scispace - formally typeset
Topic

Electronic mail

About: Electronic mail is a(n) research topic. Over the lifetime, 27107 publication(s) have been published within this topic receiving 553963 citation(s).

...read more

Papers
More filters

Journal ArticleDOI
TL;DR: A new latent variable modeling approach is provided that can give more accurate estimates of interaction effects by accounting for the measurement error that attenuates the estimated relationships.

...read more

Abstract: The ability to detect and accurately estimate the strength of interaction effects are critical issues that are fundamental to social science research in general and IS research in particular. Within the IS discipline, a significant percentage of research has been devoted to examining the conditions and contexts under which relationships may vary, often under the general umbrella of contingency theory (cf. McKeen et al. 1994, Weill and Olson 1989). In our survey of such studies, the majority failed to either detect or provide an estimate of the effect size. In cases where effect sizes are estimated, the numbers are generally small. These results have led some researchers to question both the usefulness of contingency theory and the need to detect interaction effects (e.g., Weill and Olson 1989). This paper addresses this issue by providing a new latent variable modeling approach that can give more accurate estimates of interaction effects by accounting for the measurement error that attenuates the estimated relationships. The capacity of this approach at recovering true effects in comparison to summated regression is demonstrated in a Monte Carlo study that creates a simulated data set in which the underlying true effects are known. Analysis of a second, empirical data set is included to demonstrate the technique's use within IS theory. In this second analysis, substantial direct and interaction effects of enjoyment on electronic-mail adoption are shown to exist.

...read more

5,024 citations


Journal ArticleDOI
David Chaum1Institutions (1)
TL;DR: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system.

...read more

Abstract: A technique based on public key cryptography is presented that allows an electronic mail system to hide who a participant communicates with as well as the content of the communication - in spite of an unsecured underlying telecommunication system. The technique does not require a universally trusted authority. One correspondent can remain anonymous to a second, while allowing the second to respond via an untraceable return address. The technique can also be used to form rosters of untraceable digital pseudonyms from selected applications. Applicants retain the exclusive ability to form digital signatures corresponding to their pseudonyms. Elections in which any interested party can verify that the ballots have been properly counted are possible if anonymously mailed ballots are signed with pseudonyms from a roster of registered voters. Another use allows an individual to correspond with a record-keeping organization under a unique pseudonym, which appears in a roster of acceptable clients.

...read more

3,953 citations


Journal ArticleDOI
Eckart Zitzler1, Lothar Thiele1, Marco Laumanns1, Carlos M. Fonseca2  +1 moreInstitutions (2)
TL;DR: This study provides a rigorous analysis of the limitations underlying this type of quality assessment in multiobjective evolutionary algorithms and develops a mathematical framework which allows one to classify and discuss existing techniques.

...read more

Abstract: An important issue in multiobjective optimization is the quantitative comparison of the performance of different algorithms. In the case of multiobjective evolutionary algorithms, the outcome is usually an approximation of the Pareto-optimal set, which is denoted as an approximation set, and therefore the question arises of how to evaluate the quality of approximation sets. Most popular are methods that assign each approximation set a vector of real numbers that reflect different aspects of the quality. Sometimes, pairs of approximation sets are also considered. In this study, we provide a rigorous analysis of the limitations underlying this type of quality assessment. To this end, a mathematical framework is developed which allows one to classify and discuss existing techniques.

...read more

3,184 citations


11


Journal ArticleDOI
TL;DR: Two studies that replicate previous work by Fred Davis on the subject of perceived usefulness, ease of use, and usage of information technology focus on evaluating the psychometric properties of the ease ofUse and usefulness scales, while examining the relationship between ease ofuse, usefulness, and system usage.

...read more

Abstract: This paper presents the findings of two studies that replicate previous work by Fred Davis on the subject of perceived usefulness, ease of use, and usage of information technology. The two studies focus on evaluating the psychometric properties of the ease of use and usefulness scales, while examining the relationship between ease of use, usefulness, and system usage. Study 1 provides a strong assessment of the convergent validity of the two scales by examining heterogeneous user groups dealing with heterogeneous implementations of messaging technology. In addition, because one might expect users to share similar perspectives about voice and electronic mail, the study also represents a strong test of discriminant validity. In this study a total of 118 respondents from 10 different organizations were surveyed for their attitudes toward two messaging technologies: voice and electronic mail.

...read more

3,004 citations


Journal ArticleDOI
TL;DR: A two-layered feed-forward neural network is trained on a non-redundant data base to predict the secondary structure of water-soluble proteins with a new key aspect is the use of evolutionary information in the form of multiple sequence alignments that are used as input in place of single sequences.

...read more

Abstract: We have trained a two-layered feed-forward neural network on a non-redundant data base of 130 protein chains to predict the secondary structure of water-soluble proteins A new key aspect is the use of evolutionary information in the form of multiple sequence alignments that are used as input in place of single sequences The inclusion of protein family information in this form increases the prediction accuracy by six to eight percentage points A combination of three levels of networks results in an overall three-state accuracy of 708% for globular proteins (sustained performance) If four membrane protein chains are included in the evaluation, the overall accuracy drops to 702% The prediction is well balanced between alpha-helix, beta-strand and loop: 65% of the observed strand residues are predicted correctly The accuracy in predicting the content of three secondary structure types is comparable to that of circular dichroism spectroscopy The performance accuracy is verified by a sevenfold cross-validation test, and an additional test on 26 recently solved proteins Of particular practical importance is the definition of a position-specific reliability index For half of the residues predicted with a high level of reliability the overall accuracy increases to better than 82% A further strength of the method is the more realistic prediction of segment length The protein family prediction method is available for testing by academic researchers via an electronic mail server

...read more

2,945 citations


Network Information
Related Topics (5)
Asynchronous communication

28.1K papers, 430.4K citations

90% related
Mobile device

58.6K papers, 942.8K citations

89% related
Computer science

3 papers, 2 citations

88% related
The Internet

213.2K papers, 3.8M citations

87% related
Performance improvement

2.8K papers, 28.6K citations

87% related
Performance
Metrics
No. of papers in the topic in previous years
YearPapers
20222
2021178
2020325
2019336
2018733
20171,283

Top Attributes

Show by:

Topic's top 5 most impactful authors

Kiyoshi Toyoda

27 papers, 635 citations

Yoshifumi Tanimoto

17 papers, 98 citations

Leonard Barolli

14 papers, 134 citations

Fatos Xhafa

13 papers, 108 citations

Robert E. Kraut

9 papers, 1.9K citations