Privacy hazards of e-mail

被引:0
|
作者
Joyce, John
机构
来源
关键词
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] Assessing e-mail intent and tasks in e-mail messages
    Sappelli, M.
    Pasi, G.
    Verberne, S.
    de Boer, M.
    Kraaij, W.
    INFORMATION SCIENCES, 2016, 358 : 1 - 17
  • [42] The inner life of e-mail (Why use e-mail)
    Stevick, Philip
    SALMAGUNDI-A QUARTERLY OF THE HUMANITIES AND SOCIAL SCIENCES, 2007, (153-54): : 3 - 18
  • [43] E-Mail as Legacy: Managing and Preserving E-Mail as a Collection
    Dinneen, Jesse David
    Krtalic, Maja
    PORTAL-LIBRARIES AND THE ACADEMY, 2020, 20 (03) : 413 - 424
  • [44] Nothing cryptic about the lack of privacy of Internet E-mail
    Jones, PBC
    BIOTECHNOLOGY LAW REPORT, 1995, 14 (05): : 811 - 814
  • [45] Registered e-mail (REM) — Reliable e-mail for everybody
    Franco Ruggieri
    Datenschutz und Datensicherheit - DuD, 2010, 34 (5) : 314 - 317
  • [46] Spam e-mail: How Malaysian e-mail users deal with it?
    Bujang, Yanti Rosmunie
    Hussin, Husnayati
    World Academy of Science, Engineering and Technology, 2010, 43 : 1007 - 1013
  • [47] Using E-mail to notify pseudonymous E-mail sexual partners
    Vest, Joshua R.
    Valadez, Adolfo M.
    Hanner, Andrea
    Lee, James H.
    Harris, Patrick B.
    SEXUALLY TRANSMITTED DISEASES, 2007, 34 (11) : 840 - 845
  • [48] An E-mail starter kit: Internet E-mail with minimum hassle
    Jung, W
    ELECTRONIC DESIGN, 1997, 45 (03) : 167 - 169