Results for ' Email'

651 found
Order:
  1.  10
    On Hegel’s Radicalization of Kantian Dualisms: „The Debate between Kant and Hegel“.G. A. Email: - 2015 - Hegel-Jahrbuch 2015 (1).
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  2.  6
    Anmerkungen zum Begriff der Wahrheit bei Kant und Hegel – und Aristoteles.Hannover Hans-Georg BenschD- & Email: Angerstraße - 2015 - Hegel-Jahrbuch 2015 (1).
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  3.  7
    Hegel, Identity, and the Middle Path.Avenue South, City Garden & N. Y. Email: - 2015 - Hegel-Jahrbuch 2015 (1).
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  4. The International Humanitarian Response to the Refugee Crisis Along the Balkan Route in the View of Strategies of International Organizations. Tetovo & of)Email: Macedonia - 2016 - Seeu Review 12 (1).
    No categories
     
    Export citation  
     
    Bookmark  
  5. Comparing the semiotic construction of attitudinal meanings in the multimodal manuscript, original published and adapted versions of Alice’s Adventures in Wonderland.Languages Yumin ChenCorresponding authorSchool of Foreign, Guangzhou, Guangdong & China Email: - 2017 - Semiotica 2017 (215).
     
    Export citation  
     
    Bookmark  
  6.  7
    Warum Reformation?A. Horst Georg PöhlmannCorresponding authorSchöneberger Straße & Wallenhorst Germany Email: D. - - 2017 - Neue Zeitschrift für Systematicsche Theologie Und Religionsphilosophie 59 (1).
    Direct download  
     
    Export citation  
     
    Bookmark  
  7.  34
    The Refutation of Polus in Plato’s Gorgias Revisited.authorLeibnizstr Georgia Sermamoglou-SoulmaidiCorresponding, Goettingen & Germany Email: - forthcoming - Apeiron.
    Objective Apeiron was founded in 1966 and has developed into one of the oldest and most distinguished journals dedicated to the study of ancient philosophy, ancient science, and, in particular, of problems that concern both fields. Apeiron is committed to publishing high-quality research papers in these areas of ancient Greco-Roman intellectual history; it also welcomes submission of articles dealing with the reception of ancient philosophical and scientific ideas in the later western tradition. The journal appears quarterly. Articles are peer-reviewed on (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  8. Gabriele Cornelli, Richard McKirahan, and Constantinos Macris, On Pythagoreanism.Ancient History North Bailey, Durham D. H. Eu, United Kingdom United Kingdom of Great Britain & Ireland Email: Northern - 2016 - Rhizomata 4 (2).
    No categories
     
    Export citation  
     
    Bookmark  
  9.  20
    Hegel’s Critique of the Infinitesimal Calculus and Analytical Practice.Central Fábio Mascarenhas NolascoAv, Itaúna Padre Eustáquio & M. G. Brazil-Email: - 2015 - Hegel-Jahrbuch 2015 (1).
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  10.  20
    Asynchronous email interview as a qualitative research method in the humanities.Kateřina Ratislavová & Jakub Ratislav - 2014 - Human Affairs 24 (4):452-460.
    The article focuses on a method for collecting qualitative data. The method is the asynchronous email interview. The authors assess the advantages, challenges and best practices of the asynchronous email interview method. They base their assessment on the academic literature and their own experiences using this data collection method in qualitative research on women who had experienced perinatal loss. The asynchronous email interview will never fully replace traditional face-to-face interviews, but it could gain a solid position as (...)
    No categories
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  11. On the Semantics of Email Addresses.Brian Rabern - manuscript
    At the turn of the century, electronic mail emerged as a core mode of communication, fundamentally transforming the way individuals and organizations interact. In this digital age, one ubiquitous representational device is the email address. Given the importance of email addresses in our lives, it is natural to ask: what do email addresses represent? And how do they represent it? Given that email addresses have a semantic interpretation, and that they have a formal syntax, it is (...)
    Direct download  
     
    Export citation  
     
    Bookmark  
  12.  34
    Email, voicemail, and privacy: What policy is ethical?Marsha Woodbury - 2000 - Science and Engineering Ethics 6 (2):235-244.
    Business people repeatedly asked Computer Professionals for Social Responsibility (CPSR) to recommend a policy to deal with email and voicemail. After many such requests to our organization, we attempted to construct guidelines that we could endorse. This paper outlines the guidelines that we proposed and the public reaction to them. The paper discusses the tensions inherent in a business environment, and the means of identifying ethical behavior for both companies and their employees.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  13.  14
    Novel email spam detection method using sentiment analysis and personality recognition.Enaitz Ezpeleta, Iñaki Velez de Mendizabal, José María Gómez Hidalgo & Urko Zurutuza - 2020 - Logic Journal of the IGPL 28 (1):83-94.
    Unsolicited email campaigns remain as one of the biggest threats affecting millions of users per day. During the past years several techniques to detect unsolicited emails have been developed. This work provides means to validate the hypothesis that the identification of the email messages’ intention can be approached by sentiment analysis and personality recognition techniques. These techniques will provide new features that improve current spam classification techniques. We combine personality recognition and sentiment analysis techniques to analyse email (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  14.  20
    Coauthors’ Email Addresses: A Neglected Journal-Level Measure to Uphold Authorship Integrity in Research Collaboration.Ahmed Abu-Zaid - 2020 - Science and Engineering Ethics 26 (3):1879-1880.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  15.  35
    Email dialogue journaling: attitudes and impact on L2 reading performance.Hui‐Fang Shang * - 2005 - Educational Studies 31 (2):197-212.
    With the rapid development of technologies, online learning, especially email dialogue journaling, has been playing an increasingly important role in foreign language learning and teaching in recent years. While many studies have examined the effect of email learning on student learning performance, few have looked into students? attitudes towards email application and its impact on their learning outcomes. Positive user attitudes (high self?efficacy) have been considered critical factors that contribute to the subsequent and successful academic performance. By (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  16.  19
    Work Emails at the Breakfast Table: Proximity of Labour and Capital as an Unexamined Difficulty for the (Just) Distribution of Discretionary Time.Alastair James - 2024 - Journal of Applied Philosophy 41 (2):350-365.
    This article examines an omission in the study of discretionary time that bears on proposals currently being evaluated in this part of political philosophy. Specifically, this is the tendency in many jobs for work time to bleed into what is meant to be protected or discretionary time. I refer to this phenomenon as the relative proximity of labour and capital, which has become more prevalent in the labour market due to increased use of mobile communications technology. Ignored by the literature (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  17.  25
    How does the email matter to the civic honesty? A comment on Cohn et al. (2019).Toan Luu Duc Huynh, Mei Wang & Marc Oliver Rieger - 2020 - Business and Society Review 125 (4):387-391.
    Cohn et al. (2019) designed the field experiment about the lost wallets across 40 countries to examine whether people attempt to contact the owners to return the 17,000 wallets. We discussed the design flaw in their experimental settings by reanalyzing the relationship between the rates of wallet return, in the Cohn et al. (2019)’s data, and the percentage of the Internet penetration (over population) as an upper bound of proportion email users. We found that countries with limited access to (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  18.  39
    Transparency and Control in Email Communication: The More the Supervisor is Put in cc the Less Trust is Felt.Tessa Haesevoets, David De Cremer, Leander De Schutter, Jack McGuire, Yu Yang, Xie Jian & Alain Van Hiel - 2019 - Journal of Business Ethics 168 (4):733-753.
    The issue of trust has increasingly attracted attention in the business ethics literature. Our aim is to contribute further to this literature by examining how the use of the carbon copy function in email communication influences felt trust. We develop the argument that the use of cc enhances transparency—representing an important characteristic of workplace ethics—and hence promotes trust. We further argue that a downside of the cc option may be that it can also be experienced as a control mechanism, (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  19.  26
    Email post to a friend: S online philosophy papers.Berel Dov Lerner - manuscript
    The information you provide on this form will not be used for anything other than sending the email to your friend. This feature is not to be used for advertising or excessive self-promotion.
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  20.  12
    Undergraduate and postgraduate students’ emails to faculty members: an impoliteness perspective.Marah Ahmad Abu-Rumman, Abdel Rahman Mitib Altakhaineh, Mohammed Al-Badawi & Yazeed Hammouri - 2024 - Lodz Papers in Pragmatics 20 (1):175-201.
    This study delves into the use of impoliteness strategies within emails sent by undergraduate and postgraduate students to their professors, aiming to discern the variance in their implementation based on (Culpeper and Hardaker’s. 2017. Impoliteness. In: Culpeper, Jonathan, Haugh, Michael and Daniel Kadar (eds.), The Palgrave handbook of linguistic (im) politeness, 199–225. Basingstoke: Palgrave) model. Data, comprising emails from University of Jordan students and semi-structured interviews, underwent analysis to identify impoliteness strategies and themes. Findings indicate a higher prevalence of impolite (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  21. Email: Uzplacek@ kinga. Cyf-kr. Edu. pi.Partial Indeterminism Is Enough - 2002 - In Tomasz Placek & Jeremy Butterfield (eds.), Non-locality and Modality. Dordrecht and Boston: Kluwer Academic Publishers.
     
    Export citation  
     
    Bookmark  
  22.  17
    Email Overload? Brain and Behavioral Responses to Common Messaging Alerts Are Heightened for Email Alerts and Are Associated With Job Involvement.Maria Uther, Michelle Cleveland & Rhiannon Jones - 2018 - Frontiers in Psychology 9.
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  23.  17
    Who Responds to Phishing Emails? An International Investigation of 15-Year-Olds Using PISA Data.John Jerrim - 2023 - British Journal of Educational Studies 71 (6):701-724.
    Young people are facing an ever-increasing array of online dangers. One of the most common is receipt of a phishing email. This paper presents new evidence on the characteristics of young people most likely to respond to such emails. I find approximately one-in-seven 15-year-olds are at risk of responding to a phishing email, rising to one-in-five amongst those from disadvantaged socio-economic backgrounds. Such risks are particularly high amongst young people with low levels of cognitive skill. Unfortunately, students who (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  24.  8
    Email and Ethics: Style and Ethical Relations in Computer-Mediated Communications.Emma Rooksby - 2002 - Routledge.
    _E-mail and Ethics_ explores the ways in which interpersonal relations are affected by being conducted via computer-mediated communication. The advent of this channel of communication has prompted a renewed investigation into the nature and value of forms of human association. Rooksby addresses these concerns in her rigorous investigation of the benefits, limitations and implications of computer-mediated communication. With its depth of research and clarity of style, this book will be of essential interest to philosophers, scholars of communication, cultural and media (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  25.  52
    Coordination in an email game without ``almost common knowledge''.Nicola Dimitri - 2003 - Journal of Logic, Language and Information 12 (1):1-11.
    The paper presents a variation of the EMAIL Game, originally proposed byRubinstein (American Economic Review, 1989), in which coordination ofthe more rewarding-risky joint course of actions is shown to obtain, evenwhen the relevant game is, at most, ``mutual knowledge.'' In the exampleproposed, a mediator is introduced in such a way that two individualsare symmetrically informed, rather than asymmetrically as in Rubinstein,about the game chosen by nature. As long as the message failure probabilityis sufficiently low, with the upper bound being (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark  
  26.  26
    Email: Unruh@ physics. Ubc. ca.is Quantum Mechanics Non-Local - 2002 - In Tomasz Placek & Jeremy Butterfield (eds.), Non-locality and Modality. Dordrecht and Boston: Kluwer Academic Publishers.
  27.  28
    The "Dark Side" of Humour. An Analysis of Subversive Humour in Workplace Emails.Charley Rowe & Stephanie Schnurr - 2008 - Lodz Papers in Pragmatics 4 (1):109-130.
    The "Dark Side" of Humour. An Analysis of Subversive Humour in Workplace Emails Although a substantial amount of research has investigated the various functions of humour in a workplace context, electronic means of communication have largely been ignored. This is particularly surprising since electronic communication in the workplace is increasingly gaining significance. This seems to be especially true for email, which in many workplaces is the preferred medium for communicating transactional as well as relational topics. Drawing on a corpus (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark   1 citation  
  28.  28
    Evaluation of email alerts in practice: Part 2 – validation of the information assessment method.Pierre Pluye, Roland M. Grad, Janique Johnson-Lafleur, Tara Bambrick, Bernard Burnand, Jay Mercer, Bernard Marlow & Craig Campbell - 2010 - Journal of Evaluation in Clinical Practice 16 (6):1236-1243.
  29.  25
    Cybercriminal Networks and Operational Dynamics of Business Email Compromise (BEC) Scammers: Insights from the “Black Axe” Confraternity.Suleman Lazarus - 2024 - Deviant Behavior 46:1-25.
    I explored the relationship between the “Black Axe” Confraternity and cybercrime, with a particular emphasis on the structural dynamics of the Business Email Compromise (BEC) schemes. I investigated whether a conventional hierarchical system governs the membership and remuneration for BEC roles as perpetrators by interviewing an accused “leader” of the “Black Axe” affiliated cybercriminal incarcerated in a prominent Western nation. I supplemented the analysis of interview data with insights from tapped phone records monitored by a law enforcement entity. I (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  30. EMAIL: [email protected].Ron Sun & Todd Peterson - unknown
    In developing autonomous agents, one usually emphasizes only (situated) procedural knowledge, ignoring more explicit declarative knowledge. On the other hand, in developing symbolic reasoning models, one usually emphasizes only declarative knowledge, ignoring procedural knowledge. In contrast, we have developed a learning model Clarion, which is a hybrid connectionist model consisting of both localist and distributed representations, based on the two-level approach proposed in Sun (1995). learns and utilizes both procedural and declarative knowledge, tapping into the synergy of..
     
    Export citation  
     
    Bookmark  
  31. Email Discourse Among Chinese Using English as a Lingua Franca.[author unknown] - 2016
    No categories
     
    Export citation  
     
    Bookmark  
  32. (2 other versions)Email and ethics : style and ethical relations in computer-mediated communication.Emma Rooksby - 2007 - In Michael Beaney (ed.), The Analytic Turn: Analysis in Early Analytic Philosophy and Phenomenology. New York: Routledge.
    E-mail and Ethics explores the ways in which interpersonal relations are affected by being conducted via computer-mediated communication. The advent of this channel of communication has prompted a renewed investigation into the nature and value of forms of human association. Rooksby addresses these concerns in her rigorous investigation of the benefits, limitations and implications of computer-mediated communication. With its depth of research and clarity of style, this book will be of essential interest to philosophers, scholars of communication, cultural and media (...)
     
    Export citation  
     
    Bookmark   1 citation  
  33.  30
    After cologne : An online email discussion about the philosophy of John Dewey.Larry A. Hickman, Stefan Neubert, Kersten Reich, Kenneth W. Stikkers & Jim Garrison - 2009 - In Larry A. Hickman, Stefan Neubert & Kersten Reich (eds.), John Dewey between pragmatism and constructivism. New York: Fordham University Press.
    This chapter presents an edited e-mail discussion based on the philosophical conversations at a conference held in Cologne, Germany, in December 2001. The discussion proceeds in three steps. First, the contributors discuss selected questions about their contributions, roughly following the sequence of the chapters in Part II of this book. Second, the contributors ask more general questions about Dewey, Pragmatism, and constructivism. Finally, the chapter ends with brief statements about why Dewey is still an indispensible thinker for them. As they (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  34. Assessing Cybercrime Syndicates: Understanding ‘Black Axe’ Confraternity and Cybercriminal Networks in Business Email Compromise (BEC) Scams.Suleman Lazarus - 2024 - Public Sector Counter Fraud Journal 1 (14):24-26.
    Cybercrime is a global threat affecting both public and private sectors. Business email compromise (BEC) is one of the most advanced and lucrative forms of cybercrime, exploiting vulnerabilities in corporate email systems to facilitate unauthorised financial transactions. Organisations worldwide suffer substantial losses from these attacks. This article explores the connection between Black Axe and BEC scams, providing insights into how public sector organisations can better combat these sophisticated criminal networks.
    Direct download  
     
    Export citation  
     
    Bookmark  
  35.  27
    Email || Home Page || publication list.William H. Calvin - unknown
    Plan-ahead becomes necessary for those movements which are over-and-done in less time than it takes for the feedback loop to operate. Natural selection for one of the ballistic movements (hammering, clubbing, and throwing) could evolve a plan-ahead serial buffer for hand-arm commands that would benefit the other ballistic movements as well. This same circuitry may also sequence other muscles (children learning handwriting often screw up their faces and tongues) and so novel oral-facial sequences may also benefit (as might kicking and (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  36.  47
    Communicative In-Betweens of Email Communication.Ejvind Hansen - 2009 - Techné: Research in Philosophy and Technology 13 (1):13-26.
    In this paper I seek to deconstruct internet-based communication. I highlight Derrida’s focus on the margins and in-betweens of communication, and relate it to the genre of e-mail. I argue (i) that the silence between the dialogic turns becomes more marked, while (ii) the separation of present and previous statements becomes less marked. The visibility of the silence between the turns (i) can be a resource for increased awareness of how communicative exchanges are shaped by self-arrangements and -presentations. The dissolution (...)
    Direct download (4 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  37. Email: A. valentini@ ic. ac. uk.Antony Valentini - 2002 - In Tomasz Placek & Jeremy Butterfield (eds.), Non-locality and Modality. Dordrecht and Boston: Kluwer Academic Publishers. pp. 81.
    No categories
     
    Export citation  
     
    Bookmark   1 citation  
  38.  98
    Adaptive intelligent learning approach based on visual anti-spam email model for multi-natural language.Akbal Omran Salman, Dheyaa Ahmed Ibrahim & Mazin Abed Mohammed - 2021 - Journal of Intelligent Systems 30 (1):774-792.
    Spam electronic mails (emails) refer to harmful and unwanted commercial emails sent to corporate bodies or individuals to cause harm. Even though such mails are often used for advertising services and products, they sometimes contain links to malware or phishing hosting websites through which private information can be stolen. This study shows how the adaptive intelligent learning approach, based on the visual anti-spam model for multi-natural language, can be used to detect abnormal situations effectively. The application of this approach is (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   1 citation  
  39.  77
    Network-based filtering for large email collections in E-Discovery.Hans Henseler - 2010 - Artificial Intelligence and Law 18 (4):413-430.
    The information overload in E-Discovery proceedings makes reviewing expensive and it increases the risk of failure to produce results on time and consistently. New interactive techniques have been introduced to increase reviewer productivity. In contrast, the techniques presented in this article propose an alternative method that tries to reduce information during culling so that less information needs to be reviewed. The proposed method first focuses on mapping the email collection universe using straightforward statistical methods based on keyword filtering combined (...)
    Direct download (6 more)  
     
    Export citation  
     
    Bookmark   2 citations  
  40.  33
    Email: Tmuel 1 er@ F dm. uni-f reiburg. De.Branching Space-Time & Modal Logic - 2002 - In Tomasz Placek & Jeremy Butterfield (eds.), Non-locality and Modality. Dordrecht and Boston: Kluwer Academic Publishers. pp. 273.
    Direct download  
     
    Export citation  
     
    Bookmark  
  41.  55
    ‘Like building a new motorway’: establishing the rules for ethical email use at a UK Higher Education Institution.Laura J. Spence - 2002 - Business Ethics, the Environment and Responsibility 11 (1):40-51.
    Computer mediated communication, in particular email, is of particular importance in the Higher Education sector. In this paper, research at one Higher Education Institution on the ethical use of email is presented. Focus groups were used to gather data on the impact of email, on current patterns of use, and on perceptions of ethical use. Using the analogy of a new motorway, which everyone is expected to use but for which there are no established rules of behaviour (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  42.  13
    In my professor’s eyes: Faculty and perceived impoliteness in student emails.Hamed Zandi & Iftikhar Haider - 2022 - Lodz Papers in Pragmatics 18 (1):197-222.
    Impoliteness in student emails to faculty can have negative consequences. However, the nuances of perceived impoliteness by faculty with different language backgrounds have not been thoroughly studied in the literature. This paper explores how emails written by non-native English-speaking students are perceived impolite by faculty depending on social identity variables such as native speaker status, gender, and seniority. Participants read six emails and rated their perceptions of the emails on a questionnaire. The items on the questionnaire were about lack of (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  43.  30
    Evaluation of email alerts in practice: part 1 – review of the literature on clinical emailing channels.Pierre Pluye, Roland M. Grad, Vera Granikov, Justin Jagosh & Kit Leung - 2010 - Journal of Evaluation in Clinical Practice 16 (6):1227-1235.
  44.  28
    Finding light in dark archives: using AI to connect context and content in email.Stephanie Decker, David A. Kirsch, Santhilata Kuppili Venkata & Adam Nix - 2022 - AI and Society 37 (3):859-872.
    Email archives are important historical resources, but access to such data poses a unique archival challenge and many born-digital collections remain dark, while questions of how they should be effectively made available remain. This paper contributes to the growing interest in preserving access to email by addressing the needs of users, in readiness for when such collections become more widely available. We argue that for the content of email to be meaningfully accessed, the context of email (...)
    Direct download (3 more)  
     
    Export citation  
     
    Bookmark  
  45.  26
    Discursive-manipulative strategies in scam emails and SMS: The Nigerian perspective.Temitope Michael Ajayi - 2022 - Lodz Papers in Pragmatics 18 (1):175-195.
    Cyber scam, a subculture in Nigeria, especially among youths, has been under-investigated from the linguistic perspective. This study thus explores discursive-manipulative strategies in scam emails and SMS/messages in Nigeria, drawing samples from a corpus of over 200 emails and 50 SMS documented between 2018 and 2022. With insights from Brown and Levinson’s face, Mey’s pragmatic act and McCronack’s information manipulation theories, it is observed that discursive manipulative strategies such as positive and negative false alarm, self-denigration, formulaic, and evocation of theistic (...)
    No categories
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  46.  15
    Understanding Phishing Email Processing and Perceived Trustworthiness Through Eye Tracking.John McAlaney & Peter J. Hills - 2020 - Frontiers in Psychology 11.
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  47.  11
    Use of Apology Strategies in Emails by Chinese Learners of English: Evidence Based on Naturally Occurring Data.Ying Chen, Qi Lu & Yuxuanjing Wei - 2022 - Frontiers in Psychology 12.
    Using a data set of 30 authentic institutional emails written by Chinese college students to their native English teacher, this article investigates the frequency and combinations of apology strategies used by English as a Foreign Language learners in natural contexts. Drawing on the coding framework adapted from previous studies, this article carries out a fine-grained analysis of apology behaviors of Chinese EFL learners when they offended their teacher for various reasons. Results revealed that the most frequently used strategy was illustrative (...)
    Direct download (2 more)  
     
    Export citation  
     
    Bookmark  
  48.  16
    The discourse of digital deceptions and ‘419’ emails.Innocent Chiluwa - 2009 - Discourse Studies 11 (6):635-660.
    This study applies a computer-mediated discourse analysis to the study of discourse structures and functions of ‘419’ emails — the Nigerian term for online/financial fraud. The hoax mails are in the form of online lottery winning announcements, and email ‘business proposals’ involving money transfers/claims of dormant bank accounts overseas. Data comprise 68 email samples collected from the researcher’s inboxes and colleagues’ and students’ mail boxes between January 2008 and March 2009 in Ota, Nigeria. The study reveals that the (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark   2 citations  
  49.  11
    Berkeley CA, USA. Email: mangan@berkeley. edu.Bruce Mangan - 1999 - In Jonathan Shear & Francisco J. Varela (eds.), The view from within: first-person approaches to the study of consciousness. Bowling Green, OH: Imprint Academic. pp. 249.
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
  50.  11
    A discourse-based study of three communities of practice: How members maintain a harmonious relationship while threatening each other’s face via email.Victor Chung Kwong Ho - 2011 - Discourse Studies 13 (3):299-326.
    This article discusses and compares the way the members of three communities of practice maintained a harmonious relationship with one another by managing rapport and performing relational work while threatening other members’ face in making requests through emails. The three communities of practice differed from one another in terms of the aim and nature of their joint enterprise, cultural composition and size. The ways rapport was managed were revealed by examining the employment of linguistic strategies of expressiveness-restraint, the choice of (...)
    No categories
    Direct download  
     
    Export citation  
     
    Bookmark  
1 — 50 / 651