Muutke küpsiste eelistusi

E-raamat: E-mail and Behavioral Changes - Uses and Misuses of Electronic Communications: Uses and Misuses of Electronic Communications [Wiley Online]

  • Formaat: 184 pages
  • Ilmumisaeg: 01-Mar-2016
  • Kirjastus: ISTE Ltd and John Wiley & Sons Inc
  • ISBN-10: 1119285100
  • ISBN-13: 9781119285106
  • Wiley Online
  • Hind: 174,45 €*
  • * hind, mis tagab piiramatu üheaegsete kasutajate arvuga ligipääsu piiramatuks ajaks
  • Formaat: 184 pages
  • Ilmumisaeg: 01-Mar-2016
  • Kirjastus: ISTE Ltd and John Wiley & Sons Inc
  • ISBN-10: 1119285100
  • ISBN-13: 9781119285106

This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented.

Have you ever felt overwhelmed by the number of e-mail and textual messages in your inbox, be it on your laptop, your Smartphone or your PC? This book should help you in finding a wealth of answers, tools and tactics to better surf the ICT wave in the professional environment, and develop proper protection strategies to mitigate your exposure to spam in any form.

Acknowledgements ix
Preface xi
Introduction xv
Chapter 1 Electronic Mail
1(18)
1.1 Electronic mail, what is it exactly?
1(1)
1.2 The most used communication tool in the professional world
2(2)
1.2.1 E-mail or telephone?
2(1)
1.2.2 A growth that is not slowing down
3(1)
1.2.3 A perfectly adapted tool for a business in touch
4(1)
1.3 Characteristics and beginning of misuse
4(6)
1.3.1 A remote and asynchronous means of communication
5(1)
1.3.2 Almost instantaneous and interactive
6(1)
1.3.3 Textual
7(1)
1.3.4 Ubiquitous and mobile
8(1)
1.3.5 Which allows numerous messages to be sent
8(1)
1.3.6 On to the storing and archiving of messages
9(1)
1.4 E-mail versus other communication tools
10(2)
1.5 The structure of e-mail and its susceptibility to misuse
12(3)
1.5.1 Structure
12(2)
1.5.2 Envelope and body of the message: two possible targets
14(1)
1.6 Other forms of electronic communication, other flaws
15(2)
1.6.1 Instant messaging
15(1)
1.6.2 Micro-blogging
16(1)
1.6.3 Social networks
17(1)
1.7 Conclusion
17(2)
Chapter 2 From Role to Identity
19(14)
2.1 Roles, boundaries and transitions
19(2)
2.1.1 Spatial and temporal boundaries
20(1)
2.2 Roles
21(7)
2.2.1 Definition
21(2)
2.2.2 Role boundaries
23(3)
2.2.3 Transitions between roles
26(2)
2.3 Identities
28(2)
2.4 Conclusion
30(3)
Chapter 3 Roles and the Digital World
33(12)
3.1 When electronic communications disrupt space-time
33(5)
3.1.1 The transformation of space
34(1)
3.1.2 The transformation of time
34(1)
3.1.3 The transformation of distance
35(2)
3.1.4 Mobility and ubiquity
37(1)
3.2 Role transformation
38(5)
3.2.1 Role boundaries
38(1)
3.2.2 Flexibility
38(3)
3.2.3 Permeability
41(1)
3.2.4 Role separation
41(1)
3.2.5 Transitions between roles
42(1)
3.3 Conclusion
43(2)
Chapter 4 Challenges in Communication
45(12)
4.1 Interpersonal communication: a subtle tool
45(1)
4.2 Misunderstanding in communication
46(5)
4.2.1 Sources of misunderstanding
47(1)
4.2.2 The absence of an operating communication channel
47(1)
4.2.3 The absence of a common vocabulary
48(1)
4.2.4 Exclusive information context
48(1)
4.2.5 Situations involving incomprehension
49(1)
4.2.6 Distance communication
49(1)
4.2.7 Asynchronous communication
50(1)
4.2.8 Heterogeneous competence domains or levels
50(1)
4.2.9 Man--machine communication
50(1)
4.2.10 E-mail: the accumulation of obstacles to comprehension
50(1)
4.3 From misunderstanding to a lack of respect
51(2)
4.4 A challenge for digital managers: communicating with the absent other
53(2)
4.4.1 A lower volume of communication
53(1)
4.4.2 A drop in communication quality
54(1)
4.5 Conclusion
55(2)
Chapter 5 Defining Spam
57(18)
5.1 What is spam?
57(1)
5.2 Preface: the influence of role on users' perceptions of messages
57(4)
5.3 Classifying e-mails according to role management theory
61(7)
5.3.1 Roles and direct and indirect idiosyncratic connections
61(4)
5.3.2 Roles played, transitions and perception of e-mail
65(3)
5.4 Message classification model
68(5)
5.4.1 E-mails received from unknown sources
68(1)
5.4.2 Commercial spam
69(1)
5.4.3 Fraudulent spam
70(1)
5.4.4 E-mail received from known (trusted) sources
70(3)
5.5 Conclusion
73(2)
Chapter 6 A Lack of Ethics that Disrupts E-mail Communication
75(30)
6.1 There is a new behavior behind every technical asset
75(1)
6.2 Ethics and Information and Communication Technologies
76(3)
6.3 Glossary of misuses and some of their consequences
79(25)
6.4 Conclusion
104(1)
Chapter 7 The Deadly Sins of Electronic Mail
105(12)
7.1 Carefree exuberance
105(2)
7.2 Confused identity
107(1)
7.3 Cold indifference
108(1)
7.4 Impassioned anger
109(2)
7.5 Lost truth
111(1)
7.6 The door of secrets
112(2)
7.6.1 The ethical approach
112(1)
7.6.2 The managerial approach
113(1)
7.7 Fraudulent temptation
114(1)
7.8 What answers should be given to these questions?
115(2)
Chapter 8 The Venial Sins of Electronic Mail
117(6)
8.1 Information overload
117(1)
8.2 Anonymous disrespect
118(1)
8.3 Communication poverty
118(1)
8.4 Misunderstanding
119(1)
8.4.1 Poorly written messages
119(1)
8.4.2 Misread messages
119(1)
8.4.3 When faced with misunderstanding, is empathy a solution?
120(1)
8.5 Culpable ambiguity
120(1)
8.6 Humor, love, rumors, and all the rest
120(3)
Chapter 9 Exposure to Spam and Protection Strategies
123(22)
9.1 Risk behaviors
123(11)
9.1.1 Dynamic factors of spam exposure
124(7)
9.1.2 Static factors of spam exposure
131(2)
9.1.3 Other risks of spam exposure
133(1)
9.2 Protection strategies
134(8)
9.2.1 Keeping separate e-mail accounts
134(2)
9.2.2 Using complex addresses
136(1)
9.2.3 Treating received spam appropriately
136(2)
9.2.4 Checking our e-proximity and network
138(1)
9.2.5 Filters
139(3)
9.2.6 Modify our sensitivity to spam
142(1)
9.3 Conclusion
142(3)
Concluding Recommendations 145(6)
Bibliography 151(6)
Index 157
Dr. Fernando A. Lagraña, Grenoble Ecole de Management/Webster University, Geneva.