• Title/Summary/Keyword: 의미적 이메일 관리

Search Result 9, Processing Time 0.027 seconds

An e-mail Archiving System using Semantic Interface Rules (의미규칙을 이용한 이메일 아카이빙 시스템)

  • Jeon, Jin-Hwan;Yoon, Yeo-Been;Song, Jeo;Lee, Sang-Moon
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.263-264
    • /
    • 2016
  • 이메일은 모바일 기기의 발달과 SNS의 확산에도 불구하고 전 세계의 기업에게 가장 중요한 통신 및 업무수단으로 여전히 중요한 역할을 하고 있다. 이메일의 사용 증가로 인해 보안 및 보관 문제가 발생하였으며, 모든 이메일을 수년에 걸쳐 보관할 의무를 지는 기업이 점점 늘어나고 있다. 본 논문에서는 의미추론규칙을 이용하여 온톨로지 기반의 이메일 아카이빙 시스템에 대해 제안한다.

  • PDF

Recognizing Emotional Content of Emails as a byproduct of Natural Language Processing-based Metadata Extraction (이메일에 포함된 감성정보 관련 메타데이터 추출에 관한 연구)

  • Paik, Woo-Jin
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.2
    • /
    • pp.167-183
    • /
    • 2006
  • This paper describes a metadata extraction technique based on natural language processing (NLP) which extracts personalized information from email communications between financial analysts and their clients. Personalized means connecting users with content in a personally meaningful way to create, grow, and retain online relationships. Personalization often results in the creation of user profiles that store individuals' preferences regarding goods or services offered by various e-commerce merchants. We developed an automatic metadata extraction system designed to process textual data such as emails, discussion group postings, or chat group transcriptions. The focus of this paper is the recognition of emotional contents such as mood and urgency, which are embedded in the business communications, as metadata.

Insider Threat Detection Technology against Confidential Information Loss using Email (이메일을 통한 기밀정보 유출 유형의 내부자 위협 탐지 기술)

  • Youngjae Lee;Seongwon Kang;Kyungmi Kim;Kyungroul Lee
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.217-218
    • /
    • 2023
  • 내부자 위협이란, 조직의 보안 및 데이터, 시스템에 대한 내부 정보에 접근하는 현 임직원 및 전 임직원, 계약자와 같이, 동일한 조직 내부의 사람들로부터 발생하는 위협을 의미한다. 일반적으로 내부자들은 업무를 위하여, 시스템에 대한 합법적인 접근 권한을 가지며, 만약 이러한 권한이 오남용되는 경우에는 조직에 매우 심각한 피해를 입힐 수 있다. 이러한 내부자 위협은 외부로부터의 위협보다 방어 및 탐지가 훨씬 어려운 한계점이 있으며, 그 피해 규모가 매우 방대하다는 문제점도 존재한다. 이에 따라, 본 논문에서는 내부자 위협을 탐지하기 위하여, 이메일을 통한 기밀정보를 유출하는 유형의 위협에 대응하는 방안을 제안한다. 제안하는 방안은 조직 내에서 이메일을 발신하는 경우를 대상으로, 파일이 포함된 이메일에 발신자를 식별하기 위하여, 파일에 키 값 및 서명을 삽입하며, 발신되는 이메일을 모니터링하여 첨부된 파일의 유형을 파악함으로써, 동적 그래프를 통하여 시각화한다. 내부 시스템 및 네트워크에서의 보안관제 담당자 및 관리자는 시각화된 그래프를 확인함으로써, 직관적으로 정보 유출을 파악하고 대응할 수 있을 것으로 판단된다. 본 논문에서 제안하는 방안을 통하여, 조직 내의 내부자 위협을 탐지할 수 있으며, 데이터 유출 사고가 발생하는 경우, 유출자를 빠르게 식별하고 초기에 대응할 수 있을 것으로 판단된다.

  • PDF

A Study on the Implementation and Service of the RSS Based Science and Technology Information Syndication System(STI-RSS) (RSS 기반 과학기술정보 배급표준 시스템(STI-RSS)의 개발과 활용방안에 대한 연구)

  • Kwon, Lee-Nam;Kim, Jae-Soo;Shin, Dong-Gu;Jhun, Sung-Jin;Jeong, Teak-Young
    • Journal of Information Management
    • /
    • v.36 no.4
    • /
    • pp.175-198
    • /
    • 2005
  • Information services adopting RSS(Really Simple Syndication) is on an increase. It is replacing the existing email services. Information in the area of science and technology is of vast amount and various area and their life-cycle and service is complex. Institutions providing information of a single area are not faced with many obstacles in designing information services using RSS in acquiring a channel for the service. However, RSS service in the area of science and technology has to be more specific in designing and implementing the services. In this study, RSS is compared with other information service protocols, domestic and international trends in the area of RSS is analyzed to implement the RSS based Science and Technology information service system(STI-RSS) and its service.

Pseudonym-based Anonymous PKI with Short Group Signature (Short Group Signature를 이용한 가명 기반 PKI)

  • Lee, Sok-Joon;Han, Seung-Wan;Lee, Yun-Kyung;Chung, Byung-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.703-707
    • /
    • 2008
  • Nowadays, Internet becomes an essential element in our life. We can make use of numerous on-line services through Internet such as information search, on-line shopping, e-mail service, etc. But, while getting the benefits of Internet service, invasion of our privacy frequently occurs because on-line service providers tend to request excessive or unnecessary personal information. So, there have been some researches on anonymous authentication, which means that user can authenticate herself, not revealing her identity or personal information. But, most of the researches are not somewhat applicable to current authentication infrastructure. In this paper, we propose a pseudonym-based anonymous PKI with short group signature. Using our proposed scheme, we can provide anonymity with conditional traceability to current PKI.

  • PDF

A Study of the Conservation Policy and Management Status of Historic Gardens in England - Focused on the National Trust - (영국 역사정원 보전정책과 관리현황에 대한 연구 - 내셔널 트러스트를 중심으로 -)

  • Yoon, Sang-Jun;Kwon, Jin-Wook
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.28 no.3
    • /
    • pp.131-143
    • /
    • 2010
  • This paper investigates the history, policy and status of the conservation of historic gardens in the National Trust in England and its implications for Korea. It was conducted in three phases as follows: First, related literature data was collected to understand the National Trust and its role in the conservation of historic gardens. Second, The National Trust Policy Papers: Gardens and Landscape Parks in 1996 was reviewed and analyzed into eight categories with a review of 216 gardens and interviews with gardener-in-charge via e-mail. Finally an understanding of the policy for the conservation of historic gardens was formed from the results of the previous phases, and implications were drawn from the integrated analysis guidelines of the policy and status. The key feature of the conservation of the National Trust's historic gardens is that the conservation process has been conducted systematically through acquisition, management, upkeep, advice and so on. Furthermore, the conservation principles are defined in a concise and accessible form. According to their practical conservation process and principles, the results of the National Trust activities are to appreciate the significance of the gardens and act with accountability; integration; managing change; access and participation; and training gardener and partnership. According to the results of its activities under the premise that the purpose of the conservation and the meaning of a garden do not differ significantly among nations, implications for Korea can be primarily suggested by three points as follows: First of all, a flexible approach to change in historic gardens should be managed. In response to inevitable and desirable change, anything that is added or transferred should be recorded for the future as much as possible. Therefore, everything must be recorded and any change should be managed. Second, is to provide sustainable access for the benefit for the people and visitors. The aim of conserving the gardens is for human's to eventually understand that the present generation just borrows the historic gardens before they are passed down. The ensuing implication is that people may enjoy the gardens educationally, aesthetically, and physically, and children can be continuously interested in historic gardens as apart of educating the future generation. Finally, the National Trust educates apprentice gardeners who will maintain the historic gardens and continuously keep the current garden staff up to date with workshops. This is in contrast to the day laborers who work for historic gardens in Korea. In practice, the maintenance of historic gardens is not a simple process. The gardener must understand the past, reflect the present, and prepare for the future. Therefore, gardeners deliver culture from generation to generation.

Analysis of Threats and Countermeasures on Mobile Smartphone (스마트폰 보안위협과 대응기술 분석)

  • Jeon, Woong-Ryul;Kim, Jee-Yeon;Lee, Young-Sook;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.2
    • /
    • pp.153-163
    • /
    • 2011
  • Smartphone is a mobile device which can perform better than feature phone. Recently, growth in demand for advanced mobile devices boasting powerful performance, market share of smartphone is increasing rapidly in mobile device market, for example, iphone and android phone. Smartphone can provide many functionalities, e-mail, scheduler, word-processing, 3D-game, and etc, based on its powerful performance. Thus, various secret information is integrated in smartphone. To provide service, sometimes, smartphone transmits informations to outside via wireless network. Because smartphone is a mobile device, user can lose his/her smartphone, easily, and losing smartphone can cause serious security threats, because of integrated information in smartphone. Also data which is transmitted in wireless network can be protected for privacy. Thus, in present, it is very important to keep secure smartphone. In this paper, we analyze threats and vulnerabilities of smartphone based on its environments and describe countermeasures against threats and vulnerabilities.

A Study on the Effect of CMC on Learning Performance (커뮤니케이션 매체의 이용수준이 성과에 미치는 영향 - 친숙도의 조절효과를 중심으로 -)

  • Li, Guo Zhong;Kwon, Sun-Dong
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.6 no.2
    • /
    • pp.75-96
    • /
    • 2011
  • Recently, Dennis et al.(2008) proposed media synchronicity theory. In this theory, for conveyance communication processes, use of media supporting lower synchronicity should result in better communication performance. But for convergence processes, use of media supporting higher synchronicity should result in better communication performance. This paper proved a part of the propositions of media synchronicity theory, because media synchronicity theory was proposed theoretically, not empirically. We used a data set generated from the survey. The respondents of survey were 163 students who had experienced the communication media in the classes that should summit result of team projects or team reports. According to the results of data analysis, higher use of communication media led to better learning performance. The familiarity of task moderated the effect of communication media on learning performance. And use of media supporting higher synchronicity led to better learning performance.

  • PDF

Qualitative Study on Experiences of Responding to COVID-19 of Therapists in Long-term Care Hospitals (요양병원 치료사의 코로나19 대응 경험에 대한 질적 연구)

  • Bae, Won-Jin;Park, Ju-Young
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.4
    • /
    • pp.337-347
    • /
    • 2021
  • This study is a qualitative study conducted to provide basic data for therapists working in long-term care hospitals to improve their countermeasure strategies for new infectious diseases and improvement of the treatment room infection management system, and to help therapists understand their infection management work. Colaizzi's phenomenological research method was applied as the research method. Telephone interviews were conducted with nine occupational therapists and physical therapists working in nursing hospitals. The contents of the interview were recorded with the consent of the study subjects, and additional confirmation was received by email. The recorded content was analyzed after transcription, and the meaning and nature of the experience coping with COVID-19 were described. The content was organized into 6 themes, 17 main meaning and 49 meaning units. In accordance with the COVID-19 situation, the infection control system has been strengthened by reinforcing infection control education in nursing hospitals, practicing infection control, and supervising infection control outside business hours. It was found that the treatment environment was changed due to the restriction of treatment activities by practicing distancing in the treatment room, adjusting rest and meal times during working hours, and strengthening infection control. In addition, the therapist's role has been expanded and the paradigm of treatment has changed, such as considering the untact intervention, and they have experienced cohort quarantine, pre-tested for COVID-19, vaccinations, and side effects from COVID-19. However, due to the infection work, the therapist's work burden is increased, and the person is experiencing fear, depression, and work stress from the spread of COVID-19. They were also aware of the need for nursing hospital care personnel support, such as guaranteeing rest after vaccination and providing infection control tools and equipment. The results of this study are expected to be used as basic data for human and physical support for the development of infectious disease response strategy programs in nursing hospital treatment rooms and for infection control in nursing hospitals.