5,066,777 research outputs found

    Message Deleted? Resolving Physician-Patient E-mail through Contract Law

    Get PDF
    This article examines the impact of e-mail on the physician-patient relationship, and how contract law can resolve the uncertainties incumbent in this nascent form of communication. Significantly, courts have yet to indicate when the physician-patient relationship begins by e-mail, or to what extent e-mail affects the duties of the relationship. Instead of waiting for judicial guidance, physicians and patients can employ specialized contracts to clarify the role that e-mail plays in their relationship. As a result, more physicians and patients will regard e-mail correspondence as a valuable means of communication, and a tool for improving the quality of health care as well

    Curating E-Mails; A life-cycle approach to the management and preservation of e-mail messages

    Get PDF
    E-mail forms the backbone of communications in many modern institutions and organisations and is a valuable type of organisational, cultural, and historical record. Successful management and preservation of valuable e-mail messages and collections is therefore vital if organisational accountability is to be achieved and historical or cultural memory retained for the future. This requires attention by all stakeholders across the entire life-cycle of the e-mail records. This instalment of the Digital Curation Manual reports on the several issues involved in managing and curating e-mail messages for both current and future use. Although there is no 'one-size-fits-all' solution, this instalment outlines a generic framework for e-mail curation and preservation, provides a summary of current approaches, and addresses the technical, organisational and cultural challenges to successful e-mail management and longer-term curation.

    A discourse analysis of e-mail messages in a Malaysian Business Community

    Get PDF
    The study attempts to investigate recurrent grammatical features and functions of electronic mail discourse in a selected business community, comprising executives in a Malaysian public limited company. It also examines whether the electronic mail system has influenced language forms in the executives' e-mail discourse. Differences between language in the e-mail discourse and language in conventional business writing are explored too. The corpus comprises 102 electronic mail messages from the executives' routine communication in work contexts. The study examines grammatical features, communicative functions and discourse features of the messages. Findings reveal a predominance of main clauses in imperative and declarative moods, and subordinate clauses denoting purpose and reason, reflecting that e-mail communication of the community is used more for requesting and informing, and less for enquiring. Other discourse features like opening salutation, opening statement, closing statement and closing salutation are also found in the e-mail messages although they are not compulsory for such a communication. It is hoped that the language features and functions, and other discourse features identified in the e-mail communication of the business community would contribute towards pedagogy and course design for English for Business Communication, as well as for e-mail communication at the workplace

    Fluctuation in e-mail sizes weakens power-law correlations in e-mail flow

    Full text link
    Power-law correlations have been observed in packet flow over the Internet. The possible origin of these correlations includes demand for Internet services. We observe the demand for e-mail services in an organization, and analyze correlations in the flow and the sequence of send requests using a Detrended Fluctuation Analysis (DFA). The correlation in the flow is found to be weaker than that in the send requests. Four types of artificial flow are constructed to investigate the effects of fluctuations in e-mail sizes. As a result, we find that the correlation in the flow originates from that in the sequence of send requests. The strength of the power-law correlation decreases as a function of the ratio of the standard deviation of e-mail sizes to their average.Comment: 8 pages, 6 figures, EPJB accepte

    Spam on the Internet: can it be eradicated or is it here to stay?

    Get PDF
    A discussion of the rise in unsolicited bulk e-mail, its effect on tertiary education, and some of the methods being used or developed to combat it. Includes an examination of block listing, protocol change, economic and computational solutions, e-mail aliasing, sender warranted e-mail, collaborative filtering, rule-based and statistical solutions, and legislation

    Analyzing the Social Structure and Dynamics of E-mail and Spam in Massive Backbone Internet Traffic

    Full text link
    E-mail is probably the most popular application on the Internet, with everyday business and personal communications dependent on it. Spam or unsolicited e-mail has been estimated to cost businesses significant amounts of money. However, our understanding of the network-level behavior of legitimate e-mail traffic and how it differs from spam traffic is limited. In this study, we have passively captured SMTP packets from a 10 Gbit/s Internet backbone link to construct a social network of e-mail users based on their exchanged e-mails. The focus of this paper is on the graph metrics indicating various structural properties of e-mail networks and how they evolve over time. This study also looks into the differences in the structural and temporal characteristics of spam and non-spam networks. Our analysis on the collected data allows us to show several differences between the behavior of spam and legitimate e-mail traffic, which can help us to understand the behavior of spammers and give us the knowledge to statistically model spam traffic on the network-level in order to complement current spam detection techniques.Comment: 15 pages, 20 figures, technical repor

    Using ICT to support reflection in pre-service mathematics teacher education

    Get PDF
    This paper analyses a virtual supervision setting (e-mail and forum) during the practicum in a pre-service secondary school mathematics teacher education program. It is a study of the authors’ own professional practice using a qualitative-interpretative approach and case studies of student teachers. The results show that the setting was significant for pre-service teachers who had a more reflective attitude, but was seen as a burden by the others. The forum enabled fruitful reflections and discussions and e-mail was mostly used for organizational matters. In the future, attention must be paid to the role of the educational supervisor in fostering participation in the forum and use of e-mail.Este artigo analisa um dispositivo de supervisão virtual (e-mail e fórum) durante o estágio num curso de formação inicial de professores de Matemática do ensino secundário. É um estudo dos autores sobre a sua própria prática profissional usando uma abordagem qualitativa e interpretativa e estudos de casos de futuros professores. Os resultados mostram que o dispositivo foi significativo para os futuros professores que tinham uma atitude mais reflexiva mas foi visto como um “peso” pelos outros futuros professores. O fórum permitiu reflexões frutuosas e discussões e o e-mail foi principalmente usado para matérias organizacionais. No futuro, deve ser dada atenção ao papel do supervisor educacional em promover a participação no fórum e o uso do e-mail

    Implementing Open Access Policy: First case studies

    Get PDF
    When implementing open access, policy pioneers and flagship institutions alike have faced considerable challenges in meeting their own aims and achieving a recognized success. Legitimate authority, sufficient resources and the right timing are crucial, but the professionals charged with implementing policy still need several years to accomplish significant progress. This study defines a methodological standard for evaluating the first generation of open access policies. Evaluating implementation establishes evidence, enables reflection, and may foster the emergence of a second generation of open access policies. While the study is based on a small number of cases, these case studies cover most of the pioneer institutions, present the most significant issues and offer an international overview. Each case is reconstructed individually on the basis of public documents and background information, and supported by interviews with professionals responsible for open access implementation. This article presents the highlights from each case study. The results are utilized to indicate how a second generation of policies might define open access as a key component of digital research infrastructures that provide inputs and outputs for research, teaching and learning in real time.</p

    Innovations of subject service in National Science Library, Chinese Academy of Sciences and the implications

    Get PDF
    Looking at the development of subject librarians and subject services in Chinese libraries during the past decade, this paper highlights the innovative concepts and practices of subject librarians in National Science Library (NSL), Chinese Academy of Sciences (CAS). After a two-year trial period, NSL, CAS, with 39 full-time subject librarians, has begun to provide personalized, subject-speci.c, and knowledge-based services to the end-users since 2006. Such a practice manifests that subject librarians and subject services should be embedded into the research process and working environment. And, the subject service should be made available to the users beyond the space restriction and time limit, and .nally create a congenial environment for users. Librarians should develop new expertise to offer the user-oriented service, changing the role from book keepers to research instructors, advisors, even chief information officer (CIO) or chief knowledge officer (CKO).</p
    corecore