Usability, Affordability, And Ubiquity Of Email Cannot Term Paper

PAGES
2
WORDS
598
Cite
Related Topics:

¶ … usability, affordability, and ubiquity of email cannot be denied. However, along with these benefits come some significant issues that companies must be aware of and try to address. Information overflow, misuse that replaces more appropriate forms of communication, amplified security exposure, right to privacy concerns, and negative implications for work practices represent the dark side of email Email extensions such as alias and distribution lists combined with the near zero costs allow irresponsible mass mailings. Spamming is now a common marketing technique that has become even more problematic than unwanted telemarketing. Email leads to an in-flow of information that is beyond most employees' bandwidth. Most modern email facilities have weak content filtering and message prioritization and many companies do not permit the creation of private mailboxes whose address is controlled by the owner.

Nearly all systems lack the ability to deal with hierarchical organizations that correspond...

...

Author M. Lynn Markus in Finding a Happy Medium: Explaining the Negative Effects of Electronic Communication of Social Life at Work provides a case study of a large company dubbed "HCP" and found that people were "hiding behind the network." That is, they were using corporate email when they wanted to convey a non-negotiable decision, when they did not like the other person, when they wanted to describe a situation that made them angry, or when they wanted to make a request of someone that irritates them.
Security problems created by email are a huge drain on corporate resources. Email clients support binary, executable files as attachments. These files can transmit viruses that corrupt computer systems and that can quickly propagate throughout…

Sources Used in Documents:

Bibliography

Berghel, H. Email: the good, the bad and the ugly. Retrieved January 25, 2003 from ACM Web Site: http://www.acm.org/~hlb/col-edit/digital_village/apr-97/dv_4-97.html

Markus, M.L.. Finding a happy medium: explaining the negative effects of electronic communication on social life at work. ACM Transactions on Information Systems. 12, 2 (April 1994) pp. 119-149.


Cite this Document:

"Usability Affordability And Ubiquity Of Email Cannot" (2003, January 25) Retrieved April 29, 2024, from
https://www.paperdue.com/essay/usability-affordability-and-ubiquity-of-142885

"Usability Affordability And Ubiquity Of Email Cannot" 25 January 2003. Web.29 April. 2024. <
https://www.paperdue.com/essay/usability-affordability-and-ubiquity-of-142885>

"Usability Affordability And Ubiquity Of Email Cannot", 25 January 2003, Accessed.29 April. 2024,
https://www.paperdue.com/essay/usability-affordability-and-ubiquity-of-142885

Related Documents

This report will hopefully pull together the research available with regard to this issue, and also identify what users are most at risk for virus attacks. The research currently available also confirms that modern viruses are becoming more insidious and complex, with the potential to incur more damage to computers and data than in the past. Studies suggest that newer versions of viruses may escape detection using standard anti-viral software.

computer virus is among the greatest enemy of computer technology's globalization. In just a few split of seconds, it can turn our endeavor of automating our diverse activities into a nightmare. This is especially a catastrophe to businesses whose operation at a large percentage depends on computerized data access and retrieval. Globally, computerization is the trend among businesses. Thus, the damage that computer viruses can cause is a global

Computers and Work -- and
PAGES 1 WORDS 457

" (Wahlgren, 2004) Telecommuting, conversely, can cause the opposite problem -- isolating employees from the input of other individuals, and also the system of rewards that comes from having a manager praise -- or critique one's performance in a personal basis, rather than through emails or online correspondence. The Internet seems to act to decrease social connections on the whole. "13% of heavy Internet users reported spending less time attending

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Phishing is another criminal technique used to cull bank account or credit card information. Lovet (2007) describes how simple and potentially lucrative phishing can be: "the total costs for sending out 100,000 phishing emails can be as little as $60. This kind of 'phishing trip' will uncover at least 20 bank accounts of varying cash balances, giving a 'market value' of $200 - $2,000 in e-gold." Most incidents of

Hacking, the apolitical counterpart of hacktivism, is also not necessarily a form of terrorism. However, cyberterrorists often use hacking as a tool of terrorism. Terrorists may be tempted to use computer attacks for several reasons including the following. First, cyberterrorism can be relatively inexpensive. Second, terrorists can easily remain anonymous when they use computer terrorism. Third, the scope of the attack can potentially be larger than physically combative ones. Fourth,