• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 93
  • 25
  • 15
  • 8
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 211
  • 52
  • 40
  • 36
  • 35
  • 28
  • 28
  • 24
  • 21
  • 21
  • 20
  • 16
  • 15
  • 15
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
21

The cost effectiveness of electronic communication

Jackson, Thomas William January 2001 (has links)
Electronic communication is becoming an integral part of the communication structure within organisations, but the costs and benefits are not being assessed. Communication by email is usually assumed to be an efficient and effective means of sending messages. However, on analysis the process is seen to be much more complex and much less efficient than is normally assumed. Communication is carried out in many different forms, but the common underlying motive of communication is to improve working practices and to increase productivity. As communication pervades nearly everything we do, even small improvements in the effectiveness and cost of our communication processes can have significant benefits. The aim of this research was to analyse the cost effectiveness of using email and to suggest ways in which the cost effectiveness can be improved. A number of studies have been conducted into the cost effectiveness of email within organisations. The studies were carried out mainly at the Danwood Group, the company sponsoring the author's PhD research. The Danwood Group has just over 500 employees at 19 sites around the UK and its head office is based in Lincoln, where all of the email case studies in this thesis where undertaken. The Danwood Group retails office equipment, predominately photocopiers. Email behaviour was monitored by the use of software at the Danwood Group. This raised a number of questions on the ethical issues of electronic monitoring. This thesis explores these issues and proposes a set of guidelines to allow electronic monitoring within strict professional and ethical guidelines. The Danwood Group studies examined how and when email was used. It was found that, when the company first started using email, over two thirds of messages were non-business-related, though this dropped to less than half in a few months. It was also found that many messages could be delivered in one line of text. A one-line message service was introduced and this was found to save employee time for both senders and receivers of the messages. A costing formula was developed measuring the human cost of operating email messaging. The final study was to determine how long it took employees to recover and return to normal work after an email interruption and this was compared with published data for telephone interrupts. From these results a set of guidelines were developed to enable companies to make the most efficient use of email. The thesis concludes by identifying further areas of research into email usage that would help give a better understanding of methods to enable email to become even more cost effective.
22

Improving Email Security in Organizations : Solutions and Guidelines

Andrén, Axel, Kashlan, Ghaith, Nantarat, Atichoke January 2023 (has links)
Data breaches from email attacks have been an issue since email was first implemented. Common attack methods like phishing are still a threat to organizations to this very day. That is because it never seems to stop evolving and keeps becoming more and more convincing. Email compromises have caused billions of dollars in damage worldwide, and it shows no sign of stopping. The purpose and research questions of this thesis are formulated to find guidelines or solutions that organizations can follow to improve their overall email security and awareness. In this thesis, both a systematic literature review and interviews are methods used to conduct the research. That way, both the technical portion of the subject, as well as the human perspective are covered. We found that the most common and significant email threats to organizations are phishing, BEC, and APT attacks. This thesis provides methods to mitigate these threats. What has also become clear is that human mistakes are a large portion of the problem concerning email attacks.
23

Efektivita email marketingu u elektronických obchodů / The effectiveness of email marketing in e-commerce

Kaňka, Miroslav January 2009 (has links)
The work can be considered objective factors influencing the efficiency of call email marketing for e-commerce and on the basis of data from e-shop adidasmania.cz analyze their effectiveness. The work offers an insight into email marketing from all sides. It's use of e-commerce, legal and technical perspective solution. In addition to a detailed presentation of the e-shop are adidasmania.cz analyzed the data from Google Analytics. Based on these data, evaluated the effectiveness of individual factors. For most variable factors is proved their effectiveness and impact on the recommended next steps in the creation of emailing.
24

Efficiency of Email Marketing on the International Flower Delivery Market / Efektivita email marketingu na trhu mezinárodních květinových zásilek

Štěpánová, Klára January 2011 (has links)
One of the strongest benefits, but at the same time also one of the reasons for unexploited potential of email marketing, is its high return on investment. As in the case of the firm FloraQueen, also other companies underestimate the efficiency of email marketing. The goal of this thesis is to contrast current email marketing activities of a concrete example against the best case practices and define approaches for achieving the most efficient results. To do so, latest email marketing statistics and trends are recompiled, internal analysis of FloraQueen is realized, industry benchmarks are established and a final set of recommendations is concluded.
25

Regulating the Internet : privacy under the microscope

Williams, Elizabeth A., n/a January 1997 (has links)
This thesis is an exploration of privacy as it relates to the Internet in general, and e-mail communication in particular. It looks at the philosophy of privacy and tracks the privacy debate in both an academic and legal framework. It examines the Australian Privacy Act of 1988 and similar legislation overseas. Current government approaches to privacy and privacy regulation are also examined providing a legislative/political context for the research. The fieldwork component of the thesis attempts to unravel individual perceptions of privacy. It overlays those perceptions of privacy with an examination of the effects of Internet technology on a conceptual understanding of privacy. There is no doubt that the discussion of privacy and the electronic age is extensive but discussion with individuals about their place in the debate and, indeed, the legislation is yet to be tackled in an extensive manner. Until we mesh the views of individuals in the community about their place in the new communications technology and privacy debate, we will not reap the full benefits of advances in communications technology. Consumers will remain reluctant about and suspicious of breaches of their privacy via the Internet.
26

An ownership-base message admission control mechanism for curbing spam

Geng, Hongxing 04 September 2007
Unsolicited e-mail has brought much annoyance to users, thus, making e-mail less reliable as a communication tool. This has happened because current email architecture has key limitations. For instance, while it allows senders to send as many messages as they want, it does not provide adequate capability to recipients to prevent unrestricted access to their mailbox. This research develops a new approach to equip recipients with ability to control access to their mailbox.<p>This thesis builds an ownership-based approach to control mailbox usage employing the CyberOrgs model. CyberOrgs is a model that provides facilities to control resources in multi-agent systems. We consider a mailbox to be a precious resource of its owner. Any access to the resource requires its owner's permission. Thus, we give recipients a capability to manage their valuable resource - mailbox. In our approach, message senders obtain a permission to send messages through negotiation. In this negotiation, a sender makes a proposal and the intended recipient evaluates the proposal according to their own policies. A sender's desired outcome of a negotiation is a contract, which conducts the subsequent communication between the sender and the recipient. Contracts help senders and recipients construct a long-term relationship.<p>Besides allowing individuals to control their mailbox, we consider groups, which represent organizations in human society, in order to allow organizations to manage their resources including mailboxes, message sending allowances, and contracts.<p>A prototype based on our approach is implemented. In the prototype, policies are separated from the mechanisms. Examples of policies are presented and a public policy interface is exposed to allow programmers to develop custom policies. Experimental results demonstrate that the system performance is policy-dependent. In other words, as long as policies are carefully designed, communication involving negotiation has minimal overhead compared to communication in which senders deliver messages to recipients directly.
27

An ownership-base message admission control mechanism for curbing spam

Geng, Hongxing 04 September 2007 (has links)
Unsolicited e-mail has brought much annoyance to users, thus, making e-mail less reliable as a communication tool. This has happened because current email architecture has key limitations. For instance, while it allows senders to send as many messages as they want, it does not provide adequate capability to recipients to prevent unrestricted access to their mailbox. This research develops a new approach to equip recipients with ability to control access to their mailbox.<p>This thesis builds an ownership-based approach to control mailbox usage employing the CyberOrgs model. CyberOrgs is a model that provides facilities to control resources in multi-agent systems. We consider a mailbox to be a precious resource of its owner. Any access to the resource requires its owner's permission. Thus, we give recipients a capability to manage their valuable resource - mailbox. In our approach, message senders obtain a permission to send messages through negotiation. In this negotiation, a sender makes a proposal and the intended recipient evaluates the proposal according to their own policies. A sender's desired outcome of a negotiation is a contract, which conducts the subsequent communication between the sender and the recipient. Contracts help senders and recipients construct a long-term relationship.<p>Besides allowing individuals to control their mailbox, we consider groups, which represent organizations in human society, in order to allow organizations to manage their resources including mailboxes, message sending allowances, and contracts.<p>A prototype based on our approach is implemented. In the prototype, policies are separated from the mechanisms. Examples of policies are presented and a public policy interface is exposed to allow programmers to develop custom policies. Experimental results demonstrate that the system performance is policy-dependent. In other words, as long as policies are carefully designed, communication involving negotiation has minimal overhead compared to communication in which senders deliver messages to recipients directly.
28

Interlanguage Pragmatics and Email Communication

Ko, Wei-Hong 16 December 2013 (has links)
The present study investigated learners’ interlanguage pragmatic development through analysis of ninety requestive emails written to a faculty member over a period of up to two years. Most previous studies on interlanguage pragmatics have been comparative. These studies focused on how nonnative speakers’ pragmalinguistic and sociopragmatic competence differed from native speakers’ and compared learners with different linguistic and cultural backgrounds to native speakers. In addition, the few existing literature on developmental pragmatics have used elicited. Naturally occurring data, in the form of emails, offer a more valid reflection of learners’ pragmatic competence. This study adopted speech event analysis approach, which seeks to account for all parts of requestive emails and recognize the “work” each part does in the production of the speech event. Results indicated that although quantitative analysis did not indicate much pragmatic development, content analysis revealed learners’ development of pragmatic competence such as showing ability, clearer requests and relevant supportive moves and improvement from a reason then request to request then reason structure. This study elucidated the merits of analyzing natural data in interlanguage pragmatics as well as offered the benefit of recognizing email requests as a situated event.
29

Modelling Deception Detection in Text

Gupta, Smita 29 November 2007 (has links)
As organizations and government agencies work diligently to detect financial irregularities, malfeasance, fraud and criminal activities through intercepted communication, there is an increasing interest in devising an automated model/tool for deception detection. We build on Pennebaker's empirical model which suggests that deception in text leaves a linguistic signature characterised by changes in frequency of four categories of words: first-person pronouns, exclusive words, negative emotion words, and action words. By applying the model to the Enron email dataset and using an unsupervised matrix-decomposition technique, we explore the differential use of these cue-words/categories in deception detection. Instead of focusing on the predictive power of the individual cue-words, we construct a descriptive model which helps us to understand the multivariate profile of deception based on several linguistic dimensions and highlights the qualitative differences between deceptive and truthful communication. This descriptive model can not only help detect unusual and deceptive communication, but also possibly rank messages along a scale of relative deceptiveness (for instance from strategic negotiation and spin to deception and blatant lying). The model is unintrusive, requires minimal human intervention and, by following the defined pre-processing steps it may be applied to new datasets from different domains. / Thesis (Master, Computing) -- Queen's University, 2007-11-28 18:10:30.45
30

Využití internetu v marketingových aktivitách mezinárodní firmy SGS / Usage of internet in marketing activies of international company SGS

Pešková, Zuzana January 2008 (has links)
Diplomová práce analyzuje možnosti využití internetu v marketingu se zaměřením na webové stránky a jejich roli v rámci marketingové strategie; elektronickou poštu a její dominantní postavení v rámci komunikace, extranet a jeho využití v rámci komunikace se zákazníky a intranet pro interní komunikaci. Část práce je také věnována reklamě na internetu. Konkrétně je práce věnována využití těchto nástrojů ve společnosti SGS.

Page generated in 0.0468 seconds