• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 94
  • 25
  • 16
  • 8
  • 4
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • Tagged with
  • 213
  • 52
  • 42
  • 37
  • 35
  • 29
  • 28
  • 24
  • 21
  • 21
  • 20
  • 17
  • 17
  • 16
  • 15
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
51

The Quest to Secure Email: A Usability Analysis of Key Management Alternatives

Andersen, Jeffrey Thomas 01 July 2016 (has links)
The current state of email security is lacking, and the need for end-to-end encryption of email is clear. Recent research has begun to make progress towards usable, secure email for the masses (i.e., novice users without IT support). In this paper, we evaluate the usability implications of three different key management approaches: PGP, IBE, and passwords. Our work is the first formal A/B evaluation of the usability of different key management schemes, and the largest formal evaluation of secure email ever performed. Our results reveal interesting inherent usability trade-offs for each approach to secure email. Furthermore, our research results in the first fully-implemented PGP-based secure email system that has been shown to be usable for novice users. We share qualitative feedback from participants that provides valuable insights into user attitudes regarding each key management approach and secure email generally. Finally, our work provides an important validation of methodology and design principles described in prior work.
52

Attaching Social Interactions Surrounding Software Changes to the Release History of an Evolving Software System

Baysal, Olga January 2006 (has links)
Open source software is designed, developed and maintained by means of electronic media. These media include discussions on a variety of issues reflecting the evolution of a software system, such as reports on bugs and their fixes, new feature requests, design change, refactoring tasks, test plans, etc. Often this valuable information is simply buried as plain text in the mailing archives. We believe that email interactions collected prior to a product release are related to its source code modifications, or if they do not immediately correlate to change events of the current release, they might affect changes happening in future revisions. In this work, we propose a method to reason about the nature of software changes by mining and correlating electronic mailing list archives. Our approach is based on the assumption that developers use meaningful names and their domain knowledge in defining source code identifiers, such as classes and methods. We employ natural language processing techniques to find similarity between source code change history and history of public interactions surrounding these changes. Exact string matching is applied to find a set of common concepts between discussion vocabulary and changed code vocabulary. We apply our correlation method on two software systems, LSEdit and Apache Ant. The results of these exploratory case studies demonstrate the evidence of similarity between the content of free-form text emails among developers and the actual modifications in the code. We identify a set of correlation patterns between discussion and changed code vocabularies and discover that some releases referred to as minor should instead fall under the major category. These patterns can be used to give estimations about the type of a change and time needed to implement it.
53

Attaching Social Interactions Surrounding Software Changes to the Release History of an Evolving Software System

Baysal, Olga January 2006 (has links)
Open source software is designed, developed and maintained by means of electronic media. These media include discussions on a variety of issues reflecting the evolution of a software system, such as reports on bugs and their fixes, new feature requests, design change, refactoring tasks, test plans, etc. Often this valuable information is simply buried as plain text in the mailing archives. We believe that email interactions collected prior to a product release are related to its source code modifications, or if they do not immediately correlate to change events of the current release, they might affect changes happening in future revisions. In this work, we propose a method to reason about the nature of software changes by mining and correlating electronic mailing list archives. Our approach is based on the assumption that developers use meaningful names and their domain knowledge in defining source code identifiers, such as classes and methods. We employ natural language processing techniques to find similarity between source code change history and history of public interactions surrounding these changes. Exact string matching is applied to find a set of common concepts between discussion vocabulary and changed code vocabulary. We apply our correlation method on two software systems, LSEdit and Apache Ant. The results of these exploratory case studies demonstrate the evidence of similarity between the content of free-form text emails among developers and the actual modifications in the code. We identify a set of correlation patterns between discussion and changed code vocabularies and discover that some releases referred to as minor should instead fall under the major category. These patterns can be used to give estimations about the type of a change and time needed to implement it.
54

The effects of message framing, source credibility, and product involvement on intention to forward e-mail

Chen, Chia-chung 28 July 2004 (has links)
With great growth of the use of internet ,the communication based on computer-mediated system or so called electronic word-of-mouth becomes more important. In these ways to exchange information, forward mail is unique and powerful especially. In this research, we would like to know what factors make people to decide to forward a e-mail or not, and what kind of roles these factors play in the process to make decision. Three factors were discussed in this research, including¡Gmessage framing, source credibility and product involvement, and the theory of reasoned action was applied to explain the behavior of forwarding e-mail. Through ANOVA and regression analysis to analyze 472 effective samples, the findings are outlined below¡G 1. E-mail users hold better attitude to forward negative message, and have more intention to forward it. 2. E-mail users hold better attitude to forward the message which has high source credibility, and have more intention to forward it. 3. The effect of subjective norm on intention to forward the email is greater than the effect of attitude.
55

Anti-phishing system : Detecting phishing e-mail

Mei, Yuanxun January 2008 (has links)
<p>Because of the development of the Internet and the rapid increase of the electronic commercial, the incidents on stealing the consumers' personal identify data and financial account credentials are becoming more and more common. This phenomenon is called phishing. Now phishing is so popular that web sites such as papal , eBay, MSN, Best Buy, and America Online are frequently spoofed by phishers. What’s more, the amount of the phishing sites is increasing at a high rate.</p><p>The aim of the report is to analyze different phishing phenomenon and help the readers to identify phishing attempts. Another goal is to design an anti-phishing system which can detect the phishing e-mails and then perform some operations to protect the users. Since this is a big project, I will focus on the mail detecting part that is to analyze the detected phishing emails and extract details from these mails.</p><p>A list of the most important information of this phishing mail is extracted, which contains “mail subject”, “ mail received date”, “targeted user”, “the links”, and “expiration and creation date of the domain”. The system can presently extract this information from 40% of analyzed e-mails.</p>
56

Mail-Filter-Funktionen

Leuschner, Jens 27 February 2002 (has links) (PDF)
Im Rahmen dieser Studienarbeit wird untersucht, welche Lösungen es momentan zur Filterung von Email mit unerwünschten Schadensfunktionen auf Mailservern gibt. Dabei werden sowohl offene als auch proprietäre Lösungen betrachtet und die momentanen Randbedingungen der TU Chemnitz beachtet.
57

Leveraging Email based Social Networks to Prevent Spam: Framework, System Design and Evaluation / Leveraging Email based Social Networks to Prevent Spam: Framework, System Design and Evaluation

Hameed, Sufian 06 September 2012 (has links)
No description available.
58

Email, Colors and Fonts: Responses to How Email Advertising Influences Consumer Buying Behavior and Judgment of Appeal

Stalnecker, Zoe 01 January 2014 (has links)
This study examined how various combinations of colors and fonts in email advertisements affect a consumer’s likelihood of purchasing a product and her judgment of appeal. It further examined overall perceptions of email advertisements. The study conducted a survey containing eighteen simulated emails that was distributed over Amazon MTurk. A total of 116 participants in the United States took the survey. Results showed that most participants preferred a yellow foreground to orange and purple, and a blue background to red and green. Findings also revealed that Georgia font style was consistently preferred over Onyx font style. Results showed that emails comprising of a blue background, yellow foreground and Georgia font style were especially significant in influencing consumers to purchase a product and were the most appealing.
59

Establishing Distributed Social Network Trust Model in MobiCloud System

January 2011 (has links)
abstract: This thesis proposed a novel approach to establish the trust model in a social network scenario based on users' emails. Email is one of the most important social connections nowadays. By analyzing email exchange activities among users, a social network trust model can be established to judge the trust rate between each two users. The whole trust checking process is divided into two steps: local checking and remote checking. Local checking directly contacts the email server to calculate the trust rate based on user's own email communication history. Remote checking is a distributed computing process to get help from user's social network friends and built the trust rate together. The email-based trust model is built upon a cloud computing framework called MobiCloud. Inside MobiCloud, each user occupies a virtual machine which can directly communicate with others. Based on this feature, the distributed trust model is implemented as a combination of local analysis and remote analysis in the cloud. Experiment results show that the trust evaluation model can give accurate trust rate even in a small scale social network which does not have lots of social connections. With this trust model, the security in both social network services and email communication could be improved. / Dissertation/Thesis / M.S. Computer Science 2011
60

Informační portál o zdraví a kráse pro značku Lifesaver

Grulich, Martin January 2015 (has links)
This thesis deals with the creation of the web portal of health and beauty focused on email marketing for the brand Lifesaver. The theoretical part deals with general issues of web applications with MVC architecture, evaluate the advantages and disadvantages of competing portals that are similarly based, email marketing, and finally describe the brand Lifesaver and its needs. Own work consists in programming a web portal using MVC architecture, including the creation of the logo and graphic design according to the requirements and needs of the company Lifesaver.

Page generated in 0.0671 seconds