Details

E-mail and Behavioral Changes


E-mail and Behavioral Changes

Uses and Misuses of Electronic Communications
1. Aufl.

von: Fernando Lagrana

139,99 €

Verlag: Wiley
Format: EPUB
Veröffentl.: 03.03.2016
ISBN/EAN: 9781119285120
Sprache: englisch
Anzahl Seiten: 184

DRM-geschütztes eBook, Sie benötigen z.B. Adobe Digital Editions und eine Adobe ID zum Lesen.

Beschreibungen

<p>This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented.</p> <p>Have you ever felt overwhelmed by the number of e-mail and textual messages in your inbox, be it on your laptop, your Smartphone or your PC? This book should help you in finding a wealth of answers, tools and tactics to better surf the ICT wave in the professional environment, and develop proper protection strategies to mitigate your exposure to spam in any form.</p>
<p>Acknowledgements ix</p> <p>Preface xi</p> <p>Introduction xv</p> <p><b>Chapter 1. Electronic Mail 1</b></p> <p>1.1. Electronic mail, what is it exactly? 1</p> <p>1.2. The most used communication tool in the professional world 2</p> <p>1.2.1. E-mail or telephone? 2</p> <p>1.2.2. A growth that is not slowing down 3</p> <p>1.2.3. A perfectly adapted tool for a business in touch 4</p> <p>1.3. Characteristics and beginning of misuse 4</p> <p>1.3.1. A remote and asynchronous means of communication 5</p> <p>1.3.2. Almost instantaneous and interactive 6</p> <p>1.3.3. Textual 7</p> <p>1.3.4. Ubiquitous and mobile 8</p> <p>1.3.5. Which allows numerous messages to be sent 8</p> <p>1.3.6. On to the storing and archiving of messages 9</p> <p>1.4. E-mail versus other communication tools 10</p> <p>1.5. The structure of e-mail and its susceptibility to misuse 12</p> <p>1.5.1. Structure 12</p> <p>1.5.2. Envelope and body of the message: two possible targets 14</p> <p>1.6. Other forms of electronic communication, other flaws 15</p> <p>1.6.1. Instant messaging 15</p> <p>1.6.2. Micro-blogging 16</p> <p>1.6.3. Social networks 17</p> <p>1.7. Conclusion 17</p> <p><b>Chapter 2. From Role to Identity 19</b></p> <p>2.1. Roles, boundaries and transitions 19</p> <p>2.1.1. Spatial and temporal boundaries 20</p> <p>2.2. Roles 21</p> <p>2.2.1. Definition 21</p> <p>2.2.2. Role boundaries 23</p> <p>2.2.3. Transitions between roles 26</p> <p>2.3. Identities 28</p> <p>2.4. Conclusion 30</p> <p><b>Chapter 3. Roles and the Digital World 33</b></p> <p>3.1. When electronic communications disrupt space-time 33</p> <p>3.1.1. The transformation of space 34</p> <p>3.1.2. The transformation of time 34</p> <p>3.1.3. The transformation of distance 35</p> <p>3.1.4. Mobility and ubiquity 37</p> <p>3.2. Role transformation 38</p> <p>3.2.1. Role boundaries 38</p> <p>3.2.2. Flexibility 38</p> <p>3.2.3. Permeability 41</p> <p>3.2.4. Role separation 41</p> <p>3.2.5. Transitions between roles 42</p> <p>3.3. Conclusion 43</p> <p><b>Chapter 4. Challenges in Communication 45</b></p> <p>4.1. Interpersonal communication: a subtle tool 45</p> <p>4.2. Misunderstanding in communication 46</p> <p>4.2.1. Sources of misunderstanding 47</p> <p>4.2.2. The absence of an operating communication channel 47</p> <p>4.2.3. The absence of a common vocabulary 48</p> <p>4.2.4. Exclusive information context 48</p> <p>4.2.5. Situations involving incomprehension 49</p> <p>4.2.6. Distance communication 49</p> <p>4.2.7. Asynchronous communication 50</p> <p>4.2.8. Heterogeneous competence domains or levels 50</p> <p>4.2.9. Man–machine communication 50</p> <p>4.2.10. E-mail: the accumulation of obstacles to comprehension 50</p> <p>4.3. From misunderstanding to a lack of respect 51</p> <p>4.4. A challenge for digital managers: communicating with the absent other 53</p> <p>4.4.1. A lower volume of communication 53</p> <p>4.4.2. A drop in communication quality 54</p> <p>4.5. Conclusion 55</p> <p><b>Chapter 5. Defining Spam 57</b></p> <p>5.1. What is spam? 57</p> <p>5.2. Preface: the influence of role on users’ perceptions of messages 57</p> <p>5.3. Classifying e-mails according to role management theory 61</p> <p>5.3.1. Roles and direct and indirect idiosyncratic connections 61</p> <p>5.3.2. Roles played, transitions and perception of e-mail 65</p> <p>5.4. Message classification model 68</p> <p>5.4.1. E-mails received from unknown sources 68</p> <p>5.4.2. Commercial spam 69</p> <p>5.4.3. Fraudulent spam 70</p> <p>5.4.4. E-mail received from known (trusted) sources 70</p> <p>5.5. Conclusion 73</p> <p><b>Chapter 6. A Lack of Ethics that Disrupts E-mail Communication 75</b></p> <p>6.1. There is a new behavior behind every technical asset 75</p> <p>6.2. Ethics and Information and Communication Technologies 76</p> <p>6.3. Glossary of misuses and some of their consequences 79</p> <p>6.4. Conclusion 104</p> <p><b>Chapter 7. The Deadly Sins of Electronic Mail 105</b></p> <p>7.1. Carefree exuberance 105</p> <p>7.2. Confused identity 107</p> <p>7.3. Cold indifference 108</p> <p>7.4. Impassioned anger 109</p> <p>7.5. Lost truth 111</p> <p>7.6. The door of secrets 112</p> <p>7.6.1. The ethical approach 112</p> <p>7.6.2. The managerial approach 113</p> <p>7.7. Fraudulent temptation 114</p> <p>7.8. What answers should be given to these questions? 115</p> <p><b>Chapter 8. The Venial Sins of Electronic Mail 117</b></p> <p>8.1. Information overload 117</p> <p>8.2. Anonymous disrespect 118</p> <p>8.3. Communication poverty 118</p> <p>8.4. Misunderstanding 119</p> <p>8.4.1. Poorly written messages 119</p> <p>8.4.2. Misread messages 119</p> <p>8.4.3. When faced with misunderstanding, is empathy a solution? 120</p> <p>8.5. Culpable ambiguity 120</p> <p>8.6. Humor, love, rumors, and all the rest 120</p> <p><b>Chapter 9. Exposure to Spam and Protection Strategies 123</b></p> <p>9.1. Risk behaviors 123</p> <p>9.1.1. Dynamic factors of spam exposure 124</p> <p>9.1.2. Static factors of spam exposure 131</p> <p>9.1.3. Other risks of spam exposure 133</p> <p>9.2. Protection strategies 134</p> <p>9.2.1. Keeping separate e-mail accounts 134</p> <p>9.2.2. Using complex addresses 136</p> <p>9.2.3. Treating received spam appropriately 136</p> <p>9.2.4. Checking our e-proximity and network 138</p> <p>9.2.5. Filters 139</p> <p>9.2.6. Modify our sensitivity to spam 142</p> <p>9.3. Conclusion 142</p> <p>Concluding Recommendations 145</p> <p>Bibliography 151</p> <p>Index 157</p>
<strong>Dr. Fernando A. Lagraña</strong>, Grenoble Ecole de Management/Webster University, Geneva.

Diese Produkte könnten Sie auch interessieren:

Intelligent Internet Knowledge Networks
Intelligent Internet Knowledge Networks
von: Syed V. Ahamed
PDF ebook
144,99 €
Applied Cryptanalysis
Applied Cryptanalysis
von: Mark Stamp, Richard M. Low
PDF ebook
114,99 €
Connections
Connections
von: H. Peter Alesso, Craig F. Smith
PDF ebook
69,99 €