Email Advocacy

18
Email Advocacy Enhancing Social Change @ Sandra Cullinane

description

This presentation is made by a student from the online class. "Acting Up - Using Theater & Technology for Social Change" taught by Tom Tresser for the DePaul University School for New Learning. Info: http://tomsclasses.wordpress.com

Transcript of Email Advocacy

Page 1: Email Advocacy

Email Advocacy

Enhancing Social Change

Email Advocacy

Enhancing Social Change

@ @

Sandra Cullinane

Page 2: Email Advocacy

@@ Email The Web links us to the world, but e-mail connects us. Web pages are international, but e-mail is intra-national. Web sites help us round out our picture of the world, but e-mail makes the world go 'round.

Email is a system of sending and receiving messages electronically. It is form of communication in which a computer user can compose a message at one terminal and it would be received by the recipient when they check their account. The message sent is in the form of the entered text typed from the keyboard or the electronic files, which have been stored on the storage media and sent via a search engine through the internet.

The internet

The Internet is a global network of networks. People and organizations connect into the Internet so they can access its massive store of shared information. The Internet is an inherently participative medium. Anybody can publish information or create new services. The Internet is a cooperative endeavor -- no organization is in charge of the net. People and organizations connect into the Internet so they can access its massive store of shared information. The Internet is an inherently participative medium. Anybody can publish information or create new services.

Email The Web links us to the world, but e-mail connects us. Web pages are international, but e-mail is intra-national. Web sites help us round out our picture of the world, but e-mail makes the world go 'round.

Email is a system of sending and receiving messages electronically. It is form of communication in which a computer user can compose a message at one terminal and it would be received by the recipient when they check their account. The message sent is in the form of the entered text typed from the keyboard or the electronic files, which have been stored on the storage media and sent via a search engine through the internet.

The internet

The Internet is a global network of networks. People and organizations connect into the Internet so they can access its massive store of shared information. The Internet is an inherently participative medium. Anybody can publish information or create new services. The Internet is a cooperative endeavor -- no organization is in charge of the net. People and organizations connect into the Internet so they can access its massive store of shared information. The Internet is an inherently participative medium. Anybody can publish information or create new services.

Page 3: Email Advocacy

@ The Cooperative endeavor of the Internet

The Internet - a global network of networks. People and organizations connect into the Internet and they can access its massive store of shared information. The Internet as an inherently participative medium, can publish anyone’s information or create new services. No organization is in charge of the internet – It is a cooperative endeavor.Computer Connection - Phone Line, Cable, DSL, Wireless, ... Modem Network Software - TCP/IP Application Software - Web Browser, Email, ... Internet Service Provider(ESP)Send and receive email messages. Download free software with FTP (File Transfer Protocol). Post your opinion to a Usenet newsgroup. Yack it up on IRC (Internet Relay Chat). Surf the World Wide Web. There is no charge for most services.

The Web was invented in 1991 by Tim Berners-Lee, while consulting at CERN (European Organization for Nuclear Research) in Switzerland. The Web is a distributed information system.

The Cooperative endeavor of the Internet

The Internet - a global network of networks. People and organizations connect into the Internet and they can access its massive store of shared information. The Internet as an inherently participative medium, can publish anyone’s information or create new services. No organization is in charge of the internet – It is a cooperative endeavor.Computer Connection - Phone Line, Cable, DSL, Wireless, ... Modem Network Software - TCP/IP Application Software - Web Browser, Email, ... Internet Service Provider(ESP)Send and receive email messages. Download free software with FTP (File Transfer Protocol). Post your opinion to a Usenet newsgroup. Yack it up on IRC (Internet Relay Chat). Surf the World Wide Web. There is no charge for most services.

The Web was invented in 1991 by Tim Berners-Lee, while consulting at CERN (European Organization for Nuclear Research) in Switzerland. The Web is a distributed information system.

Page 4: Email Advocacy

SearchEngines.netA Search Engine for your Site

From general search engines to meta search engines to specialized search engines, each site needs a search engine.

There are two main ways to add "search" to your site. The simplest is simply to install one of the hundreds of search forms: boxes that allow your visitors to search the Web via 3rd party search engines.

SearchEngines.netA Search Engine for your Site

From general search engines to meta search engines to specialized search engines, each site needs a search engine.

There are two main ways to add "search" to your site. The simplest is simply to install one of the hundreds of search forms: boxes that allow your visitors to search the Web via 3rd party search engines.

@@ The Webcontains multimediaInformation in the Web is connected by hyperlinksA web page is a document on the World Wide WebA web browser is the computer program you use to retrieve and view web agesThe most popular browsers = Microsoft Internet Explorer and Netscape Navigator Web page are stored in computers called web servers

Any organization can setup a web server. A web site is a collection of web pages. The starting point for a web site sometimes is called a home page.

Most large web sites have some navigation scheme to find informtion. Links on the home page will bring direct contact to featured content.

The Webcontains multimediaInformation in the Web is connected by hyperlinksA web page is a document on the World Wide WebA web browser is the computer program you use to retrieve and view web agesThe most popular browsers = Microsoft Internet Explorer and Netscape Navigator Web page are stored in computers called web servers

Any organization can setup a web server. A web site is a collection of web pages. The starting point for a web site sometimes is called a home page.

Most large web sites have some navigation scheme to find informtion. Links on the home page will bring direct contact to featured content.

Page 5: Email Advocacy

@Internet Search Engines Used for Research Internet Search Engines Used for Research

General

GoogleYahooBingAsk.com CuilDuckDuck GoKosmixYebol

Multimedia

Munax’sPlayAudioVideoBing VideosblinkxFindSoundsGoogle.VideoPicsearachPixstaPodscopeScienceStageSongzaSeeqPodVeveoTinEveYahoo!Video YouTube

Business

Business.comGlobal SpecNexis Thomasnet GenieKnowsGenieKnows

Enterprise

AskMeNowConcept Searching Ltd. DieselpointdtSearchEndecaExaleadExpert System S.p.A.Fast Search & Transfer IBMISYS Search Software Northern LightOpen TextVivisimo SAPTera TextX1 TechnologiesZyLAB Technologies

Job

BixeeCareerBuilderCraqigslistDiceEluta.caHotjobsIncruitIndeedLinkUpMonster

Education

GetEducated

Accountancy

IFACneet

Legal

WestLawLexiosQuicklawManupatra

Medical

Bioinformatic Harvester Entrez inckudes PubmedEB-eye EMBL=EBI’sGenieKnowsGoPubMedHealiaSearchmedicaWebMDPubGene

Blog

AmatomuBloglinesBlogScopeIceRocketSphereTechnorati

BitTorremt

Brjunkie FlkixFluxIswohuntMioninovaThe Pirate BayTorrentSpyTorrentz

Price Google ProductKelkooMSN ShoppingPriceGrabberPriceRunnerPriceScanShopping.comShopWikiShopzillaTheFind.com Washabi

Maps

WikiMapiaBing MapsGeoportailGoogleMapsMapQuestYahoo! Maps

Geographical

Accoona, China/USGoo, JapanGuruji.com, IndiaLeit.is, Iceland Rediff, India Walla!, IsrealYandex, RussiaZipLocal,Canada/USSesam,Birwat, SwedenSearcdh.=ch, Switzerland

People

Peek YouEx.plode.usInfoSpaceSpockSpokeoWinkZabasearch.comZoomInfo

Page 6: Email Advocacy

@@Email encryption and a wider security strategyEmail encryption should never be considered in isolation from a broader security strategy that touches all parts of an organization and protects data wherever it goes. Fundamental to this security strategy must be the issue of encryption and how data, in any of its forms, can be secured from prying eyes according to an organization’s overall data protection strategy.

Email encryption and a wider security strategyEmail encryption should never be considered in isolation from a broader security strategy that touches all parts of an organization and protects data wherever it goes. Fundamental to this security strategy must be the issue of encryption and how data, in any of its forms, can be secured from prying eyes according to an organization’s overall data protection strategy.

Organizations that deal with legal, financial, medical, or any other classically sensitive data benefit from end-point based encryption.

Organizations that deal with legal, financial, medical, or any other classically sensitive data benefit from end-point based encryption.

In cryptography, encryption is the process of transforming information (referred to as plain text) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.

In cryptography, encryption is the process of transforming information (referred to as plain text) using an algorithm (called cipher) to make it unreadable to anyone except those possessing special knowledge, usually referred to as a key.

By using software that integrates into theHeart of a email system, as well as an Existing directory structure, user inter-vention is not required and system management is made much easier.

By using software that integrates into theHeart of a email system, as well as an Existing directory structure, user inter-vention is not required and system management is made much easier.

E-mail authentication is the effort to equip messages of the email transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It differs from content filtering.

E-mail authentication is the effort to equip messages of the email transport system with enough verifiable information, so that recipients can recognize the nature of each incoming message automatically. It differs from content filtering.

Page 7: Email Advocacy

@ @ The Internet has been put to use as part of a facilitative strategy, characterized by multi-party collaboration and the sharing of information.

The voluntary sector contains a wide variety of organizations that are supported by the work of volunteers who freely contribute their time and resources in order to support common ends. The sector includes organizational types of trade associations, charities, and hobby clubs.

Within this sector, however, there are a large number of groups that strive to improve the general welfare of society through advocacy work, or by performing social services not under the purview of the public or private sectors.

The Internet has been put to use as part of a facilitative strategy, characterized by multi-party collaboration and the sharing of information.

The voluntary sector contains a wide variety of organizations that are supported by the work of volunteers who freely contribute their time and resources in order to support common ends. The sector includes organizational types of trade associations, charities, and hobby clubs.

Within this sector, however, there are a large number of groups that strive to improve the general welfare of society through advocacy work, or by performing social services not under the purview of the public or private sectors.

Yahoo!

Yahoo!

National Association of Social Workers

National Association of Social Workers

AOL

AOL

AT&T

AT&T

Greenpeace Fund, Inc.

Greenpeace Fund, Inc.

Google

Google

Bing

Bing

Web Search

Web Search

American Veterans Relief Foundation

American Veterans Relief Foundation

Citizens Against Government Waste

Citizens Against Government Waste

Page 8: Email Advocacy

@@ ‘Social change' agencies act as advocates, promoters and catalyzers of new ideas, attitudes and social institutions. Derived from historical movements designed to deal with social inequalities and dangers resulting from the sometimes narrow and short-term policies of government and business leaders, these social change organizations are currently involved with such issues as the environment, human rights, social justice, peace and international development.

‘Social change' agencies act as advocates, promoters and catalyzers of new ideas, attitudes and social institutions. Derived from historical movements designed to deal with social inequalities and dangers resulting from the sometimes narrow and short-term policies of government and business leaders, these social change organizations are currently involved with such issues as the environment, human rights, social justice, peace and international development.

American Society for Prevention of Cruelty to Animals

TASH (People with disabilities)

American Society for Prevention of Cruelty to Animals

TASH (People with disabilities)

National Coalition for the Homeles

Antidefamation League (combating anti-

Semitism

National Coalition for the Homeles

Antidefamation League (combating anti-

Semitism

Page 9: Email Advocacy

@@ Actions undertaken by society to effect change are driven by a degree of strategic thought. In thinking strategically, social change activists try to identify the nature and causes of social problems and then choose specific targets that are deemed the most likely people or organizations to resolve those problems. The optimal approach to take to ensure the targets actually help create and maintain the required changes is determined by the type of strategy adopted by the change agents. One of the keys to a successful strategic approach is in maintaining effective communication with, and among, members of the public.

Through Emailing Information, the funders are informed of the opportunities, challenges and impact of the tools that were documented, analyzed, and evaluated for nonprofit uses.

Actions undertaken by society to effect change are driven by a degree of strategic thought. In thinking strategically, social change activists try to identify the nature and causes of social problems and then choose specific targets that are deemed the most likely people or organizations to resolve those problems. The optimal approach to take to ensure the targets actually help create and maintain the required changes is determined by the type of strategy adopted by the change agents. One of the keys to a successful strategic approach is in maintaining effective communication with, and among, members of the public.

Through Emailing Information, the funders are informed of the opportunities, challenges and impact of the tools that were documented, analyzed, and evaluated for nonprofit uses.

Page 10: Email Advocacy

@@The five C's of social action:

Cause. A social objective or undertaking that change agents believe will provide some answer to a social problem.

Change Agency. An organization whose primary mission is to advance a social cause.

Change Targets. Individuals, groups, or institutions designated as the targets of change efforts.

Channels. Ways in which influence and response can be transmitted between change agents and change targets.

Change Strategy. A basic mode of influence adopted by the change agent to affect the change target." (Kotler, 1973, p. 172)

The five C's of social action:

Cause. A social objective or undertaking that change agents believe will provide some answer to a social problem.

Change Agency. An organization whose primary mission is to advance a social cause.

Change Targets. Individuals, groups, or institutions designated as the targets of change efforts.

Channels. Ways in which influence and response can be transmitted between change agents and change targets.

Change Strategy. A basic mode of influence adopted by the change agent to affect the change target." (Kotler, 1973, p. 172)

Page 11: Email Advocacy

Getting Started with Email ActivismGetting Started with Email Activism@@ Start with a clear understanding of what you want to accomplish and who you want to reach. Is your constituency online? Make sure you have the resources to maintain an online presence, and determine who will be responsible for answering email. Once you create a web site or launch an email newsletter or discussion list, who will manage it?

Collect email addresses from your members, supporters and volunteers, the media, our contacts in legislative offices, your funders and anyone else you communicate with regularly. Include a space for email addresses in your membership sign-up forms, newsletter subscription forms, and fundraising reply cards.

If your organization publishes a newsletter, offer your members the option of receiving it electronically, and encourage them to switch by reminding them that your organization will save money.

If your organization has a Web site where visitors can sign up to volunteer, to subscribe to a newsletter or action alert, or to donate money, be sure to ask for an email address If your organization has a table at a conference, rally, or other event, include space for an email address on your sign-up sheet.

Continued

Start with a clear understanding of what you want to accomplish and who you want to reach. Is your constituency online? Make sure you have the resources to maintain an online presence, and determine who will be responsible for answering email. Once you create a web site or launch an email newsletter or discussion list, who will manage it?

Collect email addresses from your members, supporters and volunteers, the media, our contacts in legislative offices, your funders and anyone else you communicate with regularly. Include a space for email addresses in your membership sign-up forms, newsletter subscription forms, and fundraising reply cards.

If your organization publishes a newsletter, offer your members the option of receiving it electronically, and encourage them to switch by reminding them that your organization will save money.

If your organization has a Web site where visitors can sign up to volunteer, to subscribe to a newsletter or action alert, or to donate money, be sure to ask for an email address If your organization has a table at a conference, rally, or other event, include space for an email address on your sign-up sheet.

Continued

Page 12: Email Advocacy

@@

Yuzhe Cool Motion 2009 1.1 Cool Motion helps to create interactive animations, flash games, flash videos, various effects, slide shows, etc. Cool Motion shows quite a lot of new features in editing, such as script compile and decompile, editing various types of motions, replacing symbols, Assigning inks, multi-documents mode, Floatable and movable menu bar and toolbar etc. and these new features will make your design work more convenient!

Yuzhe Cool Motion 2009 1.1 Cool Motion helps to create interactive animations, flash games, flash videos, various effects, slide shows, etc. Cool Motion shows quite a lot of new features in editing, such as script compile and decompile, editing various types of motions, replacing symbols, Assigning inks, multi-documents mode, Floatable and movable menu bar and toolbar etc. and these new features will make your design work more convenient!

If you distribute press releases to the media, start sending them by email instead of fax. (Also, be sure to add online media outlets to your distribution list).

Use email to communicate with staff consultants in legislative offices.

Establish and promote an email action alert list.

If you distribute press releases to the media, start sending them by email instead of fax. (Also, be sure to add online media outlets to your distribution list).

Use email to communicate with staff consultants in legislative offices.

Establish and promote an email action alert list.

Page 13: Email Advocacy

@@ Advantages of Email Emails are faster and less expensive than physical letters.

• Email provides enhanced features with file attachments, Rich Text Format, and delivery confirmation, etc which cannot be done with normal letters.

• They are time-saving and more efficient.

• They can be sent to more than one person at a time, and can be received as information from more than one person at a time

• Address Book – The user can ener the name, address, email address, and additional comments in the address book and can view the same when required by clicking on the View Entries link.

• Attachments – The user can manage all the attachments in their account through this link and download the attachments.

• Calendar – Each email account contains a calendar to be used to prepare a schedule by adding, editing, or deleting entries by clicking on he specific link.

• Composition of Emails consists of the user creating mail. When the user is finished composing an email, he can eithe rsave it as a draft, or send it to the recipient.

• Folders – The user can ceate, delete, and rename folders and sub-folders by clicking on the FOLDERS OPTIONS link.

• Search - This option is used when there are many emails. This feature helps the user to move, read, and fordward emails listed on this page.

• Trash Folder – When he user deletes any email, it automatically moves to this folder and if needed, the user can undelete the same. This folder is automatically emptied once everyday.

Advantages of Email Emails are faster and less expensive than physical letters.

• Email provides enhanced features with file attachments, Rich Text Format, and delivery confirmation, etc which cannot be done with normal letters.

• They are time-saving and more efficient.

• They can be sent to more than one person at a time, and can be received as information from more than one person at a time

• Address Book – The user can ener the name, address, email address, and additional comments in the address book and can view the same when required by clicking on the View Entries link.

• Attachments – The user can manage all the attachments in their account through this link and download the attachments.

• Calendar – Each email account contains a calendar to be used to prepare a schedule by adding, editing, or deleting entries by clicking on he specific link.

• Composition of Emails consists of the user creating mail. When the user is finished composing an email, he can eithe rsave it as a draft, or send it to the recipient.

• Folders – The user can ceate, delete, and rename folders and sub-folders by clicking on the FOLDERS OPTIONS link.

• Search - This option is used when there are many emails. This feature helps the user to move, read, and fordward emails listed on this page.

• Trash Folder – When he user deletes any email, it automatically moves to this folder and if needed, the user can undelete the same. This folder is automatically emptied once everyday.

Page 14: Email Advocacy

@@ Advantages of Email

Email plays large roll in new marketing mediums. Email is the announcer to subscribers when a new social network initiative is launched. It is weaved into social networking with the following procedures:

Advantages of Email

Email plays large roll in new marketing mediums. Email is the announcer to subscribers when a new social network initiative is launched. It is weaved into social networking with the following procedures:

Page 15: Email Advocacy

@ @ Disadvantages of Emails

In a new phishing trend, spammers are focusing on individualized attacks. Recipients may be deceived into thinking the message is from a friend, but these spammers want access to their credit card accounts. Phishing is a common scamming practice that involves emailing users under false pretenses with the aim of tricking them into revealing their private information. The emails feature the recipients' names in the subject lines, claim to have seen them at Starbucks, and ask them to click on a link to view photos. Don't click. This is a scam. Those that take the bait may be exposed to objectionable material, incur unauthorized charges to their banking account, and may fall victim to identity theft.

Email Corruption

When the viewer is unable to open or send an email, the chances are that the email Has become corrupt. When the user sends the message, but a message is indicating that the message is queue able instead, there is the probability that the email might be corrupt.

Disadvantages of Emails

In a new phishing trend, spammers are focusing on individualized attacks. Recipients may be deceived into thinking the message is from a friend, but these spammers want access to their credit card accounts. Phishing is a common scamming practice that involves emailing users under false pretenses with the aim of tricking them into revealing their private information. The emails feature the recipients' names in the subject lines, claim to have seen them at Starbucks, and ask them to click on a link to view photos. Don't click. This is a scam. Those that take the bait may be exposed to objectionable material, incur unauthorized charges to their banking account, and may fall victim to identity theft.

Email Corruption

When the viewer is unable to open or send an email, the chances are that the email Has become corrupt. When the user sends the message, but a message is indicating that the message is queue able instead, there is the probability that the email might be corrupt.

Page 16: Email Advocacy

@@Email Recovery

The Email Recovery Software is a tool used for repairing and recovering corruptedor deleted emails because the emails are stored in the Mail Folder, a separate file. Different methods to recover them are used Deleted emails can be restored by looking in the deleted items folder in outlook and outlook express, but not if they have been cleared from there as well. The Mail Recovery software can then be used. The Stellar Phoenix Mail Recovery software scans, extracts and saves email messages and folders on the local drive. Sellar offers a complete solution of file recovery software and lost data restoration programs for Windows (Windows 95,98, ME,NT, 2000, 2003, and XP), Apple Macintosh, Novell, Linux, Unix Operating system and FAT, NTFS, HFS, MWFS, JFS, ExT2 and EXT3 file systems.

The Email Recovery Software is a tool used for repairing and recovering corruptedor deleted emails because the emails are stored in the Mail Folder, a separate file. Different methods to recover them are used Deleted emails can be restored by looking in the deleted items folder in outlook and outlook express, but not if they have been cleared from there as well. The Mail Recovery software can then be used. The Stellar Phoenix Mail Recovery software scans, extracts and saves email messages and folders on the local drive. Sellar offers a complete solution of file recovery software and lost data restoration programs for Windows (Windows 95,98, ME,NT, 2000, 2003, and XP), Apple Macintosh, Novell, Linux, Unix Operating system and FAT, NTFS, HFS, MWFS, JFS, ExT2 and EXT3 file systems.

Application Toolbar Icons Collection, 2010.1PCN, BMP, ICB

Application Toolbar Icons Collection, 2010.1PCN, BMP, ICB

Page 17: Email Advocacy

@@References

A Search Engine for your site. Jenki Productions. (2010). Directory of search engines and directories that on can be integrated into personal sites. Retrieved May 14, 2010 from www.searchengines.net

Jenkins, G. Simms. (2009). The Truth about Email Marketing . Pearson Education, Inc. Publishing as . FT Press, Upper Saddle River, New Jersey. Retrieved May 13, 2010 . Baggptt. Cjros. (2007). Email Marketing by the Numbers: how to use the world’s greatest marekting tool to take any organization to the next level . Retrieved May 12, 2010.

Oskar, Park. (2010), Provider of File Recovery Software & Service Provider. Retrieved May14, 2010 from http://www.stearomfp.com,

The Strategic Importance of Email Encryption. 2010. strategic importance of email encryption. Securing business data and email traffic Retrieved May 13, 2010 from download.pgp.com/pdfs/Bloor-Research_Email-Encryption-Bri... –

Peterson, Mark F.; Thomason, Stephanie J.; Althouse, Norm; Athanassiou, Nicholas; Curri, Gudrun; Konopaske, Robert; Lenartowicz, Tomasz; Meckler, Mark; Mendenhall, Mark E.; Mogaji, Andrew A.; Rowney, Julie I. A. Social Structure and Personal Values that Predict E-Mail Use: An International Comparative Study: Journal of Global Information Management, Apr-Jun2010, Vol. 18 Issue 2, p57-84, 28p; DOI: 10.4018/jgim.2010040103; (AN 50254194) Subjects: CANADA; NIGERIA; UNITED States; COMMUNICATION & technology; ELECTRONIC mail messages -- Social aspects; COMPARATIVE studies; EXECUTIVES – Attitudes. Retrieved May 17, 2010.

Serenko, Alexander (04/01/2010). "Rigor and Relevance: The Application of The Critical Incident Technique to Investigate Email Usage.". Journal of organizational computing and electronic commerce (1091- 9392), 20 (2), p. 182. Retrieved May 18, 2010.

References

A Search Engine for your site. Jenki Productions. (2010). Directory of search engines and directories that on can be integrated into personal sites. Retrieved May 14, 2010 from www.searchengines.net

Jenkins, G. Simms. (2009). The Truth about Email Marketing . Pearson Education, Inc. Publishing as . FT Press, Upper Saddle River, New Jersey. Retrieved May 13, 2010 . Baggptt. Cjros. (2007). Email Marketing by the Numbers: how to use the world’s greatest marekting tool to take any organization to the next level . Retrieved May 12, 2010.

Oskar, Park. (2010), Provider of File Recovery Software & Service Provider. Retrieved May14, 2010 from http://www.stearomfp.com,

The Strategic Importance of Email Encryption. 2010. strategic importance of email encryption. Securing business data and email traffic Retrieved May 13, 2010 from download.pgp.com/pdfs/Bloor-Research_Email-Encryption-Bri... –

Peterson, Mark F.; Thomason, Stephanie J.; Althouse, Norm; Athanassiou, Nicholas; Curri, Gudrun; Konopaske, Robert; Lenartowicz, Tomasz; Meckler, Mark; Mendenhall, Mark E.; Mogaji, Andrew A.; Rowney, Julie I. A. Social Structure and Personal Values that Predict E-Mail Use: An International Comparative Study: Journal of Global Information Management, Apr-Jun2010, Vol. 18 Issue 2, p57-84, 28p; DOI: 10.4018/jgim.2010040103; (AN 50254194) Subjects: CANADA; NIGERIA; UNITED States; COMMUNICATION & technology; ELECTRONIC mail messages -- Social aspects; COMPARATIVE studies; EXECUTIVES – Attitudes. Retrieved May 17, 2010.

Serenko, Alexander (04/01/2010). "Rigor and Relevance: The Application of The Critical Incident Technique to Investigate Email Usage.". Journal of organizational computing and electronic commerce (1091- 9392), 20 (2), p. 182. Retrieved May 18, 2010.

Page 18: Email Advocacy

@@References

Mourby, Adrian, A Capital Loss for the Email Junkies (02/16/2001). Times Educational Supplement, Issue 4416, p15, 1/6p, 1 Black and White Photograph; (AN 4459105) Subjects: HIGH technology; SOCIAL change; GREAT Britain Database: Academic Search Premier. Retrieved May 15, 2010.

Rory O’Brien, Social Change Activism and the Internet: Strategic Online Activities. web.net/.../The Internet and Social Change Activism.doc

An Introduction to Activism on the Internet: (Jan 19, 2006). www.backspace.com/action/cell_phones.php -

Using the Internet for Outreach & Organizing: A Virtual Activist ... Jump to Online Resources for Email Activism: Comprehensive information and "how to" guides on Internet activism. The eNonprofit: A Guide to ASPs, ... dawn.thot.net/virtual_activist_training.html - Cached - Similar

References

Mourby, Adrian, A Capital Loss for the Email Junkies (02/16/2001). Times Educational Supplement, Issue 4416, p15, 1/6p, 1 Black and White Photograph; (AN 4459105) Subjects: HIGH technology; SOCIAL change; GREAT Britain Database: Academic Search Premier. Retrieved May 15, 2010.

Rory O’Brien, Social Change Activism and the Internet: Strategic Online Activities. web.net/.../The Internet and Social Change Activism.doc

An Introduction to Activism on the Internet: (Jan 19, 2006). www.backspace.com/action/cell_phones.php -

Using the Internet for Outreach & Organizing: A Virtual Activist ... Jump to Online Resources for Email Activism: Comprehensive information and "how to" guides on Internet activism. The eNonprofit: A Guide to ASPs, ... dawn.thot.net/virtual_activist_training.html - Cached - Similar