• Title/Summary/Keyword: 워크폰

Search Result 628, Processing Time 0.027 seconds

A Study on the Decision Process for Adoption of Enterprise Endpoint Security solutions (기업용 Endpoint 보안솔루션 도입을 위한 의사결정 프로세스에 대한 연구)

  • Moon, Heoungkeun;Roh, Yonghun;Park, Sungsik
    • Journal of Information Technology and Architecture
    • /
    • v.11 no.2
    • /
    • pp.143-155
    • /
    • 2014
  • In recent years, domestic electronics, banking, electricity, services, manufacturing, pharmaceutical, corporate type and malicious hackers is corporate security through the accident occurred and the resulting loss of corporate information and the damage each year is steadily increasing. Many companies have responded to domestic business activities and to protect critical information related to laptops, smart phones, tablets, and introduced a variety of Endpoint security solutions within. However, being introduced to senselessly Endpoint security solution across the over-budget, with the same features and performance, such as conflicts and problems arise, resulting in additional maintenance costs, in an effort to resolve the conflict in the operational security of the IT department's new difficulty in becoming. Here is the introduction and operation of these Endpoint security solutions in order to solve the problem on employees's PC into the center of the information security governance based on Endpoint security solution to provide the process for determining the solutions presented.

Trend Analysis of Malwares in Social Information Based Android Market (소셜 기반 안드로이드 마켓에서 악성 앱 경향성 분석)

  • Oh, Hayoung;Goo, EunHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1491-1498
    • /
    • 2017
  • As the use of smartphones and the launch of various apps have increased rapidly, the number of malicious apps has also increased, and the damage is continuing. The Google Market where Android apps are registered is inevitably present at the same time as normal apps and malicious apps even though there are regulations for app registration. Especially, as social networks are activated, users are connected with social networks, and the ratings, downloads and awareness information are reflected in the number of downloaded apps. As a result, when users choose their apps by simply reflecting ratings, popularity, popular comments, and highly-categorized apps, malicious app downloads can sometimes cause significant harm. Therefore, this study first analyzed the tendency of malicious apps by directly crawling and analyzing long-term social information in the currently active Android market.

Hybrid Web-Based Real-Time Video Communication System (하이브리드 웹 기반의 실시간 화상통신 시스템)

  • Ban, Tae-Hak;Cho, Tae-Bum;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1113-1118
    • /
    • 2013
  • Real-time video communication technology of hybrid Web-based using JavaScript and HTML5 today is on the rise. Therefore, in this paper, we have studied the real-time videoo communication technology using a Web browser that supports HTML5. It has been designed and implemented a system based on HTML5 and JavaScript, allowing for video communication of real-time, such as you would using the HTTP/WebSockets and RTC API through the Web servers in the Web browser between different each other, utilizing a Web browser was. It is available in a usable terminal equipment of a Web browser PC or notebook, smart pad, such as a smart phone, which is available without installation, such as a plug-in register or another. In all environments the network is connected, it is available in all terminals use the Web browser is enabled, which will be utilized in the field of video communication in a restricted environment.

Development of Wire-Wireless Integrated Web Messenger for Communication of users in a Multi-Organization (복수조직 구성원들의 상호통신을 위한 유무선 통합 웹 메신저 개발)

  • Cho, Migyung;Kim, Jungin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.5
    • /
    • pp.1181-1186
    • /
    • 2013
  • Mobile network has become an essential tool for mutual communications, so a survey research published that most of the smartphone users use Mobile Instant Messenger every day. In this paper, we developed a wire-wireless integrated web messenger that can be used in various platform of mobile devices and desktop computer for communicating between users of some companies. We defined a multi-organization as several independent companies. Our web messenger was developed for communicating of users of a multi-organization. So one of functions of our web messenger is to restrict access to some particular departments in each company for the security of their company. Developed web messenger worked reliably from variety of web browsers on most of platforms such as android, iOs and desktop computers.

An IoT Patent Trend Analysis for Technological Convergence on Hyper Connected Society (초연결시대 기술융합을 위한 사물 인터넷 기술의 특허동향 분석)

  • Rho, Seungmin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.11
    • /
    • pp.2724-2730
    • /
    • 2015
  • Internet of Things (IoT) is possibly the most widely discussed technological concept in today's technology circles. This technology is expected to dramatically change not only how we work but also how we live. The concept of IoT basically means a web of connected devices which can be controlled over a data network. With cost of technology required to control these devices going down and increasing internet connectivity through smartphones, IoT is expected to be an all pervasive technology in the next 10 years. In this paper, we study the technological landscape of this fast growing technology domain from an Intellectual Property (Patents) perspective. We find that the patent distribution in this domain is very fragmented with the top patent applicants in the field holding around 5% of the total patents. Especially, the US geography has seen the maximum patent filings and is closely followed by the big Asian markets of Japan and Korea.

Sensor Selection Strategies for Activity Recognition in a Smart Environment (스마트 환경에서 행위 인식을 위한 센서 선정 기법)

  • Gu, Sungdo;Sohn, Kyung-Ah
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.1031-1038
    • /
    • 2015
  • The recent emergence of smart phones, wearable devices, and even the IoT concept made it possible for various objects to interact one another anytime and anywhere. Among many of such smart services, a smart home service typically requires a large number of sensors to recognize the residents' activities. For this reason, the ideas on activity recognition using the data obtained from those sensors are actively discussed and studied these days. Furthermore, plenty of sensors are installed in order to recognize activities and analyze their patterns via data mining techniques. However, if many of these sensors should be installed for IoT smart home service, it raises the issue of cost and energy consumption. In this paper, we proposed a new method for reducing the number of sensors for activity recognition in a smart environment, which utilizes the principal component analysis and clustering techniques, and also show the effect of improvement in terms of the activity recognition by the proposed method.

Development of Real time Aircraft harmful gas detecting Emebedded system through wireless sensor network (무선 센서 네트워크를 통한 실시간 항공기 유해가스 감지 임베디드 시스템 개발)

  • Choi, Won-Huyck;Jie, Min-Seok
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.672-678
    • /
    • 2013
  • In this paper, with the development of Information technology, application service between IT and traditional industry has been on the rise. And there are many on-going discussions actively regarding the Air quality system based on wireless sensor network which monitor and control the aircraft environment automatically and manually with the application service of detecting harmful gas. In this paper, operation program constitute the administrator monitoring device, which collects data from sensor node of wireless sensor network and sensor node and transmits environment information to display and server. Also for remote monitoring, user operation program constitutes based on PC/smartphone. Under this, the harmful gas which is made in aircraft life is measured. Real time monitoring system based on wireless sensor network is designed and realized.

Fame-work Design on 3D Cyber Museum-Construction of Augmented Reality(AR) Creation Module of National Museum of Contemporary Art (3차원가상미술관 프레임워크디자인 - 국립현대미술관의 증강현실 창작모듈설계)

  • Lim, Janghoon
    • Trans-
    • /
    • v.9
    • /
    • pp.93-122
    • /
    • 2020
  • I intended to establish Augmented Reality(AR) Museum of 3D Cyber Space where artists and graphic designers can freely create in user integrated environment. This study is aimed at building a sufficient and integrated production environment for artists and graphic designers who utilize three-dimensional simulation methods in integrated development environment(IDE). This study intends to build a 3D simulation engine and a creation module of augment reality of 3D cyber space in Android platform to help artists and graphic designers to freely perform their creation in IDE. Based on these designs, I produced exhibition rooms of National Museum of Contemporary Art in 3D virtual space in which artists and graphic designers can put the graphics they have created on display, conducted a user survey and conducted tasking to an Android smartphone.

  • PDF

A Study on the Factors Influencing the User Experience of Mobile Payment Services in China -Centered on people in their 20s and 30s- (중국의 모바일 결제 서비스의 사용자 경험에 영향을 미치는 요인에 관한 연구 -20,30대 중심으로-)

  • Du, Jian;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.19 no.9
    • /
    • pp.271-276
    • /
    • 2021
  • This study is about finding factors affecting user experience in China's mobile payment. The recen development of 5G networks and the spread of phones provide the basis for the development of mobile payment, and the development of mobile payment is showing a rapid upward trend. Because of the simplicity and mobility, it is appealing to people, especially young people. Therefore, this study conducted a survey on mobile payment users in 20s and 30s and confirmed the factors affecting the user experience through regression analysis. Unlike previous studies on mobile payment technology, this study focused on user experience and identified factors affecting user experience, so it is expected to be helpful in the development of mobile payment in China.

Consortium Blockchain based Forgery Android APK Discrimination DApp using Hyperledger Composer (Hyperledger Composer 기반 컨소시움 블록체인을 이용한 위조 모바일 APK 검출 DApp)

  • Lee, Hyung-Woo;Lee, Hanseong
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.9-18
    • /
    • 2019
  • Android Application Package (APK) is vulnerable to repackaging attacks. Therefore, obfuscation technology was applied inside the Android APK file to cope with repackaging attack. However, as more advanced reverse engineering techniques continue to be developed, fake Android APK files to be released. A new approach is needed to solve this problem. A blockchain is a continuously growing list of records, called blocks, which are linked and secured using cryptography. Each block typically contains a cryptographic hash of theprevious block, a timestamp and transaction data. Once recorded, the data inany given block cannot be altered retroactively without the alteration of all subsequent blocks. Therefore, it is possible to check whether or not theAndroid Mobile APK is forged by applying the blockchain technology. In this paper, we construct a discrimination DApp (Decentralized Application) against forgery Android Mobile APK by recording and maintaining the legitimate APK in the consortium blockchain framework like Hyperledger Fabric by Composer. With proposed DApp, we can prevent the forgery and modification of the appfrom being installed on the user's Smartphone, and normal and legitimate apps will be widely used.