E-mail and Behavioral Changes - Fernando Lagrana - E-Book

E-mail and Behavioral Changes E-Book

Fernando Lagrana

0,0
139,99 €

oder
-100%
Sammeln Sie Punkte in unserem Gutscheinprogramm und kaufen Sie E-Books und Hörbücher mit bis zu 100% Rabatt.

Mehr erfahren.
Beschreibung

This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented. Have you ever felt overwhelmed by the number of e-mail and textual messages in your inbox, be it on your laptop, your Smartphone or your PC? This book should help you in finding a wealth of answers, tools and tactics to better surf the ICT wave in the professional environment, and develop proper protection strategies to mitigate your exposure to spam in any form.

Sie lesen das E-Book in den Legimi-Apps auf:

Android
iOS
von Legimi
zertifizierten E-Readern

Seitenzahl: 231

Veröffentlichungsjahr: 2016

Bewertungen
0,0
0
0
0
0
0
Mehr Informationen
Mehr Informationen
Legimi prüft nicht, ob Rezensionen von Nutzern stammen, die den betreffenden Titel tatsächlich gekauft oder gelesen/gehört haben. Wir entfernen aber gefälschte Rezensionen.



Table of Contents

Cover

Title

Copyright

Acknowledgements

Preamble

Introduction

I.1. Electronic communication, what is the problem?

1 Electronic Mail

1.1. Electronic mail, what is it exactly?

1.2. The most used communication tool in the professional world

1.3. Characteristics and beginning of misuse

1.4. E-mail versus other communication tools

1.5. The structure of e-mail and its susceptibility to misuse

1.6. Other forms of electronic communication, other flaws

1.7. Conclusion

2 From Role to Identity

2.1. Roles, boundaries and transitions

2.2. Roles

2.3. Identities

2.4. Conclusion

3 Roles and the Digital World

3.1. When electronic communications disrupt space-time

3.2. Role transformation

3.3. Conclusion

4 Challenges in Communication

4.1. Interpersonal communication: a subtle tool

4.2. Misunderstanding in communication

4.3. From misunderstanding to a lack of respect

4.4. A challenge for digital managers: communicating with the absent other

4.5. Conclusion

5 Defining Spam

5.1. What is spam?

5.2. Preface: the influence of role on users’ perceptions of messages

5.3. Classifying e-mails according to role management theory

5.4. Message classification model

5.5. Conclusion

6 A Lack of Ethics that Disrupts E-mail Communication

6.1. There is a new behavior behind every technical asset

6.2. Ethics and Information and Communication Technologies

6.3. Glossary of misuses and some of their consequences

6.4. Conclusion

7 The Deadly Sins of Electronic Mail

7.1. Carefree exuberance

7.2. Confused identity

7.3. Cold indifference

7.4. Impassioned anger

7.5. Lost truth

7.6. The door of secrets

7.7. Fraudulent temptation

7.8. What answers should be given to these questions?

8 The Venial Sins of Electronic Mail

8.1. Information overload

8.2. Anonymous disrespect

8.3. Communication poverty

8.4. Misunderstanding

8.5. Culpable ambiguity

8.6. Humor, love, rumors, and all the rest

9 Exposure to Spam and Protection Strategies.

9.1. Risk behaviors

9.2. Protection strategies

9.3. Conclusion

Concluding Recommendations

Uses and behaviors

Conclusion

Bibliography

Index

End User License Agreement

List of Illustrations

2 From Role to Identity

Figure 2.1. Identity construct

Figure 2.2. Identity construct (with roles)

Figure 2.3. An example of a functional role interacting with a persona role

3 Roles and the Digital World

Figure 3.1. The distance between two individuals Id

i

and Id

j

Figure 3.2. The distance between two individuals with a relational link

Figure 3.3. Expectations placed on employees in respect to e-proximity

5 Defining Spam

Figure 5.1. Identity construction of individual Id

0

Figure 5.2. All individual Id

0

’s professional roles

Figure 5.3. Interactions between individuals Id

0

and Id

n

’s professional roles

Figure 5.4. Two interactions between individuals Id

0

and Id

n

(simplified model)

Figure 5.5. Socio-professional sphere including six individuals surrounding Id

0

Figure 5.6. Level 3 idiosyncratic sphere

Figure 5.7. Angel’s personal roles

Figure 5.8. The role Angel plays when he talks to the teacher

Figure 5.9. Angel’s group of personal roles is activated

Figure 5.10. Personal message received when a personal role is being played: a legitimate message

Figure 5.11. Personal message received when a professional role is being played: spam

Figure 5.12. Spam classification model

6 A Lack of Ethics that Disrupts E-mail Communication

Figure 6.1 Botnet and spam

7 The Deadly Sins of Electronic Mail

Figure 7.1. Spammer profiles

List of Tables

1 Electronic Mail

Table 1.1. Number of e-mail accounts and users (2015–2019)

Table 1.2. Daily message traffic (2015–2019)

Table 1.3. Reality of Internet use in the office (2010–2013)

Table 1.4. Comparison of e-mail to other media

Guide

Cover

Table of Contents

Begin Reading

Pages

C1

iii

iv

v

ix

xi

xii

xiii

xiv

xv

xvi

xvii

1

2

3

4

5

6

7

8

9

10

11

12

13

14

15

16

17

18

19

20

21

22

23

24

25

26

27

28

29

30

31

33

34

35

36

37

38

39

40

41

42

43

44

45

46

47

48

49

50

51

52

53

54

55

57

58

59

60

61

62

63

64

65

66

67

68

69

70

71

72

73

74

75

76

77

78

79

80

81

82

83

84

85

86

87

88

89

90

91

92

93

94

95

96

97

98

99

100

101

102

103

104

105

106

107

108

109

110

111

112

113

114

115

116

117

118

119

120

121

123

124

125

126

127

128

129

130

131

132

133

134

135

136

137

138

139

140

141

142

143

145

146

147

148

149

151

152

153

154

155

156

157

158

159

160

161

162

163

164

FOCUS SERIES

Series Editor Jean-Charles Pomerol

E-mail and Behavioral Changes

Uses and Misuses of Electronic Communications

Fernando Lagraña

First published 2016 in Great Britain and the United States by ISTE Ltd and John Wiley & Sons, Inc.

Apart from any fair dealing for the purposes of research or private study, or criticism or review, as permitted under the Copyright, Designs and Patents Act 1988, this publication may only be reproduced, stored or transmitted, in any form or by any means, with the prior permission in writing of the publishers, or in the case of reprographic reproduction in accordance with the terms and licenses issued by the CLA. Enquiries concerning reproduction outside these terms should be sent to the publishers at the undermentioned address:

ISTE Ltd27-37 St George’s RoadLondon SW19 4EUUK

www.iste.co.uk

John Wiley & Sons, Inc.111 River StreetHoboken, NJ 07030USA

www.wiley.com

 

© ISTE Ltd 2016

The rights of Fernando Lagraña to be identified as the author of this work have been asserted by him in accordance with the Copyright, Designs and Patents Act 1988.

Library of Congress Control Number: 2016930386

British Library Cataloguing-in-Publication DataA CIP record for this book is available from the British LibraryISSN 2051-2481 (Print)ISSN 2051-249X (Online)ISBN 978-1-84821-850-5

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!

Lesen Sie weiter in der vollständigen Ausgabe!