In this paper, we describe preliminary findings that indicate that managers and non-mangers think about their email differently. We asked three research managers and three researc...
Catalina Danis, Wendy A. Kellogg, Tessa A. Lau, Ma...
Cryptographically protected email has a justly deserved reputation of being difficult to use. Based on an analysis of the PEM, PGP and S/MIME standards and a survey of 470 merchan...
Simson L. Garfinkel, David Margrave, Jeffrey I. Sc...
Spam e-mail with advertisement text embedded in images presents a great challenge to anti-spam filters. In this paper, we present a fast method to detect image-based spam e-mail. U...
This paper describes a two-year research study that piloted and evaluated the use of low-cost, low-bandwidth Information and Communications Technology (ICT) to support meetings be...
Private information management and compliance are important issues nowadays for most of organizations. As a major communication tool for organizations, email is one of the many pot...
Liqiang Geng, Larry Korba, Xin Wang, Yunli Wang, H...