| Acknowledgements |
|
ix | |
| Preface |
|
xi | |
| Introduction |
|
xv | |
|
Chapter 1 Electronic Mail |
|
|
1 | (18) |
|
1.1 Electronic mail, what is it exactly? |
|
|
1 | (1) |
|
1.2 The most used communication tool in the professional world |
|
|
2 | (2) |
|
1.2.1 E-mail or telephone? |
|
|
2 | (1) |
|
1.2.2 A growth that is not slowing down |
|
|
3 | (1) |
|
1.2.3 A perfectly adapted tool for a business in touch |
|
|
4 | (1) |
|
1.3 Characteristics and beginning of misuse |
|
|
4 | (6) |
|
1.3.1 A remote and asynchronous means of communication |
|
|
5 | (1) |
|
1.3.2 Almost instantaneous and interactive |
|
|
6 | (1) |
|
|
|
7 | (1) |
|
1.3.4 Ubiquitous and mobile |
|
|
8 | (1) |
|
1.3.5 Which allows numerous messages to be sent |
|
|
8 | (1) |
|
1.3.6 On to the storing and archiving of messages |
|
|
9 | (1) |
|
1.4 E-mail versus other communication tools |
|
|
10 | (2) |
|
1.5 The structure of e-mail and its susceptibility to misuse |
|
|
12 | (3) |
|
|
|
12 | (2) |
|
1.5.2 Envelope and body of the message: two possible targets |
|
|
14 | (1) |
|
1.6 Other forms of electronic communication, other flaws |
|
|
15 | (2) |
|
|
|
15 | (1) |
|
|
|
16 | (1) |
|
|
|
17 | (1) |
|
|
|
17 | (2) |
|
Chapter 2 From Role to Identity |
|
|
19 | (14) |
|
2.1 Roles, boundaries and transitions |
|
|
19 | (2) |
|
2.1.1 Spatial and temporal boundaries |
|
|
20 | (1) |
|
|
|
21 | (7) |
|
|
|
21 | (2) |
|
|
|
23 | (3) |
|
2.2.3 Transitions between roles |
|
|
26 | (2) |
|
|
|
28 | (2) |
|
|
|
30 | (3) |
|
Chapter 3 Roles and the Digital World |
|
|
33 | (12) |
|
3.1 When electronic communications disrupt space-time |
|
|
33 | (5) |
|
3.1.1 The transformation of space |
|
|
34 | (1) |
|
3.1.2 The transformation of time |
|
|
34 | (1) |
|
3.1.3 The transformation of distance |
|
|
35 | (2) |
|
3.1.4 Mobility and ubiquity |
|
|
37 | (1) |
|
|
|
38 | (5) |
|
|
|
38 | (1) |
|
|
|
38 | (3) |
|
|
|
41 | (1) |
|
|
|
41 | (1) |
|
3.2.5 Transitions between roles |
|
|
42 | (1) |
|
|
|
43 | (2) |
|
Chapter 4 Challenges in Communication |
|
|
45 | (12) |
|
4.1 Interpersonal communication: a subtle tool |
|
|
45 | (1) |
|
4.2 Misunderstanding in communication |
|
|
46 | (5) |
|
4.2.1 Sources of misunderstanding |
|
|
47 | (1) |
|
4.2.2 The absence of an operating communication channel |
|
|
47 | (1) |
|
4.2.3 The absence of a common vocabulary |
|
|
48 | (1) |
|
4.2.4 Exclusive information context |
|
|
48 | (1) |
|
4.2.5 Situations involving incomprehension |
|
|
49 | (1) |
|
4.2.6 Distance communication |
|
|
49 | (1) |
|
4.2.7 Asynchronous communication |
|
|
50 | (1) |
|
4.2.8 Heterogeneous competence domains or levels |
|
|
50 | (1) |
|
4.2.9 Man--machine communication |
|
|
50 | (1) |
|
4.2.10 E-mail: the accumulation of obstacles to comprehension |
|
|
50 | (1) |
|
4.3 From misunderstanding to a lack of respect |
|
|
51 | (2) |
|
4.4 A challenge for digital managers: communicating with the absent other |
|
|
53 | (2) |
|
4.4.1 A lower volume of communication |
|
|
53 | (1) |
|
4.4.2 A drop in communication quality |
|
|
54 | (1) |
|
|
|
55 | (2) |
|
|
|
57 | (18) |
|
|
|
57 | (1) |
|
5.2 Preface: the influence of role on users' perceptions of messages |
|
|
57 | (4) |
|
5.3 Classifying e-mails according to role management theory |
|
|
61 | (7) |
|
5.3.1 Roles and direct and indirect idiosyncratic connections |
|
|
61 | (4) |
|
5.3.2 Roles played, transitions and perception of e-mail |
|
|
65 | (3) |
|
5.4 Message classification model |
|
|
68 | (5) |
|
5.4.1 E-mails received from unknown sources |
|
|
68 | (1) |
|
|
|
69 | (1) |
|
|
|
70 | (1) |
|
5.4.4 E-mail received from known (trusted) sources |
|
|
70 | (3) |
|
|
|
73 | (2) |
|
Chapter 6 A Lack of Ethics that Disrupts E-mail Communication |
|
|
75 | (30) |
|
6.1 There is a new behavior behind every technical asset |
|
|
75 | (1) |
|
6.2 Ethics and Information and Communication Technologies |
|
|
76 | (3) |
|
6.3 Glossary of misuses and some of their consequences |
|
|
79 | (25) |
|
|
|
104 | (1) |
|
Chapter 7 The Deadly Sins of Electronic Mail |
|
|
105 | (12) |
|
|
|
105 | (2) |
|
|
|
107 | (1) |
|
|
|
108 | (1) |
|
|
|
109 | (2) |
|
|
|
111 | (1) |
|
|
|
112 | (2) |
|
7.6.1 The ethical approach |
|
|
112 | (1) |
|
7.6.2 The managerial approach |
|
|
113 | (1) |
|
7.7 Fraudulent temptation |
|
|
114 | (1) |
|
7.8 What answers should be given to these questions? |
|
|
115 | (2) |
|
Chapter 8 The Venial Sins of Electronic Mail |
|
|
117 | (6) |
|
|
|
117 | (1) |
|
|
|
118 | (1) |
|
8.3 Communication poverty |
|
|
118 | (1) |
|
|
|
119 | (1) |
|
8.4.1 Poorly written messages |
|
|
119 | (1) |
|
|
|
119 | (1) |
|
8.4.3 When faced with misunderstanding, is empathy a solution? |
|
|
120 | (1) |
|
|
|
120 | (1) |
|
8.6 Humor, love, rumors, and all the rest |
|
|
120 | (3) |
|
Chapter 9 Exposure to Spam and Protection Strategies |
|
|
123 | (22) |
|
|
|
123 | (11) |
|
9.1.1 Dynamic factors of spam exposure |
|
|
124 | (7) |
|
9.1.2 Static factors of spam exposure |
|
|
131 | (2) |
|
9.1.3 Other risks of spam exposure |
|
|
133 | (1) |
|
9.2 Protection strategies |
|
|
134 | (8) |
|
9.2.1 Keeping separate e-mail accounts |
|
|
134 | (2) |
|
9.2.2 Using complex addresses |
|
|
136 | (1) |
|
9.2.3 Treating received spam appropriately |
|
|
136 | (2) |
|
9.2.4 Checking our e-proximity and network |
|
|
138 | (1) |
|
|
|
139 | (3) |
|
9.2.6 Modify our sensitivity to spam |
|
|
142 | (1) |
|
|
|
142 | (3) |
| Concluding Recommendations |
|
145 | (6) |
| Bibliography |
|
151 | (6) |
| Index |
|
157 | |