TY - JOUR AB - Posits that computational electronic mail is essentially traditional electronic mail messages with embedded programs or interpretable scripts. States, at the recipient’s end, the mail reading software will distinguish it from normal mail, and executes it on confirmation by the recipient, and if appropriate, output from the program can be channelled back to the sender automatically for further processing. Shows that, despite its potential for many applications, it has not however, taken off in a big way. Major reasons stem from security concerns among users. Examines security issues associated with computational electronic mail systems and suggests some techniques and approaches for improving the security of such systems. VL - 5 IS - 3 SN - 0968-5227 DO - 10.1108/09685229710175783 UR - https://doi.org/10.1108/09685229710175783 AU - Foo Schubert AU - Chor Leong Peng AU - Nam Sng Yee PY - 1997 Y1 - 1997/01/01 TI - Improving security in computational electronic mail systems T2 - Information Management & Computer Security PB - MCB UP Ltd SP - 102 EP - 110 Y2 - 2024/05/07 ER -