• Title/Summary/Keyword: 인터넷 대중화

Search Result 323, Processing Time 0.022 seconds

A Study on the integrated management system for tourism complexes based on IoT technology (IoT 기술을 기반으로 한 관광단지 통합관리시스템에 관한 연구)

  • An, Tai-Gi
    • Journal of Industrial Convergence
    • /
    • v.17 no.4
    • /
    • pp.1-8
    • /
    • 2019
  • The purpose of this study is to analyze the actual condition of tourism complex and to apply IoT-based integrated management system to tourism complex to improve the utilization and management of tourism complex. Tourists need various information to take the lead in tourism activities, and all of these necessary information is collected through various routes such as information of the Internet, travel agencies, newspapers, and surrounding experiences. Recently, information provision through the Internet has taken a large part due to the development of information technology, and systems that combine IoT technology are being constructed. This is because the popularization of IoT technology improves the diversity, accessibility and convenience of information and makes it convenient to use. The purpose of this study is to suggest the importance of tourism information service using IoT-based system and future research directions. The previous studies on IoT-based system construction were also reviewed considering the efficiency of IoT technology. In order to solve the problems of tourism complex, this study improved the IoT-based tourism complex operation system and conducted operation management. IoT-based management system is expected to be improved as a tourism complex platform and is expected to be improved by overall management cases and experiences.

Effects of using Korean Entertainment Information in SNS on Attitude toward Hallyu Contents and Hanllyu (중국 시나 웨이보에서의 한국엔터테인먼트 정보 이용이 한류 콘텐츠 및 한류 호감도에 미치는 영향)

  • Li, Ruo Xi;Jin, HaiYan;Hwang, HaSung
    • Journal of Internet Computing and Services
    • /
    • v.18 no.2
    • /
    • pp.87-96
    • /
    • 2017
  • Since SNS has gained its popularity as the means of diffusion of Hallyu, this study aims to examine the relationships between SNS use and Hallyu. In particular, this study explored how the use of SNS as a tool for obtaining information about Korean entertainment influence Chinese attitude toward Hallyu and Hallyu contents In doing so, the study conducted the case of Sina Weibo, the most leading SNS in China. The survey questionnaire was administrated to college students who use Sina Weibo in China. Two hundreds forty one surveys were included in the final analysis. The result indicated that Sina Weibo use is strong predictor influencing attitude toward Hallyu and Hallyu contents. The more students use Sina Weibo to get Korean entertainment information the more they have positive attitude toward Hallyu contents and acceptance of Hallyu in their life. In addition, the study found that attitude toward Hallyu(in terms of acceptability) depends on the level of activity in the Sina Weibo among college students in China. In other words, the passive users (e.g. lurking) are more likely to adopt Hallyu rather than active users (e.g. people who are more likely to retweet Korean entertainment information on Sina Weibo or click 'like). Based on these findings the implications, limitations and directions for future studies are discussed.

Seamless and Secure Service Framework using Multiple Network Interlaces Terminal in Heterogeneous Environment (이종 네트워크 환경에서 다중 인터페이스 단말을 활용한 끊김 없이 안전한 서비스 프레임워크)

  • Yoon, Sung-Hun;Lee, Soon-Seok;Kim, Sang-Ha
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.4
    • /
    • pp.53-65
    • /
    • 2011
  • As the Information and Communication Technologies continue to advance, some sensitive services (e.g. e-commerce, on-line financial service, and etc.) have spread rapidly. Accordingly, ensuring the safety of the sensitive service itself using personal Information as well as the protection of personal Information Is becoming very important. In addition, with the popularization of smart phone and the universalized use of wireless Internet, many services that have been provided on the basis of the conventional wired network are increasingly propagating to wired and wireless converged network environment. These changes in the network environment requires new paradigm for the pursuit of safe and stable communication. In this paper, we propose seamless and secure service framework that can facilitate a sustainable secure connection between the user terminal and the sensitive service system by using both the personal and network Information. The proposed service framework is capable of isolating the source of authorized use by a third party of the personal Information as far as the user terminal is not lost, although some personal Information is disclosed. Besides, it can provide a seamless and safe service environment even if the access network is changed by relocation of terminals in the heterogeneous mobile network environment.

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

Extraction of System-Wide Sybil-Resistant Trust Value embedded in Online Social Network Graph (온라인 소셜 네트워크 그래프에 내포된 시스템-차원 시빌-저항 신뢰도 추출)

  • Kim, Kyungbaek
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.533-540
    • /
    • 2013
  • Anonymity is the one of main reasons for substantial improvement of Internet. It encourages various users to express their opinion freely and helps Internet based distributed systems vitalize. But, anonymity can cause unexpected threats because personal information of an online user is hidden. Especially, distributed systems are threatened by Sybil attack, where one malicious user creates and manages multiple fake online identities. To prevent Sybil attack, the traditional solutions include increasing the complexity of identity generation and mapping online identities to real-world identities. But, even though the high complexity of identity generation increases the generation cost of Sybil identities, eventually they are generated and there is no further way to suppress their activity. Also, the mapping between online identities and real identities may cause high possibility of losing anonymity. Recently, some methods using online social network to prevent Sybil attack are researched. In this paper, a new method is proposed for extracting a user's system-wide Sybil-resistant trust value by using the properties embedded in online social network graphs. The proposed method can be categorized into 3 types based on sampling and decision strategies. By using graphs sampled from Facebook, the performance of the 3 types of the proposed method is evaluated. Moreover, the impact of Sybil attack on nodes with different characteristics is evaluated in order to understand the behavior of Sybil attack.

Effects of Information Retrieval and Coffee Shop's Attributes on the Means of Repositioning (정보검색과 커피전문점 선택속성이 재방문 의도에 미치는 영향)

  • Baek, Young Ju;Lee, Min Jung
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.9
    • /
    • pp.549-557
    • /
    • 2020
  • Recently, the number of coffee shops has continued to increase, and information searches have been increasing for consumers who want to visit coffee shops. We wanted to find out the impact on the intention of revisiting a coffee shop by adding information search factors to the existing coffee shop's selection properties and search for the actual selection properties, and summarize the results as follows. The analysis of this study was conducted in two ways, before and after visiting a coffee shop through information search. First, the four factors and optional attributes that are important in information retrieval were the reliability of information (the number of reviews and views by coffee shops, recent postings), physical environment (the proximity of stores, the atmosphere, size, presence of side menus), visuality of information (physical environment, background, design, easy composition), merchantability (the taste of coffee, convenience of parking). In addition, the selection properties for satisfaction after visiting coffee shops through information search were derived from five general characteristics of coffee shops, menu, information consistency, taste of coffee, and convenience of parking, and among them, the consistency of information, taste of coffee, and general characteristics of coffee were found to affect the intention of revisiting again.

A Study on Single Sign-On Authentication Model using Multi Agent (멀티 에이전트를 이용한 Single Sign-On 인증 모델에 관한 연구)

  • 서대희;이임영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.997-1006
    • /
    • 2004
  • The rapid expansion of the Internet has provided users with a diverse range of services. Most Internet users create many different IDs and passwords to subscribe to various Internet services. Thus, the SSO system has been proposed to supplement vulnerable security that may arise from inefficient management system where administrators and users manage a number of ms. The SSO system can provide heightened efficiency and security to users and administrators. Recently commercialized SSO systems integrate a single agent with the broker authentication model. However, this hybrid authentication system cannot resolve problems such as those involving user pre-registration and anonymous users. It likewise cannot provide non-repudiation service between joining objects. Consequently, the hybrid system causes considerable security vulnerability. Since it cannot provide security service for the agent itself, the user's private information and SSO system may have significant security vulnerability. This paper proposed an authentication model that integrates a broker authentication model, out of various authentication models of the SSO system, with a multi-agent system. The proposed method adopts a secure multi-agent system that supplements the security vulnerability of an agent applied to the existing hybrid authentication system. The method proposes an SSO authentication model that satisfies various security requirements not provided by existing broker authentication models and hybrid authentication systems.

Design of Personalization Service System in Mobile GIS (모바일 GIS에서의 개인화 서비스 시스템 설계)

  • Park, Key-Ho;Jung, Jae-Gon
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2008.10a
    • /
    • pp.106-112
    • /
    • 2008
  • Personalization is user oriented dynamic method based on user preferences for easy access to what users want to view or get. It has become more important in mobile domain with rapid growth of wireless Internet and mobile phone market after success of web based market and therefore, it can be applied to service of spatial analysis result. In this paper, spatial analysis using user profile and notification service methods are proposed as one of personalized spatial data service methods for mobile users. A service system for spatial analysis with user profile is designed to prove possibility of spatial analysis based on user preferences and notification service is also designedto show generated output can be sent to user's mobile devices efficiently to make users informed of preferred information. Prototype system is implemented and it is applied to real estate data that has many selectable conditions by users. Information service based on user preferences can be applied to spatial data by using proposed system and it is efficient when cache module is used to shorten response time. Various user models for application domains and performance evaluation methods need to be developed in the future.

  • PDF

Communal Ontology of Landmarks for Urban Regional Navigation (도시 지역 이동을 위한 랜드마크의 공유 온톨로지 연구)

  • Hong, Il-Young
    • Journal of the Korean Geographical Society
    • /
    • v.41 no.5 s.116
    • /
    • pp.582-599
    • /
    • 2006
  • Due to the growing popularity of mobile information technology, more people, especially in the general public, have access to computerized geospatial information systems for wayfinding tasks or urban navigation. One of the problems with the current services is that, whether the users are exploring or navigating, whether they are travelers who are totally new to a region or long-term residents who have a fair amount of regional knowledge, the same method is applied and the direction are given in the same way. However, spatial knowledge for a given urban region expands in proportion to residency. Urban navigation is highly dependent on cognitive mental images, which is developed through spatial experience and social communication. Thus, the wayfinding service for a regional community can be highly supported, using well-known regional places. This research is to develop the framework for urban navigation within a regional community. The concept of communal ontology is proposed to aid in urban regional navigation. The experimental work was implemented with case study to collect regional landmarks, develop the ontological model and represent it with formal structure. The final product of this study will provide the geographical information of a region to the other agent and be the fundamental information structure for cognitive urban regional navigation.

A Cultural Politics of Online Parody: Its Aesthetical Possibilities and Limits (온라인 정치 패러디물의 미학적 가능성과 한계)

  • Lee, Kwang-Suk
    • Korean journal of communication and information
    • /
    • v.48
    • /
    • pp.109-134
    • /
    • 2009
  • This study explores the political parody, which has become an active art form in order to express Korean Internet users' political practices, especially, during the politically turbulent periods from the presidential election of 2003 to the recent candlelight vigil protest of 2008. This study investigates the rise and fall of a parody culture by online users from the mid-2000s, and also examines aesthetical aspects of parodic artworks relying on amateurism culminated in 2004. Specifically, the current study questions an aesthetical lack shown in 'appropriation', by which most of the online users simply produce imitations of original image. This study rather notes 'photomontage' as an aesthetic prototype, the political aesthetics made by John Heartfield, through which this study intends to observe how his aesthetical legacy of political art could be realized in the contemporary form of political parodies produced by online users. The present paper concludes that online users' political participations in producing critical works of art could allow us to negate the dichotomy between the elite and the mass, professional artists and amateur parodists, and a radical politics and the politics of style.

  • PDF