Spelling suggestions: "subject:"femail"" "subject:"émail""
181 |
TRIPOLI - Empowered Email EnvironmentLohr, Frank 27 April 2004 (has links)
Workshop "Netz- und Service-Infrastrukturen"
Der Vortrag im Rahmen des Workshop "Netz- und Service-Infrastrukturen" stellt
das Projekt Tripoli vor, zeigt Ziele und Prinzipien der erweiterten
Emailumgebung (Empowered Email Environment, Tripple-E) für authentifizierten
und zertifizierten Emailverkehr, Ablauf der Kommunikation und zu lösende
Probleme auf.
|
182 |
The Effects of Task-Based Documentation Versus Online Help Menu Documentation on the Acceptance of Information TechnologyBell, Thomas 05 1900 (has links)
The objectives of this study were (1) to identify and describe task-based documentation; (2) to identify and describe any purported changes in users attitudes when IT migration was preceded by task-based documentation; (3) to suggest implications of task-based documentation on users attitude toward IT acceptance. Questionnaires were given to 150 university students. Of these, all 150 students participated in this study. The study determined the following: (1) if favorable pre-implementation attitudes toward a new e-mail system increase, as a result of training, if users expect it to be easy to learn and use; (2) if user acceptance of an e-mail program increase as expected perceived usefulness increase as delineated by task-based documentation; (3) if task-based documentation is more effective than standard help menus while learning a new application program; and (4) if training that requires active student participation increase the acceptance of a new e-mail system. The following conclusions were reached: (1) Positive pre-implementation attitudes toward a new e-mail system are not affected by training even if the users expect it to be easy to learn and use. (2) User acceptance of an e-mail program does not increase as perceived usefulness increase when aided by task-based documentation. (3) Task-based documentation is not more effective than standard help menus when learning a new application program. (4) Training that requires active student participation does not increase the acceptance of a new e-mail system.
|
183 |
Emailový server jako služba pro systémy založené na technologii Windows-NT / Email Server as a Windows Network ServiceJalůvka, Petr January 2007 (has links)
Email is one of the most used services on the Internet. It's hard to find a user with less than one own mailbox. These mailboxes are usually located on servers controlled by someone else than mailbox owners. Users trying to create their own email serverhave to install unix system and go through hard configuration process of the email server. Purpose of this work is to familiriaze reader with email history and protocols and then introduce design and implementation of an email server with easy configuration for Windows NT platform.
|
184 |
E‐Shape AnalysisSroufe, Paul 12 1900 (has links)
The motivation of this work is to understand E-shape analysis and how it can be applied to various classification tasks. It has a powerful feature to not only look at what information is contained, but rather how that information looks. This new technique gives E-shape analysis the ability to be language independent and to some extent size independent. In this thesis, I present a new mechanism to characterize an email without using content or context called E-shape analysis for email. I explore the applications of the email shape by carrying out a case study; botnet detection and two possible applications: spam filtering and social-context based finger printing. The second part of this thesis takes what I apply E-shape analysis to activity recognition of humans. Using the Android platform and a T-Mobile G1 phone I collect data from the triaxial accelerometer and use it to classify the motion behavior of a subject.
|
185 |
Conceptualizing and investigating patterns of consumer behaviour towards in-home shoppingHogg, Margaret January 1995 (has links)
This research examines intermediate patterns of joint consumption whereby constellations, anti constellations and configurations are seen as representing patterns of consumption which lie between the traditional micro (product-centred) and macro (societal-centred) studies of consumption. A series of models are developed: of the relationship between individuals and consumption from a social psychological perspective of the formation of patterns of joint consumption and of the three forces which influence patterns of consumption: the symbolic-functional force (located in the product) the physiological-esteem-self-actualization force (located in individual needs) and the expressive-instrumental force (located in activities or behaviour). A two stage empirical study explores the content, structure and context of consumption patterns amongst mail order shoppers in the U.K. The quantitative stage involved the application of correspondence analysis to data extracted from the BMRBffGI database and the qualitative phase was a series of in-depth interviews with mail order industry marketing personnel. The findings confirmed the existence of three identifiable groups amongst mail order shoppers, with different intermediate patterns of joint consumption representing different sets of responses to the three forces which influence consumption and which had been modelled above. The research extends work on the grammar of consumption by developing a set of rules of combination for analyzing the structure and levels of joint consumption: constellations, anti constellations and configurations, which could be associated with the groups of mail order shoppers. The study concludes that products cohere around social roles and that interdependence exists at two levels, firstly, amongst the forces which influence consumption, and secondly, between consumption and the societal-cultural context. It was seen that functional and symbolic complementarities could be found in the intermediate patterns of joint consumption and that different combinatorial rules could be applied to the different levels of consumption patterns elicited for the various groups.
|
186 |
Communication satisfaction in relation to managerial roles and the choice of communication media林芷蔚, Lam, Tse-wai, Constance. January 1998 (has links)
published_or_final_version / Business Administration / Master / Master of Business Administration
|
187 |
Secure and Trusted Mobile Commerce System based on Virtual CurrenciesKounelis, Ioannis January 2015 (has links)
With the widespread usage of mobile devices and their applications, many areas of innovation have created a multitude of opportunities for mobile technologies to be deployed with very interesting effects. One such new area that emerged in the last few years is mobile commerce. It represents a system where various entities create real–life or digital assets, distribute information about them to interested consumers, execute transactions, accept various types of compensation methods, and finally deliver these assets; all of it in a secure and trusted manner, respecting users’ privacy. Since mobile devices are increasingly used for m-commerce, it is important to ensure that users’ data on such devices are kept secure. Mobile devices contain many of our personal and private data and information, since we nowadays use them for all kind of activities, both personal and professional. However, such data and information are not always treated in a secure and privacy friendly way. The goal of this thesis is to identify and provide solutions to security related problems found on mobile devices, such as communications, storage and mobile application design, and with the use of cryptocurrencies to combine the findings in the design of a secure mobile commerce system. As a result, this thesis describes a design and architecture of a secure e-commerce system, called eAgora, primarily exploiting mobile technology. The system is innovative as it treats digital goods, classified and called mobile commerce objects. Based on the attributes and anticipated use of such specific m–commerce objects, different security and privacy measures for each of them are needed and enforced. The goal was to design a system that deals with mobile commerce in a secure and privacy friendly way in all the lifecycle of the transactions. As users are mostly using mobile devices to connect to the proposed services, research first focused on mobile device security and privacy issues, such as insecure storage on the mobile device, insecure handling of user credentials and personal information, and insecure communications. Issues not only coming from the device itself but also from the nature of it; being mobile it is used in a different way that the classical desktop computers. Mobile devices are used in public, in an environment that cannot be controlled, and are interfacing a variety of networks that are not under the mobile device user’s control. Potential attackers’ interest was analysed in different mobile commerce scenarios in order to understand the needs for security enhancements. After having analyzed the possible threats, a methodology for mobile application development that would allow many common development errors to be avoided and security and privacy mechanisms to be considered by design was specified. Moreover, in order to provide secure storage and guard against active and passive intruder attacks, a secure Mobile Crypto Services Provider facility that allows storage of data on the UICC cards was designed and implemented. In order to secure communications, a secure e-mail application was designed and implemented. The application provides a user-friendly way to encrypt and sign e-mails, using the users’ already working e-mail accounts. The security functionality is completely transparent to users and ensures confidentiality and integrity of e-mail exchange. For the mobile commerce system, an architecture that enables exchange of m-commerce objects between different merchants, customers and retailers is proposed. Inthe architecture, policy enforcement and the feature to detect suspicious events that may be illegal and to cooperate with law enforcement was embedded. The newly defined technology of virtual currencies is used as a payment facilitator within the proposed architecture. Many of its innovative features are adopted but some are also extended, such as the secure use of the user wallet files, i.e. the files that link the user with the virtual currencies and enable payment transactions between customers and merchants. Although there is no distinction between different virtual currencies, Bitcoin is used as an example of a market valued trading currency to validate and evaluate the proposed secure e-commerce architecture and the findings have been applied on it. The thesis provides detailed use cases that demonstrate how the proposed architecture of eAgora functions in different complicated e-trading circumstances and how different security related mechanisms are used. The thesis concludes with the analysis of the research results and with proposed directions for future research and development works. / <p>QC 20150521</p>
|
188 |
E-post : Dess stresspåverkan i arbetet och hur den kan hanterasBergström, Robin, Olsson, Philip, Åkesson, Eric January 2010 (has links)
<p>E-post har blivit en vanlig teknik för kommunikation och information inom arbetslivet såväl som privatlivet. Den här uppsatsen handlar om e-post och syftar till att undersöka hur det påverkar individer inom arbetslivet. Uppsatsen syftar också till att undersöka vad det är som kan utlösa e-poststress och vad som kan göras för att förebygga det. För att kunna undersöka detta har en enkätundersökning gjorts inom olika organisationer. Resultatet från enkäten har sedan analyserats och jämförts med tidigare forskning och teorier. Uppsatsens resultat visar att 21,1 % av respondenterna i vår undersökning känner att e-post är en bidragande faktor till stress. I analysdelen har vi tagit fram en tabell som visar att de som inte har tillräckligt med tid spenderar 2 timmar och 11 minuter per dag medan de som har tillräckligt med tid spenderar 1 timme och 47 minuter. Analysdelen presenterar också vad det är som kan utlösa e-poststress samt hur det kan förebyggas utifrån vår undersökning. I slutet av uppsatsen dras slutsatser utifrån vårt resultat och vår analys samt en diskussion över hur studien har gått.</p> / <p>E-mail has become a useful and almost indispensible communication tool for people at workplaces and in their private life. This thesis intends to examine how e-mail affects individuals work. It also refers to examine what kind of factors that can contribute to e-mail stress and how you can help prevent it. We have made a questionnaire study to help us investigate this in different organizations. We have then analyzed the data from the survey and compared it to previous studies and theories. We show in this thesis result that 21.1 % of the respondents find e-mail to be a contributing factor for stress. We present in this chapter a table where you can see that the ones who does not have enough time for email spend 2 hours and 11 minutes with email while the ones who do have enough time only spend 1 hour and 47 minutes. We also present what the cause might be and how it can be avoided with data from our survey. In the end of the thesis we draw a conclusion from our result and analysis as well as a discussion of how the study went.</p>
|
189 |
DISTRIBUTED SERVICES ON A LOCALNET 20 NETWORK.Jirón, Cecilia Sabina. January 1985 (has links)
No description available.
|
190 |
AI-BASED WORKSTATIONS AND KNOWLEDGE BASE SERVER DESIGN FOR AUTOMATED STAFFING IN A LOCAL AREA NETWORK (ELECTRONIC MAIL).Hsieh, Sheau-Ling. January 1986 (has links)
No description available.
|
Page generated in 0.0203 seconds