• Title/Summary/Keyword: 네트워크 관리 서비스

Search Result 2,056, Processing Time 0.03 seconds

Analyzing the Positive and the Negative SNS Behaviors of the Elementary and Middle School Students (초.중학생의 SNS에서의 긍정적.부정적 행동 분석)

  • Lee, Soojung;Yeon, Jeong-Hwa
    • Journal of The Korean Association of Information Education
    • /
    • v.17 no.1
    • /
    • pp.1-8
    • /
    • 2013
  • SNS is a social networking service that removes the barrier between cyber spaces and the real world and helps people who have common interests to have a two-way communication, manage their interpersonal relationships and share information. The domestic and international SNS markets have attained a steady growth, and their growth is being more accelerated in recent days. However, studies on SNS have just examined adults, and it's required to research the use of SNS and cyber behaviors via SNS among elementary and middle school students. This study attempted to analyze the relationship of the use of SNS, motivation of using SNS, the use of active SNS functions, SNS-dependent tendency and SNS awareness to cyber behaviors via SNS among elementary and middle school students. As a result, regardless of gender and grade, stealing private information was the most frequent activity and the frequency of 'contacting strangers' activity increased most rapidly with the usage time and grade. SNS dependency turned out to be the most highly correlated with the negative cyber behavior. Moreover, the difference of gender was not significant to the overall negative cyber behavior, whereas that of grade was.

  • PDF

A Study on Business Types of IoT-based Smarthome: Based on the Theory of Platform Typology (IoT 기반 스마트홈 비즈니스 유형 연구: 플랫폼유형론을 근간으로)

  • Song, Minzheong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.27-40
    • /
    • 2016
  • This paper aims to analyze the business types of 237 IoT based smart home companies in the world (launched during 1999~2014) which got global investment last few years. For this, the previous literatures trying to analze technology and service types of smart home are searched and the typology of the platform is discussed. Based on it, this research conceptualizes an analysis framework that includes three areas of smart home like home automation, home security, and energy efficiency with the three platform types like product, software, and service. This study concludes that the development of business type for IoT based smart home ecosystem is from the product to software and it can be a platform or not. In current status, there are a few platforms of product and software, but in the device management (16%) and thermostat (11%), companies are persuing more platform like. It is difficult to find the service platform in overall areas, for application based service has a few attractions in the investment market due to the lack of cloud infrastructure and data analytics. The following three are the implication to domestic market: 1) More active offering of API and SDK, 2) more active introduction of wireless Intenet network protocols, and 3) more active interoperability efforts and alliance activities are needed.

A Study on the Effects of SNS Informativeness, Playfulness and Reliability on Purchase Intention and Business Performance (SNS의 정보제공성, 유희성, 신뢰성이 구매의도 및 경영성과에 미치는 영향에 관한 연구)

  • Kim, Ye-Jung;Park, Sang-Bong
    • Management & Information Systems Review
    • /
    • v.38 no.3
    • /
    • pp.113-125
    • /
    • 2019
  • This study empirically analyzes the effect of SNS informativeness, playfulness and reliability on purchase intention and the effect of consumer's purchase intention on business performance through structural equation model, In doing so, this study aims to suggest ways to enhance consumers' purchase intention and consequently increase the business performance through various SNS marketing strategies that can efficiently manage consumers. The questionnaires were distributed to adult men and women who are in their 20s through 60s, actively use SNS, and primarily reside in Daegu and Gyeongbukdo. The 400 copies of questionnaire were distributed from September 15 to October 1, 2018, of which 364 (91%) were used for the empirical analysis, except for 36 of the questionnaires that were unfaithful or unresponsive. Basic statistical analysis including frequency analysis was performed using SPSS 22.0 and AMOS 24.0, reliability and validity analysis were also performed, and finally hypotheses were tested by performing confirmatory factor analysis and path analysis of structural equation model. All of the SNS informativeness, playfulness and reliability were shown to have positive effects on the purchase intention. In addition, the effect of purchase intention on business performance was found to be significant. Companies should come up with a strategic SNS marketing plan to encourage consumers to enhance the willingness to purchase their products and services through SNS, and to make actual purchases, thereby improving business performance.

A System Recovery using Hyper-Ledger Fabric BlockChain (하이퍼레저 패브릭 블록체인을 활용한 시스템 복구 기법)

  • Bae, Su-Hwan;Cho, Sun-Ok;Shin, Yong-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.2
    • /
    • pp.155-161
    • /
    • 2019
  • Currently, numerous companies and institutes provide services using the Internet, and establish and operate Information Systems to manage them efficiently and reliably. The Information System implies the possibility of losing the ability to provide normal services due to a disaster or disability. It is preparing for this by utilizing a disaster recovery system. However, existing disaster recovery systems cannot perform normal recovery if files for system recovery are corrupted. In this paper, we proposed a system that can verify the integrity of the system recovery file and proceed with recovery by utilizing hyper-ledger fabric blockchain. The PBFT consensus algorithm is used to generate the blocks and is performed by the leader node of the blockchain network. In the event of failure, verify the integrity of the recovery file by comparing the hash value of the recovery file with the hash value in the blockchain and proceed with recovery. For the evaluation of proposed techniques, a comparative analysis was conducted based on four items: existing system recovery techniques and data consistency, able to data retention, recovery file integrity, and using the proposed technique, the amount of traffic generated was analyzed to determine whether it was actually applicable.

Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment (신뢰실행환경기반 엣지컴퓨팅 환경에서의 암호문에 대한 효율적 프라이버시 보존 데이터 중복제거)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.305-316
    • /
    • 2022
  • With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.

Development of Certification Model of Robot-Friendly Environment for Apartment Complexes (아파트 단지의 로봇 친화형 환경 인증 모델 개발)

  • Jung, Minseung;Jang, Seolhwa;Gu, Hanmin;Yoon, Dongkeun;Kim, Kabsung
    • Journal of Cadastre & Land InformatiX
    • /
    • v.53 no.1
    • /
    • pp.83-105
    • /
    • 2023
  • A robot-friendly building certification system was established in 2022 to accommodate the growing number of service robots introduced into buildings. However, this system primarily targeted office buildings, with limitations in applying other functional architectures. To address this problem, we developed a certification model of a robot-friendly environment to extend the existing system to apartment complexes. Using focus group interviews and the analytic hierarchy process, we established 28 evaluating items categorized as (a) architecture and facility design, (b) networks and systems, (c) building operations management, and (d) support for robot activity and other services. These indicators were weighted based on their relative importance within and between categories, resulting in scores ranging from 1 to 18 points and a total of 176 points. According to evaluations with the 28 items, each apartment complex could be graded as "best," "excellent," or "general" based on its total achieved scores. This study is significant, as we present the world's first certification model of a robot-friendly environment for apartment complexes that considers human-robot interactions

A Study on Improvement for Identification of Original Authors in Online Academic Information Service (온라인 학술정보 서비스 상 원저작자 식별 개선 방안 연구)

  • Jung-Wan Yeom;Song-Hwa Hong;Sang-Hyun Joo;Sam-Hyun Chun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.24 no.3
    • /
    • pp.133-138
    • /
    • 2024
  • In the modern academic research environment, the advancement of digital technology provides researchers with increasingly diverse and rich access to information, but at the same time, the issue of author identification has emerged as a new challenge. The problem of author identification is a major factor that undermines the transparency and accuracy of academic communication, potentially causing confusion in the accurate attribution of research results and the construction of research networks. In response, identifier systems such as the International Standard Name Identifier (ISNI) and Open Researcher and Contributor ID (ORCID) have been introduced, but still face limitations due to low participation by authors and inaccurate entry of information. This study focuses on researching information management methods for identification from the moment author information is first entered into the system, proposing ways to improve the accuracy of author identification and maximize the efficiency of academic information services. Through this, it aims to renew awareness of the issue of author identification within the academic community and present concrete measures that related institutions and researchers can take to solve this problem.

An Implementation of Dynamic Gesture Recognizer Based on WPS and Data Glove (WPS와 장갑 장치 기반의 동적 제스처 인식기의 구현)

  • Kim, Jung-Hyun;Roh, Yong-Wan;Hong, Kwang-Seok
    • The KIPS Transactions:PartB
    • /
    • v.13B no.5 s.108
    • /
    • pp.561-568
    • /
    • 2006
  • WPS(Wearable Personal Station) for next generation PC can define as a core terminal of 'Ubiquitous Computing' that include information processing and network function and overcome spatial limitation in acquisition of new information. As a way to acquire significant dynamic gesture data of user from haptic devices, traditional gesture recognizer based on desktop-PC using wire communication module has several restrictions such as conditionality on space, complexity between transmission mediums(cable elements), limitation of motion and incommodiousness on use. Accordingly, in this paper, in order to overcome these problems, we implement hand gesture recognition system using fuzzy algorithm and neural network for Post PC(the embedded-ubiquitous environment using blue-tooth module and WPS). Also, we propose most efficient and reasonable hand gesture recognition interface for Post PC through evaluation and analysis of performance about each gesture recognition system. The proposed gesture recognition system consists of three modules: 1) gesture input module that processes motion of dynamic hand to input data 2) Relational Database Management System(hereafter, RDBMS) module to segment significant gestures from input data and 3) 2 each different recognition modulo: fuzzy max-min and neural network recognition module to recognize significant gesture of continuous / dynamic gestures. Experimental result shows the average recognition rate of 98.8% in fuzzy min-nin module and 96.7% in neural network recognition module about significantly dynamic gestures.

Design and implementation of smart card-based multi-authentication mechanism for digital contents delivery (디지털콘텐츠 유통을 위한 스마트카드기반의 다중인증처리방법설계 및 구현)

  • Kim, Yong;Lee, Tae-Young
    • Journal of the Korean Society for information Management
    • /
    • v.19 no.1
    • /
    • pp.23-46
    • /
    • 2002
  • With explosively increasing digital contents, library and Information center should have a new role between knowledge providers and knowledge users as information brokering organization. Electronic transaction system should be required for performing this brokering service since economic value is added to information and knowledge in information society. The developments and changes around library are keeping up with increasing building digital library and digitalizing printed sources. With the rapidly changing circumstances, the Internet is currently witnessing an explosive growth. By serving as a virtual information resource. the Internet can dramatically change the way business is conducted and Information is provided. However because of features o( the Internet like openness and information sharing, it has fundamental vulnerabilities in security issues. For Instance, disclosure of private information and line eavesdropping such as password, banking account, transaction data on network and so on are primary obstruction factors to activation of digital contents delivery on network. For high network security and authentication, this paper looks at smart card technologies and proposes multi-authentication protocol based on smart card on open network, implements and analyzes it.

Welfare Activation Strategy for a Urban Park Users (도시공원 이용자들을 위한 공원복지 활성화전략 -부산도시공원 이용자를 중심으로-)

  • Kim, Kyo-Jung
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.10
    • /
    • pp.195-204
    • /
    • 2012
  • The purpose of this study is to suggest the improvement plan for the welfare in the park through the empirical test on the park facilities, which are the hardware, and the service contents, which are the software, in the urban parks of Busan. Therefore, to identify the welfare of the parks in Busan, this study took 7 urban parks as samples according to the plate method of experts, and conducted the questionnaire survey from 1,500 persons using these parks. The IPA analysis results on the importance and the satisfaction of the users on the form of use, facilities and the contents of the park are as follows. First, the convenient facilities, which are the hardware of the park, are represented as a intensive management item. Second, the importance and the satisfaction for all the facilities and the contents of each park are significant differences. according to the location of each park and the characteristics of each principal park users. Such results mean that the Busan urban park operation does not satisfy the expectation of the park users for the welfare facilities in the parks. Therefore, it implies that to activate the urban parks and to improve the quality of life than the present, the aceessibility of the local residents to the information should be reinforced through the development of contents to reflect the region and the desires of the users and through building and managing the homepage of the urban parks.