139,99 €
This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented. Have you ever felt overwhelmed by the number of e-mail and textual messages in your inbox, be it on your laptop, your Smartphone or your PC? This book should help you in finding a wealth of answers, tools and tactics to better surf the ICT wave in the professional environment, and develop proper protection strategies to mitigate your exposure to spam in any form.
Sie lesen das E-Book in den Legimi-Apps auf:
Seitenzahl: 231
Veröffentlichungsjahr: 2016
Cover
Title
Copyright
Acknowledgements
Preamble
Introduction
I.1. Electronic communication, what is the problem?
1 Electronic Mail
1.1. Electronic mail, what is it exactly?
1.2. The most used communication tool in the professional world
1.3. Characteristics and beginning of misuse
1.4. E-mail versus other communication tools
1.5. The structure of e-mail and its susceptibility to misuse
1.6. Other forms of electronic communication, other flaws
1.7. Conclusion
2 From Role to Identity
2.1. Roles, boundaries and transitions
2.2. Roles
2.3. Identities
2.4. Conclusion
3 Roles and the Digital World
3.1. When electronic communications disrupt space-time
3.2. Role transformation
3.3. Conclusion
4 Challenges in Communication
4.1. Interpersonal communication: a subtle tool
4.2. Misunderstanding in communication
4.3. From misunderstanding to a lack of respect
4.4. A challenge for digital managers: communicating with the absent other
4.5. Conclusion
5 Defining Spam
5.1. What is spam?
5.2. Preface: the influence of role on users’ perceptions of messages
5.3. Classifying e-mails according to role management theory
5.4. Message classification model
5.5. Conclusion
6 A Lack of Ethics that Disrupts E-mail Communication
6.1. There is a new behavior behind every technical asset
6.2. Ethics and Information and Communication Technologies
6.3. Glossary of misuses and some of their consequences
6.4. Conclusion
7 The Deadly Sins of Electronic Mail
7.1. Carefree exuberance
7.2. Confused identity
7.3. Cold indifference
7.4. Impassioned anger
7.5. Lost truth
7.6. The door of secrets
7.7. Fraudulent temptation
7.8. What answers should be given to these questions?
8 The Venial Sins of Electronic Mail
8.1. Information overload
8.2. Anonymous disrespect
8.3. Communication poverty
8.4. Misunderstanding
8.5. Culpable ambiguity
8.6. Humor, love, rumors, and all the rest
9 Exposure to Spam and Protection Strategies.
9.1. Risk behaviors
9.2. Protection strategies
9.3. Conclusion
Concluding Recommendations
Uses and behaviors
Conclusion
Bibliography
Index
End User License Agreement
2 From Role to Identity
Figure 2.1. Identity construct
Figure 2.2. Identity construct (with roles)
Figure 2.3. An example of a functional role interacting with a persona role
3 Roles and the Digital World
Figure 3.1. The distance between two individuals Id
i
and Id
j
Figure 3.2. The distance between two individuals with a relational link
Figure 3.3. Expectations placed on employees in respect to e-proximity
5 Defining Spam
Figure 5.1. Identity construction of individual Id
0
Figure 5.2. All individual Id
0
’s professional roles
Figure 5.3. Interactions between individuals Id
0
and Id
n
’s professional roles
Figure 5.4. Two interactions between individuals Id
0
and Id
n
(simplified model)
Figure 5.5. Socio-professional sphere including six individuals surrounding Id
0
Figure 5.6. Level 3 idiosyncratic sphere
Figure 5.7. Angel’s personal roles
Figure 5.8. The role Angel plays when he talks to the teacher
Figure 5.9. Angel’s group of personal roles is activated
Figure 5.10. Personal message received when a personal role is being played: a legitimate message
Figure 5.11. Personal message received when a professional role is being played: spam
Figure 5.12. Spam classification model
6 A Lack of Ethics that Disrupts E-mail Communication
Figure 6.1 Botnet and spam
7 The Deadly Sins of Electronic Mail
Figure 7.1. Spammer profiles
1 Electronic Mail
Table 1.1. Number of e-mail accounts and users (2015–2019)
Table 1.2. Daily message traffic (2015–2019)
Table 1.3. Reality of Internet use in the office (2010–2013)
Table 1.4. Comparison of e-mail to other media
Cover
Table of Contents
Begin Reading
C1
iii
iv
v
ix
xi
xii
xiii
xiv
xv
xvi
xvii
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
145
146
147
148
149
151
152
153
154
155
156
157
158
159
160
161
162
163
164
FOCUS SERIES
Series Editor Jean-Charles Pomerol
Fernando Lagraña
First published 2016 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.
Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address:
ISTE Ltd27-37 St George’s RoadLondon SW19 4EUUK
www.iste.co.uk
John Wiley & Sons, Inc.111 River StreetHoboken, NJ 07030USA
www.wiley.com
© ISTE Ltd 2016
The rights of Fernando Lagraña to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988.
Library of Congress Control Number: 2016930386
British Library Cataloguing-in-Publication DataA CIP record for this book is available from the British LibraryISSN 2051-2481 (Print)ISSN 2051-249X (Online)ISBN 978-1-84821-850-5
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
Lesen Sie weiter in der vollständigen Ausgabe!
