• Title/Summary/Keyword: Internet E-mail

Search Result 293, Processing Time 0.029 seconds

Design and implementation of the email client server model using the avatar contents for the mobile phone (휴대폰에서 Avata컨텐츠 기반의 E-mail Client/server 모델 설계 및 구현)

  • 이경진;이정윤;김강석;송왈철
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.05a
    • /
    • pp.385-391
    • /
    • 2004
  • Today, mobile technology is developing very fast and people use internet through mobile phones. Using mobile phones, people use games, email, avatar and other services. We designed client/server modules in order to join email and avatar together. First two major server modules were designed, one of them is DB management module for avatar user information and the other is email management module. One the client side, we designed avatar image animation module and a module for showing the email contents. The purpose of the design is to reduce the performance overhead on the client side as mobile phones cannot be used as a high performance device. We propose and implement a new avatar based service using the SK-VM environment, that is different from the current avatar services.

  • PDF

Modeling and Simulation of Firewall System and Security Functions of Operating System for Network Security (네트워크 보안을 위한 침입차단 시스템과 운영체제 보안 기능 모델링 및 시뮬레이션)

  • 김태헌;이원영;김형종;김홍근;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.11 no.2
    • /
    • pp.1-16
    • /
    • 2002
  • The need for network security is being increasing due to the development of information communication and internet technology. In this paper, firewall models, operating system models and other network component models are constructed. Each model is defined by basic or compound model, referencing DEVS formalism. These models and the simulation environment are implemented with MODSIM III, a general purpose, modular, block-structured high-level programming language which provides direct support for object-oriented programming and discrete-event simulation. In this simulation environment with representative attacks, the following three attacks are generated, SYN flooding and Smurf attack as an attack type of denial of service, Mail bomb attack as an attack type of e-mail. The simulation is performed with the models that exploited various security policies against these attacks. The results of this study show that the modeling method of packet filtering system, proxy system, unix and windows NT operating system. In addition, the results of the simulation show that the analysis of security performance according to various security policies, and the analysis of correlation between availability and confidentiality according to security empowerment.

  • PDF

An Analysis of Success Factors in Internet Shopping Malls (인터넷 쇼핑몰구축의 성공요인에 대한 분석)

  • 진영배;권영식
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.12
    • /
    • pp.1495-1504
    • /
    • 2001
  • The main purpose of this research is to show Internet shopping mall the strategic way with the analysis of success factors in Internet shopping malls. To achieve the above purpose, the success factors and variables were defined by the survey of the reference. Sample malls for the research un selected of shopping malls registered in yahoo, Lycos, Empas and Hanmir regardless of their type and class, and did an online-survey of their operation. From the above method, the following results are deduced. First, there are five factors in the success of Internet shopping malls: the effectiveness of customer management the effectiveness of marketing. the competitiveness of product-sales, the convenience of use, the credibility of product. Second, the effectiveness of marketing is positively related to the number of member, visitors, and sales. Third, the credibility of product is negatively related to the number of member, visitors, and sales. At the end, the number of member and visitor are positively related to sales. This result could provide the managers with highly relevant managerial issues. The implication of the study are discussed and futher research directions are proposed.

  • PDF

The Influence of the repeated learning of moving picture materials applying 'the development of mathematical power' program on The Self-Directed Learning (수학적 힘의 신장 프로그램을 적용한 교실 수업 동영상 자료 반복 학습이 자기 주도적 학습에 미치는 영향 - 수학 I 을 중심으로 -)

  • Byun Kyung-Hae
    • Communications of Mathematical Education
    • /
    • v.20 no.2 s.26
    • /
    • pp.295-326
    • /
    • 2006
  • Despite the importance of mathematics education, many students in high school have lost their interests and felt difficulties and they don't have 'mathematical' experience with meanings attached because of the entrance examination. This paper attempted to resolve these problems and find the teaching-method with which students can study by themselves with more confidence. Nowadays students' use of Internet is very popular. After develop 'the development of mathematical power' program based on mathematics history, history, science, the application of problems in real world, and self-evaluation, I made students repeat them after making teaching lessons in classroom as moving pictures. Through this processes, I attempted to develop the Self-Directed Learning' ability by making public education substantial. First of all I analyzed the actual conditions on 'Self-Directed Learning' ability in mathematics subject, the conditions of seeing and hearing in Internet learning program, and students' and their parents' interests in Internet education. By analyzing the records, I observed the significance of the introducing mathematics history in mathematics subject in early stager, cooperative-learning, leveled-learning, self-directed learning, and Internet learning. Actually in aspect of applying 'the development of mathematical power' program, at first I made up the educational conditions to fix the program, collected the teaching materials, established the system of teaching-learning model, developed materials for the learning applying Internet mail and instruments of classroom, and carried out instruction to establish and practice mathematics learning plan. Then I applied the teaching-learning model of leveled cooperation and presentation loaming and at the same time constructed and used the leveled learning materials of complementary, average, and advanced process and instructed to watch teaching moving pictures through Internet mail and in the classroom. After that I observed how effective this program was through the interest arid attitude toward mathematics subject, learning accomplishment, and the change of self-directed learning. Finally, I wrote the conclusion and suggestion on the preparation of conditions fur the students' voluntary participation in mathematics learning and the project and application on 'the development of mathematical power' program and repeated learning with the materials of moving pictures in classroom.

  • PDF

A Design of the Certification System in a Instantant Messenger Using PKI (PKI를 이용한 인스턴트 메신저에서의 인증 시스템 설계)

  • Park Su-Young;Choi Gwang-Mi;Jung Chai-Yeoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.1
    • /
    • pp.142-147
    • /
    • 2006
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. In the past, e-mail has been the primary choice of exchanging information, but instant messengers are gaining popularity abroad and domestically because of their nature of getting immediate reponses. However a instant messenger services have the exposure of data on internet but clients use them without recognizing their exposure. It's like phone tapping. The coding technology using Public Key Cryptosystem has developed the public key infrastructure to be able to do the services of Access-control, Authentication, Confidentiality, Integrity. and Non-repudiation with internet. It is a thesis that suggests the certification protocol in a instant messenger using PKI(Public Key Infrastructure) for secure communication.

An analysis of Web Sites on the Nursing Departments for Hospital Internet Marketing (병원의 인터넷 마케팅을 위한 간호부서의 웹사이트 분석)

  • Jung, Myun-Sook
    • Journal of Korean Academy of Nursing Administration
    • /
    • v.7 no.3
    • /
    • pp.531-543
    • /
    • 2001
  • Purpose : The purpose of this study was exploring current status of having home page on the hospitals which have more than 500 beds and analyzing web site on the Nursing Department among them. Method : Cases under analyzing were 92 hospitals which have their own home pages. And then, content analysis with 33 cases was used to evaluate web site of Nursing Department. Results : 1. There are 85(92.4%) home pages in the hospitals among 92 hospitals. 2. There are 33(35.9%) web pages on the Nursing Home page in the 85 hospitals which has hospital home pages. 3. The contents of web pages were 'Introduction of Nursing Department' (78.8% of Nursing Department), 'Home health care'(39.4%), 'Areas of Nursing department'(36.4%), 'Educational Opportunities'(36.4%), 'Research activities'(30.3%), 'Interaction'(27.3%), 'E-mail'(18.2%), 'Information providing to consumer'(15.2%), 'Hospice'(15.2%), 'Hot line, consultation'(12.1%) respectively. Conclusion : The results showed that most web sites of Nursing Department were consist of simple contents with simple purpose. Therefore, in this informational world, Nursing Departments have to try using internet marketing with well developed client centered web site.

  • PDF

Development of Embedded Security Fax Server Supporting Dual Mode (이중 방법을 지원하는 임베디드 보안 팩스 서버 개발)

  • Lee, Sang-Hak;Chung, Tae-Choong
    • The KIPS Transactions:PartA
    • /
    • v.11A no.3
    • /
    • pp.129-138
    • /
    • 2004
  • Even though the Internet applications such as e-mail and FTP are widely used, fax is still an important media for data communications till today. Many researches on security over the Internet data communication have been done over the years, on the other hand not many researches have been dedicated to the fax security issue which is as important as the Internet. In this paper, we describe the development of hardware and software of the embedded security fax server which increases the security in supporting existing fax. The developed system is designed and implemented to maintain security while minimizing the delay due to encryptionㆍdecryption. Since there's international or domestic tryptographic standard and each nation have their policy to restrict the use of cryptographic system, we adopt domestic standard cryptographic protocol admitted in Korea. And the system supports two modes: Security mode and Non-Security mode that user can choose from. The system can be applied directly which is the requirements of users at company ,End the government. We verify the performance and functioning of the system in various real environment.

Study on the Use of Agricultural Information in Leaf Vegetable Farmers (엽채류 재배농가의 농업정보 이용에 관한 연구)

  • Jung, Gu Hyun;Cheon, Myeong Hyee;Lee, Won Suk
    • Agribusiness and Information Management
    • /
    • v.1 no.1
    • /
    • pp.63-83
    • /
    • 2009
  • This study was performed to investigate the status of using agricultural information and develope desirable strategy to offer agricultural information for leaf vegetables farmers. 187 farmers are surveyed to collect data. Many farmers get agricultural information through various channel. They satisfied with agricultural information contents, rightness of time but dissatisfied with the easiness of gain, fitness of information relatively. And the mean score of farmer's information needs on agricultural information were higher than that of theoretical mean. relatively high items were new seed information, technology of cultivation, pesticide purchase and prevention, laborer finding, consumer information, the trend of leaf vegetables price, marketing place, government's agricultural policy and laws etc. To make farmers get information easily, we recommend to gather information at one place and provide them on internet portal site composed with information related for paddy rice farmers. To make desirable information service system, farmers should bring up their internet searching ability, and agricultural extension officers in count/city have to make effort to provide useful information more often by various communication methods such as visiting farmers, using internet or e-mail service, pamphlet, and so on.

  • PDF

Study on Improved Detection Rule Formation via Information Leakage Malware Analysis (정보유출 악성코드 분석을 통한 개선된 탐지 규칙 제작 연구)

  • Park, Won-Hyung;Yang, Kyeong-Cheol;Lee, Dong-Hwi;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.1-8
    • /
    • 2008
  • Not only the recent hacking techniques are becoming more malicious with the sophisticated technology but also its consequences are bringing more damages as the broadband Internet is growing rapidly. These may include invasion of information leakage, or identity theft over the internet. Its intent is very destructive which can result in invasion of information leakage, hacking, one of the most disturbing problems on the net. This thesis describes the technology of how you can effectively analyze and detect these kind of E-Mail malicious codes. This research explains how we can cope with malicious code more efficiently by detection method.

  • PDF

A Study on the Promotion Strategy for Internet Fashion Soho Shopping Mall (인터넷 패션 소호 쇼핑몰 활성화를 위한 촉진전략 연구)

  • Kim, Hee-Sun
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.9 no.3
    • /
    • pp.59-73
    • /
    • 2007
  • The purpose of this study is to find out the promotion methods for successful management of 'the fashion saho internet shopping mall' with a small capital. This study analyze the research reports, the news items, the documents on the internet shopping mall and data on promotion method which are offered by the hosting companies of the internet shopping mall like 'Cafe 24', 'Make shop', 'Whoismall' and the promotion consulting companies like 'Whoisad', 'Naver keyword shop'. And also analyze the data that interviewed the administrator of internet shopping mall and directly observed the famous internet shopping mall sites. Generally speaking, the promotion mix, marketing communication program can classify 'advertisement', 'publicity', 'personal selling', and 'sales promotion'. This study analyze the research materials on the basis of advertisement, publicity, personal selling, and sales promotion. The result are as follows. 1. The promotion methods at the stage of information the shopping mall site to the consumer are advertisement, and publicity. ${\bigcirc}$ The methods of advertisement are 'searching engine registration', 'advertisement of key word', 'advertisement of overture', 'advertisement of banner', 'advertisement cooperation marketing', 'advertisement of e-mail'. ${\bigcirc}$ The methods of publicity are using 'cafe', 'blog', 'Naver information site', 'community bulletin board', 'the fashion magazine or a press report' and 'cosponsorship'. 2. The main promotion methods at the stage of inducing the purchase are 'personal selling', and various 'sales promotion'. ${\bigcirc}$ 'Personal selling' at the shopping mall have an effect on the communication at bulletin board over the internet and the telephone. ${\bigcirc}$ 'Sales promotion' are attempted by 'VMD', 'deposit system', 'sale', etc.

  • PDF