Advising by E-Mail: Some Advisors' Perceptions

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Understanding relationships among teleworkers' e-mail usage, e-mail richness perceptions, and e-mail productivity perceptions under a software engineering environment

This study was undertaken to investigate the use of e-mail and its implications under a telework environment for distributed software engineering. For this, the relative strength between a social influence and individual attributes in affecting teleworkers’ e-mail use was studied. Management support was used as the representative social influence, and age, status, and ease of use represented in...

متن کامل

Spam E-mail Recognition by Subspace Analysis

In this study, a subspace analysis approach is proposed for the detection of spam e-mail. Spam e-mails can be described as messages that are sent for promotion, advertisement or directly disturbance purposes. We have chosen covariance based subspace analysis methods to approach the classification problem. The training and test sets used in the study are composed of HTML e-mails in English. A no...

متن کامل

E-mail Classification by Decision Forests

We investigate the use of decision forests for automated e-mail filing into folders and junk e-mail filtering. The experiments show that decision forests offer the following advantages: (i) ability to deal with the large dimensionality of feature vectors in text categorization, (ii) improved accuracy of the ensemble over the single decision trees and favourable comparison with a number of other...

متن کامل

Trap E-mail Address for Combating E-mail Viruses

The biggest infection events show that the most dangerous viruses propagate via the Internet email systems. We propose a new solution to accelerate the identification of infected computers after an attack by e-mail viruses. Our approach uses trap e-mail addresses secured by a feasible cryptographic technique. The novelty of our work is the introduction of virtual e-mail addresses to identify vi...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: NACADA Journal

سال: 2001

ISSN: 0271-9517,2330-3840

DOI: 10.12930/0271-9517-21.1-2.88