Measuring the Effectiveness of Encrypted Surveys as a Non-Response Reduction Technique

Size: px
Start display at page:

Download "Measuring the Effectiveness of Encrypted Email Surveys as a Non-Response Reduction Technique"

Transcription

1 Measuring the Effectiveness of Encrypted Surveys as a Non-Response Reduction Technique Herson Esquivel-Vargas, Sandip Pandey and Tamunomiebaka Dibi {h.t.esquivelvargas, s.pandey, t.c.dibi}@student.utwente.nl University of Twente Surveys are an important research tool in applied statistics, though sometimes it is difficult to get enough responses to reach statistically significant results. Because of the low cost, electronic surveys are becoming more and more popular. We developed a hypothesis which claims that encrypted surveys could be used as a non-response reduction technique and then we did our own survey applying this approach in order to gather evidence to support or refute our hypothesis. We measured the response rate of encrypted surveys over plain text surveys to investigate the effectiveness of responses in both groups. We sent in the same survey to s publicly available in PGP servers: 50% plain text and 50% encrypted. Although the questions of the survey were not relevant for our hypothesis (which is focused on the response or non-response variable) we developed five questions about Security Concerns of Mobile Phones. With 2 replies out of 249 encrypted s and 4 replies out of 249 plain text s, the results gotten refute our hypothesis. Finally, we discuss the implications of our results in other somewhat related fields like spam and briefly identify some common user practices related to security in mobile phones. Keywords - Encrypted Survey, PGP (Pretty Good Privacy) Users, Non-response reduction technique. Introduction Sampling theory posits that data collected from a randomly selected sample may be projected onto a larger population. Depending on the kind of research being developed, surveys can be the more appropriate way to gather data. Surveys are an important research tool in applied statistics, though sometimes it is difficult to get enough responses to reach statistically significant results. The response rate indicates the percentage of persons that participate in a research project out of all of those who are asked to participate. It is commonly known the fact that You cannot manage what you cannot monitor and that is why International workshops like the one carried out since 1990 by nonresponse.org have as mission...the focus of the Workshop is non-response in household surveys. The main goal of the Workshop is to bring adjusters and reducers together and to initiate cooperation on different projects. People s participation in surveys can be classified (Singer, 2002) as those who respond for altruistic reasons e.g. the survey is useful for some purpose important to the respondent, or the respondent is fulfilling a social obligation; those who respond for survey-related reasons e.g. they are interested in the survey topic, or find the interviewer appealing; and those who cite what the authors call personal reasons e.g. they promised to do it. In spite of that a 2010 study by SurveyMonkey (Brent, 2010) looking at 100,000 of the online surveys they host found a drop in the response rate by about 3% at 10 questions surveys and about 6% at 20 questions surveys, with drop off slowing (for example, only 10% reduction at 40 questions). (Converse, 2006) also pointed out that the quality of response is often found to be degraded toward the end of long surveys. Because of the low cost, electronic surveys are becoming more and more popular. The aim of the present study is to test a new non-response reduction technique based on PGP to send encrypted (personalized) messages using each individual s public key, which could trigger the recipient s curiosity and at the end, help in the reduction of non-response rates. There are many reasons for wanting to develop new nonresponse reduction techniques: Governments usually pay attention to their demographic measurements and statistics to strategically plan the investment in fields like education, healthcare, welfare homes, among others. Many recommendations have been proposed towards a non-response reduction (Lynn, 2008) in telephone or faceto-face surveys (Dillman, 1978), some of which can be used in surveys as well. Advance letter: A short letter is sent in advance to inform the sampled respondents about the upcoming survey.

2 2 TEAM BOBBYPHISHER Short introduction: The interviewer should always start with a short instruction about him or herself. Respondent-friendly survey questionnaire: The questions asked must be clear, non-offensive and easy to respond to for the subjects under study. Incentives: Something is offered to the respondents to motivate the participation sacrificing anonymity. In the pilot survey we developed to test our technique we used additionally the latter three in all the surveys we sent. We sent encrypted surveys using user s public keys commonly available in PGP key servers. Using this technique we reach a demographic group with very particular technical characteristics/skills. Taking advantage of this, we develop a survey on Security concerns in mobile phones. A control group from the same population receive the same survey in plain text, which allow us to compare the results from both groups. To be more elaborate on PGP, Pretty Good Privacy is a standard format defined in [RFC-4880] used to encrypt and decrypt . Subjects were chosen in an unbiased manner so that we could cover a wide range of people from different demographic areas. There are many legitimate reasons for an internet user to be convinced to remain anonymous and/or communicate confidentially online including their rights to privacy and personal security. The Internet Society published an online survey results regarding confidential communications on the Internet which recorded 1347 responses from all around the world indicating global interest in this issue (Internet.Society, 2014). The survey was to collect information about Internet users to help gaining a more complete understanding of their needs and expectations for confidential communications online. Survey showed that about 95% considered it important to be able to communicate online with others confidentially both in personal and work purposes. Another result of the survey indicated that 52.6% considered encryption as tools or strategies to use for private communications with other users out of which 70% used PGP (Pretty Good Privacy). The above result motivated the hypothesis of the paper. Method The research methodology can be highlighted in following points. 1. Subject Selection 2. Generation of Personalized s 3. Sending s 4. Collection and analysis of responses Figure 1. Distribution of domains among subjects Subject Selection Random PGP users were chosen from the MIT s PGP keyserver (see appendix B for script used to find PGP users) from which we extracted name, and the public key. The quality of the data hosted in those servers can not be verified a priori and we can reasonably expect the presence of some careless users whose private key (required to decrypt messages) has been lost, fake/absurd names, closed accounts (like temporary addresses e.g. student.utwente.nl) and even dead people ( 0x E79F0DF4B). Since to the best of our knowledge there are no available statistics about the correctness of the data available in PGP servers we can not quantify such expectations. We chose a batch of 908 users divided in 454 for the control group (plain text survey recipients) and 454 for the experimental group (encrypted survey recipients). To avoid being black-listed by providers at the time of sending the s, we divided our subjects in three batches of 200, 216 and 454 users. As a result of the random selection of subjects we got the domain distribution shown in figure 1. Generation of Personalized s For both groups of subjects the started with Hello [name]. To craft such messages we used the name registered in the PGP server and collected in the first phase. An example of a complete message is shown in appendix A. For the encrypted survey group, the personalized was encrypted using the recipient s public key using the GPG (GNU Privacy Guard) software implementation of PGP. Encrypted messages could be considered more personalized because each one of those messages was encrypted using recipient s public key such that only the intended recipient of the message would be able to decrypt and read the message. We couldn t identify any risks for our subjects since of course,

3 TEAM BOBBY PHISHER 3 Figure 2. Aggregated survey statistics including total sent, failure, success delivery and response received they could freely ignore the message or participate in the survey. delivery After the preparation of personalized s, the delivery of both plain text and encrypted s was automated through a tailored software (appendix B) with a 30 seconds delay in between two s of each category. The delay was introduced to prevent from being detected as spam. Moreover, to send the s we used addresses in the student.utwente.nl domain which (we believe) can hardly be considered a source of spam. All messages were sent during the second half of November (16th, 24th and 28th each batch), Collection and analysis of responses After two weeks waiting for responses from the subjects we started the process of data collection. This decision is motivated from the fact shown in literature that more than 90% of users click on spam links within the first week (Kanich et al., 2008). Although it is not exactly the same situation we believe that a time window of two weeks is enough to effectively measure the response rate. plain text or encrypted (the sender s public key is in PGP servers too) answers were considered equally as successful surveys. The answers to our questions were recorded for further analysis. Results The units of analysis were individuals (i.e. survey recipients) who could either ignore or reply the survey. Accordingly with the hypothesis that we wanted to test, encrypted surveys should have had a greater response rate compared to plain text surveys but the experimental results show no evidence that this is the case. After sending 908 survey s, 46% of the total bounced with delivery failure. The number of subjects receiving plain text and encrypted surveys was exactly 249 in each group but less than 2% of those subjects actually responded the survey as shown in figure 2. Table 1 Actual delivery/response statistics. Date Delivered s Response Plain text Encrypted Plain text Encrypted Nov Nov Nov Total Out of 6 responses obtained from the survey, 2 of the responses were not useful to analyse the survey questions because reply didn t include the answers to survey question. However, those were still replies to survey and which made them important not to ignore since we were trying to measure the non-responsiveness. The responses of each questions are listed below along with questions. 1. Which operating system runs on your Smartphone? Android 1 ios 2 Other 1 2. What is the average data consumption (download) on your smartphone per week? <100MB 2 100MB-500MB 1 500MB-1000MB 1 >1000MB 0 3. On average, how often do you check for application updates on your device? Daily 0 Weekly 2 Monthly 0 Never 1 It is done automatically 1 4. Do you have an antivirus installed on your phone? Yes 0 No 4 5. Do you pay attention to the permissions required by the apps when you install? Yes but I accept anyway 0 Yes and sometimes I cancel 4 No, I don t care 0 Discussion In this research we started with the hypothesis that encrypted surveys could be used as a non-response reduction technique. Although encrypting something that 1) is not confidential and 2) we want to divulge can be thought as counterproductive, the reasoning behind it was that receiving an

4 4 TEAM BOBBYPHISHER encrypted survey could trigger the user s curiosity and therefore could be used to increase the response rate. The poor response rate obtained from the experiment refutes our hypothesis. Among the reasons of this results we can think of two: 1. Since the demography chosen is located in many different countries around the world, the language could have been a barrier because we used English for all the surveys without distinction. 2. Due to the high usage of mobile devices nowadays, most people tend to read and reply their personal mail using those while they are traveling or at home. The lack of PGP applications for mobile devices or the lack of trust of the users to put their secret key on their mobile devices could have deter them from effectively decrypt and read the survey. The obtained results are also useful to explain why publicly available public keys like those in PGP directories, are not used to deliver encrypted spam. It was important for the experiment that the s sent weren t marked as spam on the subject s inbox. To discard that possibility, we sent 5 encrypted and 5 plain text surveys to our own student address hosted in googleapps which was an important fact given that maximum number of our subjects have their addresses in gmail.com and it was reasonable to expect the spam filter behaves similarly. However, after some experiment with sending encrypted s with various titles, we found out that even encrypted could be marked as spam by Mail Provider. Gmail and Hotmail constituted the majority of subjects address, so study was constrained to above two providers only. Hence, the title and structure of body of were carefully chosen to avoid common spam patterns, and was tested to be not marked as spam on major provider in experiment. To avoid being blacklisted for sending large volume of s, sufficient delay (30 seconds in case of Gmail) was introduced between two consecutive s. Several delay and failure messages were obtained within a week after we sent the which suggested that such addresses no longer exists. Those survey s were discarded from the experiment and rest of s were assumed to be received by the subjects. However, we had no way of finding out whether the subject actually read the . Despite poor survey results, we can clearly see that all surveyed subjects doesn t use any antivirus application in their phone as in Figure 4. Another distinct result we see is that surveyed subjects agreed on paying attention to app permissions and often they cancel the application that request unnecessary permissions as shown in Figure 5. These results are in line with the expectation of PGP users to be self-aware about the privacy and application permissions (see Appendix C for survey result charts). The major limitation of the experiment is that the lack of responses support the fact that encrypted surveys is not a non-response reduction technique. However, this experiment can serve as base for conducting further research on the effectiveness of electronic communications from the point of view of the sender interested in statistics, marketing, etc. with different selection of subjects. Another contribution of this research is the GPL ed software developed to retrieve and send encrypted and plain text messages in batch. The reader can find the links in appendix B. In our experiment the subjects were randomly chosen from all around the world with no restriction in place of residence and age of key. Conducting similar research with more specific target group based on demographic region, and age of public key could help understand the effectiveness of encrypted surveys better to have meaningful conclusions. References Brent, C. (2010, December). Does adding one more question impact survey. Retrieved from /08/survey_questions_and_completion_rates/ Converse, P. E. (2006). The nature of belief systems in mass publics (1964). Critical Review, 18(1-3), Dillman, D. A. (1978). Mail and telephone surveys : the total design method. New York : Wiley. (1978 ed.) Internet.Society. (2014, December). Communicating online confidentially. Retrieved from default/files /Communicating%20Online %20Confidentially_GDP1.pdf/ Kanich, C., Kreibich, C., Levchenko, K., Enright, B., Voelker, G. M., Paxson, V., & Savage, S. (2008). Spamalytics: An empirical analysis of spam marketing conversion. In Proceedings of the 15th acm conference on computer and communications security (pp. 3 14). Lynn, P. (2008). The problem of non-response, chapter 3, International Handbook of Survey Research Methods. Singer, E. (2002). The use of incentives to reduce nonresponse in household surveys. Survey nonresponse,

5 TEAM BOBBY PHISHER 5 Appendix A Sample Survey Hello John Doe, You received this message because you have been randomly chosen to participate in this survey. This is part of a research project developed at the "UNIVERSITY OF TWENTE". Your answers will not be disclosed to third parties and you will not receive additional survey s from us. We will raffle an Amazon gift card ($20) among those who participate in the survey. You could be the lucky one. We will inform you through if you are the lucky winner of the raffle. Please take out two minutes of your time to reply this writing an X on the appropriate option for every question. Feel free to add any comments on those cases when you think none of the options suits your situation. 1. Which operating system runs on your smartphone? [ ] Android [ ] ios [ ] Other 2. What is the average data consumption (download) on your smartphone per week? [ ] <100MB [ ] 100MB-500MB [ ] 500MB-1000MB [ ] >1000MB 3. On average, how often do you check for application updates on your device? [ ] Daily [ ] Weekly [ ] Monthly [ ] Never [ ] It is done automatically 4. Do you have an antivirus installed on your phone? [ ] Yes [ ] No 5. Do you pay attention to the permissions required by the apps when you install? [ ] Yes but I accept anyway [ ] Yes and sometimes I cancel [ ] No, I don extquotesinglet care Thank you for your time. Figure 3. Figure 2: Average Data usage Figure 4. Figure 3: Software update pattern in Smartphone Kind Regards, Sandip Pandey<s.pandey@student.utwente.nl>, Herson Esquivel-Vargas<h.t.esquivelvargas@student.utwente.nl>, Tamunomiebaka Dibi<t.c.dibi@student.utwente.nl> Appendix B Source code Project source for sending encrypted s Program source code for finding PGP users post-page?startkey=[%22picking-random-pgp-users%22] Appendix C Survey Results Charts and graphs shows the result of survey. Figure 5. Use of antivirus software in phone

Secure Email Frequently Asked Questions

Secure Email Frequently Asked Questions Secure Email Frequently Asked Questions Frequently Asked Questions Contents General Secure Email Questions and Answers Forced TLS Questions and Answers SecureMail Questions and Answers Glossary Support

More information

E-mail Encryption Recipient Guidelines

E-mail Encryption Recipient Guidelines E-mail Encryption Recipient Guidelines Canadian Western Bank Group Human Resources Department November 1, 2013 This reference guide was developed for training and reference use only. Any discrepancies

More information

Receiving Secure Email from Citi For External Customers and Business Partners

Receiving Secure Email from Citi For External Customers and Business Partners Citi Secure Email Program Receiving Secure Email from Citi For External Customers and Business Partners Protecting the privacy and security of client information is a top priority at Citi. Citi s Secure

More information

How to use PGP Encryption with iscribe

How to use PGP Encryption with iscribe How to use PGP Encryption with iscribe iscribe e-mail seamlessly supports e-mail encryption and digital signatures. This bulletin describes how to setup iscribe so that you can send and receive encrypted

More information

How To Secure Mail Delivery

How To Secure Mail Delivery FortiMail Identity Based Encryption A Business Enabler WHITE PAPER FORTINET FortiMail Identity Based Encryption - A Business Enabler PAGE 2 Contents Business Need Secure Mail Delivery... 3 Challenges with

More information

Client Training Manual

Client Training Manual Client Training Manual Contents Quick Summary on How to Open Encrypted Email from Arlington County.2 I. Overview... 4 A. Overview of Email Encryption with Arlington County Government... 4 Link to YouTube

More information

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012

Electronic Messaging Policy. 1. Document Status. Security Classification. Level 4 - PUBLIC. Version 1.0. Approval. Review By June 2012 Electronic Messaging Policy 1. Document Status Security Classification Level 4 - PUBLIC Version 1.0 Status DRAFT Approval Life 3 Years Review By June 2012 Owner Secure Research Database Analyst Retention

More information

Email Encryption. Discovering Reasons Behind its Lack of Acceptance

Email Encryption. Discovering Reasons Behind its Lack of Acceptance Email Encryption Discovering Reasons Behind its Lack of Acceptance Kendal Stephens LaFleur Department of Computer Science Sam Houston State University Huntsville, TX, United States kks016@shsu.edu Abstract

More information

Secure E-mail FAQs 1

Secure E-mail FAQs 1 Secure E-mail FAQs 1 P age Table of Contents Secure E-Mail Overview... 3 Options for viewing secure e-mail... 3 Delivery Option Decision Tree... 4 Before you start using Secure E-mail... 4 To use a PGP

More information

Setting up and controlling E-mail

Setting up and controlling E-mail Setting up and controlling E-mail Two methods Web based PC based Setting up and controlling E-mail Web based the messages are on the Internet accessed by dial-up or broadband at your Internet Service Provider

More information

How To Use The Gtokus Secure Mail System

How To Use The Gtokus Secure Mail System Department of Banking and Finance (DBF) Secure Message Center DBF Secure E-Mail Procedures This document contains information proprietary to the Georgia Department of Banking and Finance and shall not

More information

mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from

mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from Technical Overview mkryptor allows you to easily send secure emails. This document will give you a technical overview of how. mkryptor is a software product from Contents What is mkryptor? 1 Mkryptor VS

More information

Managing Junk Mail. About the Junk Mail Filter

Managing Junk Mail. About the Junk Mail Filter Managing Junk Mail Outlook can filter out certain types of messages and send them to a separate folder to keep your Inbox from being cluttered with junk mail. Outlook can also disable links in suspicious

More information

E Mail Encryption End User Guide

E Mail Encryption End User Guide E Mail Encryption End User Guide TABLE OF CONTENTS Why Use Email Encryption... 2 What is a Registered Envelope... 2 Features & Benefits... 2 Security Policies... 2 How to Compose and Send an Encrypted

More information

SECURE Email User Guide

SECURE Email User Guide SECURE Email User Guide Receiving SECURE Email from Starion Financial Starion Financial is now offering an enhanced email encryption tool, IronPort PXE, which enables the email communication of sensitive

More information

INinbox Start-up Pack

INinbox Start-up Pack 2 INspired Email Marketing This is what you should know about sending emails through INinbox and how to get started! Thanks for joining INinbox. choice. You ve made a great In front of you, you find the

More information

Guidance for sending and receiving an encrypted NHSmail e-mail

Guidance for sending and receiving an encrypted NHSmail e-mail Contents Guidance for sending and receiving an encrypted NHSmail e-mail Introduction 2 Sending an encrypted e-mail to a VERIFIED e-mail address 2 Receiving an encrypted e-mail 4 Reply to and forward encrypted

More information

e- storage Mail Archive

e- storage Mail Archive e- storage Mail Archive 1 TABLE OF CONTENTS 1.0 OVERVIEW 3 1.1 INTRODUCTION... 3 1.2 REQUIREMENT. 4 2.0 SETUP AND CONFIGURATION. 6 2.1 CREATE NEW ARCHIVE PROFILE. 6 2.1.1 Gmail Account.. 8 2.1.2 Hotmail

More information

Pretty Good Privacy with GnuPG

Pretty Good Privacy with GnuPG Pretty Good Privacy with GnuPG Steve Revilak Cabot House Sep. 24, 2013 1 / 16 Encryption and Signing Encryption The purpose is to ensure that a message is readable only by someone possessing a specific

More information

How to Use the KartHost Kloud Mail Service

How to Use the KartHost Kloud Mail Service USING LIVE QUARANTINE SETTING UP YOUR ACCOUNT YOU WILL ONLY BE USING THIS SERVICE IF YOU ARE STILL USING Shared Web Hosting Email. If you are Using KartHost Kloud Mail you will have no need for this service.

More information

How to Setup Privacy Guard Encryption.

How to Setup Privacy Guard Encryption. How to Setup Privacy Guard Encryption. Contents Setting up for the first time.... 1 Installing the Software (free)... 1 Generating your own key... 2 Share your key with your friends so they can send you

More information

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper

CIPHERMAIL EMAIL ENCRYPTION. CipherMail white paper CIPHERMAIL EMAIL ENCRYPTION CipherMail white paper Copyright 2009-2014, ciphermail.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in

More information

End-to-End Email Encryption for Everybody?

End-to-End Email Encryption for Everybody? White paper End-to-End Email Encryption for Everybody? Why private individuals and corporations need different solutions White paper End-to-End Email Encryption for Everybody? Why private individuals and

More information

EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8

EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 EJGH Email Encryption User Tip Sheet 10-11-2013 1 of 8 External Users Decrypting Secure Messages The following sections describe how users external to EJGH receive and decrypt secure messages. Reading

More information

Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group

Secure Email User Guide. Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Guidance for Recipients of Secure Email Messages from Lloyds Banking Group Version: 1.3 Last updated: 14/04/2016 1 Introduction This user guide is intended for third party email users users who receive,

More information

The Economics of Attack and Defense : Spam Ecosystem"

The Economics of Attack and Defense : Spam Ecosystem The Economics of Attack and Defense : Spam Ecosystem" Jeffrey Avery Dependable Computing Systems Lab (DCSL) Purdue University Slide 1/22 Papers Presenting" Click Trajectories: End-To-End Analysis of the

More information

GPG - GNU Privacy Guard

GPG - GNU Privacy Guard GPG - GNU Privacy Guard How to use Károly Erdei October 15, 2014 Károly Erdei GPG - GNU Privacy Guard 1/60 1 Why 2 Cryptography 3 PGP 4 KGPG-Assistant 5 -Key-Manager 6 -Editor 7 GPG4Win 8 Enigmail Károly

More information

Welcome to HomeTown Bank s Secure E-mail! User Guide

Welcome to HomeTown Bank s Secure E-mail! User Guide Welcome to HomeTown Bank s Secure E-mail! User Guide To access the secure email message center, click the Secure Email link on the www.htbmn.com main web page. Select whether you are a new user of the

More information

Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc.

Domains Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Help Documentation This document was auto-created from web content and is subject to change at any time. Copyright (c) 2016 SmarterTools Inc. Domains All Domains System administrators can use this section

More information

How To Encrypt An Email From A Cell Phone To A Pc Or Ipad (For A Partner) With A Cisco Email Encryption Solution (For Partners)

How To Encrypt An Email From A Cell Phone To A Pc Or Ipad (For A Partner) With A Cisco Email Encryption Solution (For Partners) New PHI & PII E-mail Encryption Solution (Partner Notification) In a continuing effort to utilize the advantages of email security while at the same time protecting clients private information, the Department

More information

Version 4 Revised 5/2015

Version 4 Revised 5/2015 Email Encryption Manual Version 4 Revised 5/2015 This document provides information on sending, receiving, and saving encrypted emails using the WRC Group Message Center. Contents What is Email Encryption...

More information

Self Service vs. Managed Services

Self Service vs. Managed Services Internet Mail Manager: Self Service vs. Managed Services A Guide to Help You Decide www.303media.com CRMail Surveys ecommerce Customer Profiling Event Registration Newsletters & Promotions Table of Contents

More information

Anchor s Email Marketing Glossary and Common Terms

Anchor s Email Marketing Glossary and Common Terms Anchor s Email Marketing Glossary and Common Terms A/B Split Test: A method used for testing the response of sending two different email campaigns to two equal segments of an email list. Marketers can

More information

Barracuda Spam Firewall Users Guide. How to Download, Review and Manage Spam

Barracuda Spam Firewall Users Guide. How to Download, Review and Manage Spam Barracuda Spam Firewall Users Guide How to Download, Review and Manage Spam By: Terence Peak July, 2007 1 Contents Reviewing Barracuda Messages... 3 Managing the Barracuda Quarantine Interface... 4 Preferences...4

More information

Tutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014)

Tutorial: Encrypted Email with Thunderbird and Enigmail. Author: Shashank Areguli. Published: Ed (August 9, 2014) Tutorial: Encrypted Email with Thunderbird and Enigmail Author: Shashank Areguli Published: Ed (August 9, 2014) There are three issues of security that needs to dealt with on the internet, concerning information.

More information

Overview of edx Analytics

Overview of edx Analytics Overview of edx Analytics I. Data Available from edx EdX provides researchers with data about your institution's classes running on edx.org and edge.edx.org. This includes: Course data Student information

More information

Articles Fighting SPAM in Lotus Domino

Articles Fighting SPAM in Lotus Domino Page 1 of 5 Articles Fighting SPAM in Lotus Domino For many e-mail administrators these days, the number one complaint from the users and managers is unsolicited emails flooding the system, commonly called

More information

Smart E-Marketer s Guide

Smart E-Marketer s Guide 30 insider tips to maximise your email deliverability rate 30 insider tips Step 1. Ensure the domain you use for sending emails is configured to enable authentication (SPF / Sender ID/ DomainKeys). Step

More information

E-mail Encryption. How do I send my e-mail encryption key?

E-mail Encryption. How do I send my e-mail encryption key? E-mail Encryption SecurenCrypt e-mail encryption was designed to work as a plug-in with Microsoft Outlook. The following instructions are geared toward users encrypting e-mail with Outlook. However, throughout

More information

Page 1 of 5. How to unblock automatic picture downloads in e-mail messages you receive

Page 1 of 5. How to unblock automatic picture downloads in e-mail messages you receive Page 1 of 5 How to unblock automatic picture downloads in e-mail messages you receive Page 2 of 5 Block or unblock automatic picture downloads in e-mail messages To help protect you from junk e-mail senders,

More information

Email Basics Workshop

Email Basics Workshop Email Basics Workshop Electronic mail, or email, is the most frequently used service on the Internet. Being able to use email effectively and efficiently is a core skill required in today s world. WLAC

More information

EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you.

EnterGroup offers multiple spam fighting technologies so that you can pick and choose one or more that are right for you. CONFIGURING THE ANTI-SPAM In this tutorial you will learn how to configure your anti-spam settings using the different options we provide like Challenge/Response, Whitelist and Blacklist. EnterGroup Anti-Spam

More information

Guidelines for Bulk Email Distribution

Guidelines for Bulk Email Distribution Guidelines for Bulk Email Distribution Document Information Identifier Status Published Published 10/01/2007 Last Reviewed 10/01/2007 Last Updated 10/01/2007 Version 1.0 Revision History Version Published

More information

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com

Frequently Asked Questions. Frequently Asked Questions. 2013 SSLPost Page 1 of 31 support@sslpost.com Frequently Asked Questions 2013 SSLPost Page 1 of 31 support@sslpost.com Table of Contents 1 What is SSLPost Cloud? 3 2 Why do I need SSLPost Cloud? 4 3 What do I need to use SSLPost Cloud? 5 4 Which Internet

More information

Open-Xchange Guard Major Release v2.0.0. Feature Overview V1.4

Open-Xchange Guard Major Release v2.0.0. Feature Overview V1.4 Open-Xchange Guard Major Release v2.0.0 Feature Overview V1.4 2015 Copyright Open-Xchange Inc. This document is the intellectual property of Open-Xchange Inc. The document may be copied in whole or in

More information

SPAM ARREST WORKS! Quick Start Enterprise Administrators. Take Control of Your Inbox. Protecting mailboxes since 2001

SPAM ARREST WORKS! Quick Start Enterprise Administrators. Take Control of Your Inbox. Protecting mailboxes since 2001 Page 1 of 6 Quick Start Enterprise Administrators Welcome to the Quick Start Guide (QSG) for Enterprise Account Customers. The aim and purpose of this guide is to provide a quick overview of what you need

More information

savvisdirect White Papers Migrating Email Accounts to Hosted Microsoft Exchange

savvisdirect White Papers Migrating Email Accounts to Hosted Microsoft Exchange savvisdirect White Papers Migrating Email Accounts to Hosted Microsoft Exchange Services not available everywhere. CenturyLink may change or cancel services or substitute similar services at its sole discretion

More information

Zipit Chat. Functional Specification / User Manual

Zipit Chat. Functional Specification / User Manual Zipit Chat Functional Specification / User Manual 1 Table of Contents 1. Zipit Chat Overview... 4 How to download... 4 Supported version... 4 2. Functionalities... 4 Get Started... 4 Login... 7 Payment

More information

Instructions for Secure Email Cisco Registered Envelope Service (CRES)

Instructions for Secure Email Cisco Registered Envelope Service (CRES) Instructions for Secure Email Cisco Registered Envelope Service (CRES) Please read the official Cisco Guidance on the Cisco Registered Envelope Service And Frequently Asked Questions A courtesy attempt

More information

The Guide to: Email Marketing Analytics"

The Guide to: Email Marketing Analytics The Guide to: Email Marketing Analytics" This guide has been lovingly created by Sign-Up.to we provide email marketing, mobile marketing and social media tools and services to organisations of all shapes

More information

An Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst

An Introduction to Secure Email. Presented by: Addam Schroll IT Security & Privacy Analyst An Introduction to Secure Email Presented by: Addam Schroll IT Security & Privacy Analyst Topics Secure Email Basics Types of Secure Email Walkthroughs 2 Secure Email Services Confidentiality Message Integrity

More information

U.S. Bank Secure Mail

U.S. Bank Secure Mail U.S. Bank Secure Mail @ Table of Contents Getting Started 3 Logging into Secure Mail 5 Opening Your Messages 7 Replying to a Message 8 Composing a New Message 8 1750-All Introduction: The use of email

More information

Mailwall Remote Features Tour Datasheet

Mailwall Remote Features Tour Datasheet Management Portal & Dashboard Mailwall Remote Features Tour Datasheet Feature Benefit Learn More Screenshot Cloud based portal Securely manage your web filtering policy wherever you are without need for

More information

Introduction to Email. Jan 24 th 2010

Introduction to Email. Jan 24 th 2010 Introduction to Email Jan 24 th 2010 Email Need special software (called email-reader or emailclient) to connect to the email-server and download the emails Email-server has limited space for each user

More information

Ciphermail for BlackBerry Reference Guide

Ciphermail for BlackBerry Reference Guide CIPHERMAIL EMAIL ENCRYPTION Ciphermail for BlackBerry Reference Guide June 19, 2014, Rev: 8975 Copyright 2010-2014, ciphermail.com. CONTENTS CONTENTS Contents 1 Introduction 3 2 BlackBerry add-on 3 2.1

More information

Secure Email Client User Guide Receiving Secure Email from Mercantile Bank

Secure Email Client User Guide Receiving Secure Email from Mercantile Bank Receiving Secure Email from Contents This document provides a brief, end-user overview of the Secure Email system which has been implemented by. Why Secure Email? When someone sends you an email, the email

More information

How to manage and prevent Spam

How to manage and prevent Spam N E W S L E T T E R IT Computer Technical Support Newsletter How to manage and prevent Spam June 23, 2014 Vol.1, No.6 TABLE OF CONTENTS How to manage and prevent Spam....1 Identifying spam....5 Blocking

More information

How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application

How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application How to Send an Encrypted Email via KDADS' Outlook Client or Outlook Web Application In order to ensure Personal Health Information (PHI) and Personally Identifiable Information (PII) is protected, KDADS

More information

Track-able Bulk Management System

Track-able Bulk Management System Track-able Bulk Management System Table of Contents TABLE OF CONTENTS... 2 1. INTRODUCTION... 3 2. WHAT IS TRACK-ABLE BULK MANAGEMENT SYSTEM?... 3 3. TRACK-ABLE BULK MANAGEMENT SYSTEM... 4 4. CONCLUSION...13

More information

Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011

Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 Options for encrypted e-mail communication with AUDI AG Version of: 31 May 2011 1 Options for encrypted e-mail communication with AUDI AG Confidential information may only be transmitted in encrypted form

More information

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures

GETTING STARTED SECURE FILE TRANSFER PROCEDURES A. Secure File Transfer Protocol (SFTP) Procedures A. Secure File Transfer Protocol (SFTP) Procedures Overview IEHP utilizes our Secure File Transfer Protocol (SFTP) server to conduct all electronic data file transactions. Some of the benefits to using

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

Policy Based Encryption E. Administrator Guide

Policy Based Encryption E. Administrator Guide Policy Based Encryption E Administrator Guide Policy Based Encryption E Administrator Guide Documentation version: 1.2 Legal Notice Legal Notice Copyright 2012 Symantec Corporation. All rights reserved.

More information

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8

BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 BlackBerry Internet Service Using the Browser on Your BlackBerry Smartphone Version: 2.8 User Guide SWDT653811-793266-0827104650-001 Contents Getting started... 3 About messaging service plans for BlackBerry

More information

User guide Business Internet e-mail features

User guide Business Internet e-mail features User guide Business Internet e-mail features Page 1 de 1 Table of content Page Introduction 3 1. How do I access my web based e-mail? 3 2. How do I access/alter these enhancements? 3 A. Basic Features

More information

1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...

1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered... 1. Introduction...3 2. Email Deliverability-Benchmarks...4 2.1. Working with Your Service Provider...4 2.2. Email sent...4 2.3. Email delivered...4 2.4. Bounces....4 2.5. Email unsubscribe requests....5

More information

Secure Email Client Guide

Secure Email Client Guide PRESIDIO BANK 33 Secure Email Client Guide THE BUSINESS BANK THAT WORKS 8/2013 Table of Contents Introduction.....3 Our Responsibility to Protect Confidential Information....4 Registering and Accessing

More information

Using Barracuda Spam Firewall

Using Barracuda Spam Firewall Using Barracuda Spam Firewall Creating your Barracuda account Your Barracuda account has been created for you if you are a current Hartwick College student, staff or faculty member. Setting Your Password.

More information

SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011

SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011 SECURE E-MAIL COMMUNICATIONS PLAN Updated August 25, 2011 Introduction In October, 2008, the Division of Welfare and Supportive Services (DWSS) announced the introduction of secure e-mail through ASM 17-08.

More information

Class Outline. Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account

Class Outline. Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account EMAIL Basics Class Outline Part 1 - Introduction Explaining email Parts of an email address Types of email services Acquiring an email account Part 3 Managing Your Messages Deleting messages The Trash

More information

Email Marketing Glossary of Terms

Email Marketing Glossary of Terms Email Marketing Glossary of Terms A/B Testing: A method of testing in which a small, random sample of an email list is split in two. One email is sent to the list A and another modified email is sent to

More information

Email Win-Back Programs: Everyone Recommends Them, But Do They Work?

Email Win-Back Programs: Everyone Recommends Them, But Do They Work? Email Win-Back Programs: 1 Everyone Recommends Them, But Do They Work? Email Win-Back Programs: Everyone Recommends Them, But Do They Work? We ve missed you! Yes, But Not the Way You Think Talk to a permission-based

More information

6-Part Lunch Learning Series

6-Part Lunch Learning Series Deliverability Basics Thursday, March 21, 2013 12:00pm 12:30pm EDT #asaewebinar Presented by: Jenny Lassi Professional Services, HighRoadSolution This complimentary webinar is brought to you by HighRoad

More information

DJIGZO EMAIL ENCRYPTION. Djigzo white paper

DJIGZO EMAIL ENCRYPTION. Djigzo white paper DJIGZO EMAIL ENCRYPTION Djigzo white paper Copyright 2009-2011, djigzo.com. Introduction Most email is sent as plain text. This means that anyone who can intercept email messages, either in transit or

More information

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security

ITSC Training Courses Student IT Competence Programme SIIS1 Information Security ITSC Training Courses Student IT Competence Programme SI1 2012 2013 Prof. Chan Yuen Yan, Rosanna Department of Engineering The Chinese University of Hong Kong SI1-1 Course Outline What you should know

More information

INTERNET MARKETING. http://www.tinyurl.com/oomegk

INTERNET MARKETING. http://www.tinyurl.com/oomegk INTERNET MARKETING http://www.tinyurl.com/oomegk INTERNET MARKETING FOR BEGINNERS Internet marketing for beginners is somewhat of an oxymoron. This is because while in theory the concepts behind Internet

More information

Emails and anti-spam Page 1

Emails and anti-spam Page 1 Emails and anti-spam Page 1 As the spammers become increasing aggressive more and more legit emails get banned as spam. When you send emails from your webcrm system, we use the webcrm servers to send emails

More information

Word Secure Messaging User Guide. Version 3.0

Word Secure Messaging User Guide. Version 3.0 Word Secure Messaging User Guide Version 3.0 Copyright 2007-2013 WordSecure, LLC. All Rights Reserved. Page 1 of 7 1. Introduction Word Secure Messaging is a program that allows you to exchange encrypted

More information

Contacting respondents for survey research

Contacting respondents for survey research Contacting respondents for survey research Is email a useful method? Joanna d Ardenne and Margaret Blake November 2012 Background The question Is email a useful way of contacting potential respondents

More information

ONE Mail Direct for Desktop Software

ONE Mail Direct for Desktop Software ONE Mail Direct for Desktop Software Version: 1 Document ID: 3931 Document Owner: ONE Mail Product Team Copyright Notice Copyright 2015, ehealth Ontario All rights reserved No part of this document may

More information

Using the Barracuda Spam Firewall to Filter Your Emails

Using the Barracuda Spam Firewall to Filter Your Emails Using the Barracuda Spam Firewall to Filter Your Emails This chapter describes how end users interact with the Barracuda Spam Firewall to check their quarantined messages, classify messages as spam and

More information

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1

PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 PANDA CLOUD EMAIL PROTECTION 4.0.1 1 User Manual 1 Contents 1. INTRODUCTION TO PANDA CLOUD EMAIL PROTECTION... 4 1.1. WHAT IS PANDA CLOUD EMAIL PROTECTION?... 4 1.1.1. Why is Panda Cloud Email Protection

More information

SPEAR PHISHING TESTING METHODOLOGY

SPEAR PHISHING TESTING METHODOLOGY SPEAR PHISHING TESTING METHODOLOGY From An article on our Spear Phishing Testing which can be used in social engineering exercise to determine organization wide susceptibility to an APT style attack. Document

More information

Page 1 Rev Date: February 2010. User Manual for Encrypted Email Services

Page 1 Rev Date: February 2010. User Manual for Encrypted Email Services Page 1 User Manual for Encrypted Email Services Instructions for Using Encrypted Email Services This document is being provided to assist you in opening encrypted emails sent from Century Bank. The following

More information

It is clear the postal mail is still very relevant in today's marketing environment.

It is clear the postal mail is still very relevant in today's marketing environment. Email and Mobile Digital channels have many strengths, but they also have weaknesses. For example, many companies routinely send out emails as a part of their marketing campaigns. But people receive hundreds

More information

Anti Spamming Techniques

Anti Spamming Techniques Anti Spamming Techniques Written by Sumit Siddharth In this article will we first look at some of the existing methods to identify an email as a spam? We look at the pros and cons of the existing methods

More information

Steps to Opening Your First Password-Protected Envelope

Steps to Opening Your First Password-Protected Envelope This section provides step-by-step instructions for opening a password-protected Registered Envelope for the first time. The steps demonstrate a typical scenario for a first-time recipient. Some of the

More information

Published : 2013-12-02 License : None

Published : 2013-12-02 License : None K9 1 2 Published : 2013-12-02 License : None INTRODUCTION K-9 Mail is an email application (app) for Android phones or tablets. K-9 supports multiple mailboxes, each independently configurable. T his ability

More information

Secure Email User Guide

Secure Email User Guide Secure Email User Guide Transport Layer Security (TLS) Pretty Good Privacy (PGP) PDF Messenger 1 Contents 1 Introduction... 3 2 Transport Layer Security (TLS).4 3 Pretty Good Privacy (PGP).5 4 PDF Messenger...

More information

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown

GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM Device Application User Guide Installation and Configuration for Android with TouchDown GO!Enterprise MDM for Android, Version 3.x GO!Enterprise MDM for Android with TouchDown 1 Table

More information

Core Essentials. Outlook 2010. Module 1. Diocese of St. Petersburg Office of Training Training@dosp.org

Core Essentials. Outlook 2010. Module 1. Diocese of St. Petersburg Office of Training Training@dosp.org Core Essentials Outlook 2010 Module 1 Diocese of St. Petersburg Office of Training Training@dosp.org TABLE OF CONTENTS Topic One: Getting Started... 1 Workshop Objectives... 2 Topic Two: Opening and Closing

More information

Hairy Goat D E S I G N

Hairy Goat D E S I G N Hairy Goat D E S I G N Email marketing made easy Hairy Goat D E S I G N Top 5 reasons to use us as part of your marketing strategy 7 Different types of email marketing we offer 9 Email marketing and the

More information

How to make Secure Email Easier to use Simson L. Garfinkel (MIT/Harvard) Jeffrey I. Schiller (MIT) Erik Nordlander (MIT) David Margrave (Amazon) Robert C. Miller (MIT) Financial Services Technology Consortium

More information

How to Create and Send Newsletter Using G-Lock EasyMail

How to Create and Send Newsletter Using G-Lock EasyMail How to Create and Send Newsletter Using G-Lock EasyMail Beginner s Guide 1 Page Table of Contents 1. Create E-Mail Account 3 2. Create Contact Group. 5 3. Import Contacts from External Database. 6 4. Compose

More information

Instructions on TLS/SSL Certificates on Yealink Phones

Instructions on TLS/SSL Certificates on Yealink Phones Instructions on TLS/SSL Certificates on Yealink Phones 1. Summary... 1 2. Encryption, decryption and the keys... 1 3. SSL connection flow... 1 4. The instructions to a certificate... 2 4.1 Phone acts as

More information

EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT

EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT PLATFORM PEOPLE STRATEGY EMAIL MARKETING MODULE OVERVIEW ENGINEERED FOR ENGAGEMENT Contents p1 E-Newsletter Overview p2 E-Newsletter Sample p3 Forward Article p4 p5 p6 p7 Print Article Read More Subscription

More information

Secure Email Recipient Guide

Secure Email Recipient Guide Secure Email Recipient Guide Contents How to open your first Encrypted Message.... 3 Step-by-Step Guide to Opening Your First Envelope... 3 Step One:... 3 Step Two:... 4 Step Three:... 4 Step Four:...

More information

CONS No plug-ins to ease use with email client programs.

CONS No plug-ins to ease use with email client programs. StartMail EDITOR RATING: EXCELLENT Review Date March 19, 2015 BY NEIL J. RUBENKING It doesn't cost you a thing to search the Internet or to send an email to your friends, right? Well, maybe there is a

More information

An analysis of the effectiveness of personalized spam using online social network public information

An analysis of the effectiveness of personalized spam using online social network public information An analysis of the effectiveness of personalized spam using online social network public information Enaitz Ezpeleta 1, Urko Zurutuza 1, and José María Gómez Hidalgo 2 1 Electronics and Computing Department,

More information

FDIC Secure Email Procedures for External Users April 23, 2010

FDIC Secure Email Procedures for External Users April 23, 2010 FDIC Secure Email Procedures for External Users April 23, 2010 This document contains information proprietary to the Federal Deposit Insurance Corporation. Table of Contents 1. Introduction...2 2. Receiving

More information