Fact-checked by Grok 2 weeks ago

Email

Email, or electronic mail, is a store-and-forward messaging service that enables the exchange of digital messages between users across computer networks using standardized protocols for submission, transfer, and delivery. Developed initially in 1971 by while working on the , email introduced the use of the "@" symbol to separate user names from host computers, marking the first transmission of messages between distinct systems. Over the subsequent decades, it evolved into a cornerstone of global communication through key (IETF) standards, including the (SMTP) for message transport (RFC 5321) and the Internet Message Format (IMF) for structuring content (RFC 5322). The architecture of Internet Mail divides responsibilities among several components to ensure reliable end-to-end delivery: Message User Agents (MUAs) for composing and reading messages; Mail Submission Agents (MSAs) for initial acceptance and validation; Message Transfer Agents (MTAs) for relaying across networks; Mail Delivery Agents (MDAs) for depositing into mailboxes; and Mail Retrieval Agents (MRAs) for user access via protocols like POP or IMAP. This modular design, refined since the 1970s, supports multimedia extensions through and internationalized addresses, accommodating over 4.6 billion users worldwide as of 2025. Today, email remains ubiquitous for personal, professional, and commercial purposes, with an estimated 376 billion messages sent daily globally in 2025, though it faces challenges from , security threats, and competition from platforms. Despite these, its role in infrastructure persists, underpinning workflows in (where 93% of professionals check it daily) and serving as a for and that necessitates ongoing protocol enhancements like Domain-based Message Authentication, Reporting, and Conformance ().

Terminology and Concepts

Definitions and Etymology

Email, short for electronic mail, refers to the exchange of digital messages between computer users over a communications , such as the , using standardized protocols to ensure reliable delivery and retrieval. This system enables asynchronous communication, where messages are stored on servers until the recipient accesses them, distinguishing it from methods. The term "electronic mail" originated in the early 1970s amid the rise of networked computing, with credited for implementing the first networked email system in 1971 while working on . The abbreviation "email" (or "e-mail") first appeared in print in 1979 and became common in the 1980s, reflecting the technology's evolution from systems to widespread use. Developers chose "electronic mail" to parallel traditional postal services, emphasizing structured delivery and addressing to make the concept accessible to non-technical users. Email differs from postal mail, which relies on physical transport and can take days, by providing near-instantaneous digital transmission without tangible media. In contrast to , which supports synchronous, conversation-like exchanges often requiring both parties to be simultaneously, email allows deferred reading and attachment of files or . , meanwhile, is constrained to brief texts via cellular networks, lacking email's capacity for complex formatting or long-form content. Many email-specific terms draw from postal analogies to aid user familiarity. "Inbox" and "outbox" mimic physical trays for incoming and outgoing in office mailrooms, a convention established in early email software to simulate interoffice memo handling. The term "," denoting unsolicited bulk messages, stems from a 1970 comedy sketch where the word "" is repeated incessantly, a first applied to disruptive online posts in 1980s multi-user dungeons (MUDs) and later to email in the early 1990s.

Core Components

An email system relies on several interconnected core components to facilitate the composition, submission, transfer, storage, and retrieval of messages. At its foundation, the sender's device hosts a Message User Agent (MUA), which serves as the interface for composing and submitting emails. This client software interacts with a Mail Submission Agent (MSA) to initiate the process, ensuring messages are properly formatted and authenticated before entering the network. On the recipient side, a corresponding Recipient MUA (rMUA) enables the viewing and management of incoming messages, typically after retrieval from a remote server. Central to the system's operation are the message servers, which handle the intermediary roles of transfer and delivery. Message Transfer Agents (MTAs) act as relays, routing emails across networks by examining addresses and forwarding them hop-by-hop without modifying the content, except for adding trace information. Mail Delivery Agents (MDAs), in turn, perform the final deposition of messages into designated storage. These server-based components operate within Administrative Management Domains (ADMDs), distinguishing local ecosystems—such as intra-organizational handling within a single —from remote ones that span multiple domains and require relays for secure handoff. Email addresses play a pivotal role in this architecture, structured in the format <local-part>@<domain>, where the local-part identifies a specific within the , and the specifies the responsible ADMD for routing and delivery. Domains are resolved globally via the (DNS), enabling accurate navigation through the decentralized network. Mailboxes function as digital repositories within a Message Store (MS) on the recipient's , holding incoming messages until accessed by the rMUA; they also support for outgoing drafts or sent items on the sender's side. This separation underscores the conceptual divide between local components, like an individual's MUA on their device, and remote ones, such as MTAs and MDAs hosted on infrastructure servers.

History

Early Development

The development of electronic mail began in the 1960s as part of early computer systems. In 1965, at the (MIT), programmers Tom Van Vleck and Noel Morris created the first computer-based messaging program on the (CTSS) running on an 7094. This system, implemented as the MAIL command and added on August 6, 1965, allowed users logged into the same mainframe to exchange asynchronous messages stored in files, limited to 2592 BCD characters for security and efficiency. A significant advancement occurred in 1971 with the , the precursor to the , where , working at Bolt, Beranek and Newman (BBN), modified the TENEX operating system's SNDMSG program to enable messaging between users on different computers. Tomlinson sent the first network email that year, a test message whose content he later described as something like "QWERTYUIOP," and introduced the "@" symbol to denote user-host addressing, such as user@host, standardizing the format for inter-system communication. This innovation transformed intra-system messaging into a networked capability, with the updated SNDMSG incorporating memo fields like "To," "Subject," and "cc" for structured delivery. By early 1972, the program was released to sites, and email traffic soon accounted for about 75% of the network's usage by 1973. During the 1970s, further experiments expanded email's scope. At Xerox Palo Alto Research Center (PARC), researchers integrated email into the system, developing in the mid-1970s as an interface for reading, composing, and filing messages within the Distributed Message System, which supported networked office communication on Ethernet. Meanwhile, initial commercial implementations emerged, such as Software Technology Systems Consultants (STSC)'s service offered in September 1972 for systems, followed by Tymnet's OnTyme store-and-forward service in 1977 and CompuServe's email for personal computers launched on September 24, 1979. Key figures shaped these early efforts, with Tomlinson widely credited for networked email's foundational syntax and protocols. In 1978, V.A. Shiva Ayyadurai, then a teenager at the University of Medicine and Dentistry of New Jersey (UMDNJ), developed a prototype electronic mail system called EMAIL, modeled after interoffice paper mail with features including Inbox, Outbox, folders, and headers like To:, From:, Cc:, Bcc:, Subject:, and attachments; it became operational in 1980 and was copyrighted in 1982. Ayyadurai has claimed that this system constitutes the invention of email, though this assertion is not accepted by most computer historians, who credit earlier developments such as Tomlinson's networked system. Email saw early adoption in universities connected to ARPANET, such as MIT's MSGDMS system for TENEX in 1975 and the University of California, Berkeley's Delivermail client-server program in 1979, facilitating academic collaboration among institutions like UCLA and USC.

Standardization and Widespread Adoption

The standardization of email began in the early 1980s with the publication of key (RFC) documents by the (IETF). RFC 821, issued in August 1982, defined the (SMTP), which established a reliable and efficient method for transferring mail between servers across the and emerging internet infrastructure. Complementing this, RFC 822, also from August 1982, specified the format for ARPA Internet text messages, including syntax for headers and bodies to ensure interoperability among diverse systems. These RFCs formed the foundational internet standards for email, enabling seamless transmission and message structuring that persists in modern implementations, albeit with later updates like RFC 5321 and RFC 5322. The 1990s marked a period of explosive growth for email, fueled by the internet boom and the commercialization of access. As internet service providers expanded, companies like America Online (AOL) integrated email into their dial-up services, attracting millions of users by the mid-1990s through user-friendly interfaces and bundled offerings. A pivotal innovation came in 1996 with the launch of Hotmail, the first free web-based email service, which allowed users to access inboxes from any browser without proprietary software, rapidly scaling to over 8 million users within 18 months and inspiring competitors like Yahoo Mail. This era's commercialization democratized email, shifting it from academic and enterprise tools to a mainstream communication medium, with global adoption surging alongside rising internet penetration rates. By the late , the volume of physical letters had begun to decline in many developed regions due to the rise of email, reflecting its efficiency and cost-effectiveness for personal and . The further accelerated this through mobile integration, beginning with the 2003 release of devices that enabled on cellular networks, allowing access and transforming email into an always-on tool. Subsequent smartphones, such as the in 2007, embedded email clients natively, boosting usage as mobile became ubiquitous and integrating email into daily workflows. Recent developments through 2025 have focused on enhancing email's security and usability. In 2012, the (DANE) protocol, outlined in 6698, introduced authentication for SMTP using DNS records, providing a downgrade-resistant method to verify server certificates without relying solely on . Building on this, 7672 in 2015 specified SMTP security via opportunistic DANE, promoting encrypted transport to mitigate and spoofing risks. Concurrently, from 2020 onward, AI-assisted composition tools have emerged, leveraging to draft, summarize, and personalize messages; the AI-powered email assistant market, valued at USD 2.11 billion in 2025, is projected to double by 2029, driven by integrations in platforms like and that automate routine tasks while maintaining user oversight.

Technical Operation

Transmission Process

The transmission of an email message begins when the sender composes it using a mail user agent (MUA), which formats the message and submits it to the sender's via the . The acts as the originating server responsible for initiating the relay process. The sender's then resolves the recipient's by querying the for records, which specify the and of the mail servers responsible for accepting mail for that domain. These records enable routing by directing the MTA to the appropriate next-hop server, typically the one with the lowest value; if multiple records exist, the MTA attempts delivery in order of increasing . The sender's establishes a connection to the recipient's on port 25 (or port 587 for submission) and initiates the SMTP session. The SMTP handshake commences with the client sending an EHLO or HELO command to identify itself, to which the responds with a status code listing supported extensions. A transaction follows, distinguishing the from the : the , which handles routing, is defined by the MAIL FROM command specifying the sender's reverse-path and one or more RCPT TO commands for recipients' forward-paths; the , comprising headers and body, is transmitted via the DATA command, terminated by a line containing only a period (.). Each successful hop adds a "Received:" header to trace the path, and the receiving assumes responsibility for delivery or further relay. If delivery succeeds, the recipient's queues the message for local storage or forwards it if needed; however, errors are managed through status codes returned during the SMTP dialogue. Temporary failures (4xx codes, such as 421 for service unavailable) prompt queuing and retry by the sender's , often with . Permanent failures (5xx codes, like 550 for no such user) trigger a , where the receiving server generates an undeliverable mail notification to the envelope sender. For enhanced error reporting, the Delivery Status Notifications (DSN) extension to SMTP allows senders to request notifications for , failure, delay, or never via the NOTIFY parameter in RCPT TO commands. Upon failure, the server issues a DSN multipart/report message detailing the status, action (e.g., failed), and diagnostic information, using a null reverse-path to prevent loops. This mechanism, advertised via the DSN EHLO keyword, ensures reliable feedback without relying solely on basic bounces.

Protocols for Access and Delivery

The (SMTP) serves as the primary mechanism for delivering email messages between servers after initial transmission. Defined in RFC 5321, SMTP operates over on port 25 and uses a store-and-forward model where messages are relayed hop-by-hop until reaching the recipient's mail server, guided by DNS MX records. A typical SMTP begins with the client sending an EHLO or HELO command to identify itself and query server extensions, followed by MAIL FROM to specify the sender's reverse-path, one or more RCPT TO commands for recipients' forward-paths, and the command to transmit the message content, which ends with a line containing only a period (.). The server responds with three-digit status codes, such as 250 for success, and may add Received headers to trace the message path during relaying. For client access to stored email, the version 3 (POP3), specified in RFC 1939, enables retrieval from a maildrop, primarily in a download-and-delete fashion suitable for single-device use. POP3 sessions proceed in three states: authorization via USER and PASS commands for username/password (or APOP for MD5-challenge-response), for handling, and update for cleanup upon logout. Key commands include STAT to report message count and size, LIST to enumerate messages, RETR to fetch a full , and DELE to mark one for deletion, with the typically removing marked messages only at session end to allow recovery. This model minimizes storage by transferring messages to the client, though extensions like UIDL provide unique identifiers to prevent re-downloading in subsequent sessions. In contrast, the version 4rev1 (IMAP4rev1), outlined in 3501, supports server-side management and multi-device synchronization, allowing clients to access, organize, and manipulate messages without full downloads. occurs via LOGIN or AUTHENTICATE commands, followed by SELECT to open a for read-write access, enabling commands like FETCH for partial or full message retrieval, to modify flags (e.g., seen or deleted), and COPY to move messages between folders. IMAP maintains hierarchical folder structures with CREATE, DELETE, and commands, using unique identifiers (UIDs) and UIDVALIDITY values to ensure consistent synchronization across sessions and devices, even after server-side changes. Unlike POP3, IMAP keeps messages on the server by default, supporting updates and partial fetches that reduce for large inboxes. To secure these protocols against eavesdropping, the STARTTLS extension, defined in RFC 3207, upgrades plaintext connections to (TLS) through opportunistic negotiation. For SMTP, a client issues STARTTLS after EHLO if the server advertises (via 250 STARTTLS response), initiating a TLS before resuming the session with a new EHLO; similar processes apply to POP3 and IMAP on their respective ports. This provides and for credentials and message content, though it relies on server certificates for trust. POP3 and IMAP differ in efficiency based on usage: POP3 excels in low- scenarios for complete offline access on a single device, as it downloads entire messages once, but lacks native support for folders or partial sync, potentially leading to data duplication across devices. IMAP, while requiring more ongoing server resources and for queries, offers greater efficiency for multi-device environments through selective fetching and server-side operations, reducing redundant transfers and enabling seamless state . For instance, IMAP's UID-based model avoids re-fetching unchanged messages, making it preferable for users with and access.

Message Format

Headers and Metadata

Email headers form the metadata portion of an email message, providing essential routing, identification, and descriptive information that enables the delivery and processing of the message across the . Defined in the Internet Message Format (IMF) by RFC 5322, headers precede the message body and consist of structured fields that adhere to a specific , ensuring among email systems. These fields are crucial for servers to route messages correctly, for clients to display sender details and timestamps, and for diagnostic purposes during transmission. Standard header fields specified in RFC 5322 include several key elements for basic message identification and addressing. The "From:" field contains a comma-separated list of one or more specifications, indicating the author(s) or sender(s) of the message, typically formatted as a display name followed by an in angle brackets, such as " [email protected]". The "To:" field specifies the primary recipient(s) with a comma-separated list of addresses, while the "Cc:" field lists secondary recipients who receive a copy, and the "Bcc:" field includes recipients whose addresses are not visible to other recipients, often left empty or containing an address list that is removed before delivery. The "Subject:" field provides a brief, unstructured text description of the message's topic, limited to printable US-ASCII characters. The "Date:" field records the date and time the message was originated or prepared for delivery, using a specific format like "Fri, 21 Nov 1997 09:55:06 -0600" that includes the day, time, and timezone offset. Finally, the "Message-ID:" field assigns a globally to the message, formatted as "unique@domain", which aids in threading and deduplication. To manage long header lines and support international content, 5322 outlines folding and encoding mechanisms. Header fields may be folded across multiple lines by inserting a carriage return-line feed (CRLF) followed by (space or horizontal tab) where folding (FWS) is permitted, ensuring no single line exceeds 998 characters excluding the CRLF; unfolding reconstructs the original by removing the CRLF and adjacent . For international characters beyond US-ASCII, 2047 extends the format using "encoded-words" in the structure =?charset?encoding?encoded-text?=, where "charset" specifies the character set (e.g., ), "encoding" is either "Q" for or "B" for , and the encoded text replaces non-ASCII content; these encoded words are limited to 75 characters and can appear in fields like or display names but not in addresses or Received fields. Trace headers, particularly the "Received:" field, record the path of the message through the mail system for diagnostic and purposes. Each relaying prepends a "Received:" header with details such as the origin , destination, used, and a , formatted as "Received: from originating-host by destination-host; date-time", allowing reconstruction of the full delivery chain when multiple such fields are present in reverse chronological order. These headers facilitate path tracking and are commonly analyzed in anti-spam efforts to verify sender legitimacy, detect forwarding loops, and assess relay authenticity by examining addresses and timestamps. Custom headers, often prefixed with "X-" to denote non-standard extensions, allow additional functionality beyond core RFC 5322 fields. These optional fields follow the general syntax of field-name followed by a colon and unstructured text, provided they do not conflict with standard names, and are used by applications for proprietary or specialized purposes such as indicating membership or unsubscribe options. For example, mailing lists commonly employ headers defined in RFC 2369, like "List-Unsubscribe:", which provides a or email command for recipients to , enhancing compliance and reducing complaints.

Body Structure and Encoding

The body of an email contains the primary intended for the recipient, distinct from the headers that provide . Traditionally, email bodies were limited to in 7-bit US-ASCII format as specified in the original Message Format. To support richer , including non-text attachments and formatted text, the Multipurpose Mail Extensions () standard was developed, which extends the format to allow multipart structures and various encodings. entities, comprising headers and body parts, enable the inclusion of diverse media types while ensuring compatibility with legacy systems through specified transfer encodings. MIME supports attachments and complex messages by organizing the body into multipart types, such as multipart/mixed for combining independent parts like text and files, or multipart/alternative for offering equivalent content in different formats. These parts are separated by boundaries, unique strings defined in the Content-Type header's boundary parameter, which encapsulate individual body parts to prevent ambiguity during parsing. For example, a boundary might appear as "--boundary-string" to delimit sections, ensuring the message can be reliably reconstructed. Binary data, such as images or documents, is encoded using Base64, which converts 8-bit octets into a 65-character printable ASCII alphabet, grouping three octets into four characters with padding as needed to maintain line lengths under 76 characters. For text-heavy content with occasional non-printable characters, Quoted-Printable encoding is used, representing data with printable ASCII and escaping binary values as "=XX" (where XX is hexadecimal), allowing mostly unencoded text while complying with 7-bit transport limits. Plain text bodies use the MIME type text/plain, which assumes CRLF line endings and supports charsets like US-ASCII by default, providing simple, universal readability without rendering dependencies. In contrast, HTML-formatted bodies employ the text/html MIME type, enabling structured content with tags for styles, links, and inline elements, as standardized for email use. To accommodate recipients with varying capabilities, multipart/alternative structures present both text/plain and text/html versions, allowing clients to select the preferred format based on the Content-Type header. Inline images in HTML emails are embedded via multipart/related, where image parts (e.g., image/png) are referenced using Content-ID headers and cid: URIs in the HTML src attributes, ensuring the visuals integrate seamlessly without external fetches. For , non-ASCII characters in the body are handled through charset parameters in the Content-Type header, with as the recommended encoding for modern messages to support global scripts without loss. This allows text in languages beyond Latin alphabets, such as or , to be transmitted reliably, provided the encoding is explicitly declared to avoid garbled rendering.

Software and Services

Email Clients and Applications

Email clients, also known as email applications, are software programs that enable users to access, compose, send, receive, and organize electronic mail messages on personal devices. These applications typically connect to email servers using standard protocols such as POP3, IMAP, or SMTP to retrieve and transmit messages, providing a user-friendly for managing communications. Unlike web-based services, email clients operate locally on the user's device, offering greater control over and customization options. Email clients are categorized into several types based on their platform and interface. Desktop clients, such as and , run on personal computers and provide robust functionality for professional and personal use, often supporting multiple accounts and advanced organization tools. Mobile clients, exemplified by the Gmail app and on , are designed for smartphones and tablets, emphasizing touch-friendly interfaces, push notifications, and on-the-go access to inboxes. Command-line clients, like and , operate in terminal environments on systems, appealing to advanced users who prefer text-based, lightweight tools for scripting and automation. Modern email clients incorporate a range of features to enhance and . Threading organizes related messages into conversational chains, making it easier to follow discussions. Built-in search capabilities allow quick retrieval of emails using keywords, dates, or attachments, often powered by indexed databases for efficiency. Filters and rules automate sorting, labeling, and archiving based on criteria like sender or subject, reducing manual effort. Many clients also integrate with applications, enabling seamless scheduling of meetings directly from emails and syncing events across devices. The "mailto:" URI scheme facilitates linking to email composition from web pages or documents, automatically opening the user's default client with pre-filled recipient addresses, subjects, or body text. Defined in RFC 6068, this supports automation in workflows, such as generating contact forms that populate email drafts. For archiving and sharing, email clients commonly export individual in the .eml , a plain-text file extension that preserves the full including headers and attachments for into other applications. This ensures interoperability across different clients and systems.

Servers and Web-Based Systems

Email servers form the backbone of email infrastructure, responsible for relaying, storing, and delivering messages between systems. Mail Transfer Agents () handle the routing and transmission of emails across networks, ensuring reliable delivery from sender to recipient servers. Postfix, developed by Wietse Venema at , serves as a prominent open-source MTA designed for speed, ease of administration, and security, operating on systems as an alternative to older systems like . Mail Delivery Agents (), on the other hand, manage the final placement of incoming messages into user mailboxes. Dovecot functions as a secure MDA and IMAP server, supporting formats like and while providing high performance, flexible authentication, and integration with MTAs such as Postfix. Full email server suites integrate , , and additional components for comprehensive management, particularly in enterprise environments. employs a single building block architecture that scales from small organizations to large enterprises, featuring servers for handling databases, client connections, and mail routing, alongside edge transport servers for external mail flow and antispam protection. These suites often include features like Database Availability Groups to ensure resilience. Web-based email systems, or webmail services, allow users to access emails through browser interfaces hosted on remote servers, eliminating the need for local clients. , launched by on April 1, 2004, introduced innovative features such as 1 GB of free storage—significantly more than contemporaries—and advanced search capabilities, revolutionizing webmail with asynchronous and XML () for dynamic interfaces. , launched in 1997, was one of the earliest web-based services, offering free email accounts and contributing to the widespread adoption of webmail, when approximately 10 million users worldwide had free webmail accounts. These providers emphasize scalable storage and real-time features like conversation threading. For enterprise integration, the Messaging Application Programming Interface (MAPI) enables developers to build mail-enabled applications that interact seamlessly with email systems. Developed by , MAPI provides functions for creating, manipulating, and storing messages, supporting workgroup applications and specialized services in environments like . Email hosting models vary between on-premise deployments, where servers are maintained in-house on local infrastructure, and -based options, which leverage remote data centers for managed services. On-premise setups, such as self-hosted , offer full control but require significant hardware investment and maintenance. hosting, exemplified by Online or for business, provides superior scalability for large domains, allowing automatic resource adjustment without upfront hardware costs. Hybrid models combine both, balancing compliance needs with elastic scaling.

Uses and Applications

Business and Organizational Contexts

In business and organizational settings, email serves as a foundational tool for , enabling teams to exchange information, coordinate tasks, and share documents efficiently. For instance, integrations between email clients like and (CRM) systems such as allow users to log communications, track interactions, and automate follow-ups directly within email threads, streamlining workflows and reducing manual data entry. This fosters a unified view of customer or project data, supporting document sharing by attaching files or linking to shared repositories while maintaining audit trails for accountability. Email marketing has become integral to organizational outreach, powering newsletters and targeted campaigns to engage customers and drive revenue. Businesses use these tools to deliver personalized content, such as product updates or promotional offers, often achieving average open rates of 17% to 28% depending on industry benchmarks. Compliance with regulations like the is mandatory, requiring accurate header information, non-deceptive subject lines, clear disclosures, valid physical addresses, and functional mechanisms that must be honored within 10 days. Violations can result in penalties up to $53,088 per email, emphasizing the need for robust monitoring of third-party senders. Organizations implement strict policies for email archiving and retention to meet legal and operational needs, particularly in e-discovery processes during litigation. These policies often involve automated systems to preserve emails for defined periods, such as seven years for financial records, preventing deletion and ensuring accessibility for court orders under frameworks like the . E-discovery tools facilitate searching and producing relevant emails, with maturity models recommending early integration of retention strategies to minimize risks and costs in legal reviews. Such practices help organizations comply with discovery obligations while balancing efficiency. By 2025, email's role in business has evolved with (AI) enhancing prioritization and in organizational inboxes. AI-driven features, such as for categorizing incoming messages and generative AI for drafting replies, reduce manual sorting and enable faster responses in high-volume environments like teams. These tools integrate with systems to automate workflows, including lead nurturing and task assignment, boosting productivity amid rising email volumes. forecasts that by 2026, 40% of applications, including email platforms, will incorporate task-specific AI agents for such , up from less than 5% in 2025.

Personal and Everyday Use

Individuals access email through various platforms tailored to personal use, including PC-based desktop applications such as and , which provide robust features like advanced search and calendar integration for managing daily inboxes. Mobile apps, including those from and , enable on-the-go access via and devices, often with intuitive interfaces for quick reading and replying. Cross-device synchronization is facilitated by protocols like IMAP, allowing seamless updates across PC, tablet, and ; for instance, offers fast syncing for and other accounts, ensuring unread emails and folders remain consistent regardless of the device used. In everyday life, email serves as a primary channel for personal correspondence, with 99% of users checking their accounts daily and 58% doing so first thing in the morning to exchange messages with and . Subscriptions to newsletters and alerts from services like outlets or communities form a significant portion of personal inboxes, as 72% of consumers prefer email for promotional updates and information. Online shopping confirmations, including order receipts and shipping notifications, are another common activity, influencing purchase decisions for over half of through targeted promotional emails. Younger generations, such as Gen Z and , particularly rely on email for these transactional aspects of . Email usage among youth experienced a decline during the , with U.S. teens aged 12-17 seeing a 59% drop in 2010 alone as preferences shifted toward faster platforms like and for casual interactions. Despite this historical trend, email maintains strong adoption among younger users, with 91% of those aged 15-24 actively using it compared to 88% for , underscoring its persistence for formal needs such as assignments or official notifications. As of 2025, email usage among younger age groups is increasing. By 2025, overall daily email volume reaches 376.4 billion globally, reflecting its enduring role in personal routines even as social alternatives proliferate. Accessibility features in personal email have advanced significantly by 2025, incorporating voice-to-text dictation for composing messages without typing; for example, Outlook's Dictate tool allows users to speak directly into emails with high accuracy, integrated via a in the interface. Adaptive interfaces enhance usability by automatically adjusting elements like font sizes (minimum 14px, scalable to 200%) and color contrast ratios (at least 4.5:1) to accommodate visual impairments, as seen in clients like and that comply with WCAG guidelines. These features, including compatibility with and alt text for images, ensure broader inclusivity for diverse users in daily email interactions.

Challenges and Issues

Security and Privacy Risks

Email users face significant risks from malware distributed through attachments and hyperlinks, which can infect systems upon opening or clicking. Viruses and other malicious software often arrive in seemingly legitimate emails, exploiting trust in known contacts by spoofing sender addresses, and can auto-forward to further propagate without user intervention. Phishing attacks, a common vector, mimic trusted entities like banks or software vendors to trick recipients into downloading harmful files or revealing credentials, potentially leading to data theft or ransomware deployment. In 2025, AI-enhanced phishing attacks have surged, with deepfakes and generated content complicating detection efforts. Antivirus software detects and blocks many such threats by scanning attachments in real time, though users should verify unsolicited files with senders and disable auto-download features to mitigate risks. Spam, or unsolicited bulk email, overwhelms inboxes and serves as a conduit for scams, consuming bandwidth and increasing exposure to . These messages are filtered using techniques like Bayesian classifiers, which statistically analyze word probabilities from trained corpora of and legitimate emails to assign a spam likelihood, achieving high accuracy with low false positives by adapting to evolving patterns. Blacklists maintain records of known spam-sending IP addresses or domains, blocking emails from these sources at the level to prevent delivery. Spoofing involves forging email headers to impersonate legitimate senders, enabling or unauthorized access, while email bombing floods a recipient's inbox with massive volumes of messages to conduct a , degrading server performance and causing downtime. The Sender Policy Framework () counters spoofing by publishing DNS records listing authorized sending s, allowing receivers to verify the client's IP against the domain's policy during SMTP transactions. DomainKeys Identified Mail (DKIM) adds cryptographic signatures to messages using private keys, with public keys retrieved from DNS for verification, ensuring message integrity and sender authenticity despite minor transit changes. Domain-based Message Authentication, Reporting, and Conformance (DMARC) builds on SPF and DKIM by requiring alignment between authenticated domains and the visible sender, enforcing policies like rejection of failures, and providing reports on authentication outcomes to refine protections. Privacy in email is compromised by unencrypted transmission and storage, exposing content to interception, and by breaches at service providers that leak user data. Standards like S/MIME employ X.509 certificates for end-to-end encryption, digital signatures, and integrity checks, integrating with public key infrastructure for federal systems, while PGP (or OpenPGP) uses a web-of-trust model with asymmetric keys for similar protections, though key distribution poses challenges. These enable only intended recipients to decrypt messages, preserving confidentiality beyond transport-layer security like TLS. Data breaches at email providers have escalated costs, with the global average reaching $4.88 million in 2024 but decreasing to $4.44 million in 2025 (IBM Cost of a Data Breach Report 2025), often involving stolen credentials via phishing, underscoring the need for robust encryption and monitoring.

Usability and Social Concerns

One major usability challenge in email communication is , where users receive an excessive volume of messages that overwhelms their capacity to process them effectively. Studies indicate that professionals often spend more than eight hours per week managing emails, equivalent to about 20% of a standard 40-hour workweek. At institutions like the University of Hradec Králové in 2012, users received an average of 242 emails per month, with 29% deemed irrelevant, leading 71% of recipients to feel overloaded at least occasionally. This influx contributes to , with 67% of U.S. adults reporting feeling overwhelmed by their inboxes and 73% experiencing guilt or anxiety over unread messages. To mitigate overload, users and organizations employ tools such as email filters, threading features, and AI-driven systems that categorize messages by urgency or sender . For instance, interval checking—limiting inbox access to scheduled times—has been recommended to reduce constant interruptions, though adoption remains inconsistent. In extreme cases, individuals declare "email ," a practice where they delete or abandon large portions of their inbox to regain control; a 2022 survey found that 30% of U.S. adults have done so, often citing the sheer volume of unsolicited emails (73% of respondents) as a trigger. Another social concern arises from flaming, the tendency for email exchanges to escalate into aggressive or hostile tones due to the absence of nonverbal cues like facial expressions and . This lack of contextual signals in text-based communication can lead to misinterpretations, where neutral or mildly critical messages are perceived as attacks, amplifying conflicts. Research on attributes flaming to reduced social accountability and cue absence, resulting in uninhibited expression that disrupts organizational harmony. For example, a study of emails identified flaming behaviors—such as insults or —as contributors to broader interpersonal tensions, with 38.8% of email users reporting observed instances in the early . Email tracking mechanisms, including read receipts and embedded pixel trackers, raise usability issues by enabling senders to monitor recipients' behavior without explicit , often eroding and awareness. Read receipts notify senders when a is opened, while invisible 1x1 images—present in 24.6% of a sampled 2.3 million emails—log details like open times, device types, and locations upon loading. A 2018 crowdsourcing study revealed that over half of users were unaware of such tracking practices, though 86% viewed them as a serious once informed, highlighting a gap in user education and tool transparency. Social shifts in email usage reflect broader cultural changes, particularly among , who in the 2020s show reduced reliance on email in favor of apps. Surveys indicate that 67% of Gen Z individuals rarely or never use email for personal communication with friends and family, preferring platforms like , , or for their immediacy and casual nature—68% opt for texting most of the time. In professional settings, executives report that about 10% of young workers at firms like check email monthly or less, turning instead to tools like for quicker interactions, signaling email's declining role amid rising chat alternatives. Email systems impose various technical limitations that affect functionality and reliability. One prominent constraint is the size limit on attachments, which is typically set between 10 and 25 MB by major providers to manage storage and transmission efficiency. For instance, enforces a 25 MB cap on total message size, including attachments, while limits attachments to 25 MB and Exchange Online defaults to 25 MB but allows configuration up to 150 MB. These restrictions prevent overload on servers and networks but necessitate workarounds for larger files, such as compressing documents, splitting them into multiple emails, or sharing via links like , which integrates automatically for files exceeding 's limit. Bandwidth limitations further constrain email operations, particularly for high-volume or data-intensive use. Providers like apply daily bandwidth quotas—such as 2500 MB for IMAP/POP access—to curb abuse and ensure service stability, temporarily suspending accounts that exceed these thresholds through rapid large-file transfers or excessive syncing. This impacts enterprise environments where legacy applications or automated systems may inadvertently trigger limits during bulk operations. Legally, email's role in forming enforceable contracts hinges on traditional principles of offer, , and , with exchanges potentially binding even if informal, provided intent is clear. The enforceability of electronic signatures in emails is affirmed by the Electronic Signatures in Global and National Commerce Act (ESIGN Act) of 2000, which grants electronic records and signatures equivalent legal validity to paper counterparts, prohibiting denial of effect solely due to their digital form. This applies to email-based agreements in interstate commerce, though state laws like the (UETA) harmonize similar protections. Internationalization presents technical challenges in handling diverse scripts and temporal data. Support for right-to-left (RTL) scripts, such as and Hebrew, relies on standards and algorithms to prevent rendering errors in headers and bodies, with email clients using markup like the Unicode (RLM) for proper display. Time zones in email headers follow 5322, requiring the "Date" field to specify timestamps in UTC with offsets, though recipient-side rendering may adjust for , complicating cross-border coordination. Adoption of in email, enabled by 6532 for internationalized headers, allows non-ASCII characters in addresses and content, but legacy systems often lack full compatibility, leading to garbled text. Email body encoding for international text uses mechanisms like , as detailed in related standards. Compatibility with legacy systems remains a persistent infrastructural hurdle, as older email infrastructures often rely on outdated protocols like unencrypted SMTP or unsupported TLS versions, causing delivery failures when interfacing with modern secure networks. Future-proofing against threats is emerging, as algorithms like Shor's could decrypt current email encryption (e.g., using ), prompting transitions to standards from NIST, such as CRYSTALS-Kyber and CRYSTALS-Dilithium, to safeguard long-term confidentiality.

References

  1. [1]
    RFC 5598 - Internet Mail Architecture - IETF Datatracker
    History The first standardized architecture for networked email specified a simple split between the user world, in the form of Message User Agents (MUAs), and ...
  2. [2]
    Ray Tomlinson - Lemelson-MIT
    In 1971, he developed ARPANET's first application for network email by combining the SNDMSG and CPYNET programs, allowing messages to be sent to users on other ...
  3. [3]
    RFC 5321 - Simple Mail Transfer Protocol - IETF Datatracker
    This document is a specification of the basic protocol for Internet electronic mail transport. It consolidates, updates, and clarifies several previous ...
  4. [4]
    RFC 5322: Internet Message Format
    Summary of each segment:
  5. [5]
  6. [6]
    Into The Inbox: Email Marketing Statistics for 2025 - ZeroBounce
    Rating 4.8 (2,565) 86% of respondents said they have at least three email addresses. · 93% said they use email every day. · 42% check their inboxes three to five times a day. · 35% ...Missing: sources | Show results with:sources
  7. [7]
    RFC 5598: Internet Mail Architecture
    To serve as the necessary common frame of reference, this document describes the enhanced Internet Mail architecture, reflecting the current service.
  8. [8]
    The Origins of E-mail - Stanford Computer Science
    Sep 17, 1999 · When Ray Tomlinson designed his early email programs, he realized he need something to separate the user's name form the host's name. As the ...Missing: credible sources
  9. [9]
    E-mail - Etymology, Origin & Meaning
    Originating as a short form of "electronic mail" (1977), email means digital message delivery, contrasting with the older "snail mail" system.
  10. [10]
    IM and E-mail: Which is more Popular and Why? | HowStuffWorks
    The main difference between IM and e-mail is the idea of presence [source: The National Archives]. With e-mail, if you compose a message and send it to your ...Missing: definition distinction
  11. [11]
    Difference between Texting and Email - GeeksforGeeks
    Jun 30, 2020 · 2. Email : Email is the method of communication that includes the sending and receiving of professional messages. It is a sophisticated mode of ...
  12. [12]
    The History of Email: Digging Into the Past, Present, and Future
    Nov 30, 2023 · Most people give Ray Tomlinson the title of email's inventor. He came up with the idea while working for ARPANET, the government-funded research ...Missing: credible | Show results with:credible
  13. [13]
    [PDF] The History of Spam | Internet Society
    1993 First use of the term spam was for a post from USENET by Richard Depew to news.admin.policy, which was the result of a bug in a software program that ...
  14. [14]
  15. [15]
    [PDF] Email Innovation Timeline
    Aug 18, 2022 · Ray Tomlinson sent the first email over the ARPANET. 1963, March 12 ... • “MIT Computer Center CTSS Bulletin 88,” Multics History Project, MIT,.<|control11|><|separator|>
  16. [16]
    [PDF] The Alto and Ethernet System Xerox PARC in the 1970's
    Oct 17, 2006 · Laurel is the Alto program that serves as your mail reading, composition and filing interface to the Distributed. Message System. Since you are ...
  17. [17]
    Did V.A. Shiva Ayyadurai Invent Email? - SIGCIS
    Aug 4, 2015 · VA Shiva Ayyadurai is not a member of the MIT faculty and did not invent email. In 1980 he created a small-scale electronic mail system used within University ...
  18. [18]
    RFC 821: Simple Mail Transfer Protocol
    RFC 821 August 1982 Simple Mail Transfer Protocol receiver-SMTP process A process which transfers mail in cooperation with a sender-SMTP process. It waits ...
  19. [19]
    RFC 822 - STANDARD FOR THE FORMAT OF ARPA INTERNET ...
    This standard specifies a syntax for text messages that are sent among computer users, within the framework of electronic mail.
  20. [20]
    The History of Email - Service Objects
    Apr 29, 2015 · Email moved to the mobile realm in 2003 when the original Blackberry phones were released. The first US president to use email was President ...
  21. [21]
    The History of Email - Paul O'Brien
    Sep 21, 2024 · However, it was the introduction of Hotmail in 1996 that truly changed the game. Hotmail was one of the first free, web-based email services, ...
  22. [22]
    [PDF] Analysis of Historical Mail Volume Trends. - USPS OIG
    Sep 4, 2024 · The analysis covers overall market dominant mail volume, including First-Class, Marketing, and Periodicals, and their impact on the Postal ...
  23. [23]
    RFC 6698 - The DNS-Based Authentication of Named Entities ...
    Jun 11, 2024 · The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA (RFC 6698, August 2012)<|separator|>
  24. [24]
    RFC 7672: SMTP Security via Opportunistic DNS-Based ...
    This memo describes a downgrade-resistant protocol for SMTP transport security between Message Transfer Agents (MTAs), based on the DNS- Based Authentication ...
  25. [25]
  26. [26]
  27. [27]
  28. [28]
  29. [29]
  30. [30]
  31. [31]
  32. [32]
  33. [33]
  34. [34]
  35. [35]
  36. [36]
  37. [37]
  38. [38]
  39. [39]
  40. [40]
  41. [41]
  42. [42]
  43. [43]
    RFC 1939: Post Office Protocol - Version 3
    ### Summary of Post Office Protocol Version 3 (POP3) from RFC 1939
  44. [44]
  45. [45]
  46. [46]
  47. [47]
  48. [48]
  49. [49]
  50. [50]
  51. [51]
  52. [52]
  53. [53]
    RFC 3207: SMTP Service Extension for Secure SMTP over Transport Layer Security
    ### Summary of STARTTLS Extension for SMTP (RFC 3207)
  54. [54]
  55. [55]
  56. [56]
  57. [57]
  58. [58]
  59. [59]
  60. [60]
  61. [61]
  62. [62]
  63. [63]
  64. [64]
  65. [65]
    draft-josefsson-email-received-privacy-01.txt - IETF
    May 5, 2016 · The purpose of these headers is to enable audit of mail transmission, and perhaps to distinguish between regular mail and spam.
  66. [66]
  67. [67]
    RFC 2369 - The Use of URLs as Meta-Syntax for Core Mail List ...
    This is a proposal for additional header fields to be added to email messages sent by email distribution lists.
  68. [68]
    RFC 2045 - Multipurpose Internet Mail Extensions (MIME) Part One
    This set of documents, collectively called the Multipurpose Internet Mail Extensions, or MIME, redefines the format of messages.
  69. [69]
  70. [70]
  71. [71]
  72. [72]
  73. [73]
  74. [74]
  75. [75]
    RFC 2854 - The 'text/html' Media Type - IETF Datatracker
    This document summarizes the history of HTML development, and defines the "text/html" MIME type by pointing to the relevant W3C recommendations.
  76. [76]
  77. [77]
  78. [78]
    What Is an Email Client? 5 Different Types of Email Clients - CRM.org
    May 27, 2025 · What are the different types of email clients? · Web-Based Email Clients · Desktop Email Clients · Command-Line Email Clients · Mobile Email Clients.
  79. [79]
    The Ultimate Guide to the Best Email Clients - Constant Contact
    Aug 15, 2024 · This guide breaks down the features and benefits to help you pick the best email client. Read on to learn more.
  80. [80]
    The Best Email Clients for 2025 - PCMag
    Mar 3, 2025 · Dedicated clients combine all your accounts in one place, offer a pleasant user experience, and provide new features you didn't even know you ...
  81. [81]
    The 6 best email clients for Windows in 2025 - Zapier
    Jul 14, 2025 · eM Client for customization. Thunderbird for a free email client. Microsoft Outlook for email with a robust business platform.
  82. [82]
    5 Greatest Open Source Email Clients for Command-line (CLI) in 2025
    Oct 20, 2025 · Reviews, comparison, screenshots and more for the 5 greatest open-source email clients for Command-line (CLI).
  83. [83]
    Top 10 Email Clients & Software for 2025 - HelpDesk
    Dec 23, 2024 · Integrated calendar and scheduling: Outlook's built-in calendar allows users to schedule meetings, set reminders, and manage appointments ...Missing: common | Show results with:common
  84. [84]
    What Is an Email Client? – ChemiCloud Glossary
    Calendar and Scheduling: Some email clients integrate with calendars and scheduling features, allowing users to manage appointments, events, and tasks ...Missing: common | Show results with:common
  85. [85]
    RFC 6068: The 'mailto' URI Scheme
    The 'mailto' URI scheme identifies resources reached via Internet mail, and can include mail addresses, header fields, and message bodies.
  86. [86]
    RFC 6068 - The 'mailto' URI Scheme - IETF Datatracker
    The 'mailto' URI scheme identifies resources reached via Internet mail, and can include mail addresses, header fields, and message bodies.
  87. [87]
    EML vs MSG File Format - Outlook Freeware
    The EML format is designed to store individual emails. MSG files are designed to store, view, export and import individual Outlook mailbox items: one file for ...What is the EML message format · What is the difference between... · FAQ
  88. [88]
    How to export an email message to the MSG and EML format
    Mar 26, 2019 · To export an email to the EML format in the new Outlook for Windows or Outlook on the web (OWA), right-click the email on the message list and ...
  89. [89]
    The Postfix Home Page
    - **Description**: Postfix is a mail server developed by Wietse Venema, initially at IBM Research, as an alternative to Sendmail.
  90. [90]
    Dovecot | The Secure IMAP server
    ### Summary of Dovecot as MDA or IMAP Server
  91. [91]
    Exchange Server architecture | Microsoft Learn
    Apr 2, 2025 · Exchange uses a single building block architecture that provides email services for deployments of all sizes, from small organizations to the largest multi- ...Server communication... · Server role architecture
  92. [92]
    Celebrating 50 years of email | Google Workspace Blog
    Oct 29, 2021 · And when Gmail launched on April 1, 2004 with lightning fast email search and a storage limit of 1 GB—500 times more than prevailing inboxes of ...Gmail Is Born · How Email Got Safer · How Email Became More...
  93. [93]
    History of Email
    1971: Ray Tomlinson invented internet based email. 1974: There were hundreds of military users of email because ARPANET eventually encouraged it.
  94. [94]
    MAPI Programming Overview | Microsoft Learn
    Jun 1, 2022 · The Messaging Application Program Interface (MAPI) is an extensive set of functions that developers can use to create mail-enabled applications.
  95. [95]
    SaaS vs On Premise - Difference Between Software Deployments
    On-premises systems are scalable, but this scalability comes with a direct cost. If you want to improve your system, then you have to upgrade your hardware.Missing: email | Show results with:email
  96. [96]
    Exchange Online service description - Microsoft Learn
    Jun 10, 2025 · Microsoft Exchange Online is a hosted messaging solution that delivers email, calendar, contacts, and tasks from PCs, the web, and mobile devices.
  97. [97]
    What are public, private, and hybrid clouds? - Microsoft Azure
    Compliance-friendly scalability: Hybrid cloud helps meet regulatory requirements by keeping sensitive data on-premises or in private clouds, while still ...Understanding Cloud... · Public, Private, Hybrid... · Comparing Types Of Clouds In...Missing: email | Show results with:email
  98. [98]
    Salesforce And Outlook - ExAC Browser - Harvard Medical School
    May 19, 2025 · Salesforce and Outlook integration simplifies email management, offering a seamless experience with advanced automation.Missing: enterprise | Show results with:enterprise
  99. [99]
    What Are CRM Integrations? Everything You Need To Know - Forbes
    Aug 25, 2025 · Integrations with email clients will enable you to nurture your leads and simplify communication. Email integrations are a mainstay in all CRM ...
  100. [100]
    What are good open rates, CTRs, & CTORs for email campaigns?
    A good email open rate should be between 17-28%, depending on the industry you're in. While knowing these numbers is a great starting point, it's worth it to ...
  101. [101]
    CAN-SPAM Act: A Compliance Guide for Business
    Each separate email in violation of the CAN-SPAM Act is subject to penalties of up to $53,088, so non-compliance can be costly. But following the law isn't ...
  102. [102]
    Compliance With E-Discovery Demands In U.S. Non-Criminal Law ...
    Under Part V of the Federal Rules of Civil Procedure (Rules 26-37) and Rule 45, litigants in the U.S. federal trial courts may use a broad assortment of tools ...
  103. [103]
    The E-Discovery Maturity Model - EDRM
    ... Legal has begun developing and deploying policy management of information. The first area that is frequently addressed is email management and archiving.
  104. [104]
    April's Notable Cases and Events in E-Discovery - EDRM
    Apr 19, 2023 · ... policies for email retention, where individual custodians cannot override the automated preservation of their emails. Id. at *9. Judge ...
  105. [105]
    Top AI Use Cases For Accounts Receivable Automation In 2025
    Mar 20, 2025 · Quadient uses ML to categorize inbound AR emails, while genAI generates email replies and templates to save employees' time. Deduction ...Missing: enterprise | Show results with:enterprise<|separator|>
  106. [106]
    Email Marketing: Success Tips & Strategies for CMOs - Gartner
    Gartner's Digital IQ for Email Marketing Benchmarks examines emerging trends and examples of marketers who are adjusting to reap better returns.
  107. [107]
    Gartner Predicts 40% of Enterprise Apps Will Feature Task-Specific ...
    Aug 26, 2025 · Forty percent of enterprise applications will be integrated with task-specific AI agents by the end of 2026, up from less than 5% today, ...Missing: prioritization | Show results with:prioritization
  108. [108]
    Latest Email Statistics for 2025: Freshly Updated in March - DragApp
    Mar 27, 2025 · In 2025, over 375 billion emails are sent daily. 4.48 billion users are expected by the end of 2024. Best days to send are Tuesday and Thursday ...
  109. [109]
    The Ultimate List of Email Marketing Stats That We Think You ...
    Dec 14, 2023 · Gen Z, Millennials, and Gen X most often use email for online shopping. Boomers use email for correspondence with friends and family ...
  110. [110]
    Email use drops by 59% amongst US teens in one year | The Drum
    Other figures are less dramatic but still significant: total email usage declined by 8% , young adults between the ages of 25 and 25 used email 18% less last ...
  111. [111]
    How Many Email Users Are There In 2025? (21+ Email Usage Stats)
    May 2, 2025 · The 25-44 age group has 93.4% email users compared to the 78% that use social media. The 44-64 age group has 90.5% email users versus 64% social ...
  112. [112]
    how to start the voice typing feature - Microsoft Q&A
    Jan 29, 2025 · In the Message tab > select Dictate (Microphone icon); Start Speaking: A red dot on the Dictate icon indicates that Outlook is listening. Speak ...
  113. [113]
    2025 Guide to Creating Accessible Emails - Litmus
    Feb 7, 2025 · Start by creating accessible email templates that follow best practices, like live text and strong color contrast, making it easier for your ...Missing: adaptive interfaces
  114. [114]
    Using Caution with Email Attachments - CISA
    Feb 1, 2021 · If an email or email attachment seems suspicious, don't open it, even if your antivirus software indicates that the message is clean. Attackers ...
  115. [115]
    A Plan for Spam
    ### Summary of Bayesian Spam Filtering and Comparison to Blacklists
  116. [116]
  117. [117]
  118. [118]
  119. [119]
    RFC 7489 - Domain-based Message Authentication, Reporting, and ...
    DMARC is a mechanism for email operators to express domain-level policies for message validation, disposition, and reporting, using existing authentication ...Missing: bombing | Show results with:bombing
  120. [120]
    [PDF] 202403121700_E-mail Bombing Sector Alert_TLPCLEAR - HHS.gov
    Mar 12, 2024 · When an e-mail server is impacted by a DDoS, it can downgrade network performance and potentially lead to direct business downtime. This Sector ...
  121. [121]
    [PDF] Trustworthy Email - NIST Technical Series Publications
    Feb 1, 2019 · Current MUAs use S/MIME private keys to decrypt the data encryption key that was used to encrypt the email message each time that it is ...Missing: breaches | Show results with:breaches
  122. [122]
    IBM Report: Escalating Data Breach Disruption Pushes Costs to ...
    Jul 30, 2024 · The global average cost of a data breach reached $4.88 million in 2024, as breaches grow more disruptive and further expand demands on cyber teams.
  123. [123]
    [PDF] Email Overload: Causes, Consequences and the Future
    This paper focuses on finding the causes for a high number of incoming emails to inboxes and attempts to generalize the findings based on results from the case ...Missing: prioritization | Show results with:prioritization
  124. [124]
    Email Overload: 30% of Americans Declare "Email Bankruptcy"
    Dec 5, 2022 · 30% of US adults surveyed have gone one step further and “declared email bankruptcy” – either “entirely deleting” or “abandoning” their inbox due to email ...Missing: studies volume prioritization
  125. [125]
    Email Flaming Behaviors and Organizational Conflict
    Oct 1, 2007 · Landry (2000) refers to the phenomenon as “uninhibited and aggressive communication” (p. 139). Lea et al. (1992) call it “the hostile expression ...
  126. [126]
    Flaming in computer-mediated communication - Dr Martin Lea
    In another very recent study of campus electronic mail, Thompsen and Ahn (1992) reported that around one-third (38.8%) of email users had observed flaming.
  127. [127]
    [PDF] Privacy Risk Assessment on Email Tracking - Northwestern University
    with a crowdsourcing study, and we found that more than a half of users have no awareness of email tracking but 86% of them deem it as a serious privacy threat.
  128. [128]
    [PDF] Characterizing Pixel Tracking through the Lens of Disposable Email ...
    We believe that the disposable email services provide a unique opportunity to study email tracking at a much larger scale and uncover new tracking techniques in ...
  129. [129]
    Study: Gen Z & Millennials Are Ignoring Emails - Rival Technologies
    A recent study shows that 56% of Millennials and 67% of Gen Zs “rarely” or “never” use email to talk to friends and family.
  130. [130]
    'They're 25, they don't do emails': is instant chat replacing the inbox?
    Jan 20, 2023 · Bosses at Davos say direct messaging can be more effective for Gen Z employees – but email still has a role.
  131. [131]
    Send attachments with your Gmail message - Computer - Gmail Help
    ### Attachment Size Limit and Workarounds in Gmail
  132. [132]
    Sending limits in Outlook.com - Microsoft Support
    The attachment size limit for files is 25 MB. You can also share a file from OneDrive. This way, your recipients can receive larger files and collaborate on it ...
  133. [133]
    Exchange Online limits - Service Descriptions | Microsoft Learn
    Jul 11, 2025 · This 2 MB limit refers to the text extracted from the attachment, not to the file size of the attachment. For example, a 3 MB file may contain ...<|separator|>
  134. [134]
  135. [135]
    When a Contract Email Becomes Legally Binding - UpCounsel
    Apr 14, 2025 · A contract email can be legally binding if it meets basic contract law requirements: offer, acceptance, and consideration. Even informal emails ...Key Takeaways · Factors Courts Consider When... · Is an Email Contract...
  136. [136]
    [PDF] ELECTRONIC SIGNATURES IN GLOBAL AND NATIONAL ... - GovInfo
    Jun 30, 2000 · This Act may be cited as the ''Electronic Signatures in Global and National Commerce Act''. TITLE I—ELECTRONIC RECORDS AND. SIGNATURES IN ...
  137. [137]
    H34: Using a Unicode right-to-left mark (RLM) or left-to-right ... - W3C
    This technique uses Unicode RLM/LRM to override the HTML bidirectional algorithm, especially when placing neutral characters between different text directions.
  138. [138]
    RFC 6532 - Internationalized Email Headers - IETF Datatracker
    This document specifies an enhancement to the Internet Message Format and to MIME that allows use of Unicode in mail addresses and most header field content.
  139. [139]
    Navigating the Risks of Legacy System Integration | OpenLegacy
    Aug 14, 2023 · Compatibility issues. Legacy systems may have been built using outdated technology, which won't be compatible with newer systems. · Security ...
  140. [140]
    NIST Releases First 3 Finalized Post-Quantum Encryption Standards
    Aug 13, 2024 · These post-quantum encryption standards secure a wide range of electronic information, from confidential email messages to e-commerce ...