• Title/Summary/Keyword: 이메일 관리

Search Result 115, Processing Time 0.024 seconds

A Study on the Present E-mail Marketing Status and Its Effective Utilization Methods on Local Internet Shopping Malls (국내(國內) 인터넷 패션 쇼핑몰의 E-mail 마케팅 현황(現況)과 효율적(效率的) 활용방안(活用方案)에 관(關)한 연구(硏究))

  • Jung, Yun-Kyoung;Kim, Il
    • Journal of Fashion Business
    • /
    • v.7 no.1
    • /
    • pp.38-54
    • /
    • 2003
  • This study looked into the present status of e-mail marketing, which is conducted in local Internet fashion shopping malls and is being used as a one-to-one marketing method in the e-CRM concept so as to establish an effective e-mail marketing policy by grasping problems based on the current status and by presenting solutions to the problems. This study analyzed the e-mail letters received during a certain period of time by 30 professional Internet fashion shopping malls of with famous goods, brands and non-brands. Four individuals subscribed to shopping mall through the procedure for membership applying for e-mail services. The analysis showed that there were no shopping malls that were doing a differentiated e-mail marketing among Internet shopping malls. As for time factor, they were sending e-mail letters irregularly regardless of a certain cycle. And as for visual factor, they didnt have any standard for the content of the mail. As for content factor, the contents of their mail were not differentiated and all the same. The comparison of fashion malls showed that the brand shopping malls were the most active in e-mail marketing. On the basis of the problems, the direction for the effective e-mail marketing of Internet shopping malls are presented as follows: First, individualized contents fitting for customers should be developed, and differentiated mailing services should be provided thereby. Second, each shopping mall should make periodic tests of mailing to find out the optimal time and day to provide e-mail services to the customers at the designated time. Third, e-mail should be differentiated fitting for the website according to a certain on a certain standard for visual effects and the identity of shopping mall should be established. Firth, in the contents of e-mail, the image and message elements should be properly harmonized and creative policies should be made with interactive or recreational elements. Fifth, a homepage policy which can satisfy customers demand for information when the e-mail is clicked on..

A Study on the Factors Influencing the Satisfaction of Certification and Support Policy of Innovative Pharmaceutical Companies : Focusing on the policy formation process variables (혁신형 제약기업 인증·지원 정책만족도에 대한 영향요인 연구 : 정책형성과정 변인을 중심으로)

  • Kim, Daejin;Oh, Kihwan;Ha, Dongmun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.8
    • /
    • pp.360-369
    • /
    • 2018
  • Innovative pharmaceutical company certification support policies have been implemented since 2012. This study was conducted to identify the perceptions of stakeholders and related experts on the formation process and policy satisfaction of this policy, and to identify factors that explain policy satisfaction. The survey was conducted by e-mail and facsimile of the pharmaceutical companies, universities, and government - affiliated research institutes. The effective response rate was 38.4% (61/159). As a result of the cross-sectional survey, the perception of policy necessity was the most positive among the policy formation process, and all the other stages and perception of policy satisfaction were at the medium level. As a result of examining the influential factors related to the variables of the respondents' personal variables and the policy formation process, it is confirmed that the factors that have the greatest influence on the policy satisfaction are the perception of the performance of the certified company. Also, perceptions of appropriateness and follow - up ability were similar in magnitude of impact on policy satisfaction. This study can be used as a basic data to systematically and effectively improve the certification and support policies of innovative pharmaceutical companies based on the consumer's perception. However, due to limitations such as being carried out at the beginning of policy implementation, verification and supplementation are necessary through further research.

Factors Related to Smartphone Dependence among Adults in Their 20s (20대 성인의 스마트폰 의존 관련 요인)

  • Park, Jeong-Hye
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.195-204
    • /
    • 2020
  • The purpose of this study was to explore factors associated with smartphone dependence among adults in their 20s. The data were derived from the 2017 Survey on Smartphone Over-dependence conducted by the Ministry of Science and ICT and the National Information Society Agency. There were 3,684 participants. The data were analyzed by frequency, percentage, mean, standard deviation, independent t-test, Pearson's correlation coefficient, and weighted hierarchical multiple regression analysis. For the results, factors related with higher smartphone dependence of participants were duration (β=.18, p=.000) and frequency (β=.04, p=.000) of usage, gaming (β=.15, p=.000), watching videos (β=.09, p=.000), mobile shopping (β=.05, p=.000), working (β=.05, p=.010), e-mailing (β=.13, p=.000), and sports betting (β=.07, p=.000). Music (β=-.07, p=.000) and adult content (β=-.07, p=.000) significantly reduced their smartphone dependence. SNS (Social Networking Services) (β=.01, p=.358) and instant messengers (β=-.02, p=.330) were not factors related to smartphone dependence. However, instant messengers were the most used by participants and had a strong correlation with working (r=.55, p=.000). This study shows that smartphone usage patterns related with smartphone dependence among adults in their 20s are different from those of children and adolescents. These results could be used to more deeply understand smartphone dependence among adults in their 20s and plan early detection and prevention and care of dependence.

Analysis of Threats and Countermeasures on Mobile Smartphone (스마트폰 보안위협과 대응기술 분석)

  • Jeon, Woong-Ryul;Kim, Jee-Yeon;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.153-163
    • /
    • 2011
  • Smartphone is a mobile device which can perform better than feature phone. Recently, growth in demand for advanced mobile devices boasting powerful performance, market share of smartphone is increasing rapidly in mobile device market, for example, iphone and android phone. Smartphone can provide many functionalities, e-mail, scheduler, word-processing, 3D-game, and etc, based on its powerful performance. Thus, various secret information is integrated in smartphone. To provide service, sometimes, smartphone transmits informations to outside via wireless network. Because smartphone is a mobile device, user can lose his/her smartphone, easily, and losing smartphone can cause serious security threats, because of integrated information in smartphone. Also data which is transmitted in wireless network can be protected for privacy. Thus, in present, it is very important to keep secure smartphone. In this paper, we analyze threats and vulnerabilities of smartphone based on its environments and describe countermeasures against threats and vulnerabilities.

Design and Implementation of Web Mail Filtering Agent for Personalized Classification (개인화된 분류를 위한 웹 메일 필터링 에이전트)

  • Jeong, Ok-Ran;Cho, Dong-Sub
    • The KIPS Transactions:PartB
    • /
    • v.10B no.7
    • /
    • pp.853-862
    • /
    • 2003
  • Many more use e-mail purely on a personal basis and the pool of e-mail users is growing daily. Also, the amount of mails, which are transmitted in electronic commerce, is getting more and more. Because of its convenience, a mass of spam mails is flooding everyday. And yet automated techniques for learning to filter e-mail have yet to significantly affect the e-mail market. This paper suggests Web Mail Filtering Agent for Personalized Classification, which automatically manages mails adjusting to the user. It is based on web mail, which can be logged in any time, any place and has no limitation in any system. In case new mails are received, it first makes some personal rules in use of the result of observation ; and based on the personal rules, it automatically classifies the mails into categories according to the contents of mails and saves the classified mails in the relevant folders or deletes the unnecessary mails and spam mails. And, we applied Bayesian Algorithm using Dynamic Threshold for our system's accuracy.

Determining the Priorities of Korean Suicide Prevention Policies using Analytic Hierarchy Process(AHP) (AHP기법을 이용한 우리나라 자살예방정책의 우선순위 설정)

  • Kim, Hyo-Jin;Lee, Sue-Hyung;Kang, Eunjeong
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.1
    • /
    • pp.252-263
    • /
    • 2015
  • Since 2004 suicide in Korea was the number 1 cause of mortality among OECD countries, the suicides and suicide mortality rate is constantly increasing. Using AHP(Analytic Hierarchy Process), we examined the main approaches and detailed policies of suicide prevention to confirm an effective suicide policy. A workshop and survey were conducted on August 23rd and 26th, 2013, with 30 people. There were 20 academics (4 social workers, 7 mental health workers, 5 psychiatrists, 4 clinical psychologists), and 5 policymakers and 5 administrative staff. In additional 5 people from social welfare and 5 from clinical psychology fields were survey from september 9 to 12 by e-mail. The research found 4 priorities. They include, suicide attempt management, building up public infrastructure for suicide prevention, support to bereaved families, and crisis management of high risk groups in society.

An Exploratory Study of Biotechnology Scientists' Research Data Sharing Intention: The Moderating Effects of Academic Reputation (생명공학 분야 연구자의 연구데이터 공유 의도에 영향을 미치는 요인에 관한 연구: 학술적 평판의 조절효과를 중심으로)

  • Kim, Sun
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.1
    • /
    • pp.45-68
    • /
    • 2022
  • The objective of this study is to investigate the factors which influence biotechnology scientists' data sharing intention. This study employed Ostrom's theory of collective action. The target population of this study includes scientists and students of biotechnology field in South Korea. A total of 411 responses which collected by e-mail were used for the final data analysis. The summary of this study is as follows. First, norm of data sharing and academic reciprocity were found to have significant positive influences on data sharing intention directly. Second, perceived community trust was found to have significant positive influences on data sharing intention when academic reciprocity was the mediator. Third, academic reputation showed the moderating effects on the relationship between norm of data sharing and academic reciprocity, and between norm of data sharing and data sharing intention. These findings show that researchers can approach the data sharing behaviors by using the mechanism of trust, norms, reciprocity, and reputation and indicate necessity for a development of academic reputation system to promote more data sharing behaviors of researchers.

Dental Office Manager Current Conditions by Scale of Korean Dental Clinic (치과병(의)원의 규모에 따른 중간관리자의 현황)

  • Park, Young-Nam;Park, Keum-Ja;Oh, Sang-Hwan;Kim, Sook-Hyang
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.10
    • /
    • pp.267-273
    • /
    • 2010
  • The present study examined factors for current conditions of dental office manager in Korean dental clinic. 108 randomly selected members of Korean dental office manager responded to a questionnaire. A survey was conducted for a month from 1, June 2008, and the chi-square test and ANOVA were used in the statistical analysis. The findings of the study were as follows: The number of members depending on the type of occupation dental hospital was the highest number of members, members of the dental hygienist at the dental hospital number significantly higher. The career of dental office manager followed by 1-5 year in dental hospital, 5-10 year in dental network, 1-5 year in dental clinic accounting for 48%, 52.9%, 69.4%. The difficulty during duty performance are high expectation of owner in dental hospital, learning of dental office manager duty in dental clinic. The duty of dental office manager followed by customer service, appointment scheduling, telephone etiquette, treatment plan. Henceforth, it needs to standardize the Korean name of dental office manager and duty. Also, it have to an official certification system.

Cacti-based Network Traffic Monitoring System Using Libpcap (Libpcap를 이용한 Cacti기반 네트워크 트래픽 모니터링 시스템)

  • Lee, Sung-Ock;Jiang, Zhu;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.8
    • /
    • pp.1613-1618
    • /
    • 2012
  • For network is growing at a rapid rate, network environment is more complex. The technology of using network traffic to monitor our network in real-time is developed. Cacti is a representative monitoring tool which based on RRDTool(Round Robin Database tool), SNMP(Simple Network Management Protocol). In this paper, it show you how to develop a system which based on Cacti and Libpcap to monitor our monitored objects. At this system, using Libpcap to capture network traffic packets, analyze these packets and then turn out in Cacti in graphical form. So as to achieve monitoring system. This system's execution is efficient and the management is easy and the results are accurate, so it can be widely utilized in the future.

Current Status of Information Security against Cyber Attacks in Universities and Its Improvement Methods (사이버 공격에 대비한 대학의 정보보안 현황 및 개선 방안)

  • Kang, Young-Sun;Choi, Yeong-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.215-225
    • /
    • 2011
  • This paper suggests several methods of improving information securities of universities through the investigations of the current status of information securities in universities, which is becoming a hot topic in knowledge and information societies. In this paper, universities were randomly selected according to their size, and surveyed through email questionnaire to the persons in charge of security in each university, and 27 universities and 18 colleges were replied. From the survey results we confirmed that the pre-prevention is the most important thing in securing information assets, also in universities, and, in this paper, systematic support must be strengthened to establish a comprehensive security management policy and guidelines for the universities, and the importance of information assets and the necessity of security needs to be shared with the members in the universities. Moreover there must be full administrative and financial support, including recruitment and training of information security professionals and the establishing a separate security division.