Verified Document

Three Basic Problems With Email Today Essay

¶ … Constraints to Email and Potential Solutions Humankind has been communicating over increasingly lengthy distances over the millennia, beginning with drums and smoke signals, to relay runners and mounted messengers, to the telegraph and telephone and then, during the 1990s, the Internet and email. All of these communication media have their limitations, though, including the most popular written communication method today: email. Indeed, many observers believe that email will eventually spell the end of the United States Postal Service, and trillions of dollars worth of business is transacted using email each year. Nevertheless, like its predecessors mentioned above, it is reasonable to suggest that the time will come -- and it may come sooner than expected -- when email is obsolete, having been replaced by "the next big thing." This paper provides an introduction and overview to social informatics and examines three problems that are currently associated with email that may hasten its demise (i.e., so-called "spam" email, the immediacy of the process that prevents reflection prior to sending messages, and security and privacy considerations), as well as potential solutions to these issues. A summary of the research and important findings concerning current problems with email and potential solutions are presented in the conclusion.

Review and Analysis

Background and Overview of Social Informatics

The past 2 decades have been characterized by an increased focus on the social context in which information technologies are used (Jacko & Sears 2009). According to Jacko and Sears (2009, p. 1184), "The research has appeared under many labels, including social analysis of computing, social impacts of computing, information systems, sociotechnical systems, and behavioral information systems. In more recent years, this overarching enterprise has begun to coalesce within a new field called social informatics." In sum, social informatics concerns the multidisciplinary investigation of information technology design, applications, and implications that takes into consideration human interaction with various cultural and institutional contexts (Jacko & Sears 2009). According to the description provided by Sawyer and Rosenbaum (2008, p. 90), social informatic researchers "focus on the social consequences of the design, implementation, and use of information communication technologies (ICT) over a wide range of social and organizational settings."

Based on its problem-driven approach, social informatics assumes the ICTs and the organizational and social settings in which they are used are a mutually shaped relationship (Sawyer & Rosenbaum 2008). Because it is problem-driven, social informatics "tries to make sense of the vexing issues people face when they work and live with systems in which advanced ICT are one important and increasingly pervasive component" (Sawyer & Rosenbaum 2008, p. 91). One ICT element that is the cause of "the vexing issues people face" is electronic mail, or email, including its use as a direct marketing tool in the form of spam, the immediacy of the process that precludes reflection prior to usage, and significant privacy and security issues which are discussed further below.

Spam Email

Anyone with an email account which is to say virtually everyone who has clicked on their "new mail" button has likely been the recipient of countless unsolicited emails advertising the enlargement or reduction of various body parts, offers to renegotiate their mortgages at more favorable rates, and personal contacts from members of the royal families of different countries with hundreds of millions of dollars to share if the recipient will only provide certain personal and private financial information. These so-called "spam" emails are the source of never ending frustration for email users today and the amounts being sent appear to be growing larger. For example, McCusker (2009, p. 2) reports that, "Unfettered global communication through the internet has facilitated a massive intrusion of unsolicited commercial email messages, commonly known as spam. Currently accounting for as much as 65 per cent of all email, spam leads to productivity costs for businesses each year and is increasingly being used for the commission of crime."

Although spam emails are a relatively recent phenomenon, they are a direct extension of the so-called "junk mail" that has flooded personal and business mailboxes for decades (McCusker 2009). The main difference between junk mail and spam, though, is the enormous amount of spam mail that consumers and businesses receive compared to the amount of junk mail that crowds their mailboxes (Blotzer 2008). Moreover, spam email seems to proliferate irrespective of what consumers or businesses attempt to do to stem the flood. In this regard, McCusker (2009, p. 3) points out that, "Spam is email sent to a large number of people who do not request it, detailing products or services in which they may have no interest. It is sent by people who disguise their identity and whom it is difficult, if not impossible, to locate or deter." Virtually all (95%) of spam email contains offers for various products and services (McCusker 2009) and approximately 15% of all email received today is spam (Aquino 2012). While the U.S. continues to churn out more spam email than elsewhere by far, the problem has assumed global proportions in recent years (McCusker 2009).

Part of the problem relates to the volume of spam that is...

For example, according to Yeargain and Settoon (2007, p. 16), "With the growing use of the Internet for unsolicited commercial electronic mail (spam), many individuals and businesses are complaining about the time and effort necessary to delete such material from personal and business computers. Spam within an organization can cost between $600 and $1,000 per year in lost productivity for every user." This lost productivity is due to email recipients being forced to scan through legitimate emails to distinguish spam emails and deleting the latter from their inboxes (Osborne & Kunz 2007). In this regard, Osborne and Kunz (2007, p. 46) emphasize that, "Spam has penetrated the online environment at rates that may be considered equivalent to an epidemic of catastrophic proportion. Individuals and businesses alike are forced to spend a significant amount of time removing the spam from their daily routines." Indeed, the flood of spam emails has resulted in some practitioners reducing their email usage rates. In this regard, Osborne and Kunz (2007, p. 46) report that, "Because of the increase in the number of spam messages consumers receive, 44% report they have decreased their use of email and the Internet in the last year." Furthermore, spam filters are less than perfect and have been shown to block up to 17% of all legitimate emails (Osborne & Kunz 2007).
Clearly, even small- to medium-sized enterprises can experience significant financial loss due to spam, and the problem is even more severe for larger corporations with thousands of employees. For instance, a study conducted by Nucleus Research included interviews of IT administrators at 76 companies in the United States and found that:

Spam costs companies $874 per employee per year in lost productivity;

Companies lose approximately 1.4% of each employee's productively each year because of spam;

The average employee receives 13.3 spam messages each day; and,

Employees spend, on average, 6.5 minutes a day managing spam (Yeargain and Settoon 2007, p. 17).

Current email volume levels and the cost to all Internet users are set forth in Table 1 below.

Table 1. Volume of email messages and percentage of spam

Category

Email Statistics

Daily emails sent

31 billion

Daily emails sent per email address

56

Daily emails sent per person

Daily emails sent per corporate user

34

Daily emails received per person

10

Email addresses per person

3.1 average

Percentage of email identified as spam

62%

Cost to all Internet Users

$255 million

The typical content of spam emails is set forth in Table 2 below.

Table 2. Typical content of spam emails

Percent

Category

Description

24%

General products and services

Email attacks offering or advertising general goods and services. Examples: Devices, investigation services, clothing, makeup.

18%

Financial

Email attacks that contain references or offers related to money or the stock market. In addition, emails that contain other financial "opportunities" such as investments or credit reports.

14%

Adult

Email attacks containing or referring to products or services intended for person above the age of 18, often offensive or inappropriate. Examples: pornography, personal ads, relationship advice.

11%

Scams

Email attacks recognized as fraudulent, intentionally misguiding, or known to result in fraudulent activity on the part of the sender. Examples: Nigerian investment, pyramid schemes, chain letters.

7%

Health

Email attacks offering or advertising health-related products and services. Examples: Pharmaceuticals, medical treatments, herbal remedies.

7%

Other

Email attacks not pertaining to any other category.

6%

Internet

Email attacks specifically offering or advertising Internet- or computer-related goods and services. Examples: Web hosting, Web design, spamware.

6%

Leisure

Email attacks offering or advertising prizes, awards, or discounted leisure activities. Examples: Vacation offers, online casinos, games.

4%

Fraud

Email attacks that appear to be from a well-known company, but are not. Also known as "brand spoofing" or "phishing," these messages are often used to trick users into revealing personal information such as email address, financial information and passwords. Examples: Account notification, credit card verification, billing updates.

2%

Political

Messages advertising a political candidate's campaign, offers to donate money to a political party or political cause, offers for products related to a political figure, etc. Examples: Political party, elections, donations.

1%

Spiritual

Email attacks with information pertaining to religious or spiritual evangelization and/or services. Examples: Psychics, astrology, organized religion, outreach.

Source: Adapted from Yeargain and Settoon 2007, p. 17

Another part of the problem with spam…

Sources used in this document:
References

Aquino, J (2012, September). "Avoid the Spam Folder: How Marketers Can Save Outbound

Emails from the Dreaded Fate." CRM Magazine, Vol. 16, No. 9, pp. 24-29.

Baron, NS (2001). Alphabet to Email: How Written English Evolved and Where It's Heading.

London: Routledge.
Cite this Document:
Copy Bibliography Citation

Related Documents

E-Mail in Business Communication E-Mail: History, Relation,
Words: 4599 Length: 15 Document Type: Essay

E-Mail in Business Communication E-mail: History, Relation, and Impact on effective Business Communication Email in Business Communication Electronic Mail Impact of Email to Business Communication Implications of Emails as Business Communication Tools Email is an important form of communication in today's organization that is increasingly seeing a geographical dispersal of the workforce. To communication tool has replaced traditional business letters and memos in preference for email memos. The research carried out a review of literature on

E-Mail Survey Sent to Farm
Words: 7610 Length: 30 Document Type: Term Paper

Although many studies have been performed regarding marketing effectiveness and efficiency, and although some have covered the benefits of cooperative marketing, none were found specific to the unique Farm Credit segment. The research conducted in this paper was designed to fill this void. A statistical sampling was taken, utilizing e-mail surveys, to discover as much as possible about each institution's advertising needs. The research conducted was exploratory in nature, rather

Evolution of Email and Internet
Words: 4193 Length: 12 Document Type: Term Paper

This problem was solved in the following way: the program uuencode which is used by email-clients transforms its binary code (code of bits and bytes) into text code using ASCII table principle and it's send in the form of text character set in the following form (begin file name reports text translated binary body end). The recipient's email-client executes uudecode program and transforms it to binary primary code. Telnet Telnet is

E-Manufacturing - A New Link
Words: 22785 Length: 60 Document Type: Term Paper

Ayers (2000, p. 4) describes a supply chain as "Life cycle processes supporting physical, information, financial, and knowledge flows for moving products and services from suppliers to end-users." A supply chain can be short, as in the case of a cottage industry, or quite long and complex as in the manufacture, distribution, and sales of automobiles. In fact, the automobile supply chain has its origin in the mining of the

Today Vs. 1960 As the
Words: 1959 Length: 7 Document Type: Term Paper

However, since terrorism has finally struck on the soil of powerful nations like the U.S. And their key allies like the U.K., resources and attention have been focused on the eradication of terrorism like never before. Because of this, polarization has taken place among the people of the world as far as the approach that should be taken in response. There are those who feel that the only way

Management Seminar Demonstrate a Basic Understanding of
Words: 2864 Length: 6 Document Type: Term Paper

Management Seminar Demonstrate a basic understanding of the terminology, history and theories of business and management principles. Although the concept of management is already a few centuries old, the basis for the development of a science of management was laid during the Industrial Revolution. Until the 1960's diverse viewpoints on management were recognized leading to the development of a more integrated approach to management. The process approach emphasized the basic functions of

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now