Results 11 to 20 of about 6,803,534 (331)

Fluctuation in e-mail sizes weakens power-law correlations in e-mail flow [PDF]

open access: green, 2013
Power-law correlations have been observed in packet flow over the Internet. The possible origin of these correlations includes demand for Internet services.
Y. Matsubara   +2 more
openalex   +3 more sources

Barriers towards inclusive education in India for the visually challenged students [PDF]

open access: yesJournal of Studies in Social Sciences and Humanities, 2020
Inclusive education of intellectual disability children in India is in its cradle. There are comprehensive alignments of barriers that may be encountered in the effort to implement inclusive education of disability students.
Mafuza Yasmin, E-Mail: mafuzajrf@gmail.com   +2 more
doaj  

Usage of insecure E-mail services among researchers with different scientific background [PDF]

open access: yesMedicinski Glasnik, 2011
Aim Free web-based e-mail services are considered to have more security flaws than institutional ones, but they are frequently usedamong scientific researchers for professional communication. The aim of this study was to analyze frequency of usage of the
Vesna Ilakovac   +3 more
doaj  

Is Celebrity Worship Increasing Over Time? [PDF]

open access: yesJournal of Studies in Social Sciences and Humanities, 2021
Information about celebrities has steadily increased over time and is currently available every day in multiple venues. Our study examines whether extreme interest in celebrities has increased over the past 20 years. The Celebrity Attitude Scale appeared
Lynn E. McCutcheon* E-Mail: Najp1999@yahoo.com   +1 more
doaj  

Multi-Recipient E-mail Messages: Privacy Issues and Possible Solutions

open access: yesAdvances in Electrical and Computer Engineering, 2021
Chain and multi-recipient e-mails pose significant security and privacy threats such as phishing and the spread of Trojan horses. They also increase the chances of receiving spam e-mails. E-mails sent to multiple recipients at a time result in unwanted
SHEIKH, S. A., BANDAY, M. T.
doaj   +1 more source

'E' for exposed? Email and privacy issues [PDF]

open access: yes, 1997
In March 1996, American Libraries featured a piece about a librarian at the University of California/Irvine whose supervisor intercepted her e-mail while she was absent on medical leave.
Gannon-Leary, Pat
core   +1 more source

A Pragmatic Analysis of President Nnamdi Azikiwe’s Speech: a response to the foremost Military Seizure of Power in Nigeria – January, 1966 [PDF]

open access: yesJournal of Studies in Social Sciences and Humanities, 2021
This study is a pragmatic analysis of President Nnamdi Azikiwe’s speech responding to the foremost Military Seizure of Power in Nigeria – January, 1966.
Emmanuel Tobi Adegoriolu, E-mail: tobiadegoriolu@gmail.com   +4 more
doaj  

Language Change Mirroring Social Change: Constructions with saama ’get’ and Non-Finite Verb Forms in Different Periods and Registers of Written ­Estonian; pp. 169-190 [PDF]

open access: yesLinguistica Uralica, 2018
The Estonian verb saama ’get; become’, together with different non-finite verb forms, is used to form impersonal, passive, resultative, modal, and future constructions.
Külli Habicht   +6 more
doaj   +1 more source

Managing and archiving emails in government organizations

open access: yesCybrarians Journal, 2006
The study deals with saving and managing e-mail messages in institutions. The study discussed all aspects of the topic, as it addressed: Requirements for an e-mail system, the form and composition of an e-mail message, advantages and disadvantages of e ...
Ashraf Abdel Mohsen
doaj   +1 more source

Strategies for organising the attention of receivers in e-mail marketing [PDF]

open access: yes, 2017
 The article entitled “Strategies for organising the attention of receivers in e-mail marketing” discusses issues within social communication, more specifically e-mail advertising communication.
Filipczak-Białkowska, Anita
core   +2 more sources

Home - About - Disclaimer - Privacy