• 제목/요약/키워드: email

검색결과 377건 처리시간 0.024초

지방분해를 위한 장침 전기자극 시술의 안정성 및 안전성 연구 (Study on Mechanical Stability and Safety of Electroacupuncture to Localized Fat Deposit)

  • 진성순;송윤경;임형호
    • 한방재활의학과학회지
    • /
    • 제19권1호
    • /
    • pp.169-186
    • /
    • 2009
  • Obejectives : The electroacupuncture(EA) on regional fat is often used by oriental medicine doctors in Korea. However, there have been few studies about safety and biocompatibility of its application. Therefore we investigated the safety and change of mechanical character of electroacupuncture after its application on localized fat deposit. Methods : Online surveys were completed from Aug 21 2008 to Aug 28 2008, by email, the online survey data were obtained from nearly 10,002 Korean medical doctors who listed their email address on the website of association of korean oriental medicine. This study includes an experiment on the physical strength and biological property of long needles. We represent each method which were collected in advance survey, then sealed the needles off and did laboratory experiment, which includes surface observation, analysis, vickers hardness test, and also biocompatibility and toxicity test. Results : There was no considerable difference about the physical property after applying electric current, the cell survival rate did not change in comparison with controlled group either. Conclusions : Although it seems there are no considerable acupuncture-related problem, we still need additional studies about clinical effectiveness difference related operation condition. Besides, it will need research on the actual condition, standardization, and criteria about the comsumed needle in Korea.

군 정신건강증진 프로그램의 효과 (Effectiveness of the Military Mental Health Promotion Program)

  • 우정희;김선아
    • 대한간호학회지
    • /
    • 제44권6호
    • /
    • pp.717-725
    • /
    • 2014
  • Purpose: This study was done to evaluate the Military Mental Health Promotion Program. The program was an email based cognitive behavioral intervention. Methods: The research design was a quasi-experimental study with a non-equivalent control group pretest-posttest design. Participants were 32 soldiers who agreed to participate in the program. Data were collected at three different times from January 2012 to March 2012; pre-test, post-test, and a one-month follow-up test. The data were statistically analyzed using SPSS 18.0. The effectiveness of the program was tested by repeated measures ANOVA. Results: The first hypothesis that the level of depression in the experimental group who participated in the program would decrease compared to the control group was not supported in that the difference in group-time interaction was not statistically significant (F=2.19, p=.121). The second and third hypothesis related to anxiety and self-esteem were supported in group-time interaction, respectively (F=7.41, p=.001, F=11.67, p<.001). Conclusion: Results indicate that the program is effective in improving soldiers' mental health status in areas of anxiety and self-esteem.

피싱 대응 솔루션 연구 및 개발 현황 그리고 앞으로의 방향 (Study on Anti-Phishing Solutions, Related Researches and Future Directions)

  • 신지선
    • 정보보호학회논문지
    • /
    • 제23권6호
    • /
    • pp.1037-1047
    • /
    • 2013
  • 피싱(phishing) 공격의 피해가 증가함에 따라 그에 대한 대응책 및 관련 연구가 활발히 진행되어 왔다. 피싱 공격을 막는 솔루션(anti-phishing solutions)들은 웹브라우져(web-browser)의 보안 기능으로 혹은 보안 툴바(toolbar)의 형태로 다양하게 개발되었고, 그밖에도 이메일 필터링(email-filtering), 비밀 이미지 공유를 통한 서버 인증 강화 등의 방식으로 솔루션들이 개발되었다. 피싱 관련 연구로는 피싱 공격이 성공하는 이유에 대한 분석 연구, 피싱 공격을 막는 솔루션들이 효과적인지에 대해 사용자 입장에서 분석한 연구들이 발표되었다. 이 논문에서는 피싱 공격을 막는 다양한 종류의 솔루션들을 소개하고, 대표적인 솔루션들의 기술적 원리를 이해한다. 또한, 피싱 관련 연구 결과들을 함께 짚어봄으로써 피싱 공격을 막는 솔루션들이 개선되어야할 점들을 강조하여 살펴보고, 앞으로 피싱을 막기 위한 대책 연구가 진행되어야할 방향을 제시한다.

Web Service 기반의 휴대용 건강 요약지 보고 시스템 구현 (Implementation of reporting system for continuity of care document based on web service)

  • 김종욱;전소혜;임청묵;박선영;김남현
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2009년도 정보 및 제어 심포지움 논문집
    • /
    • pp.402-404
    • /
    • 2009
  • The development of health information technology enables people to access, view and acquire personal health record. But still, there have been a number of obstacles such as the absence of the standard to realize the ideal Personal Health Record(PHR) system. In this study, we proposed the service model that serves periodic Health Record Summary which is made by a medical specialist to people who are in the busy lives. Healthcare data from EMR in a hospital including people generate themselves at home is sent to a physician to make a medical opinion, and then it is changed into Health Level 7 Continuity of Care Document(CCD) format for interoperability. After a physician writes his opinion about patient's health condition, it will send to people by email. People who receive the health record summary data by email can save them into a USB device to view own PHR and medical comments of a physician through a computer. It will help people managing their own health condition with an opinion of a medical specialist.

  • PDF

Reticence and Communication Preferences in the Classroom: Comparing "E-mail" and "Face-to-face" Interactions

  • Ha, Jae-Sik;Shin, Dong-Hee;Lee, Chung Gun
    • International Journal of Contents
    • /
    • 제10권2호
    • /
    • pp.18-27
    • /
    • 2014
  • This study examines underlying factors that influence undergraduate students' willingness to enhance communication with their instructor by comparing the frequency of e-mail and face-to-face interaction between students and instructors. Data was collected through a survey of 322 undergraduate journalism students at a large Midwestern university. The findings showed that the more passive students were in expressing their opinion during the class, the less likely they were to send e-mails to their instructor (Coef. = -0.180, p < .01) or to communicate with their instructor face-to-face (Coef. = -0.262, p < .01). The findings also showed that the more students described their personality as "shy," the less likely they were to e-mail their instructor (Coef. = -0.157, p < .05) or communicate with their instructor face-to-face (Coef. = -0.210, p < .01). It is noteworthy that the degrees of both passivity and shyness had a more negative effect on the probability of face-to-face interaction than they did on email interaction. In summary, email usage follows similar broader patterns of social interaction, rather than introducing a different trend in communication. This finding implies that the importance of e-mail should not be exaggerated as a communication tool for reticent students.

차세대 통합 커뮤니케이션 서비스 제공 시스템 (Advanced Unified Communication Service System)

  • 신영미;배현주
    • 한국통신학회논문지
    • /
    • 제36권8B호
    • /
    • pp.962-970
    • /
    • 2011
  • 본 논문은 차세대 통합 커뮤니케이션 서비스 시스템에 대하여 기술한다. 차세대 통합 커뮤니케이션은 기업 내 직원들의 의사 소통 및 정보 공유를 위하여 전화, SMS(Short Message Service), 이메일, 채팅과 같은 기본 통신 수단에 소셜 네트워킹 서비스를 새로운 통신 수단으로 결합하여, 하나의 통합된 인터페이스에서 제공하는 서비스를 의미한다. 본 논문의 차세대 통합 커뮤니케이션 시스템은 차세대 UC(Unified Communications) 응용서비스, 개방형 UC 서비스 플랫폼, UC 백엔드 서버로 구성된다. 응용서비스는 웹 응용과 스마트폰에 탑재되는 모바일 응용으로 구성된다. 개방형 UC 서비스 플랫폼은 UC 응용서비스가 아닌 써드 파티 응용서비스에게 기업 내의 기본 및 소셜 네트워킹 서비스에 접근할 수 있는 개방형 서비스 컴포넌트를 제공한다. 백엔드 서버는 기업내의 전화, SMS, 이메일, 채팅을 위한 서버 기능을 제공한다.

Phishing Attack Detection Using Deep Learning

  • Alzahrani, Sabah M.
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12호
    • /
    • pp.213-218
    • /
    • 2021
  • This paper proposes a technique for detecting a significant threat that attempts to get sensitive and confidential information such as usernames, passwords, credit card information, and more to target an individual or organization. By definition, a phishing attack happens when malicious people pose as trusted entities to fraudulently obtain user data. Phishing is classified as a type of social engineering attack. For a phishing attack to happen, a victim must be convinced to open an email or a direct message [1]. The email or direct message will contain a link that the victim will be required to click on. The aim of the attack is usually to install malicious software or to freeze a system. In other instances, the attackers will threaten to reveal sensitive information obtained from the victim. Phishing attacks can have devastating effects on the victim. Sensitive and confidential information can find its way into the hands of malicious people. Another devastating effect of phishing attacks is identity theft [1]. Attackers may impersonate the victim to make unauthorized purchases. Victims also complain of loss of funds when attackers access their credit card information. The proposed method has two major subsystems: (1) Data collection: different websites have been collected as a big data corresponding to normal and phishing dataset, and (2) distributed detection system: different artificial algorithms are used: a neural network algorithm and machine learning. The Amazon cloud was used for running the cluster with different cores of machines. The experiment results of the proposed system achieved very good accuracy and detection rate as well.

Preventing Procurement Fraud in E-purchasing for Indonesian Local Governments

  • ZAHRA, Femilia;ABDULLAH, Muhammad Ikbal;KAHAR, Abdul;DIN, Muhammad;NURFALAH, Nurfalah
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제8권2호
    • /
    • pp.505-511
    • /
    • 2021
  • This study aims to investigate the effects of e-purchasing on increasing transparency, expanding market access, and the efficiency of the government procurement process. This study also investigates how transparency of the procurement process, improved market access and the efficiency of the procurement process in e-purchasing will decrease the level of fraudulent government procurement in Indonesia. The questionnaires were distributed to the Procurement Service Units (ULP) of Local Governments through email. There are currently 542 ULPs in Indonesia based on the data of the Government Procurement Policy Institute (LKPP). However, only 520 ULPs had their email addresses traced, 120 ULP returned the questionnaires and the response rate is lower than it was expected. The data research was analyzed by a structural equation model (SEM) by using WarpPLS 7.0. The results reveal that the e-purchasing effect on the transparency, the expansion of market access, and the efficiency of the government procurement process. The other findings show the negative effect between efficiency in government procurement and fraud in government procurement. The findings of this study suggest that efficiency in the process of government procurement will minimize fraud in government procurement. However, transparency in government procurement and the expansion of market access was not sufficient to minimize fraud in government procurement.

이메일을 통한 기밀정보 유출 유형의 내부자 위협 탐지 기술 (Insider Threat Detection Technology against Confidential Information Loss using Email)

  • 이영재;강성원;김경미;이경률
    • 한국컴퓨터정보학회:학술대회논문집
    • /
    • 한국컴퓨터정보학회 2023년도 제68차 하계학술대회논문집 31권2호
    • /
    • pp.217-218
    • /
    • 2023
  • 내부자 위협이란, 조직의 보안 및 데이터, 시스템에 대한 내부 정보에 접근하는 현 임직원 및 전 임직원, 계약자와 같이, 동일한 조직 내부의 사람들로부터 발생하는 위협을 의미한다. 일반적으로 내부자들은 업무를 위하여, 시스템에 대한 합법적인 접근 권한을 가지며, 만약 이러한 권한이 오남용되는 경우에는 조직에 매우 심각한 피해를 입힐 수 있다. 이러한 내부자 위협은 외부로부터의 위협보다 방어 및 탐지가 훨씬 어려운 한계점이 있으며, 그 피해 규모가 매우 방대하다는 문제점도 존재한다. 이에 따라, 본 논문에서는 내부자 위협을 탐지하기 위하여, 이메일을 통한 기밀정보를 유출하는 유형의 위협에 대응하는 방안을 제안한다. 제안하는 방안은 조직 내에서 이메일을 발신하는 경우를 대상으로, 파일이 포함된 이메일에 발신자를 식별하기 위하여, 파일에 키 값 및 서명을 삽입하며, 발신되는 이메일을 모니터링하여 첨부된 파일의 유형을 파악함으로써, 동적 그래프를 통하여 시각화한다. 내부 시스템 및 네트워크에서의 보안관제 담당자 및 관리자는 시각화된 그래프를 확인함으로써, 직관적으로 정보 유출을 파악하고 대응할 수 있을 것으로 판단된다. 본 논문에서 제안하는 방안을 통하여, 조직 내의 내부자 위협을 탐지할 수 있으며, 데이터 유출 사고가 발생하는 경우, 유출자를 빠르게 식별하고 초기에 대응할 수 있을 것으로 판단된다.

  • PDF