• Refine Query
  • Source
  • Publication year
  • to
  • Language
  • 10
  • 2
  • 2
  • 2
  • 1
  • 1
  • Tagged with
  • 21
  • 4
  • 4
  • 4
  • 3
  • 3
  • 3
  • 3
  • 3
  • 3
  • 2
  • 2
  • 2
  • 2
  • 2
  • About
  • The Global ETD Search service is a free service for researchers to find electronic theses and dissertations. This service is provided by the Networked Digital Library of Theses and Dissertations.
    Our metadata is collected from universities around the world. If you manage a university/consortium/country archive and want to be added, details can be found on the NDLTD website.
11

Recruitment at Bowling Green State University: The Role of Social and Digital Media

Glassford, Sarah R. 12 November 2010 (has links)
No description available.
12

It's About Time: The Temporal Impacts of Information and Communication Technology (ICT) on Groups

Shen, Zixing January 2009 (has links)
No description available.
13

Rétablir la confiance dans les messages électroniques : Le traitement des causes du "spam" / Restoring confidence in electronic mails

Laurent-Ricard, Eric 09 December 2011 (has links)
L'utilisation grandissante de la messagerie électronique dans les échanges dématérialisés, aussi bien pour les entreprises que pour les personnes physiques, et l'augmentation du nombre de courriers indésirables, nommés « spams » (pourriels) génèrent une perte de temps importante de traitement manuel, et un manque de confiance à la fois dans les informations transmises et dans les émetteurs de ces messages. Quels sont les solutions pour rétablir ou établir la confiance dans ces échanges ? Comment traiter et faire diminuer le nombre grandissant de « spams » ? Les solutions existantes sont parfois lourdes à mettre en oeuvre ou relativement peu efficaces et s’occupent essentiellement de traiter les effets du « spam », en oubliant d’analyser et de traiter les causes. L'identification, si ce n'est l'authentification de l'émetteur et des destinataires, est un des points clés permettant de valider l'origine d'un message et d’en garantir le contenu, aussi bien qu’un niveau important de traçabilité, mais ce n’est pas le seul, et les mécanismes de base mêmes de la messagerie électronique, plus précisément au niveau des protocoles de communication sont également en jeu. Le contenu de cette thèse portera plus spécifiquement sur les possibilités liées aux modifications de certains protocoles de l'Internet, en particulier le protocole SMTP, la mise en oeuvre de spécifications peu utilisées, et les outils et méthodes envisageables pour garantir l’identification des parties de façon simple et transparente pour les utilisateurs. L’objectif est de définir, d'une part une méthodologie d'utilisation de la messagerie pouvant assurer fiabilité et confiance, et d'autre part de rédiger les bases logiques de programmes clients et serveurs pour la mise en application de cette méthodologie. / The growing use of email in dematerialized exchanges, for both businesses and individuals, and the increase of undesirable mails, called "spam" (junk emails) generate a significant loss of time of manual processing And a lack of confidence both in the information transmitted and the issuers of such messages. What are the solutions to restore or build confidence in these exchanges? How to treat and reduce the growing number of «spam»?Existing solutions are often cumbersome to implement or relatively ineffective and are primarily concerned with treating the effects of "«spam»", forgetting to analyze and address the causes.The identification, if not the authentication, of the sender and recipients, is a key point to validate the origin of a message and ensure the content, as well as a significant level of traceability, but it is not the only one, and the basic mechanisms, themselves, of the email system, more precisely in terms of communication protocols are also at stake.The content of this thesis will focus primarily on opportunities related to changes in some Internet protocols, in particular SMTP, implementation specifications rarely used, and the tools and possible methods to ensure the identification of parties in a simple and transparent way for users.The objective is to define, firstly a methodology for using the mail with reliability and confidence, and secondly to draw the logical foundations of client and server programs for the implementation of this methodology.
14

Formulaic Sequences in Business and Academic Writing of English Learners

Xia, Detong 23 May 2022 (has links)
No description available.
15

Reaktiveringsmejl : En metod för ökad lönsamhet? / Reactivtion e-mails : A tool for an increased profitability?

Berntsson, Emma, Berggren, Evelina January 2018 (has links)
Trots att e-handeln har ökat under de senaste decennierna, är konverteringsgraden för onlinebutiker inom modesegmentet fortfarande låg. Detta kan bero på det fenomen som kallas “shopping cart abandonment”, vilket innebär att kunder lägger varor i sina virtuella varukorgar men inte sluför köpet. Det finns många anledningar till varför kunderna agerar på detta sätt. En av de vanligaste orsakerna är att det föredragna betalningsalternativet inte är tillgängligt. Eftersom alla fall av shopping cart abandonment innebär en förlorad försäljning är det viktigt för onlineföretag att arbeta mot en högre konverteringsgrad då även den minsta ökningen av slutförda köp innebär en ökad lönsamhet. Därför bör det vara av intresse för alla onlineföretag att upprätta rutiner för att se till att kunderna kommer att slutföra sina köp. Ett sätt att göra detta är att påminna kunderna via e-mejl om produkterna i den övergivna kundvagnen. Dessa mejl kallas reaktiveringsmejl och innebär i grunden att företaget skickar ett mejl till de kunder som övergivit sin virtuella varukorg. Huvudfokus i denna studie är reaktiveringsmejl med syfte att undersöka hur e-handelsföretag inom mode och textilbranschen använder reaktiveringsmejl och om de i så fall sett en ökning i konverteringsgraden. För att uppfylla syftet har två olika datainsamlingsmetoder använts. Först och främst genomfördes ett experiment bland e-handelsföretag inom det valda segmentet för att på så vis få en bild av hur vanligt det är att använda reaktiveringsmejl. Efter detta genomfördes telefonintervjuer med ett antal av dessa företag för att få en mer djupgående förståelse kring reaktiveringsmejl. Undersökningens resultat visar att användningen av dessa e-postmeddelanden inte är så vanlig, men däremot att det är ett framgångsrikt sätt att minska förekomsten av shopping cart abandonment samt öka konverteringsgraden. / Even though e-retail has increased over the last few decades, the conversion rate for online stores in the fashion segment is still relatively low. This might be due to a phenomenon called “shopping cart abandonment”, which means that online customers place products in their virtual carts but never follow through with a purchase. There are many reasons why customers balk before the very last click. One of the more common causes is that the preferred payment option is not available. However, since all cases of shopping cart abandonment mean lost sales, it is important for online companies to work towards a higher conversion rate since even the smallest increase in completed purchases results in increased profitability. Therefore, it should be of interest for all online enterprises to establish procedures to ensure that customers will complete their online purchases. One way to do this is to remind the customers via e-mail about the products in the abandoned cart, which is called reactivation e-mails, and basically means that online companies send e-mails to the customers who abandoned their virtual carts. The main focus for this thesis is reactivation e-mails, with the purpose to examine how online enterprises in the fashion and textile segment use reactivation e-mails and if they have seen an increase in their conversion rate. To fulfill the purpose, companies within the chosen segment that offer online retail to their customers, have been interviewed about the subject and the findings show that the use of these e-mails is an effective way to increase the conversion rate and decrease the occurrence of shopping cart abandonment. Two different methods for data collection have been used for this study. Firstly, an experiment was conducted among e-commerce companies within the selected segment in order to determine how common it is to use reactivation emails. Secondly, telephone interviews were conducted with several of these companies to gain a deeper understanding of reactivation emails. The results of this survey show that the use of these emails is not very common, but it is clearly a very effective way to reduce the occurrence of shopping cart abandonment. It also increases conversion rates and given the relatively low cost to implement, it should be embraced industry wide.
16

Do Booster Emails Improve Learning Transfer Among Parenting Professionals?

Stout, Benjamin C. 01 May 2019 (has links)
Parenting professionals play a key role in helping parents have a positive influence on their children, which is why it is important to ensure that professionals have and use research-based information and materials. Using data from 96 parenting professionals from Utah and Missouri, who completed a 4-hour Strong Parents, Stable Children training, we examined the effects (at 2-months post training) of reflective reminder emails on parenting professionals’ utilization and learning transfer of training materials. Results from independent samples t tests show that participants who received “booster” emails at 1-week and 1-month post training shared some information and some materials with parents more frequently, and spent more time reviewing training materials and making further notes than did a control group. Implications for improving training implementation for parenting professionals are discussed.
17

An ontological approach for monitoring and surveillance systems in unregulated markets

Younis Zaki, Mohamed January 2013 (has links)
Ontologies are a key factor of Information management as they provide a common representation to any domain. Historically, finance domain has suffered from a lack of efficiency in managing vast amounts of financial data, a lack of communication and knowledge sharing between analysts. Particularly, with the growth of fraud in financial markets, cases are challenging, complex, and involve a huge volume of information. Gathering facts and evidence is often complex. Thus, the impetus for building a financial fraud ontology arises from the continuous improvement and development of financial market surveillance systems with high analytical capabilities to capture frauds which is essential to guarantee and preserve an efficient market.This thesis proposes an ontology-based approach for financial market surveillance systems. The proposed ontology acts as a semantic representation of mining concepts from unstructured resources and other internet sources (corpus). The ontology contains a comprehensive concept system that can act as a semantically rich knowledge base for a market monitoring system. This could help fraud analysts to understand financial fraud practices, assist open investigation by managing relevant facts gathered for case investigations, providing early detection techniques of fraudulent activities, developing prevention practices, and sharing manipulation patterns from prosecuted cases with investigators and relevant users. The usefulness of the ontology will be evaluated through three case studies, which not only help to explain how manipulation in markets works, but will also demonstrate how the ontology can be used as a framework for the extraction process and capturing information related to financial fraud, to improve the performance of surveillance systems in fraud monitoring. Given that most manipulation cases occur in the unregulated markets, this thesis uses a sample of fraud cases from the unregulated markets. On the empirical side, the thesis presents examples of novel applications of text-mining tools and data-processing components, developing off-line surveillance systems that are fully working prototypes which could train the ontology in the most recent manipulation techniques.
18

Nappar ditt företag på falskt bete? : En undersökning om hur små- och medelstora företag i Sverige skyddar sig mot phishing-mejl.

Hägg, Filip, Johansson, Filip January 2023 (has links)
Mängden phishing-mejl har ständigt ökat under de senaste åren, i synnerhet mot företag och organisationer. Syftet med denna studie är att undersöka hur små- och medelstora IT-mogna företag (SMF:er) i Sverige skyddar sig mot phishing-mejl, deras största utmaningar med detta, och hur de upplevt att deras utsatthet förändrats under de senaste åren. Genom denna undersökning har brister i hur SMF:erna skyddar sig identifierats och säkerhetsåtgärder som hanterar SMF:ernas utmaningar tagits fram. Data samlades in genom både litteraturstudie och semistrukturerade-intervjuer med sju respondenter från enskilda företag, där samtliga hade ansvar för någon del i informationssäkerhetsarbetet. Resultatet visar att verksamheterna skyddar sig främst genom att sprida information, medan enbart en minoritet av respondenterna utbildar sina anställda. Ingen av respondenterna hade någon policy som berör hantering av phishing, och användandet av grundläggande tekniska skydd är något som var en gemensam nämnare. Gällande utmaningar visar resultatet främst en svårighet i att upprätthålla medvetenheten bland de anställda, samt att identifiera vilka tekniska skyddslösningar som ska anpassas. Majoriteten av respondenterna upplever även en ökad utsatthet av phishing-mejl, vilket de flesta också tror kommer att öka i framtiden. Med den insamlade data från intervjuerna och befintlig litteratur har sedan en rekommendationslista med säkerhetsåtgärder tagits fram som bemöter de utmaningar som SMF:erna belyser. / The number of phishing emails has been constantly increasing in recent years, especially towards businesses and organizations. The purpose of this study is to investigate how small and medium-sized IT-mature enterprises (SMEs) in Sweden protect themselves against phishing emails, their biggest challenges regarding this, as well as how they perceive that their exposure to phishing emails has changed in recent years. Through this study, gaps in how SMEs protect themselves have been identified and as a result, a list of security measures that address the SMEs' challenges have been produced. Data was gathered by conducting a literature study in conjunction with semistructured interviews with seven respondents, all whom where from individual companies and had some responsibility for the information security work. The results show that all SMEs rely on information sharing as their primary method of protection against phishing emails, while only a small proportion invest in employee education. In addition, the SMEs use only basic technical security solutions and none of them have any dedicated policy for managing phishing. Regarding challenges, the results mainly show difficulties in maintaining awareness among employees and identifying which technical security solutions that should be adapted. Furthermore, most of the respondents perceive that the exposure to phishing emails has increased and believe it will continue doing so in the future. With the collected data from the interviews and the literature study, a list of recommended security measures has compiled which addresses the challenges highlighted by the SMEs.
19

Vlastní próza s autorským komentářem / Personal prose with an authorial commentary

Hereinová, Olga January 2011 (has links)
RESUME The thesis 'Personal prose with an authorial commentary' consists of two parts. The first part is the authorial prose. The prose is titled The Subject: This is a novel in emails describing a partnership triangle. Jirka responds to Danka's advertisement on an Internet dating site looking for a pen pal. Although both of them are living with a partner their pen friendship grows into a love afair. The relationship and intimacy of characters are revealed through the correspondence of other people. Not only does Jirka correspond with Karel, his friend, but also his girlfriend confides Jirka's behavior to her friend Šárka. Jirka gets himself into a difficult position between two women. They then resolve the situation for him - both abandon him. In the second part of the thesis - reflection - the circumstances of the work's origin are discussed and particular aspects of the novel are reflected. In addition to the plot construction, character configuration and their characteristics the main focus is on the meaning of the work, and due to which the work's conclusion and the title have suffered. Coping with the form of emails, which is used in the novel, is also taken into consideration and the inclusion of the text into the genre of women's literature. The inability to cross autobiographical borders and...
20

Caractérisation de l'anglais comme lingua franca professionnelle à travers une analyse de corpus de courriels échangés en entreprise : une étude de registre / Characterisation of English as a professional lingua franca : a corpus-based, register study of corporate emails

Millot, Philippe 15 November 2012 (has links)
Cette thèse est une contribution à la branche professionnelle de l'anglais de spécialité et au domaine de l'anglais comme lingua franca. Le contexte de la recherche est le milieu de l'entreprise où les employés échangent des courriels dans le cadre de la réalisation d'actions professionnelles routinières. Dans ce contexte, l'anglais est considéré comme une langue internationale et, dans la situation où les employés sont natifs d'autres langues que l'anglais, la lingua franca. La première partie traite des quatre concepts fondamentaux de cette recherche : l'anglais comme langue internationale, le registre, la phraséologie et les discours professionnels. De ces quatre concepts émerge l'hypothèse selon laquelle l'analyse du discours professionnel en général et des courriels professionnels en particulier reposent sur la modélisation de situations professionnelles récurrentes en situations professionnelles typiques d'échange. Cette modélisation permet ensuite une analyse de registre. La seconde partie présente la démarche méthodologique dont l'objectif estla constitution d'un corpus de 500 courriels professionnels à partir d'une base de données plus large que nous avons constituée lors de notre enquête de terrain dans le monde de l'entreprise. Le corpus est tout d'abord défini selon quatre situations linguistiques que nous présentons ci-dessous : 1. scripteurs natifs et destinataires natifs 2. scripteurs natifs et destinataires non natifs 3. scripteurs non natifs et destinataires natifs 4. scripteurs non natifs et destinataires non natifs Il est ensuite défini selon les quatre situations professionnelles suivantes : 1. achats et ventes de produits 2. management d'équipes distantes 3. administration des ressources humaines 4. résolution de problèmes techniques A partir de ce corpus, nous menons une étude de la variation sur trois ensembles de traits linguistico-discursifs et paralinguistiques qui nous permettent d'évaluer le degré de minimalisme dans les courriels, le degré d'imbrication du texte dans le contexte ainsi que de mesurer le caractère interpersonnel et intime de ce type d'échange. Notre étude nous mène tout d'abord à confirmer que l'analyse de registre est une approche efficace pour la caractérisation des discours ordinaires et routiniers dans les entreprises. Elle interroge ensuite la solidité des normes et du concept de communauté de discours en présentant l'anglais en circulation sur les réseaux professionnels, éphémères et mondiaux, comme une variété fluide. / This dissertation is a contribution to both the professional branch of English for Specific Purposes and English as a lingua franca. The research takes place in the corporate world where employees exchange emails during the course of their professional routines. In this context, English is considered as an international language and, in the situations where employees are natives of other languages than English, the lingua franca. In the first part, the four fundamental concepts used in this study are introduced: (1) English as an international language, (2) register, (3) phraseology, and (4) professional discourse. From this introduction emerges the hypothesis that professional discourse analysis in general and professional emails in particular are based on modelising recurrent, professional situations into typical exchange situations then allowing for register analysis. The second part deals with the methodological approach which consists in building a corpus comprising 500 messages extracted from a larger database which was collected while we did fieldwork in the corporate world. The corpus is defined by the four following linguistic situations : 1. native professionals writing to native professionals 2. native professionals writing to non-native professionals 3. non-native professionals writing to native professionals 4. non-native professionals writing to non-native professionals It is also defined by four professional situations, namely : 1. selling and purchasing 2. team management 3. human resources management 4. technical problem solving The situations are then used to conduct a corpus-based, register analysis alongthree linguistic and paralinguistic dimensions. Each dimension seeks to characterise professional emails as a form of minimal, embedded, and interpersonal discourse. More generally, this thesis explores and challenges the solidity of traditional norms and that of the concept of discourse community by presenting the English used in global, ephemeral and professional networks as a fluid variety.

Page generated in 0.0678 seconds