You are previewing E-mail and Behavioral Changes.
O'Reilly logo
E-mail and Behavioral Changes

Book Description

This book is a study of the causes of spam, the behaviors associated to the generation of and the exposure to spam, as well as the protection strategies. The new behaviors associated to electronic communications are identified and commented.

Have you ever felt overwhelmed by the number of e-mail and textual messages in your inbox, be it on your laptop, your Smartphone or your PC? This book should help you in finding a wealth of answers, tools and tactics to better surf the ICT wave in the professional environment, and develop proper protection strategies to mitigate your exposure to spam in any form.

Table of Contents

  1. Cover
  2. Title
  3. Copyright
  4. Acknowledgements
  5. Preamble
  6. Introduction
    1. I.1. Electronic communication, what is the problem?
  7. 1 Electronic Mail
    1. 1.1. Electronic mail, what is it exactly?
    2. 1.2. The most used communication tool in the professional world
    3. 1.3. Characteristics and beginning of misuse
    4. 1.4. E-mail versus other communication tools
    5. 1.5. The structure of e-mail and its susceptibility to misuse
    6. 1.6. Other forms of electronic communication, other flaws
    7. 1.7. Conclusion
  8. 2 From Role to Identity
    1. 2.1. Roles, boundaries and transitions
    2. 2.2. Roles
    3. 2.3. Identities
    4. 2.4. Conclusion
  9. 3 Roles and the Digital World
    1. 3.1. When electronic communications disrupt space-time
    2. 3.2. Role transformation
    3. 3.3. Conclusion
  10. 4 Challenges in Communication
    1. 4.1. Interpersonal communication: a subtle tool
    2. 4.2. Misunderstanding in communication
    3. 4.3. From misunderstanding to a lack of respect
    4. 4.4. A challenge for digital managers: communicating with the absent other
    5. 4.5. Conclusion
  11. 5 Defining Spam
    1. 5.1. What is spam?
    2. 5.2. Preface: the influence of role on users’ perceptions of messages
    3. 5.3. Classifying e-mails according to role management theory
    4. 5.4. Message classification model
    5. 5.5. Conclusion
  12. 6 A Lack of Ethics that Disrupts E-mail Communication
    1. 6.1. There is a new behavior behind every technical asset
    2. 6.2. Ethics and Information and Communication Technologies
    3. 6.3. Glossary of misuses and some of their consequences
    4. 6.4. Conclusion
  13. 7 The Deadly Sins of Electronic Mail
    1. 7.1. Carefree exuberance
    2. 7.2. Confused identity
    3. 7.3. Cold indifference
    4. 7.4. Impassioned anger
    5. 7.5. Lost truth
    6. 7.6. The door of secrets
    7. 7.7. Fraudulent temptation
    8. 7.8. What answers should be given to these questions?
  14. 8 The Venial Sins of Electronic Mail
    1. 8.1. Information overload
    2. 8.2. Anonymous disrespect
    3. 8.3. Communication poverty
    4. 8.4. Misunderstanding
    5. 8.5. Culpable ambiguity
    6. 8.6. Humor, love, rumors, and all the rest
  15. 9 Exposure to Spam and Protection Strategies.
    1. 9.1. Risk behaviors
    2. 9.2. Protection strategies
    3. 9.3. Conclusion
  16. Concluding Recommendations
    1. Uses and behaviors
    2. Conclusion
  17. Bibliography
  18. Index
  19. End User License Agreement