• Title/Summary/Keyword: Internet E-mail

Search Result 293, Processing Time 0.022 seconds

A Study on the Automated Design of Business Card for Personal Information Leakage Prevention Using IT-based Convergent Service

  • Park, Jong-Youel
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.4
    • /
    • pp.25-30
    • /
    • 2018
  • When producing a business card, there is always a risk for exposing personal information as the information from the business card application is saved in the computer of the printing agency. The information that goes into the business card application file, such as name, mobile phone number, and e-mail address is not encrypted, which makes it easy to access. This study was conducted in order to find a way to automatize the business card application process by encrypting the information entered into the business card application file, simplifying the business card application process, minimizing the workload and by directly linking to the print shop to remove the print file after completing the printing of the business card.

A Study of the Alternative Means of Korean Resident Registration Number using the Authorized Certificate (공인인증서를 이용한 주민등록번호 대체수단에 관한 연구)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.107-117
    • /
    • 2014
  • The personal information extrusion accident(hacking, improper maintenance) by the internet has been increased rapidly during the last ten-year period. The personal information includes Korean resident registration number, name, cellphone number, home telephone number, E-mail address, home address, etc. Korean resident registration number is unchangeable from the cradle to the grave. Illegally accessed personal information can be wrongfully resoled or used at phishing scam. In this paper, we propose a alternative means of Korean resident registration number using the authorized certificate. The authorized certificate is in use safely in Internet. The authorized certificate(included Chinese name) is in used in offline service, the authorized certificate(included English name) is used in online(for government service) and the authorized certificate(not included name) is used in online(for private service). The authorized certificates are possible for discard, republication. The method can reduce the possibility of the personal information extrusion.

RP Preprocessor Based on Distributed Objects (분산객체를 응용한 RP Preprocessor의 기능 구현)

  • 지해성;이승원
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.20 no.2
    • /
    • pp.120-128
    • /
    • 2003
  • When considering the use of rapid prototyping (RP), there are many issues a designer has to address for handling an STL model, the de facto standard fur RP. Today designers can skip all these issues by visiting web-based service bureaus that readily supply needed information for the RP services. Since orders are taken for RP parts through the web page of service providers designers are now asked to upload their STL files to the company server either by direct upload, ftp file transfer, or as an e-mail attachment. If the service bureau, however, fixes or edits an STL filceto optimize the RP process but neglects to tell its customer about the rework in detail, it may cause problems down the line in processing of the original CAD data for other applications. In this paper, we propose a framework for a collaborative virtual environment between CAD designers and RP processes on the internet which directly provides designers with an advanced preprocessor functionality, design visualization, as well as model display, repair, and slicing over the network. This can help smooth data transfer from CAD to RP process with minimum inconsistency in CAD.

A Study on the Teaching Method of English Literature through the Internet and Its Effect -L2 Acquisition through British-American fiction in CCDL class between Kangwon National University and Waseda University-

  • Baek, Nak-Seung
    • English Language & Literature Teaching
    • /
    • v.8 no.1
    • /
    • pp.1-13
    • /
    • 2002
  • One of the benefits of the internet-assisted instruction is that it can improve L2 Learners' motivation to express themselves in English. The purpose of this paper is to investigate an effective approach to British-American fiction learning in Korean universities, which can emphasize communicative strategies drawing on video-conferencing system, a chat system(CUSeeMe), and an e-mail system. Students are passive participants who cannot assert their creativity in the traditional teaching method of British-American fiction, which mainly relies upon reading and translation far from literature lessons. In CCDL(Cross-cultural distance learning) class, students can play active roles in asserting their own ideas and assuming considerable responsibility for making a presentation in English. A professor can play a role as a coordinator in supporting the students' activities and in winding up the class. The main significance of this article lies in providing a paradigm for CCDL class beyond the limitation of the traditional teaching method of British-American fiction in Korea and futhermore in exploring the eclectic integration of the traditional one and CCDL.

  • PDF

Policy-based Reconfigurable Bandwidth-Controller for Network Bandwidth Saturation Attacks (네트워크 대역폭 고갈 공격에 대한 정책 기반 재구성 가능 대역폭제어기)

  • Park Sang-kil;Oh Jin-tae;Kim Ki-young
    • The KIPS Transactions:PartC
    • /
    • v.11C no.7 s.96
    • /
    • pp.951-958
    • /
    • 2004
  • Nowadays NGN is developed for supporting the e-Commerce, Internet trading, e-Government, e-mail, virtual-life and multimedia. Internet gives us the benefit of remote access to the information but causes the attacks that can break server and modify information. Since 2000 Nimda, Code Red Virus and DSoS attacks are spreaded in Internet. This attack programs make tremendous traffic packets on the Internet. In this paper, we designed and developed the Bandwidth Controller in the gateway systems against the bandwidth saturation attacks. This Bandwidth con-troller is implemented in hardware chipset(FPGA) Virtex II Pro which is produced by Xilinx and acts as a policing function. We reference the TBF(Token Bucket Filter) in Linux Kernel 2.4 and implemented this function in HDL(Hardware Description Language) Verilog. This HDL code is synthesized in hardware chipset and performs the gigabit traffic in real time. This policing function can throttle the traffic at the rate of band width controlling policy in bps speed.

Open Markets and FDS(Fraud Detection System) (오픈마켓과 부당거래 방지 시스템)

  • Yoo, Soon-Duck;Kim, Jung-Ihl
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.113-130
    • /
    • 2011
  • Due to the development of information and communication technology, the global influence on politics, economics, society, and culture has grown. A major example of this impact on the economic sector is the growth of e-commerce, which increases both the speed and efficiency of businesses. In light of these new developments, businesses need to shift away from the misconception that information overwhelms to embrace the enhanced competitiveness that e-commerce provides. However, concern about fraudulent transactions through e-commerce is pertinent because of the loss in both critical revenue and consumer confidence in open markets. Current solutions for fraudulent transactions include real-time monitoring and processing, payment pending, and confirmation through SMS, E-mail, and other wired means. Our research focuses on the management of Fraud Detection Systems (FDS) to safeguard online electronic payment systems. With effective implementation of our research we hope to foster an honorable online trading culture and protect consumers. Future comparative research in domestic and abroad markets would provide further insight into preventing fraudulent transactions.

Relationship of Internet Addiction and Mental Health of 5-6th year Students in Elementary Schools (초등학교 5.6학년 학생의 인터넷 중독과 정신건강과의 관계)

  • Kim, Hye-Jung;Cho, Bok-Hee
    • Journal of the Korean Society of School Health
    • /
    • v.16 no.2
    • /
    • pp.97-110
    • /
    • 2003
  • The purpose of this study is to find out the relationship between internet addiction and mental health of 5-6th grade students in elementary schools and to provide some basic data to develop a program for prevention and treatment of internet addiction. The study is the research of the descriptive correlation and the subjects of the study were 643 students from 5th and 6th year children of four elementary schools in four districts which are located in G city. The data were analyzed by SAS program with frequency, percentage, means, standard deviation, x2-test, ANOVA and Pearson's Correlation Coefficient. The results were as follows: 1. In the demographic characteristics of the subjects, the boys were 50.5%, girls 49.5% and 5th grade students were 48.4%, 6th grade 51.6%. The purposes of the internet using were e-mail 40.3%, game 37.5%. 2. In the degree of the internet addiction were 4.5% of addiction, 38.7% of addiction tendency and 56.8% of non-addiction. 3. The score range of the degree of the mental health index of the subjects' were 26-28, mean 47.8. 4. There were significant differences in mental health index(F=34.01, p= .000) to the degree of the internet addiction. 5. There were significant negative correlation between the degree of internet addiction and the mertal health index(r=0.342, p= .000). The result of the study showed the students who are in high-grade in elementary school have already addicted to using of the internet as much as the youth and the more they addicted to the internet, the lower mental health index they have. According to increasing of the using internet among the elementary school students, the internet addiction of them have increased. Therefore, it is necessary to develope a program for prevention and treatment of the internet addiction.

An Empirical Study on the Utilization and Activation of Electronic Trade by Korean Middle and Small Firms (${\cdot}$소 수출기업의 전자무역 활성화를 위한 영향요인 분석에 관한 연구)

  • Park Ki-Nam
    • The Journal of Society for e-Business Studies
    • /
    • v.10 no.2
    • /
    • pp.133-150
    • /
    • 2005
  • Electronic Trade is dramatically changing classical international trade paradigms. In particular, under the new economic environment, the ability to utilize and Information Technologies such as Electronic Data Interchange, Web-based EDI, ebXML, web service, Internet are emerging as an important factor in deciding the competitiveness of export business. The primary purpose of this study is (1) to investigate motivation factors and performance factors of electronic trade, (2) to show the relationship between motivation factors and the level of the utilization of e-trade, (3) to reveal the relationship between the level of the utilization and performance factors of e-trade. Analysis of survey questionnaire of Korean middle and small companies indicates the following : (1) motivation factors such as cost factor, education and promotion and the search of new market, have positive effect on the level of utilization of e-trade. (2) the level of utilization of e-trade has positive effect on the performance factors such as cost factor, the search of new market, the improvement of task process.

  • PDF

The Present and Future of Avata Fashion Market - The Strategic of Avata Fashion Marketing- (아바타 패션시장의 현재와 미래 -아바타 시장 패션 마케팅의 전략적 접근-)

  • 송영주
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.5 no.1
    • /
    • pp.47-57
    • /
    • 2003
  • Today there are increasing number of internet users. Internet is wide use of banking, shopping, school and studding. Also, internet is used in everyday living and its use is getting larger. Korea has the one of the most use of internet in the world. Most of houses have computer with internet, and there are alot of PC rooms in the streets. anyone can enjoy the internet anytime anywhere. Now, in internet there are group formed by community purpose. The 'dot com' companies was not making much of profit from their goods. However, they came out with an idea "avata" Soon, the avata became a hit and its known for its success. Avata is used for E-mail, name card, post stamp, and chatting. Also, Avata is very popular among chatting service, icon chatting, and 3D graphic chatting. Avata represent the user himself in internet and computer created imaginary space, and it connects between imaginary space and reality, also it exist between real name and nick name. Past years, the internet users were satisfied with their nick name, however resent year users wants to express them more. For the result the "Avata" is created to fulfill the need to express user themselves. There are three different ways to see how Korean react to fashion industry. first, Korea's land structure makes the density of population high, the transmission of information is very fast. Next, collectively is high among Koreans. Finally wide use to internet made the transmission of the fashion information much faster. The User wants to keep up with the fashion at the sametime they want to express themselves, and "avata" is the one that fulfill their needs. New technology and the desire to express themselves made the new term "avata industry". which was never existed before. In addition, the internet markets have potential power. Although, it is in start stage of avata industry. However, the experts say that its possibility of its development is not predictable. In conclusion, watch the development of a situation to analyze the avata industry and develop new avata fashion market.

  • PDF

An Exploratory Study on the Classified by Cluster Analysis of the Internet Shopping Mall Users (인터넷쇼핑몰 이용자의 I-VALS 군집분류에 관한 탐색적 연구)

  • 심완섭
    • The Journal of Information Technology
    • /
    • v.5 no.1
    • /
    • pp.39-50
    • /
    • 2002
  • In order for Internet Shopping Mall to be successful, it must have a theoretical framework that considers the characteristics of the Internet shopping mall users. But as of yet, there is virtually no such framework. The purpose of this study is to provide internet shopping mall in our country with the suggestive point in the marketing strategy for coping with our continuously changing environment on the basis of data gained through the following results of my research work. Hitting upon this situation, this research intends to classified by Cluster Analysis the I-VALS in Internet Shopping Mall. As a result, the purpose of this research is to supply useful data on establishing Department Internet Showing Mall. We used two methods. The first method was directly distributing questionnaires to cyberconsumers by use of one researcher who has been trained in people. The second method was sending E-mails, Fax, Mail designed to induce participation in questionnaires. Through these methods, we were able to obtain participation of people from across the country. Using 179 responses, we derived statistics by means of SPSS Win Version 10.0. The result of Empirical analysis is as follow : first, to pick out 9 factors from I-VALS of users of internet shopping mall. Second, as the result of there was a statistically significant difference between the I-VALS of internet shopping mall. As the result of the Cluster Analysis, I could see there classified 3 factors from I-VALS of users of internet shopping mall. We have know segmentation of internet shopping malls on the standard of user life, and partially significant difference with respect to using internet shopping mall information of I-VALS.

  • PDF