04576nam 2200613 450 991013635070332120231106111820.01-119-28512-71-119-28511-9(CKB)3710000000615808(EBL)4451524(Au-PeEL)EBL4451524(CaPaEBR)ebr11174083(CaONFJC)MIL909372(OCoLC)944447535(CaSebORM)9781848218505(MiAaPQ)EBC4451524(EXLCZ)99371000000061580820160108d2016 uy| 0engur|n|---|||||rdacontentrdamediardacarrierE-mail and behavioral changes uses and misuses of electronic communications /Fernando Lagraña1st editionHoboken, New Jersey :ISTE Ltd/John Wiley and Sons Inc,2016.1 online resource (132 p.)Focus seriesInformation systems, web and pervasive computing seriesTHEi Wiley ebooksDescription based upon print version of record.1-119-28510-0 1-84821-850-8 Includes bibliographical references and index.Table of Contents; Title; Copyright; Acknowledgements; Preamble; Introduction; I.1. Electronic communication, what is the problem?; 1 Electronic Mail; 1.1. Electronic mail, what is it exactly?; 1.2. The most used communication tool in the professional world; 1.3. Characteristics and beginning of misuse; 1.4. E-mail versus other communication tools; 1.5. The structure of e-mail and its susceptibility to misuse; 1.6. Other forms of electronic communication, other flaws; 1.7. Conclusion; 2 From Role to Identity; 2.1. Roles, boundaries and transitions; 2.2. Roles; 2.3. Identities; 2.4. Conclusion3 Roles and the Digital World3.1. When electronic communications disrupt space-time; 3.2. Role transformation; 3.3. Conclusion; 4 Challenges in Communication; 4.1. Interpersonal communication: a subtle tool; 4.2. Misunderstanding in communication; 4.3. From misunderstanding to a lack of respect; 4.4. A challenge for digital managers: communicating with the absent other; 4.5. Conclusion; 5 Defining Spam; 5.1. What is spam?; 5.2. Preface: the influence of role on users' perceptions of messages; 5.3. Classifying e-mails according to role management theory; 5.4. Message classification model5.5. Conclusion6 A Lack of Ethics that Disrupts E-mail Communication; 6.1. There is a new behavior behind every technical asset; 6.2. Ethics and Information and Communication Technologies; 6.3. Glossary of misuses and some of their consequences; 6.4. Conclusion; 7 The Deadly Sins of Electronic Mail; 7.1. Carefree exuberance; 7.2. Confused identity; 7.3. Cold indifference; 7.4. Impassioned anger; 7.5. Lost truth; 7.6. The door of secrets; 7.7. Fraudulent temptation; 7.8. What answers should be given to these questions?; 8 The Venial Sins of Electronic Mail; 8.1. Information overload8.2. Anonymous disrespect8.3. Communication poverty; 8.4. Misunderstanding; 8.5. Culpable ambiguity; 8.6. Humor, love, rumors, and all the rest; 9 Exposure to Spam and Protection Strategies.; 9.1. Risk behaviors; 9.2. Protection strategies; 9.3. Conclusion; Concluding Recommendations; Uses and behaviors; Conclusion; Bibliography; Index; End User License AgreementThis book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented. Have you ever felt overwhelmed by the number of e-mail and textual messages in your inbox, be it on your laptop, your Smartphone or your PC? This book should help you in finding a wealth of answers, tools and tactics to better surf the ICT wave in the professional environment, and develop proper protection strategies to mitigate your exposure to spam in any form.Information systems, web and pervasive computing series.Focus series (London, England)THEi Wiley ebooks.Spam (Electronic mail)Spam (Electronic mail)004.7Lagrana Fernando894061MiAaPQMiAaPQMiAaPQBOOK9910136350703321E-mail and behavioral changes1997129UNINA