148 results
Search Results
2. Muted voices: a critical look at e‐male in organizations
3. Usable secure email communications: criteria and evaluation of existing approaches
4. Why do some people manage phishing e‐mails better than others?
5. Understanding e‐mail overload
6. Effects of unsolicited e‐mail on the virtual business world
7. Psychological influences in e‐mail fraud
8. The use of the internet and e‐mail among Sudanese librarians: a survey report
9. Social engineering: assessing vulnerabilities in practice
10. PIM @ academia: how e‐mail is used by scholars
11. Business writing on the go : How executives manage impressions through e‐mail communication in everyday work life
12. Evaluating viral marketing: isolating the key criteria
13. Symmetrical dialogue in investor relations
14. Bridging the gap between anonymous e‐mail and anonymous web browsing
15. Social network analysis for cluster‐based IP spam reputation
16. Workplace interactions and the polymorphic role of e‐mail
17. Symmetrical versus asymmetrical company‐investor communications via the internet
18. An overview of the Sender Policy Framework (SPF) as an anti‐phishing mechanism
19. Effects of e‐mail addiction and interruptions on employees
20. Expressing emotion in electronic mail
21. The effect of e‐mail on attitudes towards performance feedback
22. Electronic mail and internal communication: a three‐factor model
23. E‐thics: the new moral methodology for business
24. E‐mail marketing at the crossroads : A stakeholder analysis of unsolicited commercial e‐mail (spam)
25. Temporal coordination through communication: using genres in a virtual start‐up organization
26. Processes, relationships, settings, products and consumers: the case for qualitative diary research
27. E‐mail viruses: how organizations can protect their e‐mails
28. Internet security: malicious e‐mails detection and protection
29. Humor as a relationship‐building tool in online negotiations
30. The determinants of consumer behavior towards email advertisement
31. Integrating the Web and e‐mail into a push‐pull strategy
32. Alert services as an approach to satisfy researchers' current awareness needs : The case of Sultan Qaboos University
33. Digital reference access points: an analysis of usage
34. Managing e‐mail and e‐commerce records
35. Online security evaluation process for new e‐services
36. The selection of instant messaging or e‐mail : College students' perspective for computer communication
37. Accessing electronic information sources through computer games consoles
38. Experiments to identify the causes of spam
39. Why are some e‐mails forwarded and others not?
40. Different contexts in electronic communication: some remarks on the communicability of scientific knowledge
41. Impact of the internet on delivery of reference services in English public libraries
42. Group communication and conflict management in an electronic medium
43. Web‐based discussion groups at stake: the profile of museum professionals online
44. Internet newsletters
45. Communicating effectively in the networked organisation: using electronic mail in academic libraries
46. Investigating the adoption of electronic customer service by Australian businesses
47. A longitudinal study of the uptake of and confidence in using e‐mail among parks management students
48. The e‐flow audit: an evaluation of knowledge flow within and outside a high‐tech firm
49. An anti‐spam scheme
50. Using a business simulation to teach applied skills – the benefits and the challenges of using student teams from multiple countries
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.