SlideShare a Scribd company logo
1 of 1
Download to read offline
What is Chain Email? 
"chain email" mean any email that suggests to the recipient that he forward it to "all your friends and
relatives" or anything similar, thus forming a chain between the author of the email and each recipient.
The fundamental principle of such emails is that the intended recipient is valued not for their thoughtfulness,
resourcefulness, careful consideration of issues, willingness to enter into a dialog, or even conversational
abilities, but, rather, primarily for their address list and their willingness to react, rather
than respond, to some hot-button issue.
Common methods used in "chain email"  include emotionally manipulative stories, get-rich-quick pyramid schemes,
and the exploitation of superstition to threaten the recipient with bad luck or even physical violence or death if he or
she "breaks the chain" and refuses to adhere to the conditions set out in the email.
"chain email"  can grow exponentially and be hard to stop and would clog the mailbox. 
 
I certainly won't forward such emails to anyone else, except to postmasters or other 
authorities to report potentially illegal scam. 
The only way I respond to "chain email" is to strongly suggest to whoever sent one to me that they not do that 
again, and that they not continue to send such emails to anyone else. 
Please do not forward chain email to anyone else. 
Remember, if you truly value your friends, you presumably see them as representing more to you than just contacts 
with yet more friends, and you value (or at least wish to encourage!) their ability to respond, rather than react, with 
their full mental and spiritual capacities to important issues. 
Only if you keep your highest ideals regarding your friends in mind will you be able to compose an email that reaches 
them with a message of valuing them as being at least as capable of you are in determining the importance of an issue, 
deciding how to respond to it, and so on. 
If and when the content of the incoming "chain email" could be of interest to the Internet and cyber society, I convert 
the contents in PDF I locate it in a web site as @ 
(1) My Information site http://www.meetup.com/BARAONDA‐Italian‐the‐place‐WHERE‐TO‐GO‐IN‐
SINGAPORE/ 
(2) My eBay http://www.meetup.com/eBay‐as‐second‐income‐and‐hobby‐surf‐shop‐or‐sale/ 
eBay as second income and hobby surf shop or sale 
(3) My Company 
http://www.meetup.com/LAMARSTONE-Construction-Architects-provider-Web-propagation/
Regretfully the new technology allow to include in "chain email" JPG. To delete this JPG is a really waste of time 
for the intended recipient.  Not only but to many do not know how to send email to multiple recipient.  Providing 
email address of the recipient to everybody. 
Provided with my best knowledge with the hope to contribute to the well been of the Internet user. 
Best regards  Andrea(mr)  http://www.lamarstone.tel/ 
Click or copy in your browser the hyperlink, there are the co‐ordinate for your information. 
To avoid our emails being seen as junk, please add our "From" address to your Address Book. 
Dp: H:ALPHAAGSTORYWhat is Chain Email.docx

More Related Content

Recently uploaded

Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
UXDXConf
 

Recently uploaded (20)

FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 
A Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System StrategyA Business-Centric Approach to Design System Strategy
A Business-Centric Approach to Design System Strategy
 
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdfHow Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
How Red Hat Uses FDO in Device Lifecycle _ Costin and Vitaliy at Red Hat.pdf
 
AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101AI presentation and introduction - Retrieval Augmented Generation RAG 101
AI presentation and introduction - Retrieval Augmented Generation RAG 101
 
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
Secure Zero Touch enabled Edge compute with Dell NativeEdge via FDO _ Brad at...
 
PLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. StartupsPLAI - Acceleration Program for Generative A.I. Startups
PLAI - Acceleration Program for Generative A.I. Startups
 
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdfLinux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
Linux Foundation Edge _ Overview of FDO Software Components _ Randy at Intel.pdf
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
AI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří KarpíšekAI revolution and Salesforce, Jiří Karpíšek
AI revolution and Salesforce, Jiří Karpíšek
 
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptxUnpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
Unpacking Value Delivery - Agile Oxford Meetup - May 2024.pptx
 
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi IbrahimzadeFree and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
Free and Effective: Making Flows Publicly Accessible, Yumi Ibrahimzade
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
Structuring Teams and Portfolios for Success
Structuring Teams and Portfolios for SuccessStructuring Teams and Portfolios for Success
Structuring Teams and Portfolios for Success
 
The UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, OcadoThe UX of Automation by AJ King, Senior UX Researcher, Ocado
The UX of Automation by AJ King, Senior UX Researcher, Ocado
 
The Metaverse: Are We There Yet?
The  Metaverse:    Are   We  There  Yet?The  Metaverse:    Are   We  There  Yet?
The Metaverse: Are We There Yet?
 
Strategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering TeamsStrategic AI Integration in Engineering Teams
Strategic AI Integration in Engineering Teams
 
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
Behind the Scenes From the Manager's Chair: Decoding the Secrets of Successfu...
 
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
SOQL 201 for Admins & Developers: Slice & Dice Your Org’s Data With Aggregate...
 
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
ASRock Industrial FDO Solutions in Action for Industrial Edge AI _ Kenny at A...
 
Demystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John StaveleyDemystifying gRPC in .Net by John Staveley
Demystifying gRPC in .Net by John Staveley
 

Featured

How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
ThinkNow
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
Kurio // The Social Media Age(ncy)
 

Featured (20)

Product Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage EngineeringsProduct Design Trends in 2024 | Teenage Engineerings
Product Design Trends in 2024 | Teenage Engineerings
 
How Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental HealthHow Race, Age and Gender Shape Attitudes Towards Mental Health
How Race, Age and Gender Shape Attitudes Towards Mental Health
 
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdfAI Trends in Creative Operations 2024 by Artwork Flow.pdf
AI Trends in Creative Operations 2024 by Artwork Flow.pdf
 
Skeleton Culture Code
Skeleton Culture CodeSkeleton Culture Code
Skeleton Culture Code
 
PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024PEPSICO Presentation to CAGNY Conference Feb 2024
PEPSICO Presentation to CAGNY Conference Feb 2024
 
Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)Content Methodology: A Best Practices Report (Webinar)
Content Methodology: A Best Practices Report (Webinar)
 
How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024How to Prepare For a Successful Job Search for 2024
How to Prepare For a Successful Job Search for 2024
 
Social Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie InsightsSocial Media Marketing Trends 2024 // The Global Indie Insights
Social Media Marketing Trends 2024 // The Global Indie Insights
 
Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024Trends In Paid Search: Navigating The Digital Landscape In 2024
Trends In Paid Search: Navigating The Digital Landscape In 2024
 
5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary5 Public speaking tips from TED - Visualized summary
5 Public speaking tips from TED - Visualized summary
 
ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd ChatGPT and the Future of Work - Clark Boyd
ChatGPT and the Future of Work - Clark Boyd
 
Getting into the tech field. what next
Getting into the tech field. what next Getting into the tech field. what next
Getting into the tech field. what next
 
Google's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search IntentGoogle's Just Not That Into You: Understanding Core Updates & Search Intent
Google's Just Not That Into You: Understanding Core Updates & Search Intent
 
How to have difficult conversations
How to have difficult conversations How to have difficult conversations
How to have difficult conversations
 
Introduction to Data Science
Introduction to Data ScienceIntroduction to Data Science
Introduction to Data Science
 
Time Management & Productivity - Best Practices
Time Management & Productivity -  Best PracticesTime Management & Productivity -  Best Practices
Time Management & Productivity - Best Practices
 
The six step guide to practical project management
The six step guide to practical project managementThe six step guide to practical project management
The six step guide to practical project management
 
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
Beginners Guide to TikTok for Search - Rachel Pearson - We are Tilt __ Bright...
 
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
Unlocking the Power of ChatGPT and AI in Testing - A Real-World Look, present...
 
12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work12 Ways to Increase Your Influence at Work
12 Ways to Increase Your Influence at Work
 

What Is Chain Email

  • 1. What is Chain Email?  "chain email" mean any email that suggests to the recipient that he forward it to "all your friends and relatives" or anything similar, thus forming a chain between the author of the email and each recipient. The fundamental principle of such emails is that the intended recipient is valued not for their thoughtfulness, resourcefulness, careful consideration of issues, willingness to enter into a dialog, or even conversational abilities, but, rather, primarily for their address list and their willingness to react, rather than respond, to some hot-button issue. Common methods used in "chain email"  include emotionally manipulative stories, get-rich-quick pyramid schemes, and the exploitation of superstition to threaten the recipient with bad luck or even physical violence or death if he or she "breaks the chain" and refuses to adhere to the conditions set out in the email. "chain email"  can grow exponentially and be hard to stop and would clog the mailbox.    I certainly won't forward such emails to anyone else, except to postmasters or other  authorities to report potentially illegal scam.  The only way I respond to "chain email" is to strongly suggest to whoever sent one to me that they not do that  again, and that they not continue to send such emails to anyone else.  Please do not forward chain email to anyone else.  Remember, if you truly value your friends, you presumably see them as representing more to you than just contacts  with yet more friends, and you value (or at least wish to encourage!) their ability to respond, rather than react, with  their full mental and spiritual capacities to important issues.  Only if you keep your highest ideals regarding your friends in mind will you be able to compose an email that reaches  them with a message of valuing them as being at least as capable of you are in determining the importance of an issue,  deciding how to respond to it, and so on.  If and when the content of the incoming "chain email" could be of interest to the Internet and cyber society, I convert  the contents in PDF I locate it in a web site as @  (1) My Information site http://www.meetup.com/BARAONDA‐Italian‐the‐place‐WHERE‐TO‐GO‐IN‐ SINGAPORE/  (2) My eBay http://www.meetup.com/eBay‐as‐second‐income‐and‐hobby‐surf‐shop‐or‐sale/  eBay as second income and hobby surf shop or sale  (3) My Company  http://www.meetup.com/LAMARSTONE-Construction-Architects-provider-Web-propagation/ Regretfully the new technology allow to include in "chain email" JPG. To delete this JPG is a really waste of time  for the intended recipient.  Not only but to many do not know how to send email to multiple recipient.  Providing  email address of the recipient to everybody.  Provided with my best knowledge with the hope to contribute to the well been of the Internet user.  Best regards  Andrea(mr)  http://www.lamarstone.tel/  Click or copy in your browser the hyperlink, there are the co‐ordinate for your information.  To avoid our emails being seen as junk, please add our "From" address to your Address Book.  Dp: H:ALPHAAGSTORYWhat is Chain Email.docx