Home Page Icon
Home Page
Table of Contents for
End User License Agreement
Close
End User License Agreement
by Fernando Lagrana
E-mail and Behavioral Changes
Cover
Title
Copyright
Acknowledgements
Preamble
Introduction
I.1. Electronic communication, what is the problem?
1 Electronic Mail
1.1. Electronic mail, what is it exactly?
1.2. The most used communication tool in the professional world
1.3. Characteristics and beginning of misuse
1.4. E-mail versus other communication tools
1.5. The structure of e-mail and its susceptibility to misuse
1.6. Other forms of electronic communication, other flaws
1.7. Conclusion
2 From Role to Identity
2.1. Roles, boundaries and transitions
2.2. Roles
2.3. Identities
2.4. Conclusion
3 Roles and the Digital World
3.1. When electronic communications disrupt space-time
3.2. Role transformation
3.3. Conclusion
4 Challenges in Communication
4.1. Interpersonal communication: a subtle tool
4.2. Misunderstanding in communication
4.3. From misunderstanding to a lack of respect
4.4. A challenge for digital managers: communicating with the absent other
4.5. Conclusion
5 Defining Spam
5.1. What is spam?
5.2. Preface: the influence of role on users’ perceptions of messages
5.3. Classifying e-mails according to role management theory
5.4. Message classification model
5.5. Conclusion
6 A Lack of Ethics that Disrupts E-mail Communication
6.1. There is a new behavior behind every technical asset
6.2. Ethics and Information and Communication Technologies
6.3. Glossary of misuses and some of their consequences
6.4. Conclusion
7 The Deadly Sins of Electronic Mail
7.1. Carefree exuberance
7.2. Confused identity
7.3. Cold indifference
7.4. Impassioned anger
7.5. Lost truth
7.6. The door of secrets
7.7. Fraudulent temptation
7.8. What answers should be given to these questions?
8 The Venial Sins of Electronic Mail
8.1. Information overload
8.2. Anonymous disrespect
8.3. Communication poverty
8.4. Misunderstanding
8.5. Culpable ambiguity
8.6. Humor, love, rumors, and all the rest
9 Exposure to Spam and Protection Strategies.
9.1. Risk behaviors
9.2. Protection strategies
9.3. Conclusion
Concluding Recommendations
Uses and behaviors
Conclusion
Bibliography
Index
End User License Agreement
Search in book...
Toggle Font Controls
Playlists
Add To
Create new playlist
Name your new playlist
Playlist description (optional)
Cancel
Create playlist
Sign In
Email address
Password
Forgot Password?
Create account
Login
or
Continue with Facebook
Continue with Google
Sign Up
Full Name
Email address
Confirm Email Address
Password
Login
Create account
or
Continue with Facebook
Continue with Google
Prev
Previous Chapter
Other titles from ISTE in Information Systems, Web and Pervasive Computing
WILEY END USER LICENSE AGREEMENT
Go to
www.wiley.com/go/eula
to access Wiley’s ebook EULA.
Add Highlight
No Comment
..................Content has been hidden....................
You can't read the all page of ebook, please click
here
login for view all page.
Day Mode
Cloud Mode
Night Mode
Reset