• Title/Summary/Keyword: Internet E-mail

Search Result 293, Processing Time 0.026 seconds

Design of A Spammail Control Model Based on Hierarchical Policy (정책기반의 계층적 스팸메일 제어모델 설계)

  • Lee Yong-Zhen;Baek Seung-Ho;Park Nam-Kyu;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.143-151
    • /
    • 2005
  • As the internet and I-commerce have been developing. a novel method for marketing is needed. A new advertisement using E-mail is becoming popular, because it has characteristics with low costs and relative efficiency. However. as the spam mails are increasing rapidly, mail service companies and users are deeply damaged in their mind and economically. In this paper, we design a hierarchical spam mail blocking policy through cooperation of all the participants-user, administrator, ISP to cut off the spam mail efficiently and Propose an efficient model to block and manage the spam mails based on the Policy. Also we prove the efficiencies and effectiveness of the proposed model through evaluation process .

  • PDF

Implementation of Encrypted Mail Program using SMTP and POP3 (SMTP와 POP3를 활용한 암호화 메일 프로그램 구현)

  • Kong, Keon-Woong;Won, Yonggwan
    • Journal of Digital Contents Society
    • /
    • v.18 no.7
    • /
    • pp.1403-1409
    • /
    • 2017
  • As the Internet evolves, security becomes more important. Especially, e-mail has become one of the most important services that companies and ordinary users use on the Internet. However, security vulnerabilities such as sniffing attacks, IDs, and password spoofs are causing many problems. This paper introduces an example of implementation of encrypted mailing program with which the secured mail is encrypted by symmetric key methode and the encrypted message can not be read without proper decryption. In order to use the current mailing systems, we keep the rules related to SMTP and POP3, and only the encrypted message is stored in the mail server system and the message can be decrypted only at the terminals of the senders and the receivers with the key which is shared in advanced by independent route between them. This implementation scheme can provide an efficiency that it does not request any change of current mailing system, which can be an additional security protection.

Realization of a Remote Management System for Process Inspection of Chip-Mounter

  • Lim, Sun-Jong;Joon Lyon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2002.10a
    • /
    • pp.91.4-91
    • /
    • 2002
  • Today, Internal offers WWW(World Wide Web), remote control, file transfer and e-mail service. Among the services, WWW takes large portion because of convenient GUI, easy information search and unlimited information registration. WWW service gives the comfort in life such as goods purchase, information search, real-time news, internet TV and medical diagnosis. Remote Monitoring Server(RMS) Ssystem that uses internet and WWW is constructed for chip mounter. Hardware base consists of RMS, chip mounter and C/S(Customer Service) service. Software includes DBMS and various modules in server home page. Web browser provide product num her, bad product number, troubl...

  • PDF

A Study of the Improvement Method of I-pin Mass Illegal Issue Accident (아이핀 대량 부정발급 사고에 대한 개선방법 연구)

  • Lee, Younggyo;Ahn, Jeonghee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.11-22
    • /
    • 2015
  • The almost of Web page has been gathered the personal information(Korean resident registration number, name, cell-phone number, home telephone number, E-mail address, home address, etc.) using the membership and log-in. The all most user of Web page are concerned for gathering of the personal information. I-pin is the alternative means of resident registration number and has been used during the last ten-year period in the internet. The accident of I-pin mass illegal issue was happened by hacker at February, 2015. In this paper, we analysis the problems of I-pin system about I-pin mass illegal issue accident and propose a improvement method of it. First, I-pin issue must be processed by the off-line of face certification in spite of user's inconvenience. Second, I-pin use must be made up through second certification of password or OTP. The third, the notification of I-pin use must be sent to the user by the text messaging service of cell-phone or the E-mail. The forth, I-pin must be used an alternative means of Korean resident registration number in Internet. The methods can reduce the problems of I-pin system.

Design of Face Recognition based Embedded Home Security System

  • Sahani, Mrutyunjanya;Subudhi, Subhashree;Mohanty, Mihir Narayan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1751-1767
    • /
    • 2016
  • Home security has become the prime concern for everyone in present scenario. In this work an attempt has been made to develop a home security system which is accessible, affordable and yet effective.The proposed system is based on 'Remote Embedded Control System' (RECS) which works both on the web and gsm platform for authentication and monitoring. This system is therefore cost effective as it relies on existing network infrastructure. As PCA is most popular and efficient algorithm for face recognition, it has been usedin this work. Next to it an interface has been developed for communication purpose in the embedded security system through the ZigBee module. Based on this embedded system, automated control of door movement has been implemented through electromagnetic door lock technology. This helps the users to monitor the real-time activities through web services/SMS. The web service consists of either web browser command or e-mail provision. The system establishes the communication between the system and authenticated user. The e-mail received by the system from the authorized person will monitor and control the real-time operation and door lock. The entire control system is reinforced using ARM1176JZF-S microcontroller and tested for actual use in the home environment. The result shows the experimental verification of the proposed system.

The study on satisfaction and intent to reuse by type of advertisement as a result of Internet fashion information search (인터넷 패션 정보탐색에 따른 광고유형별 만족도와 재이용의도에 관한 연구)

  • Je, Eun-Suk
    • Journal of Fashion Business
    • /
    • v.16 no.2
    • /
    • pp.62-73
    • /
    • 2012
  • This study is intended to analyze the effect of fashion consumer's information search on satisfaction with advertisement and the intent to reuse depending on type of advertisement. The survey of the men and women in their 20s and 30s living in Seoul and metropolitan area was conducted for data collection, beginning in 17th through 24th, October 2011. Total 355 copies of questionnaire were used for final data analysis and reliability analysis, factorial analysis and multiple regression analysis were carried out using SPSS 16.0. The results were as follows. First, for banner, e-mail and search advertisement, constant information search had influence on convenience for use and satisfaction with information, and for e-mail advertisement, information search appeared to have had effect on satisfaction with information. Second, constant information search by type of advertisement had effect on intent to reuse. Third, convenience for use, information and satisfaction with the interest by Internet user had influence on the intent to reuse, while for the user of search advertisement, convenience for use and satisfaction with information had effect on the intent to reuse.

Factor's Related to Self-Perceived Health of Young Adults (청년층의 자기인지건강 관련 요인)

  • Cho, Woo-Hyun;Suh, Il;Park, Jong-Ku;Park, Kee-Ho
    • Journal of Preventive Medicine and Public Health
    • /
    • v.33 no.4
    • /
    • pp.415-425
    • /
    • 2000
  • Objectives : To determine which factors are related to young adults perception of their health. Two research questions were asked. Which aspects of health does self-perceived health as a index of general health reflect? Why do two individuals with the same level of general health have different health perceptions? Methods : The sampling frame comprised college or graduate school students, aged 20 to 29, who were members of A, one of the 4 biggest internet communication services. The questionnaires were sent to study samples(n=1,000) and answered by E-mail. Response rate was 37.0%. Results : Firstly, physical health ranked highest and self-perceived health ranked lowest. Secondly, health, anxiety, depression, and self-perceived health showed significant differences between the sexes, with women showing a higher health status in these categories except for self-perceived health. Thirdly, the two factors significantly related to self-perceived health were physical health and self-esteem, as determined by multivariate analysis, Conclusions : The factors significantly related to self-perceived health were physical health and self-esteem. Further studies of the health characteristics of young adults are needed.

  • PDF

The Personal Information Management Practices of the Graduates of the Department of Information Studies at Kuwait University

  • AlRukaibani, Bashaer;Chaudhry, Abdus Sattar
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.9 no.1
    • /
    • pp.19-42
    • /
    • 2019
  • This study examined activities involving the finding, organizing, managing, and re-finding of information by knowledge workers in Kuwait. This research also conducted a review of the tools needed for effective personal information management (PIM) and assessed perceptions about improving PIM through Internet use. Data were collected through semi-structured interviews conducted among 26 graduates of the Department of Information Studies at Kuwait University. These participants are currently employed in different sectors engaged in a variety of information-related activities. This study's findings indicated that participants gathered different types of information from a variety of sources. This information was stored using several devices and services, including desktop computers, shared drives, clouds, bookmarked websites, e-mail correspondence, and favorites lists. Participants organized information in personal folders according to categories such as subject/topic, time, project, document type, and geographical region. Preferred methods for information re-finding included searching by keyword and browsing through folders. Interviewees reported problems of information overload, fragmentation, and anxiety. Most were active in social media via mobile device, while some of them used Siri or Ask Google to retrieve information. Tools used for PIM included calendars, tasks, schedules, e-mail management tools, clouds, and social networking tools. Participants reported that the Internet helped with personal information management practices, but that some privacy issues arose in this context.

An experimental study about integrated service environment based on e-mail by using rich internet application concept (리치 인터넷 어플리케이션 개념을 적용한 전자메일 기반의 통합 서비스 환경 구현 사례 연구)

  • Kim, Bum-Jae;Shin, Yong-Tae
    • Journal of Digital Contents Society
    • /
    • v.7 no.4
    • /
    • pp.263-269
    • /
    • 2006
  • The trend of the web is moving from portal-centered to user-centered, and RIA(rich internet application) is considered best solution for usability and functionality of the next generation web. But the lack of reference document or technical guide for RIA implementation is a big obstacle for extension of RIA environment to practical business engineer or user. In this paper, I will suggest the implementation conceptand reference site for user-centered environment based on RIA concept. The suggested concept support wire/wireless environment, and use the e-mail that is already used by many company or portal. The contents of this paper will be very helpful to the practical engineer or portal/company that want to use or implement about RIA environment.

  • PDF

Internet Information Service using Telephony and Fax, ITC-CSCC’2000

  • Jang, Young-Gun;Cho, Kyoung-Hwan
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.691-694
    • /
    • 2000
  • This paper is addressed to Internet telephony based service implementation. It describes an implementation method which uses ARS as a gateway which combines Internet and traditional public switched telephone network for Internet information service using telephony and fax, is different to traditional Internet telephony which provide enhanced speech quality and low cost functionality. This method allows telephony and/or fax user to get Internet information without additional Internet bill, Internet infrastructure and low connection quality from low signal bandwidth connected him. Implemented system is useful to a special kind information service such as climate information of Korea etc and simpler than WAP based service as for wireless mobile telephony user. We implement job opportunity information and advertisement service supported by Home page of Choong Book Small & Medium Business Administration and e-mail service supported by Korean Society for Rehabilitation of persons with Disabilities to demonstrate the system ability. As a result of test implementation, this service system works good fur blind persons and graduated persons without job, is expected to apply for special Internet information provider via Voice and Fax.

  • PDF