¶ … Constraints to Email and Potential Solutions
Humankind has been communicating over increasingly lengthy distances over the millennia, beginning with drums and smoke signals, to relay runners and mounted messengers, to the telegraph and telephone and then, during the 1990s, the Internet and email. All of these communication media have their limitations, though, including the most popular written communication method today: email. Indeed, many observers believe that email will eventually spell the end of the United States Postal Service, and trillions of dollars worth of business is transacted using email each year. Nevertheless, like its predecessors mentioned above, it is reasonable to suggest that the time will come -- and it may come sooner than expected -- when email is obsolete, having been replaced by "the next big thing." This paper provides an introduction and overview to social informatics and examines three problems that are currently associated with email that may hasten its demise (i.e., so-called "spam" email, the immediacy of the process that prevents reflection prior to sending messages, and security and privacy considerations), as well as potential solutions to these issues. A summary of the research and important findings concerning current problems with email and potential solutions are presented in the conclusion.
Review and Analysis
Background and Overview of Social Informatics
The past 2 decades have been characterized by an increased focus on the social context in which information technologies are used (Jacko & Sears 2009). According to Jacko and Sears (2009, p. 1184), "The research has appeared under many labels, including social analysis of computing, social impacts of computing, information systems, sociotechnical systems, and behavioral information systems. In more recent years, this overarching enterprise has begun to coalesce within a new field called social informatics." In sum, social informatics concerns the multidisciplinary investigation of information technology design, applications, and implications that takes into consideration human interaction with various cultural and institutional contexts (Jacko & Sears 2009). According to the description provided by Sawyer and Rosenbaum (2008, p. 90), social informatic researchers "focus on the social consequences of the design, implementation, and use of information communication technologies (ICT) over a wide range of social and organizational settings."
Based on its problem-driven approach, social informatics assumes the ICTs and the organizational and social settings in which they are used are a mutually shaped relationship (Sawyer & Rosenbaum 2008). Because it is problem-driven, social informatics "tries to make sense of the vexing issues people face when they work and live with systems in which advanced ICT are one important and increasingly pervasive component" (Sawyer & Rosenbaum 2008, p. 91). One ICT element that is the cause of "the vexing issues people face" is electronic mail, or email, including its use as a direct marketing tool in the form of spam, the immediacy of the process that precludes reflection prior to usage, and significant privacy and security issues which are discussed further below.
Spam Email
Anyone with an email account which is to say virtually everyone who has clicked on their "new mail" button has likely been the recipient of countless unsolicited emails advertising the enlargement or reduction of various body parts, offers to renegotiate their mortgages at more favorable rates, and personal contacts from members of the royal families of different countries with hundreds of millions of dollars to share if the recipient will only provide certain personal and private financial information. These so-called "spam" emails are the source of never ending frustration for email users today and the amounts being sent appear to be growing larger. For example, McCusker (2009, p. 2) reports that, "Unfettered global communication through the internet has facilitated a massive intrusion of unsolicited commercial email messages, commonly known as spam. Currently accounting for as much as 65 per cent of all email, spam leads to productivity costs for businesses each year and is increasingly being used for the commission of crime."
Although spam emails are a relatively recent phenomenon, they are a direct extension of the so-called "junk mail" that has flooded personal and business mailboxes for decades (McCusker 2009). The main difference between junk mail and spam, though, is the enormous amount of spam mail that consumers and businesses receive compared to the amount of junk mail that crowds their mailboxes (Blotzer 2008). Moreover, spam email seems to proliferate irrespective of what consumers or businesses attempt to do to stem the flood. In this regard, McCusker (2009, p. 3) points out that, "Spam is email sent to a large number of people who do not request it, detailing products or services in which they may have no interest. It is sent by people who disguise their identity and whom it is difficult, if not impossible, to locate or deter." Virtually all (95%) of spam email contains offers for various products and services (McCusker 2009) and approximately 15% of all email received today is spam (Aquino 2012). While the U.S. continues to churn out more spam email than elsewhere by far, the problem has assumed global proportions in recent years (McCusker 2009).
Part of the problem relates to the volume of spam that is...
E-Mail in Business Communication E-mail: History, Relation, and Impact on effective Business Communication Email in Business Communication Electronic Mail Impact of Email to Business Communication Implications of Emails as Business Communication Tools Email is an important form of communication in today's organization that is increasingly seeing a geographical dispersal of the workforce. To communication tool has replaced traditional business letters and memos in preference for email memos. The research carried out a review of literature on
Although many studies have been performed regarding marketing effectiveness and efficiency, and although some have covered the benefits of cooperative marketing, none were found specific to the unique Farm Credit segment. The research conducted in this paper was designed to fill this void. A statistical sampling was taken, utilizing e-mail surveys, to discover as much as possible about each institution's advertising needs. The research conducted was exploratory in nature, rather
This problem was solved in the following way: the program uuencode which is used by email-clients transforms its binary code (code of bits and bytes) into text code using ASCII table principle and it's send in the form of text character set in the following form (begin file name reports text translated binary body end). The recipient's email-client executes uudecode program and transforms it to binary primary code. Telnet Telnet is
Ayers (2000, p. 4) describes a supply chain as "Life cycle processes supporting physical, information, financial, and knowledge flows for moving products and services from suppliers to end-users." A supply chain can be short, as in the case of a cottage industry, or quite long and complex as in the manufacture, distribution, and sales of automobiles. In fact, the automobile supply chain has its origin in the mining of the
However, since terrorism has finally struck on the soil of powerful nations like the U.S. And their key allies like the U.K., resources and attention have been focused on the eradication of terrorism like never before. Because of this, polarization has taken place among the people of the world as far as the approach that should be taken in response. There are those who feel that the only way
Management Seminar Demonstrate a basic understanding of the terminology, history and theories of business and management principles. Although the concept of management is already a few centuries old, the basis for the development of a science of management was laid during the Industrial Revolution. Until the 1960's diverse viewpoints on management were recognized leading to the development of a more integrated approach to management. The process approach emphasized the basic functions of
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now