StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Intelligent E-mail Analysis - Literature review Example

Cite this document
Summary
This review 'Intelligent E-mail Analysis' tells that the importance can never be over emphasized and the effective monitoring of the emails using the log file system must intensify as it is bound to innovate the whole concept of sending and receiving mails over the internet…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER94.1% of users find it useful
Intelligent E-mail Analysis
Read Text Preview

Extract of sample "Intelligent E-mail Analysis"

? Presented by (Your school) It is true that the internet age and the overall internet have changed the whole perception of the world. The old methods of sending information was an impediment to various activities as individuals could move for long distances to pass messages, they also had to travel a lot carrying bulky utilities to be able to transact. This was beyond doubt an impediment on the system as the system was bound to have some of the prevailing weaknesses. Some of the weaknesses were related to the characteristics of information. It was supposed to be relevant, information ought to have been timely, information was supposed to be accurate, and information was supposed to obey the virtue of time.(Finlayson, Ross S,79) All this was necessary to facilitate effective communication and passage of information at that appointed and designated time. This was necessary for all the disciplines involving organizations and other institutions in the decision making process at the most appropriate appointed point for decision making. For information to be reliable, for it to pass the test of time, all these were necessary as for any organization to be able to make the most accurate decisions it had to have the right information at its disposal. The intervention of the internet through the wide revolutions in the system these individuals changed the whole face of eternity; they changed mankind by providing the most decisive tool. This tool was so necessary that because of it the world could be transformed into a global village. Problem statement The overall problem under siege, befalling the need for the analysis through the essay, is the fact that we need to analyze and discuss on an in-depth analysis the various issues revolving around the subject of Computer science and Information technology, with more emphasize to the topic of the Intelligent E-mail Analysis. The E-mail or rather the Electronic main is a utility that offers and provides the services of sending e-mails through the net. Confidentiality of data while sending them through the net is emphasized, reliability and relevance of the data the timeliness and accuracy of the data is the most advantageous characteristics presented by the net. Before embarking on an analysis of the Intelligent E-mail analysis, it’s crucial to consider the main tool which the Email service uses, the “Internet” A brief History of the internet The internet refers to the interconnection between networks. The internet is a network of networks. A network is the connectivity between the various computers at all the receiving ends. This is effective and efficient enough to facilitate communication between the node computers and the server computer at the receiving end. The intervention of the refined form of internet connectivity during the year of 1972 where one Sir Kahn did a demonstration of a large magnitude of the ARPANET. This was during a conference held that was called the ICCC also International Computer Communication Conference. (Finlayson, Ross S, 79) During this very same year 1972, researchers and inventors in the internet came up with what was then referred to as the “Hot” utility that was in the form of an application utility. This utility among others outlined as the E-mail or rather electronic mail services were brought to life. In the month of July, Roberts gave more innovation and further expanded the initial utility by making the exact first initiative of sending the first E-mail (Electronic Mail). After the intervention and discovery of the E-mail utility, the next discovery was the WWB also known as the World Wide Web. This was initially meant to bring life to the overall concept of the internet which was to bring the whole world into one global village, to transform the whole world make ease the passage and effectiveness of the communication process.(Finlayson, Ross S,79) Outlined Advantages and Disadvantages of the Internet as a utility: The Internet certainly brings more good than harm as indeed dictated It has changed and transformed the whole world. It has managed to do it by the various advantages it portrays. As a service utility, it does not produce products but merely offers services to us. This fact is beyond doubt the main advantage and stands out conspicuously as its outmost strong hold. The internet has facilitated effective communication through out the world through the E-mail services; one can send and receive E-mails to and from other respective personalities. This has made the communication process more effective and facilitated the whole ordeal. (Sugumaran, Vijayan, 68) The internet has also created other job titles the likes of internet administrators, web administrators, the titles like database builders and many others. Through this platform which mainly comprises the internet, other facilities also exists like websites that offer advertisement platform. The likes of Dealfish.com, Ebay.com Mocality.com, Soko.com and many other sites that offer advertisement platform for on-line services that fundamentally ranges from the purchase of the respective goods and services on the net. (Sugumaran, Vijayan, 68) Through the intervention of the need to interact, socialize, the need to receive and send pictures to ones friends, need to tag, share comments on web pages. The need to poke others and the overall need to have a social lifestyle online also has facilitated the intervention of various Social networking sites, the likes of Tagged.com, Facebook.com by Mark Zukerberg, Linkdin.com, Badoo.com, Skype.com and many others all these are social networking sites and have facilitated people to be able to converse and carry out their social activities on-line. The internet has also facilitated on-line studies. This is through its real time application of on-line booking, on-line class attendance on-line marking of exams and submit ion of results. This is and has always been necessary as a utility as on-line provides real-time services which ease the updating of records, and the overall advantages derived from the on-line system. (Sugumaran, Vijayan, 38) The internet also beyond doubt has significantly advanced the research field, and created a wide field of professionals who source information and carry out various researches from the net. Through this they are bound to gain knowledge, create and develop what was previously inexistence. Through this the internet has aided the medicine fraternity, the engineering discipline as they are all able to share information and find out new information from the internet. The internet has also aided the various academic disciplines and brought a perfect background for effective teaching and the effective learning process. It is extremely beneficial to consider the fact that though the internet also has most of the advantages it also has some of its limitations which primarily include: Degradation of the morals of the minors Through pornography and other sexually abusive photos present in social networking sites and websites like youtube.com, children who have access to the internet end up being accessed to photos that spread sexuality and sexual harassment. They end up being exposed to photos that promote drugs and substance abuse, they end up being exposed to videos that try to change the beliefs inculcated by their parents. This is harmful for them as they end up not being straight forward adults. (Sugumaran, Vijayan, 38) The internet has also given rise to computer crimes like the eavesdropping, industrial espionage, hacking, tapping, cracking and other computer related crimes. This is a threat to confidential data, a threat to information privacy and an overall threat to the overall accuracy of the information. It is extremely harmful and as under copyrights measures a practice that might destroy the overall privacy and legal rights of a certain information system. It is particularly evident beyond doubt that there is the need to protect data privacy and this is more evident in manufacturing firms and various institutions that tend to protect their formulas, trade secrets, market penetration trends against copyrights. (Bergstra, J. A, 68) The time spent while on the net is also a significant disadvantage. This is a contentious issue as many of the employees spend quit a large amount of their time surfing on social networking sites. This is an impediment on their part as they are not able to carry out organizational activities with efficiency and effectiveness. Also most of the organizational activities never become successful as a result of time wastage, the quality of the services offered to the customers also deteriorates as they lack focus on how to partake of the various activities. Intelligent Email Analysis: As defined, the Email is known as electronic mail which involves a process of exchange of digital impulses from the sender, or author to the receiver or recipient of the message. They carry out their transactions through the internet. They may also be customized to operate within the organizational network or interconnectivity. This is efficient enough to facilitate the sharing of information between the various computers and the node computers. The information process is made effective or the whole process is made efficient. Earlier forms of the email systems required that the receiver be online. This was a pre-requisite to facilitate the communication process. But the current system operates like the manual mailing system only that it’s is electronically. It is not a pre-requisite for you to be online and you can access your mails after logging into your account. Definition of an intelligent Email System: Intelligent Email is that which uses the aspect of log files. A system that is intelligent and dedicated to ensure that one accesses the emails and is able to sends them with the highest level of efficiency as opposed to the previous system where, the receiver had to be online to access the mails that were sent by the sender. The system is intelligent as it uses the log files concept as one is able to know which list of mails were sent to him or her and in which date that was done. They are also use the concept of log files as you can be able to check the list of the mails that were sent by you and those that were deleted .(Bergstra, J. A, 65) This concept of listing of the mails offered by the intelligent mail system gives accessibility and availability of the administrators to monitor the mails using the email monitoring system. Though aspects of privacy issues may arise also by the help of monitoring, other aspects may arise like lives may be saved in the event where a plan to kill one through the email system may be monitored and actions against this taken into consideration Literature Research Investigation of Log files Log files are defined as the exact initial files that do the listing of the various actions or functionalities that have transpired or occurred within the course of operations. They list all transactions and activities and of available log files web servers. The web servers are intelligent systems that portray a detailed listing of all the requests, and all the demands by the node computers made by the various computers within the network. Log files come with them some tools referred to as the log file analytical tools that enable one have adequate knowledge of the various visitors into the system and the specific location of their requests. It is effective in ensuring the various web administrators to ascertain the fact that this was the visitor, who visited a specific site and details of the research. By the help of the Cookie utility which essentially enables the web administrator or rather the web master to enter or log into or access information on how the various personalities used the system.(Bergstra, J. A, 63) Log File Analysis: As indicated, Log files are files that do the listing of the various actions or functionalities that have transpired or occurred within the course of operations. They list all transactions and activities and a general example of such a log file are the web servers. The web servers are intelligent systems that portrays a detailed listing of all the requests, and all the demands by the node computers made by the various node computers within the network The exceptionally clear sample of such a log file is the web server log these are the files that are inaccessible or rather they represent the various invisible files which can not be viewed by the users. They are only visible to the various web administrators or rather web managers who are responsible of managing the system. Using tools like Cookies, they may give the best statistical analysis of the various users of the network, the traffic patters, time of access, days in which they accessed. Analysis of the web server logs may provide an efficient website administration, appropriate hosting of the website. The various marketing department of the IT intensified organizations should try and understand this powerful tool, to help them in their decisions as top where to place their advertisement. They should do so in the sites that contains traffic. Or those that have more clicks and viewers per click per second. (Bergstra, J. A, 60) Log files are designed by the programme installers or the software installers, they contain a file list added or duplicated in the hard disk drive and this was during the installation process. Tendencies exists of them to be generated by most of the utility software’s e.g. Sort Utility, merge utility, time utility, date utility and many others, they may also be generated by the various FTP application programs, and the overall operating system itself. Investigation of the Email System: Emails also known as electronic mails are an application or a utility which aggregately involves a process of exchange of digital impulses from the sender, or rather author to the receiver or rather recipient of the message. They carry out their transactions through the internet. They may also be customized to operate within the organizational network or interconnectivity. This is efficient enough to facilitate the sharing of information between the various computers and the node computers. The information process is made effective or the whole process is made efficient. Earlier forms of the email system perceived and had the requirement that the receiver be online. This was a pre-requisite to facilitate the communication process. But the current system operates like the manual mail system only that it’s is electronically. It is not a must for you to be online and you can access your mails after logging into your account. An attempt to further analyze the intelligent email system raises issues to do with the Intelligent Email system. This uses the aspect of log files system that is intelligent and dedicated to ensure that, one accesses the emails, is able to sends emails with the highest level of efficiency as opposed to the previous system where the receiver had to be online to access the mails that were sent by the sender. They are intelligent as they use the log files concept in identifying which list of mails were sent to him or her and in which date that was done. They also use the concept of log files as one can check the list of the mails that were sent and those that were deleted. (Crangle, Robert D, 43) This concept of listing of the mails offered by the intelligent mail system gives accessibility and availability of the administrators to monitor the mails using the email monitoring system. Though aspects of privacy issues may arise also by the help of monitoring, other aspects may arise like lives may be saved in the event where a plan to kill one through the email system may be monitored and actions against this taken into consideration. Email Monitoring System Email monitoring is the aspect of monitoring the various mails from the different networks that are sent and received through out the overall website of website referred to as http://www also the World Wide Web. This tool is useful to the web administrators of the various sites. The various web administrators do this by the help of the cookies and the software utility tools to be able to monitor the log files from the different network. The Log files as clearly indicated gives a detailed of all the related activities on the system. They give these details in terms of who visited the sites, when? And what they came to view. This is necessary enough as information obtained from this could improve network administration; it could also intensify the hosting of the sites. ( Crangle, Robert D, 40) Computer criminals also have tendencies to send viruses to the various sites. With this they end up tampering and blocking such sites and killing and hampering their accessibility and performance. Web administrators using the utility of log files could be able to track and correct such ordeals. Emails containing viruses are monitored and also other harmful activities that transpire over the Email system are prevented through the Email monitoring process. Fraudster reduction is done through the process as the various fraudsters are laid off and reduced as a result of the system. Email monitoring tools By the use of the Mails scape, it is a tool and a unique distinctive tool that has been developed to aid the various management solutions of the Email system. It combines the elemental aspects of the exchange and monitoring exchange system, and the various administrative and reporting of the various solutions emanating from the analysis. By the use of Mail scape, the various mails are monitored and a report is given about the various outcomes of the monitoring process. By the use of the Email Deliverability Return path, application or programme which comprises the tool that provide the administrator with the knowledge and the specific data to enable one get their emails delivered directly to their inbox. Using this tool it enables the intelligent Email system to deliver an email directly to ones inbox for future accessibility of the mail. This aggregately raises the response rate and acts as a spam filter as it prevents spam and protects one from the harmful spamming effects. (Crangle, Robert D, 45) The Functions of the Email Monitoring Tools The various activities and functions of the Email monitoring tools are that they are useful in monitoring the Email system. By the use of Mail scape, someone can monitor the exchange of the mails and provide a decisive and more accurate report about the findings. By the use of Email, Deliverability Return Path application enables one to access his specific mails at his inbox. This reduces the aspect of spamming. Aggregately the overall aspect is that it offers a better management platform of the mails and apart from these enables effective hosting of the network on the internet. Customer effectiveness and efficiency and commitment with the service provider like Gmail, yahoo, rocket mail is intensified as the service provider with better email monitoring tools will be able to make the services better. Conclusion It is clear that aspect of electronically mails also emails have made the communication process even better. It is also clear that the internet has hosted the email package and gave rise to the intervention of the emails. We have seen from the analysis that the email system has advanced and undergone a transition from the previous system that necessitated that the receiver was online. It is also clear that effective monitoring improves the services offered by the service provider. The importance can never be over emphasized and the effective monitoring of the emails using the log file system must intensify as it is bound to innovate the whole concept of sending and receiving mails over the internet. Works Cited: Bergstra, J., A., and Mark, B., 2007. Handbook of network and system administration. London: Elsevier. Crangle, R., D., 2007. Log ASCII Standard (LAS) files for geophysical wireline well logs and their application to geologic cross sections through the central Appalachian basin. Reston, Va.: U.S. Geological Survey. Finlayson, R., S., and David, R., C., 1987. Log files: an extended file service exploiting write-once storage. Stanford, CA: Dept. of Computer Science, Stanford University. Gelbukh, A., 2005. Computational linguistics and intelligent text processing: 6th international conference, CICLing 2005, Mexico City, Mexico, Februray 13-19, 2005 : proceedings. Berlin: Springer. Limoncelli, T., and Strata ,R., 2007. The practice of the system and network administration. 2nd ed. Upper Saddle River, NJ: Addison-Wesley. Nemeth, E., 2011UNIX and Linux system administration handbook. 4th ed. Upper Saddle River, NJ: Prentice Hall. Sin, Y., P., M., 2002. Email privacy: legal and ethical implication of workplace surveillance and monitoring. Auckland, N.Z.: Dept. of Management Science and Information Systems, University of Auckland. Sugumaran, V., 2011. Intelligent, adaptive and reasoning technologies: new developments and applications. Hershey, PA: Information Science Reference, Greenstein, M., & Vasarhelyi, M.A., 2001-6. Electronic Commerce: Security, Risk Management, and Control, McGraw-Hill Education. Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Intelligent Email Analysis Literature review Example | Topics and Well Written Essays - 3000 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1397966-intelligent-email-analysis
(Intelligent Email Analysis Literature Review Example | Topics and Well Written Essays - 3000 Words)
https://studentshare.org/information-technology/1397966-intelligent-email-analysis.
“Intelligent Email Analysis Literature Review Example | Topics and Well Written Essays - 3000 Words”, n.d. https://studentshare.org/information-technology/1397966-intelligent-email-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Intelligent E-mail Analysis

Intelligence Community Credibility

In such a way, ‘group think' may facilitate ideas competition, which is relevant to intelligence analysis.... A creation of the National Counterterrorism Center is another modern innovation introduced in the activities of the intelligence community, because it is directed on facilitation of terrorism-related intelligence analysis and deals with counterterrorism efforts regulation on behalf of the federal government.... In America 14 agencies and organizations are united in a group where its participants develop their intelligent activities for provision of national security....
8 Pages (2000 words) Research Paper

Artificial Intelligence in Multimedia Production

The program uses artificial intelligence to automate ecological analysis.... Artificial intelligence in multimedia production Name: Instructor: Course: Data: Introduction Artificial intelligence an approach used to design intelligent agents.... intelligent agents are systems that are able to perceive their environments and use the perception results to maximize on its chances of success....
8 Pages (2000 words) Essay

Email Intelligence Analysis

This literature review "Email Intelligence analysis" demonstrates an email that takes a very crucial role and position in any given working place or area of an organization or firm.... Since email is considered a very crucial technique for communication, there are email logs that useful sources of research in the analysis including link and textual analysis and social networking (Artz & Gil 2007).... For one to start the analysis work or task, he or she has to consider the first high-level requirements statements for any email function....
6 Pages (1500 words) Literature review

Factors Contributing to Intelligence Success or Failure

The latter's policy and doctrines require the delivery of integrated and fused intelligence to inform officials without neglect of the fact that their work demand functional and technical and technical aspects of intelligence analysis (Heuer, 1999; Kan, 2011).... It is expected that those who are deployed in this nature of job have depth interests on many tools for analysis such as, (a) political, economic, social, technological, logistical, and ecological analysis (PESTLE); (b) strength, weaknesses, opportunities, and threats analysis (SWOT); (c) business analysis; (d) forensic analysis; (e) demographic, historical and operational analyses; (f) psychological and socio-cultural analysis; and, (g) all forms of quantitative and qualitative method of research....
5 Pages (1250 words) Essay

The Growing Importance of Skilful Management of Emotions

Comparative analysis Name of the of the University Date Table of Contents Abstract 3 Introduction 4 Problem statement 5 Conceptual framework 5 Objective 6 Methodology 7 Results and discussion 8 Conclusion 9 Recommendations 10 References 11 Appendix 13 Abstract In today's competitive environment emotional intelligence has occupied an important place not only in the corporate, but also in the academics.... This study focuses on the comparative analysis between the emotional intelligence competencies of the private and public universities of Ghana....
9 Pages (2250 words) Research Paper

Business Intelligence and Enterprise Performance Management

Business Intelligence is a collective word, which describes a deep analysis on the trade made for last few years.... In other words, business intelligence is the name of analysis made upon the past information of the organization along with providing data management of the organization using different latest tools and technologies.... He was keen to implement Business intelligent solution for his business consisting of a web analytics, the data ware house, an OLAP system and data mining capabilities....
7 Pages (1750 words) Case Study

Business Intelligence and Data Warehousing

Moreover, in absence of an efficient data warehouse, businesses could not be able to pull out the data required for information analysis in time to ease practical decision-making.... This paper will discuss some of the latest trends of intelligent business systems application for business areas in order to improve business functionality.... In addition, business intelligence depends on data warehousing (a huge data storage or repository to support business's decision making), allowing cost-effective storage and management capability in the form of intelligent data warehouse solution....
7 Pages (1750 words) Research Paper

Intelligent Email Analysis

This essay "Intelligent Email analysis" focuses on email messages which exist due to the central role played by email in a firm.... nbsp;… An email analysis reveals the number of internet users, recovers facts and figures and maintains a full analysis even after the system is formatted.... Email intelligent analysis provides services such as the acquisition and recovery of data, the collection of pieces of evidence and the examination of the results in a written report....
6 Pages (1500 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us