• Title/Summary/Keyword: electronic mail

Search Result 168, Processing Time 0.026 seconds

An Agent System for Automatic Generation of Personalizing e-mails using Customers' Profile and Events (고객 정보 및 이벤트를 이용한 개인화 이메일 자동 생성 에이전트 시스템)

  • 이근왕;이광형;이종희
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.1
    • /
    • pp.97-104
    • /
    • 2003
  • The appearance of various portal web sites that have individual customers, customizing information operate importantly upon a content. But most current portal sites that has a goal for international electronic commerce use information for customer to a simply individual profile and don't create more and new information that customizing. In this paper, we propose a system that generates a new customizing information with classification and analysis in detail and provides automatically to individual customers. The goal of our research is the development of personalizing auto generation agent that composed form of e-mail from preference of each individual user using open rate and mouse event Information for e-mail.

  • PDF

Twitter Crawling System

  • Ganiev, Saydiolim;Nasridinov, Aziz;Byun, Jeong-Yong
    • Journal of Multimedia Information System
    • /
    • v.2 no.3
    • /
    • pp.287-294
    • /
    • 2015
  • We are living in epoch of information when Internet touches all aspects of our lives. Therefore, it provides a plenty of services each of which benefits people in different ways. Electronic Mail (E-mail), File Transfer Protocol (FTP), Voice/Video Communication, Search Engines are bright examples of Internet services. Between them Social Network Services (SNS) continuously gain its popularity over the past years. Most popular SNSs like Facebook, Weibo and Twitter generate millions of data every minute. Twitter is one of SNS which allows its users post short instant messages. They, 100 million, posted 340 million tweets per day (2012)[1]. Often big amount of data contains lots of noisy data which can be defined as uninteresting and unclassifiable data. However, researchers can take advantage of such huge information in order to analyze and extract meaningful and interesting features. The way to collect SNS data as well as tweets is handled by crawlers. Twitter crawler has recently emerged as a great tool to crawl Twitter data as well as tweets. In this project, we develop Twitter Crawler system which enables us to extract Twitter data. We implemented our system in Java language along with MySQL. We use Twitter4J which is a java library for communicating with Twitter API. The application, first, connects to Twitter API, then retrieves tweets, and stores them into database. We also develop crawling strategies to efficiently extract tweets in terms of time and amount.

Design of a Product Recommender based on Web Log Analysis (웹 로그 분석에 기반한 상품 추천기의 설계)

  • 김건량;이도헌
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.349-352
    • /
    • 2000
  • As a lot of people have used electronic commerce, many shopping malls have appeared on the Interne and the shopping information in them has been enormous. So, the need for a system to recommend product to customers is on the increase so as to reduce time and efforts for shopping. In this paper, we suppose a Product Recommender System which is constructed by applying data mining techniques to web for files and analyzing customer's action pattern, customer's profile and product purchase data. This system offers convenience that customers can get their desired information easily, by sending e-mail or mail and recommending web pages when they visit a shopping mall.

  • PDF

A System for Automatic Push of Personalizing E-mail using Events for Mail Browsing (메일 브라우징 이벤트를 이용한 개인화 이메일 자동 푸쉬 시스템)

  • Lee, Kwang-Hyoung;Kim, Jung-Jae;Lee, Jong-Hee;Oh, Hae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2002.11c
    • /
    • pp.2223-2226
    • /
    • 2002
  • 최근들어 각 기업들의 e-CRM(electronic-Customer Relationship Management)의 활발한 연구로 인해 개인 고객에 대한 매우 많은 정보와 다양한 컨텐츠가 고객화되어 개인 사용자들에게 제공되고 있다. 하지만, 현재 국내외 진자상거래를 주목적으로 하는 포탈 사이트의 시스템들은 고객에 관한 정보를 단순한 개인 프로파일로 활용하고 있을 뿐 고객 정보를 이용하여 더 많은 개인화된 새로운 정보를 창출하지 못하고 있다. 본 논문은 고객에 대한 정보를 세분화하고 분석하여 제3의 개인화 정보를 생성하여 자동으로 각 개별 고객에게 개인화된 정보를 제공해 줄 수 있는 시스템을 설계 및 구현하고자 한다. 고객의 이메일 오픈율과 마우스 이벤트 정보를 분석 및 계산하여 개별 고객에게 고객의 관심정보 및 관심 컴포넌트를 생성한 후 관심정보와 관심 컴포넌트를 이용하여 개별 고객의 관심 정보를 고객이 선호하는 이메일 규격 및 양식에 맞게 에이전트를 통해 자동으로 재구성하여 푸쉬해 주는 개인화 메일 자동 생성 에이전트 시스템을 개발하고자 함이 본 논문의 목적이다.

  • PDF

Analysis and Improvement of ID-based Key Distribution Systems (개인정보에 기초한 키 분배방식의 분석 및 개선방안)

  • 임채훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.1 no.1
    • /
    • pp.47-65
    • /
    • 1991
  • An ID-based scheme provides a very efficient solution to the key distribution problem, since it can solve bothe the authentication problem and the communication complexity problem in a public key scheme. Especilly, and ID-Based ndninterative key distribution system plays an crucial roie in the one-way communication environment such as secure electronic mail, owing to its noninteractiveness. This paper aims at analyzing the previously proposed scheme s and providing possible improvements. It also demonstraes that the Maurey-Yacobi's scheme presented in Eurocry'91 is not secure, and provikdes an countemeasure to overcome the security problem.

A Study on Notable Points in Mind for the Use of Electronic Convention to be Made under CISG in Connections with Offer (청약과 관련한 CISG규정하에서 이루어지는 전자통신에 유엔전자협약 적용시 유의사항)

  • Oh, Se-Chang
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.38
    • /
    • pp.3-45
    • /
    • 2008
  • A motive and aim of enactment of UN Convention on the Use of Electronic Communication in Int'l Contracts is based on need to eliminate legal obstacles that might arise under existing int'l trade law instruments and promote int'l electronic commercial transaction. But when it is used with related articles, 14, 15, 16, 17 for offer under CISG, one of the most successful conventions which produces substantive law for the unification of int'l trade, questions of practical importance, for example possibilities of withdrawal, revocation, rejection of offer, the extent of its criteria arise from therewith. In conclusion, a effective electronic offer has to assure easily access and confirmation of trade terms besides criteria of offer under CISG. An offer can be withdrawal, if electronic message of withdrawal has entered the offeree's server before or at the same time when the offer has reached the offeree but agreement expressly or impliedly, between the parties about type, format, email address is a prerequisited. Implied consent could be presumed through prior conduct or trade usages between the parties under CISG articles 8, 9. The term "have reached" correspond to the time which is able to retrieve the electronic message of withdrawal. But without express or implied agreement between them about electronic communication of type, format, email address, an offer can be withdrawal before or at the same time when it has entered offeree's other e-mail address and confirmed by his retrieval. In case of the revocation, electronic message of the revocation is effective before the offeree's dispatching an acceptance. A prerequisite for the revocation by electronic communication is came as the above mentioned withdrawal except for concept of a time difference for reach. In case of a rejection of offer, when a rejection by electronic communication has entered the offeror's server, an offer is ended. But a prerequisite for the rejection by electronic message is same as the above mentioned withdrawal and revocation.

  • PDF

An Implementation of Automatic Transmission System of Traffic Event Information (교통이벤트 정보의 자동 전송시스템 구현)

  • Jeong, Yeong-Rae;Jang, Jae-Hoon;Kang, Seog Geun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.987-994
    • /
    • 2018
  • In this paper, an automatic transmission system of traffic information is presented. Here, a traffic event is defined as an obstacle to an emergency vehicle such as an ambulance or a fire truck. When a traffic event is detected from a video recorded by a black box installed in a vehicle, the implemented system automatically transmits a proof image and corresponding information to the control center through an e-mail. For this purpose, we realize an algorithm of identifying the numbers and a character from the license plate, and an algorithm for determining the occurrence of a traffic event. To report the event, a function for automatic transmission of the text and image files through e-mail and file transfer protocol (FTP) is also appended. Therefore, if the traffic event is extended and applied to the presented system, it will be possible to establish a convenient reporting system for the violation of various traffic regulations. In addition, it will contribute to significantly reduce the number of traffic violations against the regulations.

Knowing the Level of Information Security Awareness in the Usage of Social Media Among Female Secondary School Students in Eastern Makkah Al-Mukarramah- Saudi Arabia

  • Gharieb, Magdah Ezat
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.360-368
    • /
    • 2021
  • This study aims at knowing both the level of information security awareness in the use of social media among female secondary school students in Makkah Al-Mukarramah, and the procedures that students follow when exposed to hacking or other security problems. The study relied on the descriptive survey approach. The results showed a high percentage of social media use among the study sample, and the most used applications by the students are snapchat and Instagram applications successively. In fact, 48% of the study sample have awareness of information security, the majority of the students memorize the password in the devices, most of them do not change them, and they have knowledge of fake gates and social engineering. However, their knowledge of electronic hacking is weak, and students do not share passwords with anyone at a rate of 67%. At the same time, they do not update passwords. Moreover, most of the procedures followed by students when exposed to theft and hacking is to change the e-mail data and the password, and the results varied apart from that, which reflects the weak awareness of the students and the weakness of procedures related to information security. The study recommends the necessity to raise awareness and education of the importance of information security and safety, especially in light of what the world faces from data electronic attacks and hackings of electronic applications.

Information Security and Its Aapplications on the Portal of the Deanship of Library Affairs at Northern Border University

  • Al Eawy, Yaser Mohammad Mohammad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.183-188
    • /
    • 2021
  • The study aimed to assess the state of electronic security for the website of the Deanship of Library Affairs at Northern Border University, as one of the university's electronic portals, which provides distinguished knowledge services to faculty members, through the Saudi Digital Library, and the integrated automated system for libraries (Symphony) with the definition of cyber security of the university, and the most important threats The study sought to analyze the opinions of a wide sample of faculty members, towards evaluating the state of electronic security for the Deanship of Library Affairs portal, through the use of both the analytical method, as well as the survey, using the questionnaire tool, and the study sample consisted of 95 A faculty member of all academic categories and degrees, and university faculties, and the study concluded that it is necessary to work to overcome the relative slowness of the university's Internet, with the faculty members notifying the information security services through e-mail and SMS service, with the continuous updating of operating systems, Apply and use the latest anti-spyware, hacking, and antivirus software at the university, while conducting extensive research studies towards information security services, and contracting It aims to introduce information security risks, and ways to combat and overcome them, and spread the culture of information security among faculty members.

A Study on the Special Digital Signature Systems (특수 디지틀 서명방식에 대한 고찰)

  • 김승주;원동호
    • Review of KIISC
    • /
    • v.6 no.2
    • /
    • pp.21-34
    • /
    • 1996
  • 계약이나 송금 등을 행하는 서비스에서 서명은 없어서는 안되는 중요한 요소이며 특히 전자 우편(electronic mail), MHS(Message Handling System)나 EDI(Electronic Data Interchange) 서비스는 기업체는 물론 일반 사용자에게까지 널리 이용될 것으로 사료된다. 이러한 서비스의 특징은 통신망상에서 메시지를 이용하여 다양한 형태의 서비스를 제공하기 때문에 메시지 자체에 대한 인증이나 송신자, 수신자 상호 쌍방간에 인증, 부인 봉쇄 기능을 갖추는 것은 분쟁을 해결하는 필수 불가결한 요소이다. 이를 위한 기술적 대책이 디지틀 서명이다. 디지틀 서명 기술은 기존의 종이 문서에서 사용되는 수서명을 대신할 수 있는 것으로 메시지의 출처와 메시지의 진위 여부를 확인할 수 있는 매우 유용한 서명 방식이다. 그러나, 사실상 디지틀 서명이 많은 응용 업무에서 활용될 것은 자명한 사실이므로 적용 환경 및 적용 업무에 따라서 여러 가지 추가적인 요구조건이 등장할 수 있다. 이러한 특수한 디지틀 서명 프로토콜에 관한 연구는 매우 가치 있는 연구 분야이다.

  • PDF