• Title/Summary/Keyword: mail

Search Result 1,928, Processing Time 0.027 seconds

Indirection Model and Application of Electronic Mail Control System Considering High Availability (고가용성을 고려한 전자메일통제시스템의 우회 모델 및 응용)

  • Kim Young Soo;Suh Jung Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.2
    • /
    • pp.348-354
    • /
    • 2005
  • These days, Electronic mail is being used in everyday's life. And on the other hand, we are facing spam mails' problems. Spam mails are widely used by means of marketing in e-Commerce. To block these spam mails, we are using filtering or pricing systems. But these solutions are raising other problems such as impediment in reception or availability caused by false positive or payment resistance. To solve these problems, we propose an Indirect Model on Electronic Mail Control System(IMEMCS) which controls an unsolicited electronic mail and prevents an useful electronic mail from discarding. We design and implement the IMEMCS to enhance the usefulness and the availability. Being tested the IMEMCS to verify the usability and the efficiency, it gave us a very successful result.

Workforce Planning Model for the Parcel Sorting Area in a Mail Processing Center (우편집중국 소포구분 작업장 인력계측 수립모형)

  • Park, Chul-Soon;Bae, Sung-Moon;Cha, Byung-Chul;Cha, Chun-Nam
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.32 no.3
    • /
    • pp.1-9
    • /
    • 2009
  • Processing mail objects in a mail processing center involves several steps and operations, in particular dispatching as well as sorting by destination. The purpose of this paper is to present a model for the part-time worker staffing and allocation problem as it arises at the parcel sorting area in a mail processing center. The problem is formulated as a mixed integer linear program model to minimize the variable part-time workforce related cost. Hot only the characteristics of the sorting operations but also the dispatching requirements of the vehicles are reflected into the model. Six example problems with three different daily amounts of arriving mail are solved with LINGO to demonstrate the effectiveness of the 7-level induction option for the parcel sorting machine over the current 3-level one. The results indicate that measurable savings can be achieved by departing from current practice.

Information Technology Strategy for Postal Mail Acceptance Service (우편접수 서비스를 위한 정보기술 도입 전략)

  • Chang, Tai-Woo;Na, Dong-Gil;Koo, Hoon-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.2
    • /
    • pp.57-69
    • /
    • 2009
  • Korea post delivers more than 4.7 billions of mails and parcels per year. Although postal service is invoked by mail acceptance from customers, mail acceptance service is not as mature as sorting or delivery service in terms of automation and informatization. In this paper, we reviewed current status and issues of the mail acceptance service, analyzed relavent technologies and foreign case-studies, and suggest an information strategy plan for better service. According to the strategies, we propose several action plans for applying adequate information technologies. In addition, we address important results of patents analysis for major technologies. The results of this study could contribute to determining the information strategy and the R&D plan for future postal service.

  • PDF

A Study on Effective Countermeasures against E-mail Propagation of Intelligent Malware (지능형 악성코드의 이메일 전파에 대한 효과적인 대응 방안에 관한 연구)

  • Lee, Eun-Sub;Kim, Young-Kon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.189-194
    • /
    • 2020
  • Most cyber breaches are caused by APT attacks using malware. Hackers use the email system as a medium to penetrate the target. It uses e-mail as a method to access internally, destroys databases using long-term collected vulnerabilities, and illegally acquires personal information through system operation and ransomware. As such, the e-mail system is the most friendly and convenient, but at the same time operates in a blind spot of security. As a result, personal information leakage accidents can cause great damage to the company and society as a whole. This study intends to suggest an effective methodology to securely manage the APT attack by strengthening the security configuration of the e-mail system operating in the enterprise.

Reticence and Communication Preferences in the Classroom: Comparing "E-mail" and "Face-to-face" Interactions

  • Ha, Jae-Sik;Shin, Dong-Hee;Lee, Chung Gun
    • International Journal of Contents
    • /
    • v.10 no.2
    • /
    • pp.18-27
    • /
    • 2014
  • This study examines underlying factors that influence undergraduate students' willingness to enhance communication with their instructor by comparing the frequency of e-mail and face-to-face interaction between students and instructors. Data was collected through a survey of 322 undergraduate journalism students at a large Midwestern university. The findings showed that the more passive students were in expressing their opinion during the class, the less likely they were to send e-mails to their instructor (Coef. = -0.180, p < .01) or to communicate with their instructor face-to-face (Coef. = -0.262, p < .01). The findings also showed that the more students described their personality as "shy," the less likely they were to e-mail their instructor (Coef. = -0.157, p < .05) or communicate with their instructor face-to-face (Coef. = -0.210, p < .01). It is noteworthy that the degrees of both passivity and shyness had a more negative effect on the probability of face-to-face interaction than they did on email interaction. In summary, email usage follows similar broader patterns of social interaction, rather than introducing a different trend in communication. This finding implies that the importance of e-mail should not be exaggerated as a communication tool for reticent students.

Design of A Spammail Control Model Based on Hierarchical Policy (정책기반의 계층적 스팸메일 제어모델 설계)

  • Lee Yong-Zhen;Baek Seung-Ho;Park Nam-Kyu;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.143-151
    • /
    • 2005
  • As the internet and I-commerce have been developing. a novel method for marketing is needed. A new advertisement using E-mail is becoming popular, because it has characteristics with low costs and relative efficiency. However. as the spam mails are increasing rapidly, mail service companies and users are deeply damaged in their mind and economically. In this paper, we design a hierarchical spam mail blocking policy through cooperation of all the participants-user, administrator, ISP to cut off the spam mail efficiently and Propose an efficient model to block and manage the spam mails based on the Policy. Also we prove the efficiencies and effectiveness of the proposed model through evaluation process .

  • PDF

Discourse Markers in EFL Learners' Turn-Taking through Computer-Mediated Communication (CMC)

  • Hahn, Hye-Ryeong
    • English Language & Literature Teaching
    • /
    • v.13 no.4
    • /
    • pp.33-58
    • /
    • 2007
  • The present paper aims at comparing the two modes of CMC - synchronous and asynchronous - in terms of discourse markers used in turn-initial positions. It further attempts to examine the viability and limitations of these two modes of CMC in fostering EFL learners' face-to-face conversation skills. For these purposes, the present study analyzed 33 Korean EFL learners' Web chat and E-mail exchange data. Discourse markers in the participants' Web chat transcripts and those in their E-mail transcripts were identified and then compared in terms of their frequency and functions. The analysis revealed that the participants show difference in their preference for discourse markers depending on the modes of CMC. Also, the functions of discourse markers used for Web chat showed were strikingly different from those for e-mail. Especially, e-mail discourse markers revealed greater discrepancy from the markers in face-to-face conversation. The differences were found to be attributable to the time factor involved with the turn-taking systems of the two modes of CMC, especially the degree of instantaneousness in their turn-taking. Findings suggest that the turn taking skills and discourse marker use in CMC is not applicable to face-to-face conversation contexts. Pedagogical implications are discussed.

  • PDF

A fasrter Spam Mail Prevention Algorithm on userID based (userID 기반의 빠른 메일 차단 알고리즘)

  • 심재창;고주영;김현기
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.211-214
    • /
    • 2003
  • The problem of unsolicited e-mail has been increasing for years, so many researchers has studied about spam filtering and prevention. In this article, we proposed a faster spam prevention algorithm based on userID instead of full email address. But there are 2% of false-negatives by userID. In this case, we store those domains in a DB and filter them out. The proposed algorithm requires small DB and 3.7 times faster than the e-mail address comparison algorithm. We implemented this algorithm using SPRSW(Spam Prevention using Replay Secrete Words) to register userID automatically in userID DB.

  • PDF

Library Function Development for Internet MOSS(MIME Object Security Service) (인터네트 멀티미디어 전자우편의 보안 처리를 위한 라이브러리 함수 개발)

  • Yun, Seong-Sun;Yun, Gi-Song
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.6
    • /
    • pp.1493-1505
    • /
    • 1996
  • As Internet and its users grow dramatically multi-media data are getting common, many types of electronic mail applications are showing up. Internet s/w developers and users would like to electronic mail system for commercial purposes. They also would like to protect their electronic mail somehow. For these purpose, the security feature using cryptography is one of the essential functions. In this paper, we describe the library function development for handing MOSS(MIME Object Security Service), the security version of MINE(Multi -Purpose Internet Mail Extension). For these purpose, we explain the security features and structures of MOSS and defined the necessary function and we also discussed design issues for the MOSS implementation.

  • PDF

A Study on Process Optimization for Reliability of Tracking and Tracing Information in the field of Postal Logistics (우편물류 종추적 정보 신뢰성 향상을 위한 프로세스 개선방안 연구)

  • Kim, Eun-Hye;Cha, Byung-Chul
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.34 no.2
    • /
    • pp.92-102
    • /
    • 2011
  • Visibility of the flow of goods is an important service element when considering how to improve the quality of a logistics service. Registered mail service of Korea Post, one of logistics service providers, currently supply information on the handling of postal items, such as receipts and delivery and arrival times to customers. However, internally problems related to excessive spending on operating expenses and less reliable tracking and tracing information exist due to errors in the information acquisition and link handling processes, leading to unnecessarily duplicated tasks. Therefore, the purpose of this paper is to propose process optimization method for improving the quality of tracking and tracing information for registered mail items. We analyzed the process and information control system of the current registered mail service and identified the basic causes of the existence of less reliable tracking and tracing information. And we present optimized mail handling and information management process for removing internal problems. Test results using tracking and tracing information examples show a significant performance of the proposed method.