Chapter 11 Email
Chapter 11 Email
1-1-2023
Chapter 11 Email
Shambhavi Roy
Clinton Daniel
University of South Florida, [email protected]
Manish Agrawal
University of South Florida, [email protected]
This Book Chapter is brought to you for free and open access by the The Modernization of Digital Information
Technology at Digital Commons @ University of South Florida. It has been accepted for inclusion in
FUNDAMENTALS OF INFORMATION TECHNOLOGY: Textbook – English by an authorized administrator of Digital
Commons @ University of South Florida. For more information, please contact [email protected].
Email
CHAPTER CONTENTS
Overview 216
Email Origins 216
Email Impacts 217
Email Technologies 217
Mail Clients 218
Desktop Mail Clients 219
Mobile Mail Clients 219
Receiving, Creating, and Forwarding Mails 220
Organizing Email into Folders 225
Mail Labels 225
Mailing Lists 226
Mail Filters and Rules 226
Managing Signatures 228
Email Sensitivity, Security, and Delivery Options 230
Email Contacts 232
Automated Messages 232
Using Calendars to Schedule Meetings and Tasks 234
Email Security 238
Phishing Attacks 239
Spear Phishing 239
Emails Don’t Go Away 240
Chapter Terms and Definitions 241
Chapter Case: I’m Admitted to USF! 2431
Overview
Email is the method of sending, receiving, and organizing messages using a computer. Barely a few
decades ago, the only way to send messages and documents was to mail them physically at the post
office (or use courier services like FedEx and UPS). Email transformed the way we communicate. It
allows us to send and receive messages and documents instantaneously, regardless of the physical
location of the sender or the receiver. Along with services like instant messaging and video calling,
email spurred global e-commerce by breaking geographical barriers and allowing friends and family
to stay in touch on a day-to-day basis for little to no cost. To mail a letter through the postal service,
you needed to write the letter or take a printout of the letter, put it in an envelope, attach stamps, and
write the mailing address on the envelope. If you have access to a smart phone or computer, email is
much easier. You only need to know the email address of the person you want to email, then type the
message, and include any documents you want to attach to the message. Clicking the “Send” button
will instantly transfer the email from your inbox to the receiver’s inbox, while you continue to work
on your computer.
Email is critical for students and adults in the modern world. As a high schooler, you probably receive
important notifications from your school and are required to submit assignments through email.
These days, most job applications are sent and received through email because email not only helps
deliver information and documents but also serves as a permanent record of your interactions. When
you shop online for clothes or use food delivery services, you may get an email or a text message that
you can refer to for details or in case of a disagreement with the other party. A critical feature of email
compared to instant messaging is that emails are stored in virtual mailboxes, and have the advantage
of never getting lost, unless deleted deliberately. In most cases, depending on your email provider,139
you will be able to restore even deleted messages from the Trash folder for a period of time.
Email Origins
Message passing was one of the first uses of computers. The earliest electronic communication systems
were like leaving a note on a user’s desk. Users could leave a message in a specific folder on another
user’s computer, who could then open the message at their convenience.140 When the Internet became
available, users wanted to send messages to anyone connected to a computer. This introduced the
need for consistent ways of doing several things such as identifying computers, identifying users on
computers, and packaging messages. In 1972, Ray Tomlinson used the “@” symbol already available
on computer keyboards to create the simple “user@computer” convention for identifying users and
139 Even after you delete email, service providers go through a detailed process to ensure the email
is deleted from all their servers. Google’s policies are described at, “How Google Retains Data We
Collect,” https://policies.google.com/technologies/retention (accessed June 2023).
140 Ian Peter, “The History of Email,” Net History, http://www.nethistory.info/History%20of%20
the%20Internet/email.html (accessed June 2023).
Email Impacts
The popularity of email is based on its unique ability to meet the human need to communicate.145
Email has even had significant impact on the business world. The dot-com boom of 2000, one of the
greatest financial manias of all time, can be associated with email. In one of the best-known books on
market manias,146 author Charles Kindleberger has attributed the dot-com bubble to email and related
technologies. The book states that “events that lead to a [financial] crisis start with a ‘displacement,’
some exogenous, outside shock to the macroeconomic system.” In other words, a financial mania
begins with some unanticipated event that has great economic impact. Further, to describe the dot-
com mania, the book states that “the shock in the United States in the 1990’s was the revolution in
information technology and new and lower-cost forms of communication and control that involved
the computer, wireless communication and email.” The popular adoption of email led to an entire
financial bubble!
Email Technologies
Email uses a combination of technologies to work. End users use software called mail clients to read
and write email and manage their mailboxes. Service providers use software called mail servers to
store and deliver emails on behalf of end users. We discuss email clients and their use in this chapter.
141 Google paid homage to this creative use of the “@” symbol on Oct 29, 2021 in “As Email Turns
50, the @ Symbol Continues to Fuel Collaboration,” https://workspace.google.com/blog/
productivity-collaboration/celebrating-50-years-of-email (accessed June 2023).
142 Internet Hall of Fame on Ray Tomlinson, https://www.internethalloffame.org/inductee/
raymond-tomlinson/. The four-minute video on the page is worth watching, https://youtu.be/
kJp0NHkBIAY (both accessed June 2023).
143 Abhay Bhushan, Ken Pogran, Ray Tomlinson and Jim White, RFC 561, “Standardizing Network
Mail Headers,” https://www.rfc-editor.org/rfc/rfc561 (accessed June 2023).
144 “MIT 150,” Wikipedia, https://en.wikipedia.org/wiki/MIT150 (accessed June 2023).
145 As an example, most of the gadgets shown in Star Trek focused on communication, Sarah
Kessler, “8 Star Trek Gadgets That Are No Longer Fiction,” https://mashable.com/archive/star-
trek-gadgets (accessed June 2023).
146 C.P. Kindleberger and R. Aliber, Manias, Panics, and Crashes: A History of Financial Crises, 5th ed.
(Wiley, 2005).
When you compose an email and hit “Send,” your mail client sends the message to your mail server,
which then forwards it to the recipient’s mail server. When the recipient logs into their mail client,
147 This example to explain protocols is from L. Pouzin and H. Zimmermann, “A tutorial on protocols,”
Proceedings of the IEEE, 1978. 66(11): pp. 1346–1370
148 To hear about Gmail’s origin story, particularly how Gmail was released by its creator Paul Buchheit
in one day, visit Aarthi and Sriram’s podcast episode page, https://www.aarthiandsriram.com/p/
the-man-who-created-gmail (accessed June 2023).
To send an email to friends or colleagues, you only need their email addresses. In Gmail, clicking
on the large “Compose” button in the top-left corner will open a new email window where you can
enter the email addresses of your friends/colleagues in the list of recipients, write a subject, which is
a summary of your email, and type your message in the body of the email. If you want to send a copy
of your email to others, enter their addresses in Cc (carbon copy) field. The Bcc (blind carbon copy)
field lets you send a copy of your email to people without other recipients being able to see the Bcc
recipients’ email addresses. This is a very useful feature if you want to send an email to a group of
people without revealing their email addresses to each other.
FIGURE 172 — Similar to other email clients, in Outlook you can create new emails by clicking on the new email
button.
FIGURE 173 — In Outlook like other email clients, after clicking on the new email button you can edit your message,
header, addresses, and attach files.
Reading an email is as easy as clicking on the email in your Inbox (Figure 174). If you have any
attachments in the email you have received, you can click on the attached file to view the attachment.
Keep in mind, clicking on attachments from unknown senders can be dangerous, as it may have
malicious content. Though modern mail clients perform various checks to identify malicious
attachments, ultimately you are the victim if your computer gets damaged or your information gets
stolen. We will discuss this further later in this chapter. Once you have an attachment open, you can
download and save it or print it (Figure 175).
FIGURE 175 — Once attachments are downloaded printing and editing can take place.
To make sure you don’t miss attachments sent with an email, both Outlook and Gmail prominently
highlight the name and the document type of the attachments (Figure 176).
FIGURE 176 — Attachments sent or received via email in Gmail are highlighted.
After you finish reading the email, you can reply to the sender of the email by clicking on the “Reply”
button. When you open any email, you have received in Gmail, you will see the option to “Reply,”
“Reply all,” and “Forward” at the bottom of your message (Figure 177). You can also click on the dots
in the top-right corner to open a context-sensitive window that will let you “Reply,” “Reply to all,” and
“Forward.” As the names suggest, clicking on “Reply” (this is also represented with an arrow pointing
to the left) will open a new email that has the email address of the sender in the “To” field and the
original message from the sender quoted in the body of the message. You can also add additional
recipients. Then type your reply and click the “Send” button. Clicking on “Reply” to all opens a new
email with the sender’s email address and the emails addresses of all other recipients of the original
email in the “To” field. You must use “Reply” to all only when your reply is relevant for everybody on
the email to avoid bombarding and annoying people with unnecessary emails.
Sometimes you may need to print an email. Thankfully, printing any message in your Inbox is easily
achieved by clicking on the printer icon or using the print option in the context-sensitive window. In
Outlook, right-clicking on your mouse will open a context-sensitive window that has the print option
(Figure 178). You can also use the “File” tab at the top to print email messages.
FIGURE 178 — Outlook and similar clients allow users to quickly print emails by right clicking messages.
The option to “Forward” message lets you send an email message you have received in your Inbox to
others. Clicking on the “Forward” button (sometimes it is an arrow pointing to the right), will open a
new email with the original message quoted in the body of the mail. You just need to add the list of
recipients, type your message, and click the “Send” button to forward the email.
Mail Labels
Motivated by its search heritage and leveraging its superior search abilities, Google adopted the
principle of “search over structure” to organize email. Google adopted the concept of using labels
to organize email.149 Labels are tags that can be added to any email message.150 In Gmail’s approach,
all messages remain in their default folders—inbox for incoming email, sent for outgoing messages,
spam for undesired mail, etc. Users can search messages by text, date, attachments, etc. To organize
email, users can attach labels to a message by right
clicking the email and selecting one or more labels to
attach to the message.
Though folders probably feel intuitive, arguments in
favor of labels include the ability to attach more than
one label to a message, and ease of locating messages
using search compared to navigating folders to locate
a message.
Gmail already gives you a few folders like Spam and
labels such as Promotions and Social where emails
are directed automatically. You can also easily create
new labels depending upon your needs, such as Sales,
Utilities, or Action Required. These can be added using FIGURE 180 —Within Gmail’s settings labels
the “create new label” menu item (Figure 180). The new can be created to support organization.
149 Google Workspace Learning Center’s page for “Organize and Find Emails,” https://support.
google.com/a/users/answer/9260550 (accessed June 2023).
150 A useful page about labels, “Gmail Labels; Everything You Need to Know,” https://hiverhq.com/
blog/gmail-labels (accessed June 2023).
Mailing Lists
A mailing list is a feature used in email systems that allows messages sent to one email address to be
delivered to another email address or a group of addresses. For example, you can create a list called
“[email protected]” that forwards emails to all students in the school, without having to include
individual email addresses in the message. Your teacher may use a mailing list to inform all students
and parents in the class about an upcoming activity. Your school principal may use a mailing list to
inform all students in the entire school about an issue. Universities routinely use mailing lists for
announcements to students, faculty, and staff. Mailing lists make email an extremely powerful service.
However, the convenience of mailing lists also results in everyone receiving tens of emails—personal,
official, advertisements, and others—every day. This can make your inbox unmanageable and
important emails difficult to find amidst the clutter.
Outlook and other email providers also offer similar procedures to allow you to filter emails. In Outlook,
right click on any email to categorize it into any of the available categories.
Filters are called rules in mail clients such as Outlook. To create a rule in Outlook, just go to the “File”
tab and click on “Manage Rules and Alerts.” A popup window opens allowing you to create new rules
and modify existing ones (Figure 182).
For example, you could automatically divert emails from mailing lists to a folder called “Lists” that you
open once a week to get updated on the information in the lists. This way, emails from your teachers
that require your immediate attention will not get buried under promotional or other emails.
Managing Signatures
An email signature is information that is automatically added at the end of an email. Signatures typically
include contact information or personal touches such as a favorite quote. Creating signatures for your
emails saves you the effort of typing basic details every time you send an email. This is particularly
useful if you send emails to customers and would like to have your name, address, phone number,
email, and company logo in the emails you send.
To create signatures in Outlook, go to the “File” menu and select options. In the Outlook “Options”
window, select “Mail” from the left-hand menu and scroll down to the “Signatures” section. In the
“Signatures” dialogue box, you can click on “New” to create a new signature (Figure 183).
151 For more information about Gmail’s confidential mode, see “Protect Gmail Messages With
Confidential Mode,” https://support.google.com/a/answer/7684332?hl=en (accessed June
2023).
FIGURE 188 — Under the Options tab in Outlook, users can change the importance, sensitivity, and delivery options
of an email.
FIGURE 190 — In Gmail, changing the label of your email contacts allows you to add them to groups.
Automated Messages
A frequent need in work environments is to know when a recipient is busy or out of the office and unable
to respond promptly to emails. This allows email senders to take alternate measures to complete their
tasks. Email services allow you to send automated replies in these situations. Automated messages
are preconfigured responses to all incoming messages. Automated messages tell folks emailing
you that you are unable to reply—for example when you are on vacation or outside of the reach
of the Internet. A best practice for automated messages is to share the contact information of your
colleagues who cover for you while you are unable to respond to messages. This allows senders to
reach out to your colleagues for any assistance to complete their tasks.
Since automated messages are commonly used when users are on vacation, they have come to be
152 This is called a waffle. For some context on the use of food icons on websites, see “How Did Food
Get In My Website and Digital App?” https://bluezoocreative.com/2013/10/navigation-trends-
hamburgers-waffles-and-breadcrumbs/ (accessed June 2023).
FIGURE 195 — Creating a new meeting in the Outlook calendar. Step 1 (top)—create the New Meeting. Step 2
(bottom)—add details about the meeting.
FIGURE 196 — Outlook users can utilize the address book to filter attendees.
If you are scheduling a meeting with your colleagues, you may have partial access to their calendars
to be able to see when they are free. This allows you to schedule a meeting at a time that works for
everyone. Click on the “Scheduling Assistant” tab to see when your attendees are free or busy in a
grid format (Figure 197). Bold colors indicate times when a person is busy and gridlines indicate times
when they may be free. You can change the time of your meeting or the day of your meeting to make
it easy for others to attend. In this example, both the required and optional attendees are free at
2:30 p.m. on Monday (January 30th). Once you pick a time that works for everyone, you can go to the
“Meeting” tab and send the invitation.
Email Security
Before we close the chapter, it is useful to draw your attention to a few security concerns related
to email. Most cybersecurity issues arise from individuals trying to reach your computer to steal
information. Since email is a mechanism for users (including malicious users) to reach you, email has
emerged as an important cybersecurity vulnerability. According to the data breach investigations
report published by Verizon, over 80% of all computer breaches involve the human element.153 We
highlight a few important cybersecurity considerations below.
153 The 2022 Verizon data breach investigations report can be accessed at https://www.verizon.
com/business/resources/reports/dbir/ (accessed June 2023).
Spear Phishing
A spear phishing attack is more sinister and malicious because it is targeted at a particular individual.
The cybercriminals often do their homework on social media; they know who you are—may know
the names of your family members, managers, and friends. They may use your manager’s social media
posts to make the attack even more directed. Let’s say you work in the purchasing department of a
company and receive an email from your boss directing you to buy supplies in a hurry—to create a
temporary invoice, approve it, and send $1000 to an account. The attacker may even customize the
message and say, “I talked to our director, Jane, who is at her daughter’s wedding. She’s good with
it and will sign off when she comes back to work next week.” In this example, the hacker knows that
your manager is traveling, and his boss is at her daughter’s wedding and won’t be back at work for
some time. The criminals might even have hacked your boss’s email account and were just waiting for
the perfect moment (when he is traveling, and his boss is at an important event) to send the email
from his address.
Targeted attacks can be particularly difficult to detect, so it is important to spend some time and
pay attention to small details, like the tone of the request. Have you ever received a request like that
154 This is the case of Evaldas Rimasauskas, who was prosecuted in 2019. You can read about it
at https://www.reuters.com/article/us-cyber-fraud-tech/lithuanian-pleads-guilty-in-u-s-to-
massive-fraud-against-google-facebook-idUSKCN1R12FB (accessed June 2023).
155 A colleague of one of the authors of this book, a professor at a university, became a victim of
a phishing attack and lost $500. He was asked to buy iTunes in a hurry as a birthday gift. These
attacks are all around us.
Attach File: A feature in the email client that Messages (Emails): Electronic forms
allows users to share files through email messages of correspondence that allows users to
communicate and share files through the Internet
Desktop Mail Client: Desktop mail clients
connects to mail servers, downloads email Mobile Mail Client: Mobile mail clients offer
messages, and displays them to the user on portable connection to mail servers and the
desktop computers ability to download and display email messages
by utilizing mobile computing devices
Draft (Email Folder): A folder within the email
client where messages that are created but not Phishing Attack: An attempt to steal information
sent are stored from victims through the use of social engineering
techniques and various communication channels
Email Address: Email addresses are uniquely
assigned or created by users, and are used to Reply: To answer; reply only sends the new
send emails to specific users or parties message to the original sender
Email Contact: Within the email client a list Reply All: To answer; reply all sends the new
of colleagues, friends, or other users that have message to the original sender and all other
previously interacted with your email address are recipients on the To and Cc lines
saved as email contacts
Scheduling Assistant: Email scheduling
Forward: To send an email to someone else or assistants help users identify availability for
to a different address after you have received it; meetings, this allows users to schedule in advance
forward allows you to type in a whole new set of while increasing attendance
recipients
Send: The action of an email client sending a
Internet Message Access Protocol (IMAP): message to the mail server, which then forwards
Provides an ease of access to emails from it to the recipient’s server
any location or device without the need of
downloading it to your hard drive Sent (Email Folder): After you send an email
message, you might want to find that email; your
Inbox: A repository for all received emails within email service stores those messages in the Sent
the email client Items folder
Mail Client: A software program that allows you Signature: Email signatures allow users to
to manage and send electronic messages (emails) customize personalized messages that are
appended to the end of emails, and typically
Mail Server: Servers tasked with handling the contain the users name and contact information
data and traffic of email client users; these servers
handle the backend operation of email clients
Question 1: What information in this email is unusual and what kind of attack is
this? Why is the information unusual?
Question 2: Why do you think there is a link in the email asking Carl to fill out a
Federal Student Aid application?