منابع مشابه
E-Mail Tracking in Online Marketing - Methods, Detection, and Usage
E-Mail tracking uses personalized links and pictures for gathering information on user behavior, for example, where, when, on what kind of device, and how often an e-mail has been read. This information can be very useful for marketing purposes. On the other hand, privacy and security requirements of customers could be violated by tracking. This paper examines how e-mail tracking works, how it ...
متن کاملPermission-Based E-Mail Marketing Websites Success: An Integrated Perspective
Extant research on websites success has paid insufficient attention to the success of permission-based email marketing (PEM) websites. In order to bridge this knowledge gap, the contribution of this study lies in synthesizing information management/e-commerce, media/communication, as well as customer/marketing research to propose a PEM websites success model consisting of antecedent (i.e., func...
متن کاملA study of e-mail patterns
Although electronic mail is an increasingly important service, there are few empirical studies of e-mail traffic. We have observed over 2.85 million messages passing through our departmental servers over the course of seven months, and derived distributions that approximate several important e-mail parameters including message sizes, message senders and receivers and the burstiness of message d...
متن کاملTrap E-mail Address for Combating E-mail Viruses
The biggest infection events show that the most dangerous viruses propagate via the Internet email systems. We propose a new solution to accelerate the identification of infected computers after an attack by e-mail viruses. Our approach uses trap e-mail addresses secured by a feasible cryptographic technique. The novelty of our work is the introduction of virtual e-mail addresses to identify vi...
متن کاملA Better E-Mail Bouncer
This paper describes a portable electronic mail bouncer which sends detailed information back to the sender when a mail message can not be delivered to it’s intended recipient. The bouncer was originally written to handle a large merger between multiple DNS domains, and is implemented entirely in Perl5 as a mail delivery agent. The bouncer operates under the concept of "least privilege" so it’s...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Journal of Internet Applications and Management
سال: 2010
ISSN: 1309-8810
DOI: 10.5505/iuyd.2010.65375