623 resultados para spam email
Resumo:
The chapter contributes understandings of digitally mediated interactions in early childhood classrooms. Ethnomethodological and conversation analysis approaches are used to analyse a video-recorded episode of children and teacher composing an email in a preschool classroom. In their talk we find how the teacher directs the children to what counts procedurally, such as the components of an email, and the teacher’s moral work in producing a culturally correct way form of personal communication. Such considerations of situated examples can encourage investigations of digital practices that extend beyond operational skills to broader understandings of digital practices as cultural and situated activities.
Resumo:
Email is rapidly replacing other forms of communication as the preferred means of communication between contracting parties. The recent decision of Stellard Pty Ltd v North Queensland Fuel Pty Ltd [2015] QSC 119 reinforces the judicial acceptance of email as an effective means of creating a binding agreement and the willingness to adopt a liberal concept of ‘signing’ in an electronic environment.
Resumo:
I boken behandlas nya kommunikationstekniker och olika marknadsföringsmetoder som har uppkommit till följd av den tekniska utvecklingen. Marknadsföring via de nya kommunikationskanalerna har givit upphov till vissa olägenheter för mottagarna. Olägenheterna som mottagarna förorsakas vid marknadsföring via de nya teknikerna kan delas in i tre kategorier; 1) meddelandet förorsakar kostnader för mottagaren, 2) meddelandet hindrar mottagaren samt 3) meddelandet upplevs vara påträngande och utgöra ett intrång i mottagarens privatliv. Under de senaste åren har det förekommit hektiska lagstiftningsåtgärder på många håll i världen. Såväl enskilda stater, nationella myndigheter samt internationella organisationer har utarbetat regler om marknadsföring via de nya teknikerna. En av kärnfrågorna i regleringen är huruvida man skall ha ett system med ”opt-in” eller ”opt-out”. En opt-in-lösning innebär att marknadsföraren måste inhämta mottagarens samtycke på förhand, medan en opt-out-lösning innebär att det är tillåtet att sända marknadsföring om inte mottagaren motsatt sig detta. Enligt gällande lagstiftning faller marknadsföring via följande tre tekniker under opt-in: automatiserade uppringningssystem, telefax samt e-post. Det huvudsakliga syftet med avhandlingen är att utreda om nuvarande opt-in-lista är tillräckligt omfattande med beaktande av de olägenheter som marknadsföring via de nya teknikerna förorsakar, eller om den bör utvidgas. I genomgången av marknadsföring via nya tekniker har marknadsföring via bl.a. följande tekniker undersökts: Internet (www-sidor), reklamfönster, reklambanner, e-post, mobiltelefon, telefax, bloggar, RSS, Instant Messaging samt Internettelefoni. Vid sidan av nya tekniker har även vissa ”traditionella” marknadsföringsmetoder undersökts, i syfte att utreda huruvida även de bör falla in under en opt-in-lösning. De traditionella marknadsföringsmetoder som ingår i avhandlingen är hemförsäljning, telemarketing, TV- och radioreklam samt adresserad och oadresserad direktreklam. En annan central del i avhandlingen är frågan hur påföljdssystemet vid överträdelser av opt-in-bestämmelserna bör utformas. Hur skall de enskilda mottagarna få ersättning för de kostnader de åsamkats av marknadsföringen? Är det dags att införa straffskadestånd i Finland? Hög tid att även Finland får grupptalan? Kan tvisterna avgöras virtuellt via domstolar on-line eller ODR?
Resumo:
Executing authenticated computation on outsourced data is currently an area of major interest in cryptology. Large databases are being outsourced to untrusted servers without appreciable verification mechanisms. As adversarial server could produce erroneous output, clients should not trust the server's response blindly. Primitive set operations like union, set difference, intersection etc. can be invoked on outsourced data in different concrete settings and should be verifiable by the client. One such interesting adaptation is to authenticate email search result where the untrusted mail server has to provide a proof along with the search result. Recently Ohrimenko et al. proposed a scheme for authenticating email search. We suggest significant improvements over their proposal in terms of client computation and communication resources by properly recasting it in two-party settings. In contrast to Ohrimenko et al. we are able to make the number of bilinear pairing evaluation, the costliest operation in verification procedure, independent of the result set cardinality for union operation. We also provide an analytical comparison of our scheme with their proposal which is further corroborated through experiments.
Resumo:
Consultoria Legislativa - Área XIV - Comunicação Social, Informática, Telecomunicações, Sistema Postal, Ciência e Tecnologia.
Resumo:
Assessing how the University of the West of England (UWE) made large savings and improved the student experience through cloud email.
Resumo:
A guide to staff and student cloud email systems. JL
Resumo:
We propose an economic mechanism to reduce the incidence of malware that delivers spam. Earlier research proposed attention markets as a solution for unwanted messages, and showed they could provide more net benefit than alternatives such as filtering and taxes. Because it uses a currency system, Attention Bonds faces a challenge. Zombies, botnets, and various forms of malware might steal valuable currency instead of stealing unused CPU cycles. We resolve this problem by taking advantage of the fact that the spam-bot problem has been reduced to financial fraud. As such, the large body of existing work in that realm can be brought to bear. By drawing an analogy between sending and spending, we show how a market mechanism can detect and prevent spam malware. We prove that by using a currency (i) each instance of spam increases the probability of detecting infections, and (ii) the value of eradicating infections can justify insuring users against fraud. This approach attacks spam at the source, a virtue missing from filters that attack spam at the destination. Additionally, the exchange of currency provides signals of interest that can improve the targeting of ads. ISPs benefit from data management services and consumers benefit from the higher average value of messages they receive. We explore these and other secondary effects of attention markets, and find them to offer, on the whole, attractive economic benefits for all – including consumers, advertisers, and the ISPs.
Resumo:
Thesis (Master's)--University of Washington, 2012
Resumo:
Dissertação de Mestrado apresentado ao Instituto de Contabilidade e Administração do Porto para a obtenção do grau de Mestre em Marketing Digital, sob orientação de Professor Doutor António Correia de Barros
Resumo:
This work introduces two major changes to the conventional protocol for designing plastic antibodies: (i) the imprinted sites were created with charged monomers while the surrounding environment was tailored using neutral material; and (ii) the protein was removed from its imprinted site by means of a protease, aiming at preserving the polymeric network of the plastic antibody. To our knowledge, these approaches were never presented before and the resulting material was named here as smart plastic antibody material (SPAM). As proof of concept, SPAM was tailored on top of disposable gold-screen printed electrodes (Au-SPE), following a bottom-up approach, for targeting myoglobin (Myo) in a point-of-care context. The existence of imprinted sites was checked by comparing a SPAM modified surface to a negative control, consisting of similar material where the template was omitted from the procedure and called non-imprinted materials (NIMs). All stages of the creation of the SPAM and NIM on the Au layer were followed by both electrochemical impedance spectroscopy (EIS) and cyclic voltammetry (CV). AFM imaging was also performed to characterize the topography of the surface. There are two major reasons supporting the fact that plastic antibodies were effectively designed by the above approach: (i) they were visualized for the first time by AFM, being present only in the SPAM network; and (ii) only the SPAM material was able to rebind to the target protein and produce a linear electrical response against EIS and square wave voltammetry (SWV) assays, with NIMs showing a similar-to-random behavior. The SPAM/Au-SPE devices displayed linear responses to Myo in EIS and SWV assays down to 3.5 μg/mL and 0.58 μg/mL, respectively, with detection limits of 1.5 and 0.28 μg/mL. SPAM materials also showed negligible interference from troponin T (TnT), bovine serum albumin (BSA) and urea under SWV assays, showing promising results for point-of-care applications when applied to spiked biological fluids.
Resumo:
Objectives: An email information literacy program has been effective for over a decade at Université de Montréal’s Health Library. Students periodically receive messages highlighting the content of guides on the library’s website. We wish to evaluate, using Google Analytics, the effects of the program on specific webpage statistics. Using the data collected, we may pinpoint popular guides as well as others that need improvement. Methods: In the program, first and second-year medical (MD) or dental (DMD) students receive eight bi-monthly email messages. The DMD mailing list also includes graduate students and professors. Enrollment to the program is optional for MDs, but mandatory for DMDs. Google Analytics (GA) profiles have been configured for the libraries websites to collect visitor statistics since June 2009. The GA Links Builder was used to design unique links specifically associated with the originating emails. This approach allowed us to gather information on guide usage, such as the visitor’s program of study, duration of page viewing, number of pages viewed per visit, as well as browsing data. We also followed the evolution of clicks on GA unique links over time, as we believed that users may keep the library's emails and refer to them to access specific information. Results: The proportion of students who actually clicked the email links was, on average, less than 5%. MD and DMD students behaved differently regarding guide views, number of pages visited and length of time on the site. The CINAHL guide was the most visited for DMD students whereas MD students consulted the Pharmaceutical information guide most often. We noted that some students visited referred guides several weeks after receiving messages, thus keeping them for future reference; browsing to additional pages on the library website was also frequent. Conclusion: The mitigated success of the program prompted us to directly survey students on the format, frequency and usefulness of messages. The information gathered from GA links as well as from the survey will allow us to redesign our web content and modify our email information literacy program so that messages are more attractive, timely and useful for students.
Resumo:
With the great advancement of computer technologies, electronic information starts to play a more and more important role in modern business transactions. Therefore, electronic data, such as e-mail, is frequently required in the process of litigation. Companies, on the one hand, have the legal obligations to produce this kind of e-mail evidence. On the other hand, they also undertake a high cost of e-mail evidence preservation due to the great volume on a daily basis. This Article firstly analyzed features of e-mail evidence with the comparison of paper evidence. Then, it discussed about how e-mail is authenticated and admitted into evidence. By using the case laws in different legal aspects and current Canadian legislations, the Author demonstrated the importance of e-mail evidence preservation in ordinary business course. After that, the Article focused on the practical dilemma of the companies between their legal obligation and the expensive cost to preserve e-mail evidence. Finally, the Author proposed suggestions to both companies and courts on how to coordinate the obligation and cost. More specifically, while companies should adopt a document management policy to implement e-mail evidence preservation, courts need to take into consideration of the high cost of e-mail evidence preservation in electronic discovery.