• Title/Summary/Keyword: electronic mail

Search Result 168, Processing Time 0.022 seconds

A Study On Malicious Mail Training Model (악성메일 훈련 모델에 관한 연구)

  • Kang, Young-Mook;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.197-212
    • /
    • 2020
  • With the advent of virtual currency and electronic wallets creating a way to make financial gains based on anonymity, malicious code dissemination using malicious mail has continued to increase. In order to minimize the damage, the human factors, security awareness and the ability to respond, which are technical factors, should be improved evenly, which can be improved through malicious mail training. This study presented a model considering the performance of malicious mail training, such as practice. It was classified as a training for enhancing awareness of security for employees and detection and response to improve their ability to respond to malicious mail. A training system suitable for the purpose, the core functions of malware training, implementation and camouflage skills, and bypass techniques were described. Based on the above model, the training data conducted over three years were collected and the effectiveness of the training was studied through analysis of the results according to the number of training sessions, training themes and camouflage techniques.

전자상거래의 동향과 전망

  • Im, Chun-Seong
    • 정보화사회
    • /
    • s.113
    • /
    • pp.10-15
    • /
    • 1997
  • 전자상거래란 '기업과 기업간 거래관계의 모든 측면에서 걸쳐 전자적으로 비지니스를 행하는 것'이라고 정의할 수 있으며, 이는 정형화된 전자문서를 주고 받는 전자문서(EDI), 전자우편(E-Mail), Fax, Bar-Code, 전자자금이체(EFT:Electronic Funds Transfer), 화일전송, 전자정보서비스(디렉토리, 카탈로그, 시장통계, 기술적인 문서 등 데이터베이스 서비스), 음성사서함, 이미지 시스템, 비디오 메세징 등 그 종류와 형태가 다양하다.

  • PDF

Electronic Mail with Certification of Delivery and Contents (배달 및 내용 증명이 가능한 전자메일)

  • 박춘식
    • Review of KIISC
    • /
    • v.7 no.2
    • /
    • pp.73-84
    • /
    • 1997
  • 인터넷의 보급으로 인한 전자 메일의 증가가 급증하고 있다. 컴퓨터 통신망을 통해 주고받는 전자 문서에 대해 문서의 내용과 그 문서가 배달되었음을 증명해주는 현행 우편제도하에서의 특수우편물 취급 서비스가 그대로 적용될 수 있다. 본 고에서는, 이러한 서비스를 고려한 기존의 전자우편 방식들을 조사 분석하여 정리하고자 한다. 분석된 자료들은 전자 우체국의 구현이나 실현을 위해 활용될 수 있으리라 생각된다.

  • PDF

Home Security System Based on IoT (IoT 기반 홈 보안 시스템)

  • Kim, Kang-Chul;Wang, Ding-Hua;Han, Seok-Bung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.147-154
    • /
    • 2017
  • This paper aims to build a home security system based on IoT to monitor a home on a mobile phone. The system consists of data gathering sensors, camera, gateway and Xively platform. The Raspberry Pi collects data from the three sensors and sends the data to Xively, and sends the video stream of home to a client in a smart phone through a internet. The servers are composed of Xively, socket server in Raspberry Pi and E-mail server in Google. The proposed system transmits e-mail, text message, and video stream when there are motion, fire, and gas leakage, and can control the gas valve through Raspberry Pi. The experimental results show that a user gets 'emergency E-mail' and text message and watches the video stream of the home through WIFI or LTE on a smart phone.

A Study On Managing Electronic Mail Messages as Records of Public Institutions (공공기관의 이메일기록 관리 방안 연구)

  • Song, Ji Hyoun
    • The Korean Journal of Archival Studies
    • /
    • no.15
    • /
    • pp.141-183
    • /
    • 2007
  • It is not an overstatement that nowadays electronic mails are communicated more frequently as well as conveniently than phones and facsimiles, not only in routine life hot also in business transactions. Also, it is evident that emails will be used more and more as a communication method between internal and external organizations. If the information transferred and received via emails takes a role of business records, it is no wonder that emails should be uniformly managed as public records. Currently, however, specific policies or guidelines for the management of email records are not available, nor do most of public employees realize that emails are the actual records of the organization. In fact, the three research methods have been used for this study in the purpose of the establishment of email records management scheme. First of all, bibliographic research has been conducted in an effort to describes the definition and types of email records indicated in the guidelines of each nation, as well as the differences from the transitory email messages. Secondly, email management guidelines and policies of public institutions of England, The United States, Australia, and Canada, so-called the advanced countries of the records management, have been analyzed to examine the advanced examples of email management. In order to manage email records effectively, the functional requirements - capture, classification, storage, access, tracking, disposition, and role and responsibility were categorized in this thesis, based on the ISO 15489. As the designs of these foreign guidelines vary one another, common factors of them were extracted to be included in the realm of the seven stages. Lastly, this thesis has analyzed characteristics of the email system within the Electronic Document Management System of existing administrative institutions. Also, it has examined the overall environment of the email records management of public institutions and sought out its improvement. In essence, focused on the crucial factors on email management drawn out from the email management guidelines of foreign nations and the analysis of the policies, this thesis proposes an email records management scheme for Korean public intuitions, as well as an email management model suitable for forthcoming e-government era.

Operators that Reduce Work and Information Overload

  • Sabir Abbas;Shane zahra;Muhammad Asif;khalid masood
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.9
    • /
    • pp.65-70
    • /
    • 2023
  • The "information roadway" will give us an impact of new PC based assignments and administrations, yet the unusualness of this new condition will ask for another style of human-PC association, where the PC transforms into a sharp, dynamic and customized partner. Interface administrators are PC programs that use Artificial Intelligence frameworks to give dynamic help to a customer with PC based errands. Operators drastically change the present client encounter, through the similitude that a specialist can go about as an individual collaborator. The operator procures its capability by gaining from the client and from specialists helping different clients. A couple of model administrators have been gathered using this methodology, including authorities that give customized help with meeting planning, electronic mail taking care of, Smart Personal Assistant and choice of diversion. Operators help clients in a scope of various ways: they perform assignments for the client's sake; they can prepare or educate the client, they enable diverse clients to work together and they screen occasions and methods.

A Study about Electronic Document Unification for Construction Job-site Report (건설현장보고 전자문서 일원화에 관한 연구)

  • Jeong, Seong-Yun
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • 2007.11a
    • /
    • pp.925-928
    • /
    • 2007
  • As the field report data does not normalize, ordering organization requires different form every time and field reporters make out form as random, data and report to the ordering organization by different medium such as FAX, e-mail, paper document. Therefore, Field reporters must set and make out same information in required pattern. And ordering organization is being responsible for side works of totalizing and processing the reported data. This research suggests the electronic document unification about monthly construction progress report and construction present condition report system. In addition, it suggests electronically processing function that can handle field report business to unifying electronic documents. As using the result of this research, it will improve the work efficiency and simplify in report business.

  • PDF

A Chinese Spam Filter Using Keyword and Text-in-Image Features

  • Chen, Ying-Nong;Wang, Cheng-Tzu;Lo, Chih-Chung;Han, Chin-Chuan;Fana, Kuo-Chin
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.32-37
    • /
    • 2009
  • Recently, electronic mail(E-mail) is the most popular communication manner in our society. In such conventional environments, spam increasingly congested in Internet. In this paper, Chinese spam could be effectively detected using text and image features. Using text features, keywords and reference templates in Chinese mails are automatically selected using genetic algorithm(GA). In addition, spam containing a promotion image is also filtered out by detecting the text characters in images. Some experimental results are given to show the effectiveness of our proposed method.

  • PDF

Marketing Technologies In Educational Management: Current Problems

  • Zhytomyrska, Tetiana;Zrybnieva, Iryna;Romaniuk, Nadiia;Havrysh, Iryna;Gorditsa, Tetyana
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.298-302
    • /
    • 2022
  • The article considers in detail the possibilities and significance of marketing technologies for additional education programs as the most flexible and adaptive component of the educational process. Moreover, additional education programs are the most market-defined. Also at this stage, we have developed the structure of the e-mail message about ongoing additional educational programs in order to promote them, and on its basis, we have prepared an example of a letter for e-mail.informational and educational mailing using techniques to attract the attention of the addressee in order to promote additional educational programs.The content of the letter was also formed for students of the electronic course "Education Marketing", sent out in order to monitor the educational process.

Decision Method of Importance of E-Mail based on User Profiles (사용자 프로파일에 기반한 전자 메일의 중요도 결정)

  • Lee, Samuel Sang-Kon
    • The KIPS Transactions:PartB
    • /
    • v.15B no.5
    • /
    • pp.493-500
    • /
    • 2008
  • Although modern day people gather many data from the network, the users want only the information needed. Using this technology, the users can extract on the data that satisfy the query. As the previous studies use the single data in the document, frequency of the data for example, it cannot be considered as the effective data clustering method. What is needed is the effective clustering technology that can process the electronic network documents such as the e-mail or XML that contain the tags of various formats. This paper describes the study of extracting the information from the user query based on the multi-attributes. It proposes a method of extracting the data such as the sender, text type, time limit syntax in the text, and title from the e-mail and using such data for filtering. It also describes the experiment to verify that the multi-attribute based clustering method is more accurate than the existing clustering methods using only the word frequency.