scholarly journals The use of digital signature in electronic communication in BiH - Research

Author(s):  
Tijana Talić

The increasing use of electronic mail for identity theft and unsolicited marketing and frequent presence of viruses as well, reduced the credibility of email as a communication tool. Authentication of the sender is well known defense against such attacks. One of the methods to ensure that authentication, secure communication via e-mail, is the use of digital signature.

Temida ◽  
2013 ◽  
Vol 16 (1) ◽  
pp. 151-162
Author(s):  
Vida Vilic

Global social networks contributed to the creation of new, inconspicuous, technically perfect shape of criminality which is hard to suppress because of its intangible characteristics. The most common forms of virtual communications? abuse are: cyberstalking and harassment, identity theft, online fraud, manipulation and misuse of personal information and personal photos, monitoring e-mail accounts and spamming, interception and recording of chat rooms. Cyberstalking is defined as persistent and targeted harassment of an individual by using electronic communication. The victim becomes insecure, frightened, intimidated and does not figure out the best reaction which will terminate the harassment. The aim of this paper is to emphasize the importance and necessity of studying cyberstalking and to point out its forms in order to find the best ways to prevent this negative social phenomenon. Basic topics that will be analyzed in this paper are the various definitions of cyberstalking, forms of cyberstalking, and the most important characteristics of victims and perpetators.


1995 ◽  
Vol 58 (3) ◽  
pp. 45-51 ◽  
Author(s):  
Karen S. Nantz ◽  
Cynthia L. Drexel

E-mail is the primary communication vehicle for the information superhighway. Unfortunately, e-mail education is focusing on the hardware and software issues without regard for the requisite communication skills. To be effective electronic communicators, students need training in understanding the electronic organizational hierarchy and electronic communication volume and costs; selecting the appropriate media; and evaluating message permanence, security, ownership, and privacy. Including targeted exercises in the business communication class can enhance students' understanding of e-mail.


Author(s):  
Ljubomir Lazić

E-mail has emerged as the most important application on the Internet for communication of messages, delivery of documents and carrying out transactions and is used not only from computers, but many other electronic gadgets such as mobile phones. This paper is an attempt to illustrate e-mail architecture from forensics perspective.  Also, this paper projects the need for e-mail forensic investigation and lists various methods and tools used for its realization. A detailed header analysis of a multiple tactic spoofed e-mail message is carried out in this paper. It also discusses various possibilities for detection of spoofed headers and identification of its originator. Furthermore, difficulties that may be faced by investigators during forensic investigation of an e-mail message have been discussed along with their possible solutions. Our focus is on email header analysis phase offered by the tools. We examine the capability of a particular tools such as EmailTrackerPro and  aid4mail in action. The paper describes the court case of cyber crime, the so-called identity theft in Internet communication via electronic mail by two business entities. Identity theft of e-mail addresses and false communications with a foreign company was carried out in order to indicate that a cash transaction of around EUR 100,000 was paid to the account of NN attackers and not to the account in the domestic Serbian bank.


2017 ◽  
Vol 24 (3) ◽  
pp. 275
Author(s):  
Catharina Carolina De Jong ◽  
Wynand J.G. Ros ◽  
Mia Van Leeuwen ◽  
Guus Schrijvers

Background: Elderly patients in primary care often have multiple health problems,with different healthcare professionals involved. For consistency in care, it is required that communication amongst professionals and patient-systems (patient and informal-carers) be well tuned. Electronic-communication can make it easier for patient-system to be active in care.Objective: To examine whether an e-communication tool (Congredi) designed for professionals, including a care plan and secure e-mail, is usable for patient-systems and what their experiences are.Methods: In a multi-method study, home-dwelling elderly patients with two or more professionals were invited to use Congredi; data were gathered from the system after 42 weeks. Also semi-structured interviews were undertaken with patient-systems with topics retrieved from literature. Analysis took place by two researchers independently; the themes were extracted together by consensus.Results: Data about actual use of the tool were gathered from 22 patients. Four profiles of Congredi-users were distinguished, varying in intensity of use. Data from  interviews with members of patient-systems (n = 7) showed that they were motivated and able to use Congredi. Barriers in daily use were limited participation of professionals, unanswered e-mail and not being alerted about actions. Despite limitations, patient-systems retained their motivation.Conclusion: Congredi was usable for patient-systems. The barriers found seem not to be tool-related but primarily user-related. An important barrier for daily use was limited active participation of involved professionals in a complete feedback loop. Potential for future implementation was found, as patient-systems were intrinsically motivated for better feedback with the professionals, even though in this study it only partly met their expectations.


Author(s):  
Kevin Curran ◽  
Sheila McCarthy

E-mail has been one of the major reasons for the broad acceptance of the Internet, and although e-mail is still a vitally important communication tool, it suffers from an increasing number of problems as a medium for delivering information to the correct audience in a timely manner. The increasing volume of spam and viruses means that e-mail users are forced into adopting new tools, such as spam-blocking and e-mail-filtering software, that attempt to prevent the tirade of unwanted e-mails. Many users are also becoming increasingly reticent to divulge their e-mail address for fear of an impending spam influx. Further to this, recent studies suggest that up to 38% of bona fide e-mail messages are being erroneously blocked by filtering software. In reality, this means that more than a third of e-mails, newsletters, special offers, and event announcements are not reaching their intended audience (Patch & McKinlay-Key, 2004). Therefore, the combination of e-mail issues, such as the increasing difficulties associated with multimedia downloads, such as delays, compression, and data integrity maintenance, could be seen as creating a demand for an alternate, effective, and secure communication methodology. One such alternative technology is Really Simple Syndication (RSS), previously known as Rich Site Summary. RSS allows some elements of Web sites, such as headlines, to be transmitted in unembellished form. When devoid of all elaborate graphics and layouts, such minimalist headlines are quite easily incorporated into other Web sites. In other words, third-party Web sites can insert this content on their site through embedded RSS news readers and thus, provide active news feeds quite easily to their clientele. RSS, termed a lightweight content syndication technology, offers many advantages over streaming and e-mail, and for the consumer, no more difficult to access as the RSS readers are akin to e-mail clients (Byrne, 2003). There is no question that the media is keen to adopt a new communications option, and RSS most certainly can comply. RSS solves a myriad of problems Web masters commonly face, such as increasing traffic, and gathering and distributing news (BBC, 2008). RSS can also be the basis for additional content distribution services (Kerner, 2004). The real benefit of RSS, apart from the added benefit of receiving news feeds from multiple sites, simultaneously, in the viewer, is that all the news feeds (i.e., news items) are chosen by the user. With thousands of sites now RSS-enabled and more on the way, RSS has become perhaps one of the most visible Xtensible Mark-up Language (XML) success stories to date. RSS formats are specified using XML, a generic specification for the creation of data formats. Although RSS formats have evolved since March 1999, the RSS icon (“ ”) first gained widespread use in 2005/2006. RSS democratizes news distribution by making everyone a potential news provider. It leverages the Web’s most valuable asset, content, and makes displaying high-quality relevant news on a site relatively easy (King, 2004). It must be recognized, however, that RSS cannot entirely replace the primary function of e-mail, which is to provide person-to-person asynchronous communications, but it does compliment it in some interesting ways.


2014 ◽  
Vol 8 (1) ◽  
pp. 1
Author(s):  
Hani Wahyuningtias

Nowadays electronic mail (e-mail) is a communication tool that is often used in everyday life. One of the utilizations of e-mail is used in practical purposes such as making a request. This paper provided views on linguistic politeness in submitting an e-mail containing the request based on e-mail data written by native speakers of Japanese (J) and the Indonesian Japanese language learners (IJL). The data was analyzed using the theory of politeness expressed by Brown and Levinson. This paper focused on the strategy that what more likely was to be used by J and IJL in the expression of request. In the final part, it concluded the view about what should be considered in connection with the linguistic politeness in Japanese e-mail containing request. It was intended for learners of foreign language, especially Indonesian people, to know the limitation of politeness, so that IJL will not repeat the same mistakes in the future.


2014 ◽  
Vol 4 (3) ◽  
pp. 67 ◽  
Author(s):  
Tomáš Kozík ◽  
Jozefína Slivová

Electronic mail and electronic communications systems are considered significant and effective tools of communication. One of the most widespread electronic communication tools is e - mail communication. In order to avoid misinterpretation of the report on the side of the recipient, it is need to pay attention to the writing of e - mail messages as well as to their content. With the continuous expansion of the use of electronic communication there have gradually developed certain rules of etiquette in electronic communications. The existing rules of the propriety ones are expressed in the term " etiqutte " and are not automatically applied in the new communications environment - media. For electronic communication, the new rules of etiquette have been stabilised into a term NETIQUETTE. The word netiquette was created by combining words NET (net) and ETIKETA (a set of rules of social behavior and habits). Netiquette constitutes the rules of the behavior of users on a network. Although the netiquette is merely "an unwritten set of rules", their not using can be understood as a type of disrespect. Analysis of knowledge of domestic and foreign sources as well as results of a survey confirmed the justification of paying attention to the education of individuals in NETIQUETTE, irrespective of the degree of education.


2013 ◽  
Vol 5 (1) ◽  
pp. 51-76 ◽  
Author(s):  
Wasan Shaker Awad ◽  
Ali Hussein Zolait

This research studies the acceptance of e-mail for communicating official messages among citizens in Bahrain. It also examines the relationships between citizens’ age, educational level, gender, occupation, and organization type and e-mail as an official communication channel. A descriptive and quantitative research approach was applied to test hypotheses pertaining to the idea of using e-mail as an official and reliable communication tool. The findings show that e-mail can be used as an official and reliable tool to communicate information between citizens and the government in Bahrain. The findings also show that e-mail will be more widely used when specific security requirements are met. Thus, reliable electronic mail can provide an advanced means of communication and enhance the recently developed e-Government program. This study contributes to existing research by proposing new construct for examining the acceptance of email as an official communication tool.


2019 ◽  
Author(s):  
Didi Bima Yudha

Electronic Commerce (e-commerce) is the process of buying, selling orexchanging products, services and information via computer networks. e- commerce is part of the e-business, where the scope of e-business more broadly, not just commercial but also include business partners, customer service, job vacancies. In addition to networking technologies www, e-commerce technology also requires a database or a database (database), e-mail or electronic mail (e- mail), and the form of non-computer technology as well as other delivery systems, and means of payment for e -Commerce. Given the electronic commerce (e- commerce) is then the customer can access and perform orders from various places. Given the current era of advanced technology is the customer who wants to access e-commerce does not have to be somewhere, it is because in the big cities in Indonesia have a lot of places that provide an internet access facility using only the laptop / notebook or by Personal Digital Assistant (PDA) using wifi technology. Thus the time is now very necessary and desirable companies to implement e-commerceservices. The use of e-commerce in Indonesia is still very limited. From the background that there is then the author will discuss how e- commerce pemanfaaatan in their business interests.


IEEE Spectrum ◽  
1992 ◽  
Vol 29 (10) ◽  
pp. 24-28 ◽  
Author(s):  
T.S. Perry
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document