Sciweavers

775 search results - page 93 / 155
» Email data cleaning
Sort
View
DEXAW
2004
IEEE
80views Database» more  DEXAW 2004»
14 years 1 months ago
Traceable Document Flows
Ad-hoc data exchange, e.g., by sending email attachments, leads to multiple copies or versions of a document at dispersed nodes in a network. However, their relationships such as ...
Martin Bernauer, Gerti Kappel, Elke Michlmayr
INTERACT
2007
13 years 11 months ago
Electronic Communication: Themes from a Case Study of the Deaf Community
We present a qualitative, exploratory study to examine the space of electronic communication (e.g. instant messaging, short message service, email) by Deaf teenagers in the greater...
Valerie Henderson-Summet, Rebecca E. Grinter, Jenn...
SEC
2007
13 years 11 months ago
Identity Theft - Empirical evidence from a Phishing Exercise
Identity theft is an emerging threat in our networked world and more individuals and companies fall victim to this type of fraud. User training is an important part of ICT security...
Tjaart Steyn, Hennie A. Kruger, Lynette Drevin
ECIS
2003
13 years 11 months ago
ICT corporate infrastructures and risk: a dual perspective
Corporate information infrastructures are deployed to reduce risks of data fragmentation and misalignment between the computing resources and the business objectives. However, the...
Claudio U. Ciborra, Daniel Osei-joehene
DEXAW
2010
IEEE
149views Database» more  DEXAW 2010»
13 years 11 months ago
Using Progressive Filtering to Deal with Information Overload
Abstract-- In the age of Web 2.0 people organize large collections of web pages, articles, or emails in hierarchies of topics, or arrange a large body of knowledge in ontologies. T...
Andrea Addis, Giuliano Armano, Eloisa Vargiu