LEADER 04576nam 2200613 450 001 9910136350703321 005 20231106111820.0 010 $a1-119-28512-7 010 $a1-119-28511-9 035 $a(CKB)3710000000615808 035 $a(EBL)4451524 035 $a(Au-PeEL)EBL4451524 035 $a(CaPaEBR)ebr11174083 035 $a(CaONFJC)MIL909372 035 $a(OCoLC)944447535 035 $a(CaSebORM)9781848218505 035 $a(MiAaPQ)EBC4451524 035 $a(EXLCZ)993710000000615808 100 $a20160108d2016 uy| 0 101 0 $aeng 135 $aur|n|---||||| 181 $2rdacontent 182 $2rdamedia 183 $2rdacarrier 200 10$aE-mail and behavioral changes $euses and misuses of electronic communications /$fFernando Lagran?a 205 $a1st edition 210 1$aHoboken, New Jersey :$cISTE Ltd/John Wiley and Sons Inc,$d2016. 215 $a1 online resource (132 p.) 225 1 $aFocus series 225 1 $aInformation systems, web and pervasive computing series 225 1 $aTHEi Wiley ebooks 300 $aDescription based upon print version of record. 311 $a1-119-28510-0 311 $a1-84821-850-8 320 $aIncludes bibliographical references and index. 327 $aTable of Contents; Title; Copyright; Acknowledgements; Preamble; Introduction; I.1. Electronic communication, what is the problem?; 1 Electronic Mail; 1.1. Electronic mail, what is it exactly?; 1.2. The most used communication tool in the professional world; 1.3. Characteristics and beginning of misuse; 1.4. E-mail versus other communication tools; 1.5. The structure of e-mail and its susceptibility to misuse; 1.6. Other forms of electronic communication, other flaws; 1.7. Conclusion; 2 From Role to Identity; 2.1. Roles, boundaries and transitions; 2.2. Roles; 2.3. Identities; 2.4. Conclusion 327 $a3 Roles and the Digital World3.1. When electronic communications disrupt space-time; 3.2. Role transformation; 3.3. Conclusion; 4 Challenges in Communication; 4.1. Interpersonal communication: a subtle tool; 4.2. Misunderstanding in communication; 4.3. From misunderstanding to a lack of respect; 4.4. A challenge for digital managers: communicating with the absent other; 4.5. Conclusion; 5 Defining Spam; 5.1. What is spam?; 5.2. Preface: the influence of role on users' perceptions of messages; 5.3. Classifying e-mails according to role management theory; 5.4. Message classification model 327 $a5.5. Conclusion6 A Lack of Ethics that Disrupts E-mail Communication; 6.1. There is a new behavior behind every technical asset; 6.2. Ethics and Information and Communication Technologies; 6.3. Glossary of misuses and some of their consequences; 6.4. Conclusion; 7 The Deadly Sins of Electronic Mail; 7.1. Carefree exuberance; 7.2. Confused identity; 7.3. Cold indifference; 7.4. Impassioned anger; 7.5. Lost truth; 7.6. The door of secrets; 7.7. Fraudulent temptation; 7.8. What answers should be given to these questions?; 8 The Venial Sins of Electronic Mail; 8.1. Information overload 327 $a8.2. Anonymous disrespect8.3. Communication poverty; 8.4. Misunderstanding; 8.5. Culpable ambiguity; 8.6. Humor, love, rumors, and all the rest; 9 Exposure to Spam and Protection Strategies.; 9.1. Risk behaviors; 9.2. Protection strategies; 9.3. Conclusion; Concluding Recommendations; Uses and behaviors; Conclusion; Bibliography; Index; End User License Agreement 330 $aThis book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented. Have you ever felt overwhelmed by the number of e-mail and textual messages in your inbox, be it on your laptop, your Smartphone or your PC? This book should help you in finding a wealth of answers, tools and tactics to better surf the ICT wave in the professional environment, and develop proper protection strategies to mitigate your exposure to spam in any form. 410 0$aInformation systems, web and pervasive computing series. 410 0$aFocus series (London, England) 410 0$aTHEi Wiley ebooks. 606 $aSpam (Electronic mail) 615 0$aSpam (Electronic mail) 676 $a004.7 700 $aLagrana$b Fernando$0894061 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910136350703321 996 $aE-mail and behavioral changes$91997129 997 $aUNINA