• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 258
  • 67
  • 64
  • 48
  • 45
  • 26
  • 20
  • 13
  • 7
  • 7
  • 7
  • 6
  • 3
  • 2
  • 2
  • Tagged with
  • 649
  • 194
  • 119
  • 101
  • 83
  • 83
  • 70
  • 62
  • 53
  • 53
  • 52
  • 50
  • 47
  • 46
  • 44
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
171

Interactive Marketing: E-mail - Tomorrow´s Tool for Online Purchases

Öberg, Theodor, Oldby, Marcus January 2017 (has links)
This thesis aims to gain a better understanding of how customers behave with email and spontaneous online shopping and in which degree prospects or customer would be affected by functions in interactive e-mails.
172

Hur internkommunikation påverkas av IT-baserade kommunikationskanaler

Nilsson Ringi, Amanda, Wahlman, Andreas January 2017 (has links)
Syftet med den här undersökningen är att få en bättre förståelse gällande den föredragna kommunikationskanalen och om den ändras beroende på vilken position inom organisationen som personen för tillfället har. Vi lever i en värld där både det arbetsrelaterade livet och privatlivet till stor del beror på möjligheten att hålla sig uppdaterad angående situationer som sker över hela världen samt med sina kamrater med hjälp av olika IT-lösningar. Tidigare forskning visar att en majoritet av forskningsgrupperna föredrar kommunikation ansikte mot ansikte. Den här undersökningen bestod av intervjuer med individer på olika positioner i företagsstegen för att se vad de hade för åsikter kring ämnet. Respondenterna representerade båda könen, i varierande ålder och har varit anställda mellan ett till tio år i organisationen. Resultaten av undersökningen skiljde sig från tidigare forskning då merparten av respondenterna var positiva till skriftlig kommunikation (mail). / The purpose of this research is to better understand if the prefered way of communication differs depending on which organizational position the person currently holds. Since we are now living in a world where both work related life and private life to a greater scale depends on the ability to keep yourself updated with both the situation worldwide and communication with your peers with the help of different IT solutions. Earlier research results show that a majority of research groups prefers face to face communication. This research used interviews with people on different steps of the corporate ladder to find out what their standing were on the subject. The respondents where both male and female, in varying age and had been employed from one to ten years in the organization. The results found in this research were not equivalent with the earlier research since our results found that almost all respondents were pro written communication (e-mail).
173

E-mail forensic authorship attribution

Lalla, Himal January 2010 (has links)
E-mails have become the standard for business as well as personal communication. The inherent security risks within e-mail communication present the problem of anonymity. If an author of an e-mail is not known, the digital forensic investigator needs to determine the authorship of the e-mail using a process that has not been standardised in the e-mail forensic field. This research project examines many problems associated with e-mail communication and the digital forensic domain; more specifically e-mail forensic investigations, and the recovery of legally admissible evidence to be presented in a court of law. The Research Methodology utilised a comprehensive literature review in combination with Design Science which results in the development of an artifact through intensive research. The Proposed E-Mail Forensic Methodology is based on the most current digital forensic investigation process and further validation of the process was established via expert reviews. The opinions of the digital forensic experts were an integral portion of the validation process which adds to the credibility of the study. This was performed through the aid of the Delphi technique. This Proposed E-Mail Forensic Methodology adopts a standardised investigation process applied to an e-mail investigation and takes into account the South African perspective by incorporating various checks with the laws and legislation. By following the Proposed E-mail Forensic Methodology, e-mail forensic investigators can produce evidence that is legally admissible in a court of law.
174

A Multi-Variate Analysis of SMTP Paths and Relays to Restrict Spam and Phishing Attacks in Emails

Palla, Srikanth 12 1900 (has links)
The classifier discussed in this thesis considers the path traversed by an email (instead of its content) and reputation of the relays, features inaccessible to spammers. Groups of spammers and individual behaviors of a spammer in a given domain were analyzed to yield association patterns, which were then used to identify similar spammers. Unsolicited and phishing emails were successfully isolated from legitimate emails, using analysis results. Spammers and phishers are also categorized into serial spammers/phishers, recent spammers/phishers, prospective spammers/phishers, and suspects. Legitimate emails and trusted domains are classified into socially close (family members, friends), socially distinct (strangers etc), and opt-outs (resolved false positives and false negatives). Overall this classifier resulted in far less false positives when compared to current filters like SpamAssassin, achieving a 98.65% precision, which is well comparable to the precisions achieved by SPF, DNSRBL blacklists.
175

Models to Combat Email Spam Botnets and Unwanted Phone Calls

Husna, Husain 05 1900 (has links)
With the amount of email spam received these days it is hard to imagine that spammers act individually. Nowadays, most of the spam emails have been sent from a collection of compromised machines controlled by some spammers. These compromised computers are often called bots, using which the spammers can send massive volume of spam within a short period of time. The motivation of this work is to understand and analyze the behavior of spammers through a large collection of spam mails. My research examined a the data set collected over a 2.5-year period and developed an algorithm which would give the botnet features and then classify them into various groups. Principal component analysis was used to study the association patterns of group of spammers and the individual behavior of a spammer in a given domain. This is based on the features which capture maximum variance of information we have clustered. Presence information is a growing tool towards more efficient communication and providing new services and features within a business setting and much more. The main contribution in my thesis is to propose the willingness estimator that can estimate the callee's willingness without his/her involvement, the model estimates willingness level based on call history. Finally, the accuracy of the proposed willingness estimator is validated with the actual call logs.
176

The Effectiveness of an Electronic-Mail Campaign to Modify Stress Levels, Mood States, and Coping Techniques Among Employed Adults

Hoke, Cassandra N. 08 1900 (has links)
The present study was conducted to explore the effectiveness of a worksite stress management program delivered via electronic mail (e-mail). One hundred and thirty-seven employed adults (36 males, 102 females; mean age = 29.46) from several diverse businesses consented to participate. The volunteers completed Cohen's Perceived Stress Scale, the Daily Hassles Scale, the Daily Work Hassles Scale, the TCU Self-Ratings Scales, and a demographic and opinion questionnaire. Individuals in the treatment group received e-mail messages twice weekly and had access to a website for three months about a variety of cognitive-behavioral techniques for managing worksite stress. A MANCOVA of post-intervention stress levels indicated that individuals who received the stress management messages perceived the same amount of stressors and hassles as individuals who did not receive the messages [F (5, 86) = 0.95, p = .45]. However, a MANCOVA of post-intervention perceived mood states revealed a tendency for individuals in the treatment group to be less depressed, anxious, and angry than individuals in the control group [F (3, 92) = 2.44, p = .07]. Demographic variables did not influence the outcome variables and pre- and post-test absenteeism and illness rates were similar for treatment and control groups. Coping skill usage was similar in amount and frequency, but differed in quality between the groups. The findings of the present study indicate that health promotion programs can be feasibly and effectively delivered via e-mail in the worksite.
177

"Die guten ins Töpfchen, die schlechten ins ..." - Filter für E-Mail

Richter, Frank 25 April 2001 (has links)
Gemeinsamer Workshop von Universitaetsrechenzentrum und Professur "Rechnernetze und verteilte Systeme" der Fakultaet fuer Informatik der TU Chemnitz. Workshop-Thema: Mobilitaet Es werden Filtermöglichkeiten für E-Mails vorgestellt, um die E-Mail-Bearbeitung zu automatisieren und Spam-Mails und Mails mit gefährlichem Inhalt abzuwehren.
178

E-Mail für Dich - Lust oder Frust?

Richter, Frank, Sontag, Ralph 20 June 2003 (has links)
Genervte Nutzer, verunsicherte Admins, panische Mailserver: Die täglich zu Tausenden eintreffenden unerwünschten Mails - Spam - gefährden die Mailinfrastruktur.Der Vortrag wird Vor- und Nachsorgemöglichkeiten für geplagte Nutzer und Administratoren erläutern. Techniken der Spamerkennung werden vorgestellt.
179

Bayes kontra Spam

Sontag, Ralph 02 July 2003 (has links)
Workshop Mensch-Computer-Vernetzung Derzeitige Spam-Erkennung weist eklatante Mängel auf. Die Zunahme des Spam-Aufkommens erfordet neue Ansätze, um der Plage Herr zu werden. Der Vortrag erläutert, wie mit Hilfe des Satzes von Bayes die Spam-Erkennung deutlich verbessert werden kann.
180

Neue Anti-Spam-Techniken

Richter, Frank 27 April 2004 (has links)
Workshop "Netz- und Service-Infrastrukturen" Dieser Beitrag zum Workshop "Netz- und Service-Infrastrukturen" 2004 analysiert den Stand der Anti-Spam-Maßnahmen an der TU Chemnitz und zeigt neue Techniken auf.

Page generated in 0.0304 seconds