References
- Ayre, R., R. Raskin, and T. Stevenson. “E-Mail Systems: Can They Keep Their Customers Happy?” PC Magazine, 11:18, October 27, 1992, pp. 261–297.
- Barr, C. “Are You Talking to Me?” PC Magazine, 11:21, December 8, 1992, pp. 29, 32.
- Begun, D.A. “Protecting Your E-mail Privacy,” PC Magazine, 12:1, January 12, 1993, p. 32.
- Derfler, Jr., F. and S. Rigney. “Windows for Workgroups,” PC Magazine, 11:21, December 8, 1990, pp. 255–269.
- Dern, D.P. “Plugging into the Internet,” BYTE, 17:10, October 1992, pp. 149–156.
- Detweiler, L. <[email protected]>. “Identity, Privacy, and Anonymity on the Internet,” Privacy & Anonymity FAQ in alt. privacy on USENET, Version 2.0, 1993/2/15.
- Kehoe, B.P. Zen and the Art of the Internet, Prentice Hall, Englewood Cliffs, NJ, 1993.
- Parker, T. Unix User's Handbook, Microtrend Books, San Marcos, CA, 1993.
- Pearson, R.A. “Electronic Mail in the University,” Journal of Microcomputer Systems Management, Summer 1991, pp. 22–27.
- Phillips, Jr., J.T. “Electronic Junk Mail,” Records Management Quarterly, 26:3, July 1992, pp. 38–60.
- Samuelson, R.J. “Technology in Reverse,” Newsweek, 120:3, July 1992, p. 45.
- Schaefermeyer, M. and E.H. Sewell, Jr. “Communicating by Electronic Mail,” American Behavioral Scientist, 32:2, November/December 1988, pp. 112–123.
- Wiegner, K. “The Trouble with E-mail,” Working Woman, 17:4, April 1992, p. 46.