• Title/Summary/Keyword: Electronic mail

Search Result 167, Processing Time 0.025 seconds

An Implementation of the Security Service on Internet Mail System (인터넷 메일 시스템에서의 정보보호 서비스 구현)

  • 강명희;신효영;유황빈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.7 no.2
    • /
    • pp.107-122
    • /
    • 1997
  • Most of the currently used electronic mail system has the threat of security such as illegal leak of message, forgery, uncertain identity, denial of sending and receiving, and so forth. The security for this system is not satisfied yet, thus we explore these problems. In this thesis, we implement the security services for internet mail system which cover the weakness for traditional mail system. This system provides not only security services which PEM and PGP provides (i.e message confidentiality, message integrity, originator authentication, non-repudiation of origin), but also message replay prevention. and non-denial of recipient using certification of contents. In addition, this system increases security of the digital signature by signing with signature block formatting on the creation of it. And it increases security of the digital enveloping by encrypting with encryption block formatting of message encryption key.

Anticipated Benefits of electronic Commerce and Competitive Strategies (전자상거래를 통한 국내 인터넷 쇼핑몰 업체들의 기대 이득과 경쟁전략)

  • 장시영;이정섭
    • Korean Management Science Review
    • /
    • v.17 no.3
    • /
    • pp.31-47
    • /
    • 2000
  • The widespread diffusion of Internet has enables companies to conduct business in quite a different way. marketing on the Internet becomes more important as firms adopt electronic commerce as a means to implement competitive strategies. One hundred and four BC shopping mall companies responded to an e-mail and web server survey about the anticipated benefits of electronic commerce and related strategies. The survey also asked about improvements in value chain activities and impediments to the implementation of electronic commerce in Korea. The results indicated that Korean shopping mall companies followed differentiation strategy significantly more than the other two strategies. In addition, six benefits factors were drawn from this study - information, productivity, cost savings, customers, management information, and applications. Productivity factor was related to cost leadership strategy, and customers factor was related with cost leadership, differentiation and focus strategies. Several benefits factors were also correlated with value chain activity improvements. The results of this study were compared with those of research conducted in the United States.

  • PDF

Development of Adaptive Electronic Approval System(EAS) Based on Workflow Control (흐름제어 기반의 적응형 전자결재 시스템 개발)

  • Gwon, Yeong-Do;Sin, Dong-U
    • 연구논문집
    • /
    • s.30
    • /
    • pp.169-176
    • /
    • 2000
  • The Evolution of Workflow Managment consists of rhe automation of business procedures or "workflows" during which documents, information or tasks are passed from one participant to another in a way that is governed by rules or procedures. Workflow technologies have evolved from image management system, document management system, relational or object database systems, and electronic mail system. Workflow Management system has the benefits to improve better efficiency, process control,flexibility, business process. Automation of many business processes results in the elimination standdardizing working methods. Consistency in the processes leads to greater predictability in levels of response to customers and software control over processes enables their re-design in line with changing business needs, In this present study, we implement Electronic Approval System which is a kind of Workflow Management system using static and dynamic flow control information on the web environment.

  • PDF

A Study on the Preparation of Standardized Operation Criteria for Enhancement of Safety and Convenience of Mobile Electronic Notice Service

  • JongBae, Kim
    • International Journal of Advanced Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.547-554
    • /
    • 2022
  • Due to the expansion of non-face-to-face services, the demand for user identification for mobile devices is increasing. Recently, mobile resident registration cards, mobile driver's licenses, etc. are installed in mobile phones and used for user identification and authentication services. In order to identify a user online, unique identification information of the online user is required. In particular, in order to provide information only to online users, it is necessary to accurately deliver information to a mobile device owned by the user. To make this service possible, it was realized with the advent of mobile electronic notice service. However, the identification of online service users and information on mobile devices owned or subscribed by the relevant users require safe management as personal information, and it is also necessary to increase the convenience of online service users. In this paper, we propose an operating standard for providing a mobile electronic notice service that sends electronic notice using a mobile device owned by the user. The mobile electronic notice service is a service that provides notices expressed in electronic information to the recipient's cell phone, mobile app, e-mail, etc. Therefore, as the use of mobile electronic notification service increases and the provision and use of connecting information to identify users increases, it is necessary to expand the mobile electronic notification service while safely protecting users' personal information.

Toward a Social Sciences Methodology for Electronic Survey Research on the Internet or Personal Computer check (사회과학 연구에 있어 인터넷 및 상업용 통신망을 이용한 전자설문 조사방법의 활용)

  • Hong Yong-Gee;Lee Hong-Gee;Chae Su-Kyung
    • Management & Information Systems Review
    • /
    • v.3
    • /
    • pp.287-316
    • /
    • 1999
  • Cyberspace permits us to more beyond traditional face-to-face, mail and telephone surveys, yet still to examine basic issues regarding the quality of data collection: sampling, questionnaire design, survey distribution, means of response, and database creation. This article address each of these issues by contrasting and comparing traditional survey methods(Paper-and-Pencil) with Internet or Personal Computer networks-mediated (Screen-and-Keyboard) survey methods also introduces researchers to this revolutionary and innovative tool and outlines a variety of practical methods for using the Internet or Personal Computer Networks. The revolution in telecommunications technology has fostered the rapid growth of the Internet all over the world. The Internet is a massive global network and comprising many national and international networks of interconnected computers. The Internet or Personal Computer Networks could be the comprehensive interactive tool that will facilitate the development of the skills. The Internet or Personal Computer Networks provides a virtual frontier to expand our access to information and to increase our knowledge and understanding of public opinion, political behavior, social trends and lifestyles through survey research. Comparable to other technological advancements, the Internet or Personal Computer Networks presents opportunities that will impact significantly on the process and quality of survey research now and in the twenty-first century. There are trade-offs between traditional and the Internet or Personal Computer Networks survey. The Internet or Personal Computer Networks is an important channel for obtaining information for target participants. The cost savings in time, efforts, and material were substantial. The use of the Internet or Personal Computer Networks survey tool will increase the quality of research environment. There are several limitations to the Internet or Personal Computer Network survey approach. It requires the researcher to be familiar with Internet navigation and E-mail, it is essential for this process. The use of Listserv and Newsgroup result in a biased sample of the population of corporate trainers. However, it is this group that participates in technology and is in the fore front of shaping the new organizations of interest, and therefore it consists of appropriate participants. If this survey method becomes popular and is too frequently used, potential respondents may become as annoyed with E-mail as the sometimes are with mail survey and junk mail. Being a member of the Listserv of Newsgroup may moderate that reaction. There is a need to determine efficient, effective ways for the researcher to strip identifiers from E-mail, so that respondents remain anonymous, while simultaneously blocking a respondent from responding to a particular survey instrument more than once. The optimum process would be on that is initiated by the researcher : simple, fast and inexpensive to administer and has credibility with respondents. This would protect the legitimacy of the sample and anonymity. Creating attractive Internet or Personal Computer Networks survey formats that build on the strengths of standardized structures but also capitalize on the dynamic and interactive capability of the medium. Without such innovations in survey design, it is difficult to imagine why potential survey respondents would use their time to answer questions. More must be done to create diverse and exciting ways of building an credibility between respondents and researchers on the Internet or Personal Computer Networks. We believe that the future of much exciting research is based in the Electronic survey research. The ability to communicate across distance, time, and national boundaries offers great possibilities for studying the ways in which technology and technological discourse are shaped. used, and disseminated ; the many recent doctoral dissertations that treat some aspect of electronic survey research testify to the increase focus on the Internet or Personal Computer Networks. Thus, scholars should begin a serious conversation about the methodological issues of conducting research In cyberspace. Of all the disciplines, Internet or Personal Computer Networks, emphasis on the relationship between technology and human communication, should take the lead in considering research in the cyberspace.

  • PDF

Design and Development of an XML/EDI System (XML/EDI 시스템의 설계 및 구현)

  • Sin, Dong-Gyu;Sin, Dong-Il
    • The KIPS Transactions:PartD
    • /
    • v.8D no.2
    • /
    • pp.181-192
    • /
    • 2001
  • XML/EDI is different from traditional EDI because it offers the framework necessary for electronic commerce and extends the scope of the traditional EDI which focuses on data transfer. Since existing EDI services are moved to Internet platform and again to Web platform, users can use EDI in the integrated environment without inconvenience of using different EDI softwares, which have their own configurations. This paper describes the overall design and implementation of a Web-based XML/EDI system that is a core component for the electronic commerce. The constructed XML/EDI system in this paper is comprised of document generation module, document storage module, document search module, document management module, template document management module and e-mail transmission module. Requirements and design goal of XML/EDI system are introduced, detailed functionalities of modules and design facts are described and execution and execution procedures of the implemented system are explained.

  • PDF

The satisfaction of systems and services of Agricultural Products on Electronic Commerce (농산물 전자상거래 시스템 및 서비스에 대한 만족도 연구)

  • Kim, Deok Hyeon;Seo, Jeon Won;Son, Jang Hwan
    • Agribusiness and Information Management
    • /
    • v.1 no.1
    • /
    • pp.3-18
    • /
    • 2009
  • This research aims to examine consumers' general types of information search and their unsatisfactory factors in purchasing agricultural products on electronic commerce and analyze consumers' behavioral characteristics. As study subjects, 802 consumers who have visited the home pages of 14 households or companies, whose home pages are actively managed, were sampled. As a research tool, pop-up post and e-mail were used as research tools and questionnaires were asked three times. The date on research result were analyzed using SPSS 13 statistics package in terms of frequency, percentage, descriptive statistics, one-way ANOVA and correlation analysis.

  • PDF

An Efficient Identity-Based Deniable Authenticated Encryption Scheme

  • Wu, Weifeng;Li, Fagen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.5
    • /
    • pp.1904-1919
    • /
    • 2015
  • Deniable authentication protocol allows a sender to deny his/her involvement after the protocol run and a receiver can identify the true source of a given message. Meanwhile, the receiver has no ability to convince any third party of the fact that the message was sent by the specific sender. However, most of the proposed protocols didn't achieve confidentiality of the transmitted message. But, in some special application scenarios such as e-mail system, electronic voting and Internet negotiations, not only the property of deniable authentication but also message confidentiality are needed. To settle this problem, in this paper, we present a non-interactive identity-based deniable authenticated encryption (IBDAE) scheme using pairings. We give the security model and formal proof of the presented IBDAE scheme in the random oracle model under bilinear Diffie-Hellman (BDH) assumption.

A Study On The Improved Line Regulation For High Efficiency BoostDC-DCConverter (고효율 Boost DC-DC 변환기를 위한 Line Regulation 향상에 대한 연구)

  • Doo, Su-Yeon;Jeong, Seong-Yon;Chung, Jin-Il;Kwack, Kae-Dal
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.391-392
    • /
    • 2007
  • In recent, portable information and communication terminals such as a notebook computer, an electronic pocketbook, a hand personal computer(PC) have been regards as the leading role in the coming next generation portable multimedia terminals which have hi-directional wireless data communication capability and can receive information and communication services such as electronic mail, database searching, and electronic shopping at anytime and anyplace. Therefore, in this paper, the circuit is simulated by 0.35um memory process used Current Limit for Boost DC-DC converter. Supply voltage $2.5V{\sim}3.3V$, output voltage 5V, Clock Frequency 1MHz, output current 200mA and line regulation decreased 12.46%.

  • PDF

A Development of Agent for he Consumer Descision Information Reuse and Efficient Management of EC System (소비자 구매의사 정보 재사용과 전자상거래 시스템의 효율적 관리를 위한 에이전트 개발)

  • Seo, Sun-Mo;Yang, Hae-Sul;Kim, Jeong-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.5S
    • /
    • pp.1708-1718
    • /
    • 2000
  • In the operating of electronic commerce system, the information about consumer purchasing intention to product through e-mail has caused the problems in the management aspects. These are the using of information again and response to the situations promptly in consumer purchasing intension, etc. Moreover, it has brought out the issues timely to operate the electronic commerce system strategically with reapplication of consumer intention information. In this studies, the agent system AWEC(Agent Windows for EC) was proposed as an alternative paln, which charges of he getting and transmitting information of consumers intension in the electronic commerce system. In this proposed AWEC, the functional structure and working allocation were executed. And also eh performance of the proposed system is analyzed and evaluated through experiment.

  • PDF