scholarly journals The Virtual Office

1996 ◽  
Vol 6 (4) ◽  
pp. 296-299
Author(s):  
Milton E. McGiffen

Many careers involve working at multiple locations with unpredictable daily schedules. Professionals may have several locations from which they conduct business. Electronic mail (e-mail) and other features of the Internet have facillitated the evolution of the virtual office, which gives the appearance of a single point of contact with mobile, busy people. E-mail is the most obvious use of the Internet. E-mail groups allow for effective discussions with people of similar interests and the exchange of hard-to-acess expert information. Websites and e-mail groups allow rapid dissemination and discussion of multimedia information. The Vegetable Research and Information Center is an example of how to extend the virtual office concept to the departmental level, allowing spatially scattered researchers, extension workers, and their clientele to work together and exchange information.

2011 ◽  
pp. 2159-2163 ◽  
Author(s):  
Simpson Poon

The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.


Author(s):  
Simpson Poon

The use of the Internet for business purposes among small businesses started quite early in the e-commerce evolution. In the beginning, innovative and entrepreneurial owners of small businesses attempted to use rudimentary Internet tools such as electronic mail (e-mail) and file transfer protocol (FTP) to exchange messages and documents. While primitive, it fulfilled much of the business needs at the time. Even to date, e-mail and document exchange, according to some of the latest research findings, are still the most commonly used tools despite the fact that tools themselves have become more sophisticated.


Author(s):  
Nestor J. Zaluzec

The Information SuperHighway, Email, The Internet, FTP, BBS, Modems, : all buzz words which are becoming more and more routine in our daily life. Confusing terminology? Hopefully it won't be in a few minutes, all you need is to have a handle on a few basic concepts and terms and you will be on-line with the rest of the "telecommunication experts". These terms all refer to some type or aspect of tools associated with a range of computer-based communication software and hardware. They are in fact far less complex than the instruments we use on a day to day basis as microscopist's and microanalyst's. The key is for each of us to know what each is and how to make use of the wealth of information which they can make available to us for the asking. Basically all of these items relate to mechanisms and protocols by which we as scientists can easily exchange information rapidly and efficiently to colleagues in the office down the hall, or half-way around the world using computers and various communications media. The purpose of this tutorial/paper is to outline and demonstrate the basic ideas of some of the major information systems available to all of us today. For the sake of simplicity we will break this presentation down into two distinct (but as we shall see later connected) areas: telecommunications over conventional phone lines, and telecommunications by computer networks. Live tutorial/demonstrations of both procedures will be presented in the Computer Workshop/Software Exchange during the course of the meeting.


Author(s):  
Edwin I. Achugbue

The chapter focuses on the history of the internet system of e-mail; e-mail security; threat to e-mail security, usefulness of e-mail address and country codes, how e-mails can be secured by the individual and electronic mail policy. The future of e-mail security is also described.


Stalking ◽  
2007 ◽  
Author(s):  
Graham D. Glancy ◽  
Alan W. Newman

Cyberstalking involves the use of the Internet or other electronic communication to stalk another person. Already common, it is likely to become more common as the use of the Internet continues to grow. The characteristics of online stalkers and their victims have some differences from those of the offline stalker. Mullen, Pathé, Purcell, and Stuart’s (1999) classification may apply to cyberstalkers except for the apparently common phenomenon of child luring that may be a new category. The methods of cyberstalking, as described in this chapter, are particularly ingenious. We know little about the effect on victims, but postulate that it is similar to offline stalking. We make some suggestions that may prevent cyberstalking, as well as offer some steps to bear in mind once cyberstalking occurs. The proliferation of personal computers with Internet access in the last decade has raised concerns about a new phenomenon known as cyberstalking. The Internet can be used to annoy and harass large numbers of victims in a generic manner by disseminating computer viruses, Internet scams, and “spamming” people with unsolicited e-mail. In 1999 Janet Reno, the attorney general of the United States, defined cyberstalking as the use of the Internet, e-mail, or other electronic communications devices to stalk another person (Reno, 1999). Barak (2005) looked at the issue of sexual harassment on the Internet. He characterizes cyberstalking as one type of sexual coercion. He notes that online behavior is characterized by disinhibition, openness, venture, and bravado—an atmosphere characterized by typical masculine attitudes. He argues that the lack of legal boundaries or enforcement vehicles encourage people to do what they would not have done in offline situations. He notes the near impossibility of implementation of legal procedures on a large scale. In this chapter we will discuss what is known about the prevalence of this phenomenon, the types of cyberstalking, and what is known about the perpetrators. In addition, we will generate some hypotheses about the comparison between online and offline stalkers. We will also discuss the effects on victims and current thoughts and resources for dealing with cyberstalking.


1996 ◽  
Vol 11 (3) ◽  
pp. 223-234
Author(s):  
Kathleen K. Molnar ◽  
Ramesh Sharda

Knowledge acquisition is a major task in expert system development. This paper proposes one way of acquiring knowledge for expert system development: through the use of the Internet. Internet resources (e.g. Usenet groups, ListServ discussion lists, archive sites and on-line literature/database searches) are knowledge sources. Internet tools such as newsreaders, electronic mail, Telnet, FTP, gophers, archie, WAIS and World Wide Web provide access to these sources. The results of an exploratory study that examined the use of the Internet as a knowledge source are presented here in conjunction with a framework for using the Internet in the planning phase. Four major advantages can be found in this: the availability of multiple experts in multiple domains, the interaction of domain experts and end users, time/cost savings, and convenience. The lessons learned and some additional issues are also presented.


First Monday ◽  
2007 ◽  
Author(s):  
Kofoworola Jagboro

The Internet is arguably one of the most significant technological developments of the late 20th century. However, despite the added benefits of this tool to learning, teaching and research, a number of problems still plague Internet connectivity and usage in the Nigerian University system. The objective of this study was to evaluate the level of utilization of the Internet for academic research at the Obafemi Awolowo University, Ile-Ife, Nigeria. Questionnaires were administered to postgraduate students spanning art and science based programmes. The results from the analysis of the responses showed that the use of the Internet ranked fourth (17.26 percent) among the sources of research materials. However, respondents who use the Internet ranked research materials (53.42 percent) second to e-mail (69.86 percent). The study concludes that the use of the Internet for academic research would significantly improve through the provision of more access points at Departmental and Faculty levels.


2012 ◽  
Vol 47 (1) ◽  
pp. 37-41
Author(s):  
A. Zak Kevin ◽  
L. Monaghan Christina ◽  
Parker Amanda

Purpose An observational study was conducted to identify and evaluate trends in the use of the Internet and social media by pharmacy publications. Methods The print and online versions of 10 pharmacy publications were compared at 2 different times separated by 3 years for similarities and differences in content and presentation. Characteristics and functions were evaluated for online publications, including subscription requirements for online access, the dates of online archived material, pre- and postpublication features, e-mail notifications, hyperlinks, and the use of social media and other specialty applications. Results Between 2007 and 2010, online functionality of selected pharmacy publications increased in 52% (12/23) of the features assessed; among these expanded features, the median percent increase was 20%. The 2 most prevalent online features among publications in 2007 and 2010 were article availability in portable document format (pdf) and the ability to submit articles online. The online feature most adopted during the study timeframe was the ability to e-mail friends about an article (increased by 40%). In 2010, the majority of publications offered social media or other specialty applications (80%) and required a paid subscription for online access (60%). Conclusion Currently, not all available online features have been adopted by the reviewed pharmacy publications. Overall, the online functionality of pharmacy publications was maintained or slightly increased from 2007 to 2010. It is important for publishers to continue to expand their presence on the Internet to improve accessibility to the scientific literature.


1997 ◽  
Vol 2 (2) ◽  
pp. 49-58 ◽  
Author(s):  
R. Coomber

The Internet and electronic mail increasingly offer the research community opportunities that it did not previously have. Access to information has increased as has access to and discussion with those working in similar areas. One other aspect of ‘cyberspace’ which presents enormous possibilities to the research community, currently in its infancy, is the use of the Internet to reach individuals as research subjects. In particular, there may be significant research benefits to be gleaned where the group being researched is normally difficult to reach and/or the issues being researched are of a particularly sensitive nature. This paper outlines some recent survey research using the Internet as the interface between researcher and researched. The target group, illicit ‘drug dealers’, are difficult to access under normal conditions and contacting a spread of such individuals across international borders was previously prohibitive. A discussion of sampling issues is undertaken which concludes that the Internet can be a valuable source of indicative as opposed to easily generalizable data. A practical guide to undertaking research via the Internet is also included.


2009 ◽  
Vol 60 (1) ◽  
pp. 30
Author(s):  
Ralph L Scott

We have all become increasingly aware that, for commercial and perhaps other reasons, our use of the Internet can and is being tracked. For most of us this tracking has become a major concern as unwanted e-mail (commonly called SPAM) has begun to clog our incoming mailboxes.  There are a variety of ways to combat both the tracking and the receipt of unwanted e-mail. One of the ways of dealing with this problem is the use of an anonymiser service, many of which are available over the Web.


Sign in / Sign up

Export Citation Format

Share Document