E-mail and Behavioral Changes

Uses and Misuses of Electronic Communications

This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented. Les mer
Vår pris
2126,-

(Innbundet) Fri frakt!
Leveringstid: Sendes innen 21 dager
På grunn av Brexit-tilpasninger og tiltak for å begrense covid-19 kan det dessverre oppstå forsinket levering.

Vår pris: 2126,-

(Innbundet) Fri frakt!
Leveringstid: Sendes innen 21 dager
På grunn av Brexit-tilpasninger og tiltak for å begrense covid-19 kan det dessverre oppstå forsinket levering.

Om boka

This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented.


Have you ever felt overwhelmed by the number of e-mail and textual messages in your inbox, be it on your laptop, your Smartphone or your PC? This book should help you in finding a wealth of answers, tools and tactics to better surf the ICT wave in the professional environment, and develop proper protection strategies to mitigate your exposure to spam in any form.

Fakta

Innholdsfortegnelse

Acknowledgements ix Preface xi Introduction xv Chapter 1. Electronic Mail 1 1.1. Electronic mail, what is it exactly? 1 1.2. The most used communication tool in the professional world 2 1.2.1. E-mail or telephone? 2 1.2.2. A growth that is not slowing down 3 1.2.3. A perfectly adapted tool for a business in touch 4 1.3. Characteristics and beginning of misuse 4 1.3.1. A remote and asynchronous means of communication 5 1.3.2. Almost instantaneous and interactive 6 1.3.3. Textual 7 1.3.4. Ubiquitous and mobile 8 1.3.5. Which allows numerous messages to be sent 8 1.3.6. On to the storing and archiving of messages 9 1.4. E-mail versus other communication tools 10 1.5. The structure of e-mail and its susceptibility to misuse 12 1.5.1. Structure 12 1.5.2. Envelope and body of the message: two possible targets 14 1.6. Other forms of electronic communication, other flaws 15 1.6.1. Instant messaging 15 1.6.2. Micro-blogging 16 1.6.3. Social networks 17 1.7. Conclusion 17 Chapter 2. From Role to Identity 19 2.1. Roles, boundaries and transitions 19 2.1.1. Spatial and temporal boundaries 20 2.2. Roles 21 2.2.1. Definition 21 2.2.2. Role boundaries 23 2.2.3. Transitions between roles 26 2.3. Identities 28 2.4. Conclusion 30 Chapter 3. Roles and the Digital World 33 3.1. When electronic communications disrupt space-time 33 3.1.1. The transformation of space 34 3.1.2. The transformation of time 34 3.1.3. The transformation of distance 35 3.1.4. Mobility and ubiquity 37 3.2. Role transformation 38 3.2.1. Role boundaries 38 3.2.2. Flexibility 38 3.2.3. Permeability 41 3.2.4. Role separation 41 3.2.5. Transitions between roles 42 3.3. Conclusion 43 Chapter 4. Challenges in Communication 45 4.1. Interpersonal communication: a subtle tool 45 4.2. Misunderstanding in communication 46 4.2.1. Sources of misunderstanding 47 4.2.2. The absence of an operating communication channel 47 4.2.3. The absence of a common vocabulary 48 4.2.4. Exclusive information context 48 4.2.5. Situations involving incomprehension 49 4.2.6. Distance communication 49 4.2.7. Asynchronous communication 50 4.2.8. Heterogeneous competence domains or levels 50 4.2.9. Man machine communication 50 4.2.10. E-mail: the accumulation of obstacles to comprehension 50 4.3. From misunderstanding to a lack of respect 51 4.4. A challenge for digital managers: communicating with the absent other 53 4.4.1. A lower volume of communication 53 4.4.2. A drop in communication quality 54 4.5. Conclusion 55 Chapter 5. Defining Spam 57 5.1. What is spam? 57 5.2. Preface: the influence of role on users perceptions of messages 57 5.3. Classifying e-mails according to role management theory 61 5.3.1. Roles and direct and indirect idiosyncratic connections 61 5.3.2. Roles played, transitions and perception of e-mail 65 5.4. Message classification model 68 5.4.1. E-mails received from unknown sources 68 5.4.2. Commercial spam 69 5.4.3. Fraudulent spam 70 5.4.4. E-mail received from known (trusted) sources 70 5.5. Conclusion 73 Chapter 6. A Lack of Ethics that Disrupts E-mail Communication 75 6.1. There is a new behavior behind every technical asset 75

Om forfatteren