guarantees the high quality of…

  5. Managerial Systems as Measures of Quality Management in Universities in Uganda

    Science.gov (United States)

    Neema-Abooki, P.

    2014-01-01

    This paper envisions that, since universities are basically consent organizations university management has an obligation to processes that engender total participation and passion of all employees. This study aimed at delving into management stances at universities. It based on Likert's systems of management, which depict the total organization…

  6. No Need for Black Chambers: Testing TLS in the E-mail Ecosystem at Large

    OpenAIRE

    Mayer, Wilfried; Zauner, Aaron; Schmiedecker, Martin; Huber, Markus

    2015-01-01

    TLS is the most widely used cryptographic protocol on the Internet. While many recent studies focused on its use in HTTPS, none so far analyzed TLS usage in e-mail related protocols, which often carry highly sensitive information. Since end-to-end encryption mechanisms like PGP are seldomly used, today confidentiality in the e-mail ecosystem is mainly based on the encryption of the transport layer. A well-positioned attacker may be able to intercept plaintext passively and at global scale. In...

  7. CONFERENCING VIA E-MAIL: AN ALTERNATIVE WAY TO RESPOND TO STUDENT WRITING (LA CONFERENCIA VÍA E-MAIL: UNA MANERA ALTERNATIVA PARA RESPONDER A LOS ESCRITOS DE LOS ESTUDIANTES

    Directory of Open Access Journals (Sweden)

    Zúñiga Vargas Juan Pablo

    2010-04-01

    Full Text Available Resumen:El presente artículo reporta las conclusiones obtenidas en un proyecto de investigación cuyo objetivo fue determinar la eficacia de responder a los escritos de los estudiantes por medio de la conferencia vía correo electrónico. Dicho proyecto de investigación se realizó con nueve profesores de la facultad de ingeniería y un estudiante avanzado de ingeniería de una universidad pública de Costa Rica durante el segundo semestre del año 2008. Para reunir información para tal proyecto se utilizaron dos cuestionarios, formularios para conferencia, reflexiones del instructor y reflexiones de los estudiantes. Un número reducido de los estudiantes completó los instrumentos y participó en la interacción por medio de conferencias que se esperaba de ellos. Aún así, los estudiantes encuestados y el instructor consideraron que el método de la conferencia fue eficaz. No obstante, es necesario realizar más investigación con el fin de obtener resultados concluyentes sobre la efectividad de la conferencia vía correo electrónico para responder a los escritos de los estudiantes. Se ofrecen sugerencias para investigaciones futuras.Abstract:This article reports the findings obtained in a research project that aimed at determining the efficiency of responding to student writing by means of conferencing via e-mail. Such research project was carried out with nine professors from the faculty of engineering and one advanced engineering student at a public university in Costa Rica during the second semester in the year 2008. To collect information for this project, two questionnaires, conferencing forms, instructors’ reflections, and student reflections were used. A reduced number of the students completed the instruments and took part in the conferencing exchanges expected of them, yet both the surveyed students and the instructor found conferencing efficient. Still, more research is needed in order obtain conclusive results about the

  8. Responsiveness to a Prospective Student E-Mail Inquiry by Community Colleges in the Nine Mega-States

    Science.gov (United States)

    Shadinger, David A.

    2014-01-01

    This quantitative study investigated e-mail responsiveness by community colleges in the nine mega-states to an inquiry from a prospective student. Noel-Levitz (2006b) reported that prospective students want to receive an e-mail with information about an institution prior to applying for admission. Specifically, high school juniors and seniors want…

  9. Self-esteem, interpersonal risk, and preference for e-mail to face-to-face communication.

    Science.gov (United States)

    Joinson, Adam N

    2004-08-01

    The media choices made by high and low self-esteem Internet users were studied using web-based methodology (n = 265). Participants were asked to rank four media (face-to-face, e-mail, letter, and telephone) in order of preference across four different communication scenarios designed to pose an interpersonal risk. The level of interpersonal risk posed by two of the scenarios (asking for a pay rise and asking for a date) were also experimentally manipulated by randomly allocating participants to a 25%, 50%, or 75% chance of rejection. Low self-esteem users (LSE) showed a significant preference toward e-mail communication compared to high self-esteem users (HSE). This pattern was reversed for face-to-face preferences. Similarly, a greater chance of rejection in a scenario led to e-mail being preferred to face-to-face communication. The results are discussed in light of both the strategic use of different media and the motivated Internet user.

  10. Contributions of Traditional Web 1.0 Tools e.g. Email and Web 2.0 Tools e.g. Weblog towards Knowledge Management

    Science.gov (United States)

    Dehinbo, Johnson

    2010-01-01

    The use of email utilizes the power of Web 1.0 to enable users to access their email from any computer and mobile devices that is connected to the Internet making email valuable in acquiring and transferring knowledge. But the advent of Web 2.0 and social networking seems to indicate certain limitations of email. The use of social networking seems…

  11. Development of enterprise architecture in university using TOGAF as framework

    Science.gov (United States)

    Amalia, Endang; Supriadi, Hari

    2017-06-01

    The university of XYZ is located in Bandung, West Java. It has an infrastructure of technology information (IT) which is managed independently. Currently, the IT at the University of XYZ employs a complex conventional management pattern that does not result in a fully integrated IT infrastructure. This is not adaptive in addressing solutions to changing business needs and applications. In addition, it impedes the innovative development of sustainable IT services and also contributes to an unnecessary high workload for managers. This research aims to establish the concept of IS/IT strategic planning. This is used in the development of the IS/IT and in designing the information technology infrastructure based on the framework of The Open Group Architecture Framework (TOGAF) and Architecture Development Method (ADM). A case study will be done at the University of XYZ using the concept of qualitative research through review of literatures and interviews. This study generates the following stages:(1) forming a design using TOGAF and the ADM around nine functional areas of business and propose 12 application candidates to be developed at XYZ University; (2) generating 11 principles of the development of information technology architecture; (3) creating a portfolio for future applications (McFarlan Grid), generating 6 applications in the strategic quadrant (SIAKAD-T, E-LIBRARY, SIPADU-T, DSS, SIPPM-T, KMS), 2 quadrant application operations (PMS-T, CRM), 4 quadrant application supports (MNC-T, NOPEC-T, EMAIL-SYSTEM, SSO); and (4) modelling the enterprise architecture of this study which could be a reference in making a blueprint for the development of information systems and information technology at the University of XYZ.

  12. The Management and Demonstration System at Murray State University.

    Science.gov (United States)

    Schroeder, Gary G.

    The management system in use at the Murray State University Teacher Corps Project is described. The system uses management by objectives and the demonstration approach, and encourages managers to focus on the development and demonstration of ideas, processes, and structures. The system's operating concepts of time management and human resources…

  13. Huria: Journal of the Open University of Tanzania - Vol 17 (2014)

    African Journals Online (AJOL)

    Security Vulnerabilities of the Web Based Open Source Information Systems: Adoption Process and Source Codes Screening · EMAIL FULL TEXT EMAIL FULL TEXT · DOWNLOAD FULL TEXT DOWNLOAD FULL TEXT. S Ally, 1-13 ...

  14. The effect of feedback by SMS-text messages and email on household electricity consumption

    DEFF Research Database (Denmark)

    Gleerup, Maria; Larsen, Anders; Leth-Petersen, Søren

    2010-01-01

    This paper analyzes the effect of supplying feedback by text messages (SMS) and email about electricity consumption on the level of total household electricity consumption. An experiment was conducted in which 1,452 households were randomly allocated to three experimental groups and two control....... Results suggest that email and SMS messaging that communicated timely information about a household's 'exceptional' consumption periods (e.g. highest week of electricity use in past quarter) produced average reductions in total annual electricity use of about 3%. The feedback technology is cheap...

  15. MABEL at IPAC: managing address books and email lists at the Infrared Processing and Analysis Center

    Science.gov (United States)

    Crane, Megan; Brinkworth, Carolyn; Gelino, Dawn; O'Leary, Ellen

    2012-09-01

    The Infrared Processing and Analysis Center (IPAC), located on the campus of the California Institute of Technology, is NASA's multi-mission data center for infrared astrophysics. Some of IPAC's services include administering data analysis funding awards to the astronomical community, organizing conferences and workshops, and soliciting and selecting fellowship and observing proposals. As most of these services are repeated annually or biannually, it becomes necessary to maintain multiple lists of email contacts associated with each service. MABEL is a PHP/MySQL web database application designed to facilitate this process. It serves as an address book containing up-to-date contact information for thousands of recipients. Recipients may be assigned to any number of email lists categorized by IPAC project and team. Lists may be public (viewable by all project members) or private (viewable only by team members). MABEL can also be used to send HTML or plain-text emails to multiple lists at once and prevents duplicate emails to a single recipient. This work was performed at the California Institute of Technology under contract to the National Aeronautics and Space Administration.

  16. Influence of Different Etching Modes on Bond Strength to Enamel using Universal Adhesive Systems.

    Science.gov (United States)

    Diniz, Ana Cs; Bandeca, Matheus C; Pinheiro, Larissa M; Dos Santosh Almeida, Lauber J; Torres, Carlos Rg; Borges, Alvaro H; Pinto, Shelon Cs; Tonetto, Mateus R; De Jesus Tavarez, Rudys R; Firoozmand, Leily M

    2016-10-01

    The adhesive systems and the techniques currently used are designed to provide a more effective adhesion with reduction of the protocol application. The objective of this study was to evaluate the bond strength of universal adhesive systems on enamel in different etching modes (self-etch and total etch). The mesial and distal halves of 52 bovine incisors, healthy, freshly extracted, were used and divided into seven experimental groups (n = 13). The enamel was treated in accordance with the following experimental conditions: FUE-Universal System - Futurabond U (VOCO) with etching; FUWE - Futurabond U (VOCO) without etching; SB-Total Etch System - Single Bond 2 (3M); SBUE-Universal System - Single Bond Universal (3M ESPE) with etching; SBUWE - Single Bond Universal (3M ESPE) without etching; CLE-Self-etch System - Clearfil SE Bond (Kuraray) was applied with etching; CLWE - Clearfil SE Bond (Kuraray) without etching. The specimens were made using the composite spectrum TPH (Dentsply) and stored in distilled water (37 ± 1°C) for 1 month. The microshear test was performed using the universal testing machine EMIC DL 2000 with the crosshead speed of 0.5 mm/minute. The bond strength values were analyzed using statistical tests (Kruskal-Wallis test and Mann-Whitney test) with Bonferroni correction. There was no statistically significant difference between groups (p adhesive interface revealed that most failures occurred between the interface composite resin and adhesive. The universal adhesive system used in dental enamel varies according to the trademark, and the previous enamel etching for universal systems and the self-etch both induced greater bond strength values. Selective enamel etching prior to the application of a universal adhesive system is a relevant strategy for better performance bonding.

  17. Systems for the management of information in a university context: an investigation of user need. Information systems, Universities, Information strategy

    Directory of Open Access Journals (Sweden)

    Marcella R.

    2004-01-01

    Full Text Available The accessibility, reliability, consistency, and relevance of data underpinning information systems are crucial to its use and effectiveness in a university setting. This article reports on the findings of a research project carried out at a new university, which highlighted the role information plays in the success of the operation and in allowing the institution to evolve and meet the challenges posed by the government, students and other stakeholders. Data were gathered from the academic and administrative staff of the university through interviews with senior managers, and a Web-based questionnaire completed by 863 respondents (a 47.9% response rate. The project aimed to explore data and information activities supporting management and strategic decision making in a new university. Project results indicate that there are real deficiencies in the realization of the case institution's information strategy and that these deficiencies must be addressed in developments focusing on improving strategic effectiveness in the future. Particular issues identified included the lack of clarity in responsibility regarding information and concerns about the validity of much of the internally created and maintained data.

  18. Laboratory Performance of Universal Adhesive Systems for Luting CAD/CAM Restorative Materials.

    Science.gov (United States)

    Siqueira, Fabiana; Cardenas, Andres Millan; Gutierrez, Mario Felipe; Malaquias, Pâmela; Hass, Viviane; Reis, Alessandra; Loguercio, Alessandro D; Perdigão, Jorge

    To evaluate the microshear bond strength (μSBS) of several universal adhesive systems applied on five different indirect restorative materials. Five CAD/CAM materials were selected: 1) indirect resin composite (LAV); 2) feldspathic glass ceramic (VTR); 3) leucite-reinforced glass-ceramic (EMP); 4) lithium disilicate ceramic (EMX); 5) yttrium-stabilized zirconium dioxide (CZI). For each material, 15 blocks were cut into 4 rectangular sections (6 × 6 × 6 mm) (n = 60 per group), and processed as recommended by the respective manufacturer. For each indirect material, the following adhesive systems were applied according to the respective manufacturer's instructions: 1) AdheSE Universal [ADU]; 2) All-Bond Universal (ABU); 3) Ambar Universal (AMB); 4) Clearfil Universal (CFU); 5) Futurabond U (FBU); 6) One Coat 7 Universal (OCU); 7) Peak Universal Bond (PUB); 8) Prime&Bond Elect (PBE); 9) Scotchbond Universal Adhesive (SBU); 10) Xeno Select (XEN, negative control). After the application of the adhesive system, cylinder-shaped transparent matrices were filled with a dual-curing resin cement (NX3) and light cured. Specimens were stored in water (37°C for 24 h) and tested in shear mode at 1.0 mm/min (mSBS). The failure pattern and μSBS were statistically evaluated (a = 0.05). LAV, VTR, and EMP showed a greater number of cohesive fractures than EMX and CZI (p materials. There was a wide variability in mean μSBS when different universal adhesives were applied to the several CAD/CAM indirect materials. Most universal adhesives bonded well to air-abraded zirconia.

  19. Adult Willingness to Use Email and Social Media for Peer-to-Peer Cancer Screening Communication: Quantitative Interview Study.

    Science.gov (United States)

    Cutrona, Sarah L; Roblin, Douglas W; Wagner, Joann L; Gaglio, Bridget; Williams, Andrew E; Torres Stone, Rosalie; Field, Terry S; Mazor, Kathleen M

    2013-11-28

    Adults over age 40 are increasing their use of email and social media, raising interest in use of peer-to-peer Internet-based messaging to promote cancer screening. The objective of our study was to assess current practices and attitudes toward use of email and other e-communication for peer-to-peer dialogues on cancer screening. We conducted in-person interviews with 438 insured adults ages 42-73 in Georgia, Hawaii, and Massachusetts. Participants reported on use of email and other e-communication including social media to discuss with peers routine health topics including breast and colorectal cancer (CRC). We ascertained willingness to share personal CRC screening experiences via conversation, postcard, email, or other e-communication. Health literacy scores were measured. Email had been used by one-third (33.8%, 148/438) to discuss routine health topics, by 14.6% (64/438) to discuss breast cancer screening, and by 12.6% (55/438) to discuss CRC screening. Other e-communication was used to discuss routine health topics (11.6%, 51/438), screening for breast cancer (3.9%, 17/438), and CRC (2.3%, 10/438). In the preceding week, 84.5% (370/438) of participants had used email, 55.9% (245/438) had used e-communication of some type; 44.3% (194/438) text, 32.9% (144/438) Facebook, 12.3% (54/438) instant message, 7.1% (31/438) video chat, and 4.8% (21/438) Twitter. Many participants were willing to share their CRC screening experiences via email (32.4%, 142/438 might be willing; 36.3%, 159/438 very willing) and via other e-communication (15.8%, 69/438 might be willing; 14.4%, 63/438 very willing). Individuals willing to send CRC screening emails scored significantly higher on tests of health literacy compared to those willing to send only postcards (Pcommunication to promote cancer screening to peers. Optimal approaches for encouraging peer-to-peer transmission of accurate and appropriate cancer screening messages must be studied.

  20. Providing cell phone numbers and e-mail addresses to patients: The patient’s perspective, a cross sectional study

    Science.gov (United States)

    2012-01-01

    Background Today patients can consult with their treating physician by cell phone or e-mail. These means of communication enhance the quality of medical care and increase patient satisfaction, but they can also impinge on physicians’ free time and their patient schedule while at work. The objective of this study is to assess the attitudes and practice of patients on obtaining the cell phone number or e-mail address of their physician for the purpose of medical consultation. Methods Personal interviews with patients, 18 years of age or above, selected by random sampling from the roster of adults insured by Clalit Health Services, Southern Division. The total response rate was 41%. The questionnaire included questions on the attitude and practice of patients towards obtaining their physician’s cell phone number or e-mail address. Comparisons were performed using Chi-square tests to analyze statistically significant differences of categorical variables. Two-tailed p values less than 0.05 were considered statistically significant, with a power of 0.8. Results The study sample included 200 patients with a mean age of 46.6 ± 17.1, of whom 110 were women (55%). Ninety-three (46.5%) responded that they would be very interested in obtaining their physician’s cell phone number, and an additional 83 (41.5%) would not object to obtaining it. Of the 171 patients (85.5%) who had e-mail addresses, 25 (14.6%) said they would be very interested in obtaining their physician’s e-mail address, 85 (49.7%) said they would not object to getting it, and 61 (35.7%) were not interested. In practice only one patient had requested the physician’s e-mail address and none actually had it. Conclusions Patients favored cell phones over e-mail for consulting with their treating physicians. With new technologies such as cell phones and e-mail in common use, it is important to determine how they can be best used and how they should be integrated into the flow of clinical practice

  1. Providing cell phone numbers and e-mail addresses to patients: The patient’s perspective, a cross sectional study

    Directory of Open Access Journals (Sweden)

    Peleg Roni

    2012-08-01

    Full Text Available Abstract Background Today patients can consult with their treating physician by cell phone or e-mail. These means of communication enhance the quality of medical care and increase patient satisfaction, but they can also impinge on physicians’ free time and their patient schedule while at work. The objective of this study is to assess the attitudes and practice of patients on obtaining the cell phone number or e-mail address of their physician for the purpose of medical consultation. Methods Personal interviews with patients, 18 years of age or above, selected by random sampling from the roster of adults insured by Clalit Health Services, Southern Division. The total response rate was 41%. The questionnaire included questions on the attitude and practice of patients towards obtaining their physician’s cell phone number or e-mail address. Comparisons were performed using Chi-square tests to analyze statistically significant differences of categorical variables. Two-tailed p values less than 0.05 were considered statistically significant, with a power of 0.8. Results The study sample included 200 patients with a mean age of 46.6 ± 17.1, of whom 110 were women (55%. Ninety-three (46.5% responded that they would be very interested in obtaining their physician’s cell phone number, and an additional 83 (41.5% would not object to obtaining it. Of the 171 patients (85.5% who had e-mail addresses, 25 (14.6% said they would be very interested in obtaining their physician’s e-mail address, 85 (49.7% said they would not object to getting it, and 61 (35.7% were not interested. In practice only one patient had requested the physician’s e-mail address and none actually had it. Conclusions Patients favored cell phones over e-mail for consulting with their treating physicians. With new technologies such as cell phones and e-mail in common use, it is important to determine how they can be best used and how they should be integrated into the flow

  2. 77 FR 56212 - Federal Acquisition Regulation; Information Collection; Use of Data Universal Numbering System...

    Science.gov (United States)

    2012-09-12

    ...; Information Collection; Use of Data Universal Numbering System (DUNS) as Primary Contractor Identification... ``Information Collection 9000-0145, Use of Data Universal Numbering System (DUNS) as Primary Contractor... extension of a previously approved information collection requirement concerning use of the Data Universal...

  3. Innovation System Reform in Indonesia and Vietnam: A new Role for Universities?

    Directory of Open Access Journals (Sweden)

    Erik Baark

    2016-07-01

    Full Text Available This paper introduces the importance of the role of universities in emerging economies such as Indonesia and Vietnam, underscoring the need for universities to contribute more extensively to the dynamic development of innovation systems. The theoretical approach is a functional analysis of innovation systems, identifying essential issues that call for recognition among policymakers and in society generally. Innovation systems in Indonesia and Vietnam share some weaknesses, particularly in comparison with innovation systems in more advanced countries. There is limited ability to mobilize the resources required for innovation, as the investment in research and development as percentage of GDP is relatively low and dominated by public funding with little contribution from private sources. Financial regulation for universities seriously hampers the development of university–industry linkages. It is essential that universities gain more autonomy in order to move beyond their current role in training of skilled human resources to providers of innovation.

  4. The Impact of Gender on the Quality and Content of E-Mail Advice Professors Give to Students Applying to Graduate School

    Science.gov (United States)

    Steinpreis, Rhea E.; Anders, Katie A.; Riley, Monica G.; Ritzke, Dawn M.; McDonald, Theodore W.

    The purpose of this study was to determine if gender plays a role in the quality and quantity of the advice given to undergraduates about applying to graduate school. Four hundred male and female psychologists who listed a university address and e-mail address in the 1997 Directory of the American Psychological Association were sent an e-mail inquiry from a pseudostudent (either Theresa or Brian Miller). In the first e-mail, the pseudostudent asked if the subjects would be willing to look at his or her GRE scores and grade point average (GPA) for the purpose of providing advice about his or her chances of getting into the graduate program at the subject's school. Two hundred forty subjects consented to examine the figures, nearly equally split between males and females. Subjects were then sent the GPA and scores of an outstanding, average, or poor applicant. The results indicated that female faculty were significantly more likely to consent to examine the data of a female pseudostudent and male faculty were significantly more likely to consent to examine the data of a male pseudostudent. However, once the faculty member agreed to offer advice, gender had no impact on the length or quality of advice given to the pseudostudent, and advice became a function of the pseudostudent's academic credentials. Furthermore, while male and female subjects were equally likely to encourage, discourage, or recant on their offer to give feedback, male subjects were more likely to refuse to review the data and female subjects were more likely to offer a neutral response to the data. The results are discussed in terms of the difficulty students face in finding adequate information about pursuing a graduate education. These problems may be magnified for female students because there are fewer female faculty available to serve as mentors.

  5. E-mail as the Appropriate Method of Communication for the Decision-Maker When Soliciting Advice for an Intellective Decision Task.

    Science.gov (United States)

    Prahl, Andrew; Dexter, Franklin; Swol, Lyn Van; Braun, Michael T; Epstein, Richard H

    2015-09-01

    For many problems in operating room and anesthesia group management, there are tasks with optimal decisions, and yet experienced personnel tend to make decisions that are worse or no better than random chance. Such decisions include staff scheduling, case scheduling, moving cases among operating rooms, and choosing patient arrival times. In such settings, operating room management leadership decision-making should typically be autocratic rather than participative. Autocratic-style decision-making calls for managers to solicit and consider feedback from stakeholders in the decision outcome but to make the decision themselves using their expert knowledge and the facts received. For this to be effective, often the manager will obtain expert advice from outside the organization (e.g., health system). In this narrative review, we evaluate the advantages and disadvantages of using prompt asynchronous written communication (i.e., e-mail) as a communication channel for such interaction between a decision-maker (manager) and advisor. A detailed Appendix (Supplemental Digital Content, http://links.lww.com/AA/B72) lists each observational and experimental result. We find that the current ubiquitous role of e-mail for such communication is appropriate. Its benefits include improved time management via asynchronicity, low cognitive load (e.g., relative to Web conferencing), the ability to hide undesirable and irrelevant cues (e.g., physical appearance), the appropriateness of adding desirable cues (e.g., titles and degrees), the opportunity to provide written expression of confidence, and the ability for the advisor to demonstrate the answer for the decision-maker. Given that the manager is e-mailing an advisor whose competence the manager trusts, it is unnecessary to use a richer communication channel to develop trust. Finally, many of the limitations of e-mail can be rectified through training. We expect that decades from now, e-mail (i.e., asynchronous writing) between an

  6. Iterative design and field trial of an aphasia-friendly email tool

    NARCIS (Netherlands)

    Al Mahmud, A.; Martens, J.B.O.S.

    2015-01-01

    In this article, we describe the iterative design and field trial of Amail, an email client specifically designed for people with aphasia who have problems expressing themselves verbally. We conducted a 3-month study with eight persons with aphasia to better understand how people with aphasia could

  7. Using Web Content Management Systems in University E-Commerce Courses

    Directory of Open Access Journals (Sweden)

    Sanja Mohorovičić

    2010-03-01

    Full Text Available The aim of this paper is to elaborate and present the advantages of using Web Content Management Systems (primarily Joomla! in e-commerce courses at universities. E-commerce is taught to many non-IT students who possess various previous knowledge in IT, which can often cause problems. Content Management Systems can circumvent those problems by avoiding the need for teaching HTML, PHP, SQL etc, and enabling non-IT students to focus on content management which is crucial for e-commerce. Characteristics of Web Content Management Systems are explained, followed by brief explanation of Joomla!. Examples are presented, along with experiences from the university.

  8. Impact of an automated email notification system for results of tests pending at discharge: a cluster-randomized controlled trial.

    Science.gov (United States)

    Dalal, Anuj K; Roy, Christopher L; Poon, Eric G; Williams, Deborah H; Nolido, Nyryan; Yoon, Cathy; Budris, Jonas; Gandhi, Tejal; Bates, David W; Schnipper, Jeffrey L

    2014-01-01

    Physician awareness of the results of tests pending at discharge (TPADs) is poor. We developed an automated system that notifies responsible physicians of TPAD results via secure, network email. We sought to evaluate the impact of this system on self-reported awareness of TPAD results by responsible physicians, a necessary intermediary step to improve management of TPAD results. We conducted a cluster-randomized controlled trial at a major hospital affiliated with an integrated healthcare delivery network in Boston, Massachusetts. Adult patients with TPADs who were discharged from inpatient general medicine and cardiology services were assigned to the intervention or usual care arm if their inpatient attending physician and primary care physician (PCP) were both randomized to the same study arm. Patients of physicians randomized to discordant study arms were excluded. We surveyed these physicians 72 h after all TPAD results were finalized. The primary outcome was awareness of TPAD results by attending physicians. Secondary outcomes included awareness of TPAD results by PCPs, awareness of actionable TPAD results, and provider satisfaction. We analyzed data on 441 patients. We sent 441 surveys to attending physicians and 353 surveys to PCPs and received 275 and 152 responses from 83 different attending physicians and 112 different PCPs, respectively (attending physician survey response rate of 63%). Intervention attending physicians and PCPs were significantly more aware of TPAD results (76% vs 38%, adjusted/clustered OR 6.30 (95% CI 3.02 to 13.16), pemail notification represents a promising strategy for managing TPAD results, potentially mitigating an unresolved patient safety concern. ClinicalTrials.gov (NCT01153451).

  9. An explanatory study of the use of e-mail investor communication by South African listed companies

    Directory of Open Access Journals (Sweden)

    Roelof Baard

    2016-12-01

    Objectives: The objectives of the study were to measure the responsiveness, timeliness and relevance of companies’ responses to e-mail requests, and to test for the determinants (size, market-to-book ratio, profitability, leverage and liquidity thereof. Method: The mystery investor approach and a content analysis were used to study the e-mail handling performance of companies. The associations between company-specific characteristics were statistically tested. Results: It was found that the e-mail handling performance of companies in this study was poor compared with previous studies. Significant relationships between company size and responsiveness and relevance, and between market-to-book ratio and relevance were reported, as well as between the contact method used to request information and relevance and the use of social media and timeliness. Conclusion: Specific areas where companies could improve their investor communications were identified. The need for further research was discussed to explain some of the relationships found, as well as those not found, in contrast to what was expected. Future research is warranted to examine the relationship between the e-mail handling performance of companies and information asymmetry and the cost of equity of companies.

  10. A new compact AMS system at Peking University

    International Nuclear Information System (INIS)

    Liu Kexin; Ding Xingfang; Fu Dongpo; Pan Yan; Wu Xiaohong; Guo Zhiyu; Zhou Liping

    2007-01-01

    A compact 14 C AMS system manufactured by the National Electrostatics Corporation has been installed at the Institute of Heavy Ion Physics, Peking University. The system is based on a Model 1.5SDH-1 Pelletron accelerator with a maximum terminal voltage of 0.6 MV. The 14 C measurement accuracy with this system is better than 0.4% and the machine background is lower than 0.03 pMC. The performance of the new system, especially the background and the δ 13 C measurements, is presented. Several important applications are also described briefly

  11. Deception Detection: Study of Information Manipulation Through Electronic Identity Theft - Email Forgery in the U.S. Military

    Science.gov (United States)

    2002-12-01

    address to anything they want. Another form of email forgery is to create a bogus hotmail , yahoo or some other commercial source email account with...from a commercial source such as yahoo, hotmail , att.net or some other commercial resource and disguised to look as if it originated from the AFIT

  12. An evaluation of the role of email in promoting science investigative skills in primary rural schools in England

    Science.gov (United States)

    Jarvis, Tina; Hargreaves, Linda; Comber, Chris

    1997-06-01

    This project evaluated the effect of collaboration via email links on the quality of 10-11 year old students’ science investigative skills in six primary rural schools. After a joint planning meeting, sixty children collected, identified and shared information via email about moths in their area, in order to produce a joint booklet. All email traffic was monitored throughout the project. Indepth structured observations and interviews were carried out at the schools. Children completed daily diaries. The children demonstrated a variety of science skills, particularly observation and recording. Their competence and confidence in using computers, handling email and in manipulating a data base developed during the project. The project identified a number of important issues relating to teacher inservice training requirements, the importance of a suitable progression of IT experiences throughout the school, development in cooperative groupwork for children, and software design.

  13. The Impact of ICT on Work-Life Experiences among University Teaching Assistants

    Science.gov (United States)

    Osterlund, Katherine; Robson, Karen

    2009-01-01

    Email is now commonplace in the university environment, but little research has addressed the impact of this technology on the work-life experiences of Teaching Assistants (TAs). These workers are of interest as they are typically responsible for most day-to-day, routine interaction with undergraduates, for ensuring students understand lectures…

  14. Intelligent tutoring system of the university department

    Directory of Open Access Journals (Sweden)

    A. S. Aleshchenko

    2016-01-01

    Full Text Available The aim of the research is intelligent tutoring system for planning and development of individual learning programs for students. One of the important components of modern training programs is the individual practice programs that are formed from the first course and built up in the process of learning in the subsequent courses. Each individual practice program is formed on the basis of the Working program of practice for a specific group. At later practice stages planning and adjustment of the individual program are worked out for a particular student.The agent-oriented approach for the planning of individual learning programs is used for the formation of individual practice program. Agents of the intelligent learning systems are created according to the requirements of service-oriented architecture. To apply knowledge there used an integrated approach to represent knowledge.As a result of research, the authors propose the architecture of intelligent educational systems of the University Department, using the repository of learning objects, telecommunication systems and such agents as: the learner, the assessment of the student’s knowledge, the formation of individual programs for learning, the personal learning environment, the methodical support, the businesses. The authors demonstrate the possibility for the formation of individual practice programs using an agent of the methodical support.Application of the approaches and technologies which were considered in the article will allow to solve problems of the formation of individual practice programs. The use of such applications will extend the possibilities of intelligent tutoring systems of the University departments.

  15. Potential Limitations of E-mail and Text Messaging in Improving Adherence in Glaucoma and Ocular Hypertension.

    Science.gov (United States)

    Saeedi, Osamah J; Luzuriaga, Christine; Ellish, Nancy; Robin, Alan

    2015-01-01

    To determine how receptive patients are to the use of e-mail and text message reminders for appointments and medications. We conducted a consecutive cross-sectional survey of eligible patients with glaucoma or ocular hypertension at a private glaucoma subspecialty practice with 3 locations from February 2011 to January 2012. Main outcome measures were answers to survey questions regarding how receptive patients are to e-mail and text messaging reminders for appointments and medications. Of 989 patients, 404 (40.8%) patients reported that e-mail reminders would help remember appointments and 185 (18.7%) reported that they would help for medications. Among those with access to text messaging, 280 (68.9%) reported text messaging would help them remember appointments and 193 (47.5%) reported it would help with medications. Patients who reported e-mail would help them remember medications were more likely to live in an urban location [P=0.05, odds ratio (OR)=1.84], check the internet at least daily (P≤0.001, OR=1.04), check e-mail when not at home or the office (P=0.02, OR=1.62), and know how to open attachments (P=0.03, OR=1.87). Patients who reported that text messaging would help them remember their medications were more likely to be 40 or less (P≤0.001, OR=8.54) and African American (Ptext messaging reminders currently may have a limited utility in improving adherence in the general glaucoma population but may be useful in younger patients with glaucoma.

  16. Mobile Attendance Checking System on Android Platform for Kazakhstani University

    Science.gov (United States)

    Saparkhojayev, N.; Shakhov, E.; Mailybayev, Y.

    2016-04-01

    In the 21st century-the century of Information Technology, it is difficult to imagine life without any gadgets: phones, tablets, computers, laptops, and so on. Today, smartphones and tablets are becoming popular, and thus their operating systems become popular too. Android is designed for low-power devices that run on battery power at full capacity, using all of its services, such as cameras, lights, GPS navigation, Wi-Fi, etc. In Kazakhstani universities, the process of checking students’ attendance is one of the important issues, because final grade evaluation of students is based on their total number of appearances and their grades during the whole semester. This raises the question of having some tool to control students’ attendance. There are many possible ways of controlling attendance: there are many examples when universities prefer to control attendance by the use of paper sheet, and some universities prefer to use two-stage way of controlling attendance: firstly, teachers and professors use paper sheet for checking students’ attendance and after this, they fill out these information into a system manually. However, this is not an efficient way since there will be spent much of time for calling students names and putting marks like “presence” or “absence” if the class is a lecture class, and in this class at least 5 groups are presented. Furthermore, some students may call his/her friend as “presence” nevertheless to the fact that this student is currently absent. After taking into consideration all these issues and the fact that many gadgets use Android platform, authors of the following research paper decided to create a mobile system that makes easier to check students’ attendance automatically, and this system is implemented in Almaty Management University, Kazakhstan. The system is based on Android platform, and in this paper, details of this system are presented.

  17. A universal DNA-based protein detection system.

    Science.gov (United States)

    Tran, Thua N N; Cui, Jinhui; Hartman, Mark R; Peng, Songming; Funabashi, Hisakage; Duan, Faping; Yang, Dayong; March, John C; Lis, John T; Cui, Haixin; Luo, Dan

    2013-09-25

    Protein immune detection requires secondary antibodies which must be carefully selected in order to avoid interspecies cross-reactivity, and is therefore restricted by the limited availability of primary/secondary antibody pairs. Here we present a versatile DNA-based protein detection system using a universal adapter to interface between IgG antibodies and DNA-modified reporter molecules. As a demonstration of this capability, we successfully used DNA nano-barcodes, quantum dots, and horseradish peroxidase enzyme to detect multiple proteins using our DNA-based labeling system. Our system not only eliminates secondary antibodies but also serves as a novel method platform for protein detection with modularity, high capacity, and multiplexed capability.

  18. Scientific and Ethical Reflections on Academic Corruption in Universities: On the Science Research Evaluation System in China's Universities

    Science.gov (United States)

    Xiaochun, Wu; Dan, Jia

    2007-01-01

    A study of the science research activities in China's institutions of higher learning in recent years indicates that there is a major connection between the current instances of corruption in scientific research at colleges and universities and the evaluations system for scientific research implemented at many of the colleges and universities.…

  19. Designing Email Tasks for the Business English Classroom: Implications from a Study of Hong Kong's Key Industries

    Science.gov (United States)

    Evans, Stephen

    2012-01-01

    Email has revolutionised the way in which professionals work and companies operate, and yet has received surprisingly little scholarly attention in English for Specific Purposes and has an unexpectedly muted presence in many Business English textbooks. The dearth of research into email use in globalised business settings may be one of the factors…

  20. University multi-user facility survey-2010.

    Science.gov (United States)

    Riley, Melissa B

    2011-12-01

    Multi-user facilities serve as a resource for many universities. In 2010, a survey was conducted investigating possible changes and successful characteristics of multi-user facilities, as well as identifying problems in facilities. Over 300 surveys were e-mailed to persons identified from university websites as being involved with multi-user facilities. Complete responses were received from 36 facilities with an average of 20 years of operation. Facilities were associated with specific departments (22%), colleges (22%), and university research centers (8.3%) or were not affiliated with any department or college within the university (47%). The five most important factors to succeed as a multi-user facility were: 1) maintaining an experienced, professional staff in an open atmosphere; 2) university-level support providing partial funding; 3) broad client base; 4) instrument training programs; and 5) an effective leader and engaged strategic advisory group. The most significant problems were: 1) inadequate university financial support and commitment; 2) problems recovering full service costs from university subsidies and user fees; 3) availability of funds to repair and upgrade equipment; 4) inability to retain highly qualified staff; and 5) unqualified users dirtying/damaging equipment. Further information related to these issues and to fee structure was solicited. Overall, there appeared to be a decline in university support for facilities and more emphasis on securing income by serving clients outside of the institution and by obtaining grants from entities outside of the university.

  1. PreciseMail anti-spam gateway allows users more control over spam definitions; unwanted email is eliminated with no false positives

    CERN Multimedia

    ten Bruggencate, J

    2003-01-01

    "PreciseMail Anti-Spam Gateway uses a combination of proven heuristic (rules-based) and artificial intelligence technologies that eliminates unwanted spam e-mail at an Internet gateway without filtering critical e-mail messages. Its highly effective filtering engine identifies spam and allows multiple levels of tuning and customization to meet each user's personal e-mail spam filtering requirements" (1 page).

  2. Information Systems in Western Australian Universities

    Directory of Open Access Journals (Sweden)

    Craig Standing

    2006-11-01

    Full Text Available Systems (IS teaching and research within Western Australia (WA. A brief overview of the WA environment is followed by an exploration of teaching and research in the four main Universities. This is examined against the framework for the study and, in particular, the impact of social processes (Ariav et al, 1987; Klein et al, 1991 and local contingencies (Culnan et al, 1993; Checkland and Howell, 1998, which are found to be of relevance to historic developments.

  3. Evaluation of information technology impact on effective internal control in the University system

    Energy Technology Data Exchange (ETDEWEB)

    Sanusi Fasilat, A., E-mail: Fasilat17@gmail.com; Hassan, Haslinda, E-mail: lynn@uum.edu.my [School of Accountancy, College of Business, Universiti Utara Malaysia, Sintok, Kedah (Malaysia)

    2015-12-11

    Information Technology (IT) plays a key role in internal control system in various organizations in terms of maintaining records and other internal services. Internal control system is defined as an efficient control procedures set up by firm to safeguard resources and to assure the reliability and accuracy of both financial and non-financial records in line with applicable governance and procedure to acquire the established goal and objectives. This paper focuses on the impact of IT on internal control system in the Nigerian universities. Data are collected from three different universities via questionnaire. Descriptive statistics is used to analyze the data; Chi-square is performed to test the hypothesis. The results of the hypothesis showed that IT has a positive relationship with the effective internal control activities in the University system. It is concluded that the adoption of IT will significantly improve the effectiveness of the internal control system operations in the University in terms of quality service delivery.

  4. Evaluation of information technology impact on effective internal control in the University system

    International Nuclear Information System (INIS)

    Sanusi Fasilat, A.; Hassan, Haslinda

    2015-01-01

    Information Technology (IT) plays a key role in internal control system in various organizations in terms of maintaining records and other internal services. Internal control system is defined as an efficient control procedures set up by firm to safeguard resources and to assure the reliability and accuracy of both financial and non-financial records in line with applicable governance and procedure to acquire the established goal and objectives. This paper focuses on the impact of IT on internal control system in the Nigerian universities. Data are collected from three different universities via questionnaire. Descriptive statistics is used to analyze the data; Chi-square is performed to test the hypothesis. The results of the hypothesis showed that IT has a positive relationship with the effective internal control activities in the University system. It is concluded that the adoption of IT will significantly improve the effectiveness of the internal control system operations in the University in terms of quality service delivery

  5. Evaluation of information technology impact on effective internal control in the University system

    Science.gov (United States)

    Sanusi Fasilat, A.; Hassan, Haslinda

    2015-12-01

    Information Technology (IT) plays a key role in internal control system in various organizations in terms of maintaining records and other internal services. Internal control system is defined as an efficient control procedures set up by firm to safeguard resources and to assure the reliability and accuracy of both financial and non-financial records in line with applicable governance and procedure to acquire the established goal and objectives. This paper focuses on the impact of IT on internal control system in the Nigerian universities. Data are collected from three different universities via questionnaire. Descriptive statistics is used to analyze the data; Chi-square is performed to test the hypothesis. The results of the hypothesis showed that IT has a positive relationship with the effective internal control activities in the University system. It is concluded that the adoption of IT will significantly improve the effectiveness of the internal control system operations in the University in terms of quality service delivery.

  6. Faculty and Student Expectations and Perceptions of E-mail Communication in a Campus and Distance Doctor of Pharmacy Program

    Science.gov (United States)

    Turner, Paul D.; Monaghan, Michael S.; Walters, Ryan W.; Merkel, Jennifer J.; Lipschultz, Jeremy H.; Lenz, Thomas L.

    2010-01-01

    Objective To examine faculty members' and students' expectations and perceptions of e-mail communication in a dual pathway pharmacy program. Methods Three parallel survey instruments were administered to campus students, distance students, and faculty members, respectively. Focus groups with students and faculty were conducted. Results Faculty members perceived themselves as more accessible and approachable by e-mail than either group of students did. Campus students expected a shorter faculty response time to e-mail and for faculty members to be more available than did distance students. Conclusion E-mail is an effective means of computer-mediated communication between faculty members and students and can be used to promote a sense of community and inclusiveness (ie, immediacy), especially with distant students. PMID:21436932

  7. Predictive factors of job satisfaction among nurses in therapeutic-educational centers of Guilan University of Medical Science

    Directory of Open Access Journals (Sweden)

    Nastaran Mirfarhadi

    2014-11-01

    satisfaction in job environment, using a comprehensive program by organization managers and planners seems necessary.* Corresponding Author: Rasht, Guilan University of Medical Sciences, Faculty of Nursing and Midwifery.Email: Saghi_m80@yahoo.com

  8. A National Assessment of Colleges and University School Health Education Methods Courses

    Science.gov (United States)

    Fisher, Christine M.; Price, James H.; Telljohann, Susan K.; Dake, Joseph A.

    2015-01-01

    Background: Across the United States, school health education programs provide a wide variety of knowledge and skills to their students. There are currently no guidelines for school health methods courses. Methods: Using a 2-wave mailing followed by a third wave e-mail reminder, a final population of 226 university school health methods…

  9. Primary health care and public health: foundations of universal health systems.

    Science.gov (United States)

    White, Franklin

    2015-01-01

    The aim of this review is to advocate for more integrated and universally accessible health systems, built on a foundation of primary health care and public health. The perspective outlined identified health systems as the frame of reference, clarified terminology and examined complementary perspectives on health. It explored the prospects for universal and integrated health systems from a global perspective, the role of healthy public policy in achieving population health and the value of the social-ecological model in guiding how best to align the components of an integrated health service. The importance of an ethical private sector in partnership with the public sector is recognized. Most health systems around the world, still heavily focused on illness, are doing relatively little to optimize health and minimize illness burdens, especially for vulnerable groups. This failure to improve the underlying conditions for health is compounded by insufficient allocation of resources to address priority needs with equity (universality, accessibility and affordability). Finally, public health and primary health care are the cornerstones of sustainable health systems, and this should be reflected in the health policies and professional education systems of all nations wishing to achieve a health system that is effective, equitable, efficient and affordable. © 2015 S. Karger AG, Basel.

  10. Multi criteria evaluation for universal soil loss equation based on geographic information system

    Science.gov (United States)

    Purwaamijaya, I. M.

    2018-05-01

    The purpose of this research were to produce(l) a conceptual, functional model designed and implementation for universal soil loss equation (usle), (2) standard operational procedure for multi criteria evaluation of universal soil loss equation (usle) using geographic information system, (3) overlay land cover, slope, soil and rain fall layers to gain universal soil loss equation (usle) using multi criteria evaluation, (4) thematic map of universal soil loss equation (usle) in watershed, (5) attribute table of universal soil loss equation (usle) in watershed. Descriptive and formal correlation methods are used for this research. Cikapundung Watershed, Bandung, West Java, Indonesia was study location. This research was conducted on January 2016 to May 2016. A spatial analysis is used to superimposed land cover, slope, soil and rain layers become universal soil loss equation (usle). Multi criteria evaluation for universal soil loss equation (usle) using geographic information system could be used for conservation program.

  11. Business communication across three European cultures: A contrastive analysis of British, Spanish and Polish email writing

    Directory of Open Access Journals (Sweden)

    Rosa Giménez-Moreno

    2013-10-01

    Full Text Available Today the most international written mode of communication within the business world is electronic correspondence. As the introductory section explains, diverse analyses of emails written in different cultures have been carried out revealing interesting differences and similarities in their discourse features and rhetorical strategies. However, a comparative examination of business emails from representative European cultures such as British (Northern Europe, Spanish (Southern Europe and Polish (Eastern Europe has not been undertaken so far. With this aim, a corpus of over 100 emails of response to business requests written in English by companies set up in these three cultures has been compiled and analysed. The main research targets are to observe the main parameters of variation across these cultures, the existent variation regarding the prototypical move structure and how register variation fluctuates depending on each culture. The results will indicate that across these cultures the move structure of this genre is more complex than current templates and existing published materials show. The study also demonstrates that, while there is a tendency to standardize email correspondence at a European level, there are certain parameters of variation that may help language learners and users to conform their messages depending on the recipient’s culture.

  12. Challenges of Utilizing E-Learning Systems in Public Universities in Jordan

    Directory of Open Access Journals (Sweden)

    Muhannad Anwar Al-Shboul

    2010-06-01

    Full Text Available This research paper lists and discusses major challenges and barriers that may face faculty members at the public universities in Jordan in employing e-Learning systems authoring tools in their instructions. It also proposes several suggestions for the administrators in public universities in Jordan for what they could do to improve the utilization of e-Learning authoring tools at their campuses. E-Learning systems authoring tools allow instructors to easily create and deliver their e-contents and e-lectures. Furthermore, online course materials which uploaded by using such authoring tools could be viewed by any popular web browser system.

  13. Promotion bureau warehouse system design. Case study in University of AA

    Science.gov (United States)

    Parwati, N.; Qibtiyah, M.

    2017-12-01

    The warehouse becomes one of the important parts in an industry. By having a good warehousing system, an industry can improve the effectiveness of its performance, so that profits for the company can continue to increase. Meanwhile, if it has a poorly organized warehouse system, it is feared there will be a decrease in the level of effectiveness of the industry itself. In this research, the object was warehousing system in promotion bureau of University AA. To improve the effectiveness of warehousing system, warehouse layout design is done by specifying categories of goods based on the flow of goods in and out of warehouse with ABC analysis method. In addition, the design of information systems to assist in controlling the system to support all the demand for every burreau and department in the university.

  14. Impact of predictive scoring model and e-mail messages on African American blood donors.

    Science.gov (United States)

    Bachegowda, Lohith S; Timm, Brad; Dasgupta, Pinaki; Hillyer, Christopher D; Kessler, Debra; Rebosa, Mark; France, Christopher R; Shaz, Beth H

    2017-06-01

    Expanding the African American (AA) donor pool is critical to sustain transfusion support for sickle cell disease patients. The aims were to: 1) apply cognitive computing on donation related metrics to develop a predictive model that effectively identifies repeat AA donors, 2) determine whether a single e-mail communication could improve AA donor retention and compare retention results on higher versus lower predictive score donors, and 3) evaluate the effect of e-mail marketing on AA donor retention with culturally versus nonculturally tailored message. Between 2011 and 2012, 30,786 AA donors donated blood at least once on whom predictive repeat donor scores (PRDSs) was generated from donor-related metrics (frequency of donations, duration between donations, age, blood type, and sex). In 2013, 28% (8657/30,786) of 2011 to 2012 donors returned to donate on whom PRDS was validated. Returning blood donors had a higher mean PRDS compared to nonreturning donors (0.649 vs. 0.268; p e-mail pilot, high PRDS (≥0.6) compared to low PRDS (e-mail opening rate (p e-mail, 159% higher presentation rate (p e-mail communication has the potential to increase the efficiency of donor marketing. © 2017 AABB.

  15. Is email a reliable means of contacting authors of previously published papers? A study of the Emergency Medicine Journal for 2001.

    Science.gov (United States)

    O'Leary, F

    2003-07-01

    To determine whether it is possible to contact authors of previously published papers via email. A cross sectional study of the Emergency Medicine Journal for 2001. 118 articles were included in the study. The response rate from those with valid email addresses was 73%. There was no statistical difference between the type of email address used and the address being invalid (p=0.392) or between the type of article and the likelihood of a reply (p=0.197). More responses were obtained from work addresses when compared with Hotmail addresses (86% v 57%, p=0.02). Email is a valid means of contacting authors of previously published articles, particularly within the emergency medicine specialty. A work based email address may be a more valid means of contact than a Hotmail address.

  16. Availability of thermodynamic system with multiple performance parameters based on vector-universal generating function

    International Nuclear Information System (INIS)

    Cai Qi; Shang Yanlong; Chen Lisheng; Zhao Yuguang

    2013-01-01

    Vector-universal generating function was presented to analyze the availability of thermodynamic system with multiple performance parameters. Vector-universal generating function of component's performance was defined, the arithmetic model based on vector-universal generating function was derived for the thermodynamic system, and the calculation method was given for state probability of multi-state component. With the stochastic simulation of the degeneration trend of the multiple factors, the system availability with multiple performance parameters was obtained under composite factors. It is shown by an example that the results of the availability obtained by the binary availability analysis method are somewhat conservative, and the results considering parameter failure based on vector-universal generating function reflect the operation characteristics of the thermodynamic system better. (authors)

  17. The Difficult Transition of the Italian University System: Growth, Underfunding and Reforms

    Science.gov (United States)

    Turri, Matteo

    2016-01-01

    The evolution of Italian universities in terms of growth, economic sustainability and reforms can be interpreted in the light of the élite, mass and universal access categories defined by Martin Trow. The findings from this analysis show that although the number of enrolled students and funding problems propel the Italian university system towards…

  18. Practitioner response to parental need in email consultation : How do they match?

    NARCIS (Netherlands)

    dr. Christa C.C. Nieuwboer

    2014-01-01

    Background. Single session email consultations in web-based parenting support may be used for a variety of reasons. Parents may be looking for information on developmental needs of children, for suggestions to improve their parenting skills, or for referrals to helpful resources. The way the

  19. Going Tobacco-Free on 24 New York City University Campuses: A Public Health Agency's Partnership with a Large Urban Public University System

    Science.gov (United States)

    Bresnahan, Marie P.; Sacks, Rachel; Farley, Shannon M.; Mandel-Ricci, Jenna; Patterson, Ty; Lamberson, Patti

    2016-01-01

    The New York City Department of Health and Mental Hygiene partnered with the nation's largest university system, the City University of New York (CUNY), to provide technical assistance and resources to support the development and implementation of a system-wide tobacco-free policy. This effort formed one component of "Healthy CUNY"--a…

  20. An Affordable Microcomputer Library Information System Developed by Georgetown University.

    Science.gov (United States)

    Broering, Naomi C.

    1984-01-01

    Discusses development of a library information system by Georgetown University Medical Center's Dahlgren Memorial Library; describes its components, including online catalog and OCLC interface, circulation, serials control, acquisitions, networking/interlibrary loans, word processing and mini-Medline system; and discusses user reaction, staff…

  1. Healthy universities: an example of a whole-system health-promoting setting.

    Science.gov (United States)

    Newton, Joanne; Dooris, Mark; Wills, Jane

    2016-03-01

    The health-promoting settings approach is well established in health promotion, with organisational settings being understood as complex systems able to support human wellbeing and flourishing. Despite the reach and evident importance of higher education as a sector, 'healthy universities' has not received high-level international leadership comparable to many other settings programmes. This study explores how the concept of a healthy university is operationalised in two case study universities. Data collection methods included documentary analysis, observation field notes and semi-structured interviews with staff and students. Staff and students understood the characteristics of a healthy university to pertain to management processes relating to communication and to a respectful organisational ethos. Enhancers of health and wellbeing were feeling valued, being listened to, having skilled and supportive line managers and having a positive physical environment. Inhibitors of health and wellbeing were having a sense of powerlessness and a lack of care and concern. The concept of the healthy university has been slow to be adopted in contrast to initiatives such as healthy schools. In addition to challenges relating to lack of theorisation, paucity of evidence and difficulties in capturing the added value of whole-system working, this study suggests that this may be due to both their complex organisational structure and the diverse goals of higher education, which do not automatically privilege health and wellbeing. It also points to the need for a whole-university approach that pays attention to the complex interactions and interconnections between component parts and highlights how the organisation can function effectively as a social system. © The Author(s) 2015.

  2. WASP (Write a Scientific Paper): Open access unsolicited emails for scholarly work - Young and senior researchers perspectives.

    Science.gov (United States)

    Cuschieri, Sarah; Grech, Victor

    2018-04-20

    The increasing demand on academics and researchers to publish has led to the development of fake journals (also known as predatory journals). Such journals lack peer review and precipitate unfair criticism toward legitimate open access journals. Predatory journals tend to bombard a researcher's mailbox on a daily basis, inviting authors to submit a review/manuscript/opinion/short case to their journal while promising expedited publication - against a fee. This study assessed the unsolicited emails received over the period of November 2017 by a young and by a senior researcher. The young researcher received a substantially higher amount of emails (n = 101) compared to the senior researcher (n = 23). The article processing costs for solicited journals received, ranged between $49 and $3019. These journals are almost all only indexed in Google Scholar and do not display any meaningful journal metrics. Furthermore, the majority of the unsolicited emails were not relevant to the researcher's field of study. Therefore authors and readers alike should evaluate emails received with regard to journal legitimacy prior to submission of work to possibly predatory journals. Copyright © 2018 Elsevier B.V. All rights reserved.

  3. Human Communication Dynamics in Digital Footsteps: A Study of the Agreement between Self-Reported Ties and Email Networks

    Science.gov (United States)

    Wuchty, Stefan; Uzzi, Brian

    2011-01-01

    Digital communication data has created opportunities to advance the knowledge of human dynamics in many areas, including national security, behavioral health, and consumerism. While digital data uniquely captures the totality of a person's communication, past research consistently shows that a subset of contacts makes up a person's “social network” of unique resource providers. To address this gap, we analyzed the correspondence between self-reported social network data and email communication data with the objective of identifying the dynamics in e-communication that correlate with a person's perception of a significant network tie. First, we examined the predictive utility of three popular methods to derive social network data from email data based on volume and reciprocity of bilateral email exchanges. Second, we observed differences in the response dynamics along self-reported ties, allowing us to introduce and test a new method that incorporates time-resolved exchange data. Using a range of robustness checks for measurement and misreporting errors in self-report and email data, we find that the methods have similar predictive utility. Although e-communication has lowered communication costs with large numbers of persons, and potentially extended our number of, and reach to contacts, our case results suggest that underlying behavioral patterns indicative of friendship or professional contacts continue to operate in a classical fashion in email interactions. PMID:22114665

  4. Human communication dynamics in digital footsteps: a study of the agreement between self-reported ties and email networks.

    Directory of Open Access Journals (Sweden)

    Stefan Wuchty

    Full Text Available Digital communication data has created opportunities to advance the knowledge of human dynamics in many areas, including national security, behavioral health, and consumerism. While digital data uniquely captures the totality of a person's communication, past research consistently shows that a subset of contacts makes up a person's "social network" of unique resource providers. To address this gap, we analyzed the correspondence between self-reported social network data and email communication data with the objective of identifying the dynamics in e-communication that correlate with a person's perception of a significant network tie. First, we examined the predictive utility of three popular methods to derive social network data from email data based on volume and reciprocity of bilateral email exchanges. Second, we observed differences in the response dynamics along self-reported ties, allowing us to introduce and test a new method that incorporates time-resolved exchange data. Using a range of robustness checks for measurement and misreporting errors in self-report and email data, we find that the methods have similar predictive utility. Although e-communication has lowered communication costs with large numbers of persons, and potentially extended our number of, and reach to contacts, our case results suggest that underlying behavioral patterns indicative of friendship or professional contacts continue to operate in a classical fashion in email interactions.

  5. Human communication dynamics in digital footsteps: a study of the agreement between self-reported ties and email networks.

    Science.gov (United States)

    Wuchty, Stefan; Uzzi, Brian

    2011-01-01

    Digital communication data has created opportunities to advance the knowledge of human dynamics in many areas, including national security, behavioral health, and consumerism. While digital data uniquely captures the totality of a person's communication, past research consistently shows that a subset of contacts makes up a person's "social network" of unique resource providers. To address this gap, we analyzed the correspondence between self-reported social network data and email communication data with the objective of identifying the dynamics in e-communication that correlate with a person's perception of a significant network tie. First, we examined the predictive utility of three popular methods to derive social network data from email data based on volume and reciprocity of bilateral email exchanges. Second, we observed differences in the response dynamics along self-reported ties, allowing us to introduce and test a new method that incorporates time-resolved exchange data. Using a range of robustness checks for measurement and misreporting errors in self-report and email data, we find that the methods have similar predictive utility. Although e-communication has lowered communication costs with large numbers of persons, and potentially extended our number of, and reach to contacts, our case results suggest that underlying behavioral patterns indicative of friendship or professional contacts continue to operate in a classical fashion in email interactions.

  6. The Incidence and Types of Occupational Role Stress among University Research Administrators

    Science.gov (United States)

    Katsapis, Christine C. A.

    2012-01-01

    This study explored the types of stressors prevalent in the self-reports of university research administrators (URAs) and examined whether or not the degree or type of role stress was influenced by: a) the affiliation of their office unit within their institution, or b) their type. Randomly selected members of NCURA were invited via e-mail to…

  7. Academic entrepreneurship in a medical university: A system dynamics approach

    Directory of Open Access Journals (Sweden)

    Tofighi Sharam

    2017-01-01

    Full Text Available Academic entrepreneurship is a dynamic field which is growing after the second academic revolution that added entrepreneurial mission as the Third Mission of universities. In this sense, dynamics of this phenomenon is a suitable field of study and provides fruitful insights for both theory and practice. Thus, in this research, system dynamics approach is used to scrutinize academic entrepreneurship. The main question of this research is 'how academic entrepreneurship might evolve in a medical university of a developing country?' Therefore, Cross Impact Analysis method is used to examine the system behavior. In this study, the main attributes are adapted from a recent study by Salamzadeh et al. (2013a. Then, some policy variables are proposed and their effects on the model were shown. Findings show that although entrepreneurial ecosystem is growing in the country, still there are problems to be taken into account in order to improve the entrepreneurship in university.

  8. Institutional Evaluation in Poles of the Open University System of Brazil

    Directory of Open Access Journals (Sweden)

    Alexciano de Sousa Martins

    2018-03-01

    Full Text Available The study wanted to know the institutional evaluation in poles of distance education, of the Open University of Brazil (UAB system, analyzing the poles of the State of Ceará. The UAB system of the Brazilian Ministry of Education makes it possible to offer courses of higher level agreements with public universities. Ceará counts on UAB poles, since 2006, that form teachers and other professionals, even in regions lacking public higher education. The objective of this study was to discuss the importance of the institutional evaluation in the poles of the Open University of Brazil program through an exploratory and descriptive field research, showing that the institutional evaluation at the poles is minimal and out of line with the legislation in force. Suggestions on how to develop the evaluative practice.

  9. An Evaluation of the Informedia Digital Video Library System at the Open University.

    Science.gov (United States)

    Kukulska-Hulme, Agnes; Van der Zwan, Robert; DiPaolo, Terry; Evers, Vanessa; Clarke, Sarah

    1999-01-01

    Reports on an Open University evaluation study of the Informedia Digital Video Library System developed at Carnegie Mellon University (CMU). Findings indicate that there is definite potential for using the system, provided that certain modifications can be made. Results also confirm findings of the Informedia team at CMU that the content of video…

  10. Acquisition of an Advanced Thermal Analysis andImaging System for Integration with Interdisciplinary Researchand Education in Low Density Organic Inorganic Materials

    Science.gov (United States)

    2017-12-02

    Report: Acquisition of an Advanced Thermal Analysis and Imaging System for Integration with Interdisciplinary Research and Education in Low Density...Agreement Number: W911NF-16-1-0475 Organization: University of Texas at El Paso Title: Acquisition of an Advanced Thermal Analysis and Imaging System ...for Integration with Interdisciplinary Research and Education in Low Density Organic-Inorganic Materials Report Term: 0-Other Email: dmisra2

  11. O impacto do e-mail marketing no processo de decisão do consumidor final

    OpenAIRE

    Mouro, Ana Catarina Ruas

    2015-01-01

    Mestrado em Comunicação Cultura e Tecnologias da Informação Esta dissertação recai sobre o tema do E-mail Marketing e sobretudo sobre o impacto que tem junto do consumidor final. Nesta dissertação abordou-se primeiramente o impacto que a internet e o mundo digital teve no marketing. Esta perceção é fundamental para que possamos entender a importância que tem o E-mail Marketing nos dias de hoje e a utilidade que esta ferramenta pode vir a ter se bem utilizada. Foi realizado um estudo ...

  12. E-mail support as an adjunct to cognitive-behavioral group therapy for social anxiety disorder: Impact on dropout and outcome.

    Science.gov (United States)

    Delsignore, Aba; Rufer, Michael; Emmerich, Juliane; Weidt, Steffi; Brühl, Annette Beatrix; Moergeli, Hanspeter

    2016-10-30

    The present study evaluates the impact of semi-individualized e-mail support as an adjunct to cognitive behavioral group therapy (CBGT) for social anxiety disorder (SAD) on dropout and outcome. The effectiveness of additional semi-individualized e-mail support was evaluated for the whole sample and for a subsample of patients at risk of dropping out of therapy. A total of 91 patients with SAD were allocated either to the intervention condition (CBGT with e-mail support), or to the control condition (CBGT without e-mail support). Anxiety symptoms, depression, global symptomatology and life satisfaction were assessed at pretreatment, post-treatment and follow-up (3, 6 and 12 months). From pre-treatment to post-treatment, both groups improved significantly on all symptom measures. Therapy gains were maintained at the 1-year follow-up. Subsample analyses showed that CBGT+e-mail was more effective than CGBT alone in reducing symptom severity among patients missing at least two therapy sessions. Additionally, in this subgroup, those receiving additional e-mail support showed a tendency towards lower dropout rates. Based on the results of this study, semi-individualized e-mail support between sessions seems to enhance the effectiveness of CBGT for SAD patients at risk of dropping out of treatment and should be considered as an additional tool in clinical practice. Copyright © 2016 Elsevier Ireland Ltd. All rights reserved.

  13. EVALUATION OF UTILIZING SERVICE ORIENTED ARCHITECTURE AS A SUITABLE SOLUTION TO ALIGN UNIVERSITY MANAGEMENT INFORMATION SYSTEMS AND LEARNING MANAGEMENT SYSTEMS

    Directory of Open Access Journals (Sweden)

    A. M. RIAD

    2009-10-01

    Full Text Available To help universities achieve their goals, it is important to align managerial functionalities side by side with educational aspects. Universities consume University Management Information Systems (UMIS to handle managerial aspects as they do with Learning Management Systems (LMS to achieve learning objectives. UMIS advances LMS by decades and has reached stable and mature consistency level. LMS is the newly acquired solution in Universities; compared to UMIS, and so adopting LMSs in universities can be achieved via three different deployment approaches. First approach believes in LMS ability to replace UMIS and performing its functionalities. Second approach presents the idea of extending UMIS to include LMS functionalities. Third approach arises from the shortages of the two proposed approaches and present integration between both as the appropriate deployment approach. Service Oriented Architecture (SOA is a design pattern that can be used as a suitable architectural solution to align UMIS and LMS. SOA can be utilized in universities to overcome some of information systems’ challenges like the integration between UMIS and LMS. This paper presents the current situation at Mansoura University; Egypt, presents integration as the most suitable solution, and evaluates three different implementation techniques: Dynamic Query, Stored Procedure, and Web services. Evaluation concludes that though SOA enhanced many different aspects of both UMIS and LMS; and consequently university overall. It is not recommended to adopt SOA via Web services as the building unit of the system, but as the interdisciplinary interface between systems.

  14. ICTexperiences at the University of Extremadura framed within a socioconstructivist and researching model

    Directory of Open Access Journals (Sweden)

    Eloy José LÓPEZ MENESES

    2010-06-01

    Full Text Available The object of study was the use of blogs in different university cour­ses offered by the University of Extremadura under a socioconstructivist and research paradigm. The sample consisted of 136 students enroled in the 2008-2009 academic year at the University of Extremadura, Spain. Data were collected from comments posted by students to the various courses’ blogs, group forum threads and comments sent by students to lecturers via e-mail. Results show that blogs are easy to use, an important technological resource for education, foster the active engagement of stu­dents and become an assessment tool of the practices carried out.

  15. Demand for private healthcare in a universal public healthcare system: empirical evidence from Sri Lanka.

    Science.gov (United States)

    Pallegedara, Asankha; Grimm, Michael

    2017-11-01

    This paper examines healthcare utilization behaviour in Sri Lanka with special emphasis on the choice between costly private and free public healthcare services. We use a data set that combines nationwide household survey data and district level healthcare supply data. Our findings suggest that even with universal public healthcare policy, richer people tend to use private sector healthcare services rather than public services. We also find significant regional and ethnic discrepancies in healthcare access bearing the risk of social tensions if these are further amplified. Latent class analysis shows in addition that the choice between private and public sector healthcare significantly differs between people with and without chronic diseases. We find in particular that chronically ill people rely for their day-to-day care on the public sector, but for their inpatient care they turn more often than non-chronically ill people to the private sector, implying an additional financial burden for the chronically ill. If the observed trend continues it may not only increase further the health-income gradient in Sri Lanka but also undermine the willingness of the middle class to pay taxes to finance public healthcare. © The Author 2017. Published by Oxford University Press in association with The London School of Hygiene and Tropical Medicine. All rights reserved. For permissions, please e-mail: journals.permissions@oup.com.

  16. Closing Remarks of the Workshop OnGlobal University System & E-Learning

    Directory of Open Access Journals (Sweden)

    Ali YAIZCI

    2007-01-01

    Full Text Available The Workshop on Global University System & E-Learning was held on the 19th of October, 2006 at TOBB Economics & Technology University. The workshop attracted around 40 people from the Ministry of Education, Turkish Satellite Corporation (TURKSAT, Anadolu University, and various academic staff from different universities in Ankara. All together, there were 8 presentations each followed by a discussion. Main contributors, their brief CV’s, and the workshop program are included in the preceding part of this document.Here, I would try to put together various important points and remarks made by the speakers according to the order in the program.The first talk was presented by Professor Tapio Varis, Acting President of GUS, about the Global University System (GUS. He started his talk by reviewing the trends of the 21st Century in terms of education and technology. He emphasized the need to humanize the globalization process by adding “solidarity”, “sprit of caring for”, and “sharing with others”. It was stated that, content development, especially for educational purposes, is a difficult issue in achieving this process. Professor Varis, declared “digital literacy” as being a right for all. He mentioned “phonetic alphabet” as a tool to alleviate the problems associated with the communication among different nationalities. He mentioned the need to exchange ideas, opinions and experience to create a successful working environment and stressed the importance of cultural issues such as quality assurance, translation and assessment. He also talked about open courseware, “education for all”, offered by MIT and UNESCO. Finally, Professor Varis summarized the mission of GUS as to offer a global quality education (described as a renaissance education program for developing countries and/or regions by taking into account cultural sensitivities.The second talk was presented by Professor Takeshi Utsumi about the Global Collaborative

  17. A Universal Motor Performance Test System Based on Virtual Instrument

    Directory of Open Access Journals (Sweden)

    Wei Li

    2014-09-01

    Full Text Available With the development of technology universal motors play a more and more important role in daily life and production, they have been used in increasingly wide field and the requirements increase gradually. How to control the speed and monitor the real-time temperature of motors are key issues. The cost of motor testing system based on traditional technology platform is very high in many reasons. In the paper a universal motor performance test system which based on virtual instrument is provided. The system achieves the precise control of the current motor speed and completes the measurement of real-time temperature of motor bearing support in order to realize the testing of general-purpose motor property. Experimental result shows that the system can work stability in controlling the speed and monitoring the real-time temperature. It has advantages that traditional using of SCM cannot match in speed, stability, cost and accuracy aspects. Besides it is easy to expand and reconfigure.

  18. E-mail support as an adjunct to cognitive-behavioral group therapy for social anxiety disorder: Impact on dropout and outcome

    OpenAIRE

    Delsignore, Aba; Rufer, Michael; Emmerich, Juliane; Weidt, Steffi; Brühl, Annette Beatrix; Moergeli, Hanspeter

    2016-01-01

    The present study evaluates the impact of semi-individualized e-mail support as an adjunct to cognitive behavioral group therapy (CBGT) for social anxiety disorder (SAD) on dropout and outcome. The effectiveness of additional semi-individualized e-mail support was evaluated for the whole sample and for a subsample of patients at risk of dropping out of therapy. A total of 91 patients with SAD were allocated either to the intervention condition (CBGT with e-mail support), or to the control con...

  19. ABOUT THE GENERAL CONCEPT OF THE UNIVERSAL STORAGE SYSTEM AND PRACTICE-ORIENTED DATA PROCESSING

    Directory of Open Access Journals (Sweden)

    L. V. Rudikova

    2017-01-01

    Full Text Available Approaches evolution and concept of data accumulation in warehouse and subsequent Data Mining use is perspective due to the fact that, Belarusian segment of the same IT-developments is organizing. The article describes the general concept for creation a system of storage and practice-oriented data analysis, based on the data warehousing technology. The main aspect in universal system design on storage layer and working with data is approach uses extended data warehouse, based on universal platform of stored data, which grants access to storage and subsequent data analysis different structure and subject domains have compound’s points (nodes and extended functional with data structure choice option for data storage and subsequent intrasystem integration. Describe the universal system general architecture of storage and analysis practice-oriented data, structural elements. Main components of universal system for storage and processing practice-oriented data are: online data sources, ETL-process, data warehouse, subsystem of analysis, users. An important place in the system is analytical processing of data, information search, document’s storage and providing a software interface for accessing the functionality of the system from the outside. An universal system based on describing concept will allow collection information of different subject domains, get analytical summaries, do data processing and apply appropriate Data Mining methods and algorithms.

  20. Communications Between Volunteers and Health Researchers during Recruitment and Informed Consent: Qualitative Content Analysis of Email Interactions

    OpenAIRE

    Townsend, Anne; Amarsi, Zubin; Backman, Catherine L; Cox, Susan M; Li, Linda C

    2011-01-01

    Background While use of the Internet is increasingly widespread in research, little is known about the role of routine electronic mail (email) correspondence during recruitment and early volunteer?researcher interactions. To gain insight into the standpoint of volunteers we analyzed email communications in an early rheumatoid arthritis qualitative interview study. Objectives The objectives of our study were (1) to understand the perspectives and motivations of individuals who volunteered for ...

  1. Gambaran Histopatologik Lesi Karies pada Email dengan Aplikasi Fluor In Vitro

    Directory of Open Access Journals (Sweden)

    Agoeng Tjahjani

    2015-11-01

    Full Text Available Tahap dini karies telah lama dikenal dengan istilah bercak putih. Untuk mengetahui terjadinya lesi karies di bawah permukaan email in vivo, maka dilakukan penelitian secara in vitro dengan merendam gigi Premolar dengan dan tanpa aplikasi fluor dalam perbenihan kuman Streptococcus mutans FA-1 (ATCC 16495. Enam puluh empat gigi Preolar tanpa karies dibagi dalam 2 kelompok. Pada kelompok perlakuan, gigi diaplikasi dengan fluor sedang pada kelompok kontrol gigi tanpa aplikasi fluor. Semua gigi dimasukkan dalam perbenihan tioglikolat air yang ke dalamnya telah ditanam Streptococcus mutans FA-4 (ATCC 16495 selama 4 dan 8 minggu. Pembentukan bercah putih diamati dengan mikroskop 'zoom-stereo'. Sedang besarnya porusitas di bawah permukaan email diaamti dengan mikroskop polarisasi. Pada akhir minggu ke-4 dan ke-8 pada kedua kelompok ditemukan peningkatan jumlah gigi dengan pembentukan bercak putih dan peningkatan nilai rata-rata kedalaman lapisan badan lesi. Uji statistik dengan chi-square test menunjukkan perbedaan bermakna pada p<0.05. Berdasarkan penelitian tersebut di atas disimpulkan bahwa (1 aplikasi NaF hanya menghambat sebagian pembentukan lesi karies dan (2 sistem perbenihan kuman yang digunakan tidak dapat mencerminkan keadaan mulut yang sebenarnya.

  2. Design and Development of a University E-Library System in Turkey: A Case from Dicle University

    Directory of Open Access Journals (Sweden)

    Murat YALMAN

    2014-08-01

    Full Text Available Services provided for students in traditional libraries at universities have been renovated in line with the development of technology. Therefore, today libraries are not evaluated with their sizes of places but with the variety and abundance of sources found in libraries. In terms of current educational activities, it is fairly important for universities to structure and renovate their libraries. The reason is that learning is now independent of place and time. The spread of the Internet and of Internet technologies and the increase in the number of Internet users make e-library obligatory and unavoidable. Therefore, universities should internalize the concept of e-library and take electronic library into consideration while restructuring their library services. The present study tried to determine how to carry out an e-library design in accordance with the library services of universities. In this process, the overall purpose was to determine the needs by examining the user interface of the webpage designed, its interface features, its differences, ease of its use, its clarity for users to understand and the pros and cons of the system. In this way, universities using e-library are believed to provide their students with better services by increasing their quality of education.

  3. UNIVERSAL REGULAR AUTONOMOUS ASYNCHRONOUS SYSTEMS: ω-LIMIT SETS, INVARIANCE AND BASINS OF ATTRACTION

    Directory of Open Access Journals (Sweden)

    Serban Vlad

    2011-07-01

    Full Text Available The asynchronous systems are the non-deterministic real timebinarymodels of the asynchronous circuits from electrical engineering.Autonomy means that the circuits and their models have no input.Regularity means analogies with the dynamical systems, thus such systems may be considered to be real time dynamical systems with a’vector field’, Universality refers to the case when the state space of the system is the greatest possible in the sense of theinclusion. The purpose of this paper is that of defining, by analogy with the dynamical systems theory, the omega-limit sets, the invariance and the basins of attraction of the universal regular autonomous asynchronous systems.

  4. Excellence Initiatives to Establish World-Class Universities: Evaluation of Recent Experiences

    OpenAIRE

    Jamil Salmi; Isak Froumin

    2013-01-01

    Jamil Salmi, Ph. D., coordinator of the World Banks tertiary education program (NW, Washington, D.C., United States), member of the International Advisory Panel, National Research University -Higher School of Economics, Moscow, Russian Federation. Email: Address: The World Bank Institute, 1818 H Street, NW, Washington, D.C. 20433, United States.Isak Froumin, Ped.D., Professor, Director of Research and Development at the Education Institute, National Research Unive...

  5. Revitalising the Nigerian University System: The Imperatives of a Market Driven Funding Mechanism

    Science.gov (United States)

    Chiemeka, Nnorom; Nwagwu, Nwakaire Onuzuruike

    2015-01-01

    The needs assessment report of Nigerian public universities (2012) exposed a disturbing level of decay in public universities in Nigeria. The report, among other things advocated better financial management as a panacea for revitalising the university system. This paper compared the direct funding allocation mechanism (which is the major way of…

  6. Competing health policies: insurance against universal public systems

    Directory of Open Access Journals (Sweden)

    Asa Ebba Cristina Laurell

    2016-01-01

    Full Text Available Objectives: This article analyzes the content and outcome of ongoing health reforms in Latin America: Universal Health Coverage with Health Insurance, and the Universal and Public Health Systems. It aims to compare and contrast the conceptual framework and practice of each and verify their concrete results regarding the guarantee of the right to health and access to required services. It identifies a direct relationship between the development model and the type of reform. The neoclassical-neoliberal model has succeeded in converting health into a field of privatized profits, but has failed to guarantee the right to health and access to services, which has discredited the governments. The reform of the progressive governments has succeeded in expanding access to services and ensuring the right to health, but faces difficulties and tensions related to the permanence of a powerful, private, industrial-insurance medical complex and persistence of the ideologies about medicalized 'good medicine'. Based on these findings, some strategies to strengthen unique and supportive public health systems are proposed.

  7. THE QUALITY MANAGEMENT SYSTEM AT THE UNIVERSITY. PROBLEMS IN IMPLEMENTING

    Directory of Open Access Journals (Sweden)

    L. I. Nazina

    2014-01-01

    Full Text Available Summary. Beginning of the XXI century marked the active integration of Russia and the world community, including entry into the world educational space. The international activities of the leading universities of the country depends on the level of cooperation with foreign countries in the field of scientific and educational activities. Today topical issue recognition of the quality of Russian education abroad. One way to confirm this is the certification of the quality management system of the university. As long-term, mostly foreign experience, achieving the required level of quality and continue to improve the most productive is accomplished by implementing a quality management system in accordance with ISO 9000. In the modern system of higher education a lot of attention paid to quality, to ensure the competitiveness of the institution in the education market by training qualified specialists. Implementation of the quality management system is to move the university to process management prepared in accordance with approved and enacted by the QMS documents. Workplaces should determine the duties, powers and responsibilities of each employee within the quality management system, develop and implement the job descriptions, staff verify documented procedures. Implementation of the certification must be accompanied by specific and persistent administration by management in conjunction with the training and retraining of all managers and employees involved in the work on the implementation of the QMS in the organization. This article describes the goals, objectives in the formation and implementation of QMS in higher education arising from this problem and barriers (information, methodological, psychological, multiple ways to address them.

  8. Modifying scoring system at South African University rugby level ...

    African Journals Online (AJOL)

    Success in rugby is measured by winning the game and in order to do so, teams need to score more points ... if modifying the scoring system at South African University rugby level changes the game dynamics. ... AJOL African Journals Online.

  9. UNIVERSITY TURBINE SYSTEMS RESEARCH-HIGH EFFICIENCY ENGINES AND TURBINES (UTSR-HEET)

    Energy Technology Data Exchange (ETDEWEB)

    Lawrence P. Golan; Richard A. Wenglarz; William H. Day

    2003-03-01

    In 2002, the U S Department of Energy established a cooperative agreement for a program now designated as the University Turbine Systems (UTSR) Program. As stated in the cooperative agreement, the objective of the program is to support and facilitate development of advanced energy systems incorporating turbines through a university research environment. This document is the first annual, technical progress report for the UTSR Program. The Executive Summary describes activities for the year of the South Carolina Institute for Energy Studies (SCIES), which administers the UTSR Program. Included are descriptions of: Outline of program administrative activities; Award of the first 10 university research projects resulting from a year 2001 RFP; Year 2002 solicitation and proposal selection for awards in 2003; Three UTSR Workshops in Combustion, Aero/Heat Transfer, and Materials; SCIES participation in workshops and meetings to provide input on technical direction for the DOE HEET Program; Eight Industrial Internships awarded to higher level university students; Increased membership of Performing Member Universities to 105 institutions in 40 states; Summary of outreach activities; and a Summary table describing the ten newly awarded UTSR research projects. Attachment A gives more detail on SCIES activities by providing the monthly exceptions reports sent to the DOE during the year. Attachment B provides additional information on outreach activities for 2002. The remainder of this report describes in detail the technical approach, results, and conclusions to date for the UTSR university projects.

  10. Survey Email Scheduling and Monitoring in eRCTs (SESAMe): A Digital Tool to Improve Data Collection in Randomized Controlled Clinical Trials.

    Science.gov (United States)

    Skonnord, Trygve; Steen, Finn; Skjeie, Holgeir; Fetveit, Arne; Brekke, Mette; Klovning, Atle

    2016-11-22

    Electronic questionnaires can ease data collection in randomized controlled trials (RCTs) in clinical practice. We found no existing software that could automate the sending of emails to participants enrolled into an RCT at different study participant inclusion time points. Our aim was to develop suitable software to facilitate data collection in an ongoing multicenter RCT of low back pain (the Acuback study). For the Acuback study, we determined that we would need to send a total of 5130 emails to 270 patients recruited at different centers and at 19 different time points. The first version of the software was tested in a pilot study in November 2013 but was unable to deliver multiuser or Web-based access. We resolved these shortcomings in the next version, which we tested on the Web in February 2014. Our new version was able to schedule and send the required emails in the full-scale Acuback trial that started in March 2014. The system architecture evolved through an iterative, inductive process between the project study leader and the software programmer. The program was tested and updated when errors occurred. To evaluate the development of the software, we used a logbook, a research assistant dialogue, and Acuback trial participant queries. We have developed a Web-based app, Survey Email Scheduling and Monitoring in eRCTs (SESAMe), that monitors responses in electronic surveys and sends reminders by emails or text messages (short message service, SMS) to participants. The overall response rate for the 19 surveys in the Acuback study increased from 76.4% (655/857) before we introduced reminders to 93.11% (1149/1234) after the new function (P<.001). Further development will aim at securing encryption and data storage. The SESAMe software facilitates consecutive patient data collection in RCTs and can be used to increase response rates and quality of research, both in general practice and in other clinical trial settings. ©Trygve Skonnord, Finn Steen, Holgeir

  11. Pengaruh Lama Perendaman dan Jenis Minuman Beralkohol Bir dan Tuak terhadap Kekerasan Email Gigi Manusia (In Vitro)

    OpenAIRE

    Magista, Malida; Nuryanti, Archadian; Wahyudi, Ivan Arie

    2014-01-01

    Erosi gigi merupakan hilangnya lapisan email gigi karena asam. Jenis asam, pH rendah, serta kandungan kalsium, fosfat, dan fluoride pada bir dan tuak diduga merupakan faktor kimiawi penyebab erosi gigi. Tujuan penelitian ini untuk mengetahui pengaruh lama perendaman dan jenis minuman beralkohol bir dan tuak terhadap kekerasan email gigi manusia (in vitro). Penelitian ini menggunakan 14 sampel gigi premolar pertama atas. Setiap gigi dibagi menjadi 2 bagian, bukal dan palatal. kemudian dibagi m...

  12. Pengaruh Lama Perendaman Dan Jenis Minuman Beralkohol Bir Dan Tuak Terhadap Kekerasan Email Gigi Manusia (in Vitro)

    OpenAIRE

    Magista, Malida; Nuryanti, Archadian; Wahyudi, Ivan Arie

    2014-01-01

    Erosi gigi merupakan hilangnya lapisan email gigi karena asam. Jenis asam, pH rendah, serta kandungan kalsium, fosfat, dan fluoride pada bir dan tuak diduga merupakan faktor kimiawi penyebab erosi gigi. Tujuan penelitian ini untuk mengetahui pengaruh lama perendaman dan jenis minuman beralkohol bir dan tuak terhadap kekerasan email gigi manusia (in vitro). Penelitian ini menggunakan 14 sampel gigi premolar pertama atas. Setiap gigi dibagi menjadi 2 bagian, bukal dan palatal. kemudian dibagi m...

  13. Promoting linguistic complexity, greater message length and ease of engagement in email writing in people with aphasia

    OpenAIRE

    Thiel, L; Sage, K; Conroy, P

    2016-01-01

    Background: Improving email writing in people with aphasia could enhance their ability to communicate, promote interaction and reduce isolation. Spelling therapies have been effective in improving single word writing. However, there has been limited evidence on how to achieve changes to everyday writing tasks such as email writing in people with aphasia. One potential area that has been largely unexplored in the literature is the potential use of assistive writing technologies, despite some i...

  14. The Use of Email and the Relationships between Education Leaders and Followers

    Science.gov (United States)

    Haddouch, Reda

    2017-01-01

    Through the use of a survey questionnaire and descriptive statistics to analyze the collected data, this quantitative research study sought to determine whether there is a relationship between the use of email as a form of communication and the quality of the leader-follower relationship in organizations. Two electronic survey questionnaires were…

  15. The relationship between the external environment and physician e-mail communication: The mediating role of health information technology availability.

    Science.gov (United States)

    Mazurenko, Olena; Hearld, Larry R; Menachemi, Nir

    Physician e-mail communication, with patients and other providers, is one of the cornerstones of effective care coordination but varies significantly across physicians. A physician's external environment may contribute to such variations by enabling or constraining a physician's ability to adopt innovations such as health information technology (HIT) that can be used to support e-mail communication. The aim of the study was to examine whether the relationship of the external environment and physician e-mail communication with patients and other providers is mediated by the practice's HIT availability. The data were obtained from the Health Tracking Physician Survey (2008) and the Area Resource File (2008). Cross-sectional multivariable subgroup path analysis was used to investigate the mediating role of HIT availability across 2,850 U.S. physicians. Solo physicians' perceptions about malpractice were associated with 0.97 lower odds (p communication with patients and other providers, as compared to group and hospital practices, even when mediated by HIT availability. Subgroup analyses indicated that different types of practices are responsive to the different dimensions of the external environment. Specifically, solo practitioners were more responsive to the availability of resources in their environment, with per capita income associated with lower likelihood of physician e-mail communication (OR = 0.99, p information technology availability, which in turn was associated with a greater likelihood of communicating via e-mail with patients (OR = 1.02, p communication and the external environment is mediated by the practice's HIT availability. Efforts to improve physician e-mail communication and HIT adoption may need to reflect the varied perceptions of different types of practices.

  16. Pengaruh Lama Perendaman dan Jenis Minuman Beralkohol Bir dan Tuak terhadap Kekerasan Email Gigi Manusia (In Vitro

    Directory of Open Access Journals (Sweden)

    Malida Magista

    2014-06-01

    Full Text Available Erosi gigi merupakan hilangnya lapisan email gigi karena asam. Jenis asam, pH rendah, serta kandungan kalsium, fosfat, dan fluoride pada bir dan tuak diduga merupakan faktor kimiawi penyebab erosi gigi. Tujuan penelitian ini untuk mengetahui pengaruh lama perendaman dan jenis minuman beralkohol bir dan tuak terhadap kekerasan email gigi manusia (in vitro. Penelitian ini menggunakan 14 sampel gigi premolar pertama atas. Setiap gigi dibagi menjadi 2 bagian, bukal dan palatal. kemudian dibagi menjadi 7 kelompok perlakuan, yaitu kelompok (A1 perendaman dalam bir (ringan; (A2 kelompok perendaman dalam bir sedang; kelompok (A3 perendaman dalam bir berat, kelompok (B1: perendaman dalam tuak ringan, (B2: perendaman dalam tuak sedang, (B3: perendaman dalam tuak berat dan kelompok kontrol (C. Uji kekerasan email gigi dilakukan menggunakan Micro Vickers Hardness Tester. Pengujian kekerasan awal email gigi dilakukan sebelum perendaman gigi. Perendaman gigi premolar pertama atas pada bir dan tuak dilakukan selama 10 detik, 50 detik, dan 250 detik perhari dengan penyimpanan subjek penelitian pada saliva buatan. Uji kekerasan akhir email gigi dilakukan setelah perlakuan selama 30 hari. Nilai perubahan kekerasan email gigi merupakan selisih nilai kekerasan akhir dan nilai kekerasan awal email gigi. Sebagai tambahan data, pada bir dan tuak juga diukur kandungan pH, kalsium, dan fosfor. Data dianalisis menggunakan uji ANAVA dua jalur dilanjutkan dengan uji LSD. Hasil analisis ANAVA dua jalur menujukkan bahwa jenis minuman dan lama perendaman berpengaruh bermakna terhadap kekerasan email gigi (p<0,05. Hasil uji LSD menunjukkan adanya perbedaan rerata yang signifikan (p<0,05 antar kelompok uji bir dan tuak. Kesimpulan dari penelitian ini adalah terdapat pengaruh jenis minuman beralkohol bir dan tuak dan lama perendaman terhadap kekerasan email gigi manusia (in vitro. The Effect Of Contact Time And Alcohol Beverages Beer And Tuak On Human Dental Enamel Hardness (In

  17. Defining the Symmetry of the Universal Semi-Regular Autonomous Asynchronous Systems

    Directory of Open Access Journals (Sweden)

    Serban E. Vlad

    2012-02-01

    Full Text Available The regular autonomous asynchronous systems are the non-deterministic Boolean dynamical systems and universality means the greatest in the sense of the inclusion. The paper gives four definitions of symmetry of these systems in a slightly more general framework, called semi-regularity, and also many examples.

  18. Changes and Sentiment: A Longitudinal E-Mail Analysis of a Large Design Project

    DEFF Research Database (Denmark)

    Piccolo, Sebastiano; Wilberg, Julian; Lindemann, Udo

    " in emails and study its relation to sentiment. We find that sentiment decreases when problems or changes emerge, and increases when changes are implemented successfully. We discuss the implications of our findings for research and project engineering practice, providing avenues for further work....

  19. Single session email consultation for parents : An evaluation of its effect on empowerment

    NARCIS (Netherlands)

    prof.dr. Jo Hermanns; prof.dr. Ruben Fukkink; dr. Christa C.C. Nieuwboer

    2014-01-01

    This study evaluated the effect of single session email consultation on empowerment of parents. Practitioners in a control group (N = 19) received no training; practitioners in an experimental group (N = 21) were trained to use empowerment oriented techniques in online consultation. Parental

  20. The Impact of "Virtualization" on Independent Study Course Completion Rates: The British Columbia Open University Experiment

    Science.gov (United States)

    Giguere, Louis

    2009-01-01

    In 1997 the British Columbia Open University (BCOU) adopted a virtualization strategy based primarily on twinning off-line independent study distance education courses (textbook-based with study guide and telephone and e-mail tutor support) with alternate online versions (textbook-based with integrated conferencing and communications provided…