Shotgun email

Last updated

Shotgun email refers to an email requesting information or action that only requires the efforts of one person but is sent to multiple people in an effort to guarantee that at least one person will respond. The shotgun email often results in multiple people responding to something already accomplished, and therefore results in a loss of overall productivity. Shotgun emailing is considered poor internet etiquette. [1]

An example would be a person of authority in a business organization sending out an email to five technicians in the information technology department of his company to let them know his printer is broken. One technician responds with an on-site call and fixes the problem. Later in the day, other technicians follow-up to fix the printer that is already back in order. Shotgun emails can also be request for information or other tasks.

The blind shotgun email occurs when the sender uses the blind co-copy feature of an email program to hide the fact that a shotgun email is in use. This is considered particularly deceitful.[ citation needed ]

Related Research Articles

<span class="mw-page-title-main">Email</span> Mail sent using electronic means

Email is a method of transmitting and receiving messages using electronic devices. It was conceived in the late–20th century as the digital version of, or counterpart to, mail. Email is a ubiquitous and very widely used communication medium; in current use, an email address is often treated as a basic and necessary part of many processes in business, commerce, government, education, entertainment, and other spheres of daily life in most countries.

<span class="mw-page-title-main">HCL Notes</span> Collaborative software platform

HCL Notes is a proprietary collaborative software platform for Unix (AIX), IBM i, Windows, Linux, and macOS, sold by HCLTech. The client application is called Notes while the server component is branded HCL Domino.

In computer networking, the Name/Finger protocol and the Finger user information protocol are simple network protocols for the exchange of human-oriented status and user information.

<span class="mw-page-title-main">Internet forum</span> Online discussion site

An Internet forum, or message board, is an online discussion site where people can hold conversations in the form of posted messages. They differ from chat rooms in that messages are often longer than one line of text, and are at least temporarily archived. Also, depending on the access level of a user or the forum set-up, a posted message might need to be approved by a moderator before it becomes publicly visible.

Telephone number mapping is a system of unifying the international telephone number system of the public switched telephone network with the Internet addressing and identification name spaces. Internationally, telephone numbers are systematically organized by the E.164 standard, while the Internet uses the Domain Name System (DNS) for linking domain names to IP addresses and other resource information. Telephone number mapping systems provide facilities to determine applicable Internet communications servers responsible for servicing a given telephone number using DNS queries.

<span class="mw-page-title-main">CAN-SPAM Act of 2003</span> American law to regulate bulk e-mail

The Controlling the Assault of Non-Solicited Pornography And Marketing (CAN-SPAM) Act of 2003 is a law passed in 2003 establishing the United States' first national standards for the sending of commercial e-mail. The law requires the Federal Trade Commission (FTC) to enforce its provisions. Introduced by Republican Conrad Burns, the act passed both the House and Senate during the 108th United States Congress and was signed into law by President George W. Bush in December 2003 and was enacted on January 1, 2004.

Diffusion of responsibility is a sociopsychological phenomenon whereby a person is less likely to take responsibility for action or inaction when other bystanders or witnesses are present. Considered a form of attribution, the individual assumes that others either are responsible for taking action or have already done so.

Email fraud is intentional deception for either personal gain or to damage another individual using email as the vehicle. Almost as soon as email became widely used, it began to be used as a means to defraud people, just as telephony and paper mail were used by previous generations.

<span class="mw-page-title-main">Wedding invitation</span> Letter to attend a wedding

A wedding invitation is a letter asking the recipient to attend a wedding. It is typically written in the formal, third-person language and mailed five to eight weeks before the wedding date.

<span class="mw-page-title-main">Scientific control</span> Methods employed to reduce error in science tests

A scientific control is an experiment or observation designed to minimize the effects of variables other than the independent variable. This increases the reliability of the results, often through a comparison between control measurements and the other measurements. Scientific controls are a part of the scientific method.

An issue tracking system is a computer software package that manages and maintains lists of issues. Issue tracking systems are generally used in collaborative settings, especially in large or distributed collaborations, but can also be employed by individuals as part of a time management or personal productivity regimen. These systems often encompass resource allocation, time accounting, priority management, and oversight workflow in addition to implementing a centralized issue registry.

Public records are documents or pieces of information that are not considered confidential and generally pertain to the conduct of government.

The artificial sweetener aspartame has been the subject of several controversies since its initial approval by the U.S. Food and Drug Administration (FDA) in 1974. The FDA approval of aspartame was highly contested, beginning with suspicions of its involvement in brain cancer, alleging that the quality of the initial research supporting its safety was inadequate and flawed, and that conflicts of interest marred the 1981 approval of aspartame, previously evaluated by two FDA panels that concluded to keep the approval on hold before further investigation. In 1987, the U.S. Government Accountability Office concluded that the food additive approval process had been followed properly for aspartame. The irregularities fueled a conspiracy theory, which the "Nancy Markle" email hoax circulated, along with claims—counter to the weight of medical evidence—that numerous health conditions are caused by the consumption of aspartame in normal doses.

An email storm is a sudden spike of "reply all" messages on an email distribution list, usually caused by a controversial or misdirected message. Such storms can start when even one member of the distribution list replies to the entire list at the same time in response to an instigating message. When other members respond, pleading for the cessation of messages, asking to be removed from the list, or adding vitriol to the discussion this triggers a chain reaction of email messages. The sheer load of traffic generated by these storms can render the email servers inoperative, similar to a distributed denial-of-service attack.

The Climatic Research Unit email controversy began in November 2009 with the hacking of a server at the Climatic Research Unit (CRU) at the University of East Anglia (UEA) by an external attacker, copying thousands of emails and computer files to various internet locations several weeks before the Copenhagen Summit on climate change.

A recent extension to the cultural relationship with death is the increasing number of people who die having created a large amount of digital content, such as social media profiles, that will remain after death. This may result in concern and confusion, because of automated features of dormant accounts, uncertainty of the deceased's preferences that profiles be deleted or left as a memorial, and whether information that may violate the deceased's privacy should be made accessible to family.

<span class="mw-page-title-main">Etiquette in technology</span> Code of behavior for use of the Internet

Etiquette in technology, colloquially referred to as netiquette, is a term used to refer to the unofficial code of policies that encourage good behavior on the Internet which is used to regulate respect and polite behavior on social media platforms, online chatting sites, web forums, and other online engagement websites. The rules of etiquette that apply when communicating over the Internet are different from these applied when communicating in person or by audio or video call. It is a social code that is used in all places where one can interact with other human beings via the Internet, including text messaging, email, online games, Internet forums, chat rooms, and many more. Although social etiquette in real life is ingrained into our social life, netiquette is a fairly recent concept.

Cross-site request forgery, also known as one-click attack or session riding and abbreviated as CSRF or XSRF, is a type of malicious exploit of a website or web application where unauthorized commands are submitted from a user that the web application trusts. There are many ways in which a malicious website can transmit such commands; specially-crafted image tags, hidden forms, and JavaScript fetch or XMLHttpRequests, for example, can all work without the user's interaction or even knowledge. Unlike cross-site scripting (XSS), which exploits the trust a user has for a particular site, CSRF exploits the trust that a site has in a user's browser. In a CSRF attack, an innocent end user is tricked by an attacker into submitting a web request that they did not intend. This may cause actions to be performed on the website that can include inadvertent client or server data leakage, change of session state, or manipulation of an end user's account.

An emergency communication system (ECS) is any system that is organized for the primary purpose of supporting one-way and two-way communication of emergency information between both individuals and groups of individuals. These systems are commonly designed to convey information over multiple types of devices, from signal lights to text messaging to live, streaming video, forming a unified communication system intended to optimize communications during emergencies. Contrary to emergency notification systems, which generally deliver emergency information in one direction, emergency communication systems are typically capable of both initiating and receiving information between multiple parties. These systems are often made up of both input devices, sensors, and output/communication devices. Therefore, the origination of information can occur from a variety of sources and locations, from which the system will disseminate that information to one or more target audiences.

The New Jersey Open Public Records Act, N.J.S.A. 47:1A-1 et seq., commonly abbreviated OPRA, is a statute that provides a right to the public to access certain public records in the State of New Jersey, as well as the process by which that right may be exercised. In general, OPRA provides that "government records shall be readily accessible for inspection, copying, or examination by the citizens of this State, with certain exceptions, for the protection of the public interest." OPRA may be viewed as New Jersey's equivalent to the United States federal Freedom of Information Act.

References

  1. "Public Opinion Polling Basics". Pew Research Center. Retrieved 2023-04-18.

See also