• Title/Summary/Keyword: 인터넷 서비스 분류

Search Result 409, Processing Time 0.033 seconds

Comparative Analysis of Web-based Service Quality Of Leading Companies in Korea, U.S,, Japan and China (한, 미, 일, 중 4개국 선도기업들의 웹기반 서비스 품질 비교분석)

  • Lee Hyun-soo;Chae Young-il;Hong Bong-Hwa
    • Journal of Internet Computing and Services
    • /
    • v.6 no.2
    • /
    • pp.127-139
    • /
    • 2005
  • This research is in the same line of the research that was carried out in 1999 and 2001, Studies in 1999 and 2001 showed that there are significant differences in the usage levels of Internet in business between countries with longer history of using internet and those with shorter history. The 1999 and 2001 studies also suggested the model on development stages of Internet usage in business, This study is the continuation of the 1999 and 2001 research and used the previous data to compare and analyze the trend of the Internet development stages in leading 100 corporations in Korea, U,S.A., China and Japan in 2002. This study found that there have been significant developments in the ability to use Internet in business in three countries. The differences in Internet usage level in each stage among different countries are compared and analyzed in this study.

  • PDF

Network separation construction method using network virtualization (네트워크 가상화를 이용한 망 분리 구축 방법)

  • Hwang, Seong-Kyu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.8
    • /
    • pp.1071-1076
    • /
    • 2020
  • The importance of network separation is due to the use of the Internet with existing business PCs, resulting in an internal information leakage event, and an environment configured to allow servers to access the Internet, which causes service failures with malicious code. In order to overcome this problem, it is necessary to use network virtualization to separate networks and network interconnection systems. Therefore, in this study, the construction area was constructed into the network area for the Internet and the server farm area for the virtualization system, and then classified and constructed into the security system area and the data link system area between networks. In order to prove the excellence of the proposed method, a network separation construction study using network virtualization was conducted based on the basis of VM Density's conservative estimates of program loads and LOBs.

Analyze Virtual Private Network Vulnerabilities and Derive Security Guidelines Based on STRIDE Threat Modeling (STRIDE 위협 모델링 기반 가상 사설망 취약점 분석 및 보안 요구사항 도출)

  • Kim, Da-hyeon;Min, Ji-young;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.27-37
    • /
    • 2022
  • Virtual private network (VPN) services are used in various environments related to national security, such as defense companies and defense-related institutions where digital communication environment technologies are diversified and access to network use is increasing. However, the number of cyber attacks that target vulnerable points of the VPN has annually increased through technological advancement. Thus, this study identified security requirements by performing STRIDE threat modeling to prevent potential and new vulnerable points that can occur in the VPN. STRIDE threat modeling classifies threats into six categories to systematically identify threats. To apply the proposed security requirements, this study analyzed functions of the VPN and formed a data flow diagram in the VPN service process. Then, it collected threats that can take place in the VPN and analyzed the STRIDE threat model based on data of the collected threats. The data flow diagram in the VPN service process, which was established by this study, included 96 STRIDE threats. This study formed a threat scenario to analyze attack routes of the classified threats and derived 30 security requirements for each element of the VPN based on the formed scenario. This study has significance in that it presented a security guideline for enhancing security stability of the VPN used in facilities that require high-level security, such as the Ministry of National Defense (MND).

A Study on Evaluation and Improvement Plan for Applications for Smart-phone Overdependence Prevention (스마트폰 과의존 방지 애플리케이션 평가 및 서비스 주체별 개선방안 연구)

  • Gyoo Gun Lim;Hai Yan Jin;Hye min Hwang;Hye won Cho;Jae Ik Ahn
    • Journal of Service Research and Studies
    • /
    • v.12 no.1
    • /
    • pp.36-48
    • /
    • 2022
  • As the use of smartphones has rapidly increased due to the development of digital technology, the expansion of smartphones, and the COVID-19 incident, dependence on smartphones and the Internet is emerging as a serious social problem. As one of the solutions to the smartphone overdependence problem, the government and companies are releasing smartphone overdependence prevention applications. However, research on the effectiveness of smartphone overdependence prevention applications is insufficient. Therefore, this study selects 25 applications serviced in Korea as analysis targets and evaluates smartphone overdependence prevention applications in terms of function and service using the FGI survey method to identify problems and propose improvements. In the function evaluation, the functions of blocking illegal/harmful apps/websites, limiting smartphone usage time, and monitoring smartphone usage status are provided in most applications, so satisfaction scores are also highly evaluated. However, functions such as location check, smombie prevention, and body camphishing prevention served by some applications are evaluated low due to poor performance and poor accuracy. Classified by service provider, government-providing applications need to accurately perform functions and improve convenience of use. Mobile-Carrier-providing applications need to improve connectivity with other carriers and compatibility with other smart devices like smartphone, tablet, etc. Other private enterprise-providing applications need to open AS channels such as customer service centre and chatbot to improve service.

A Study on the information architecture and menu design in the type of web sites (웹사이트의 유형 분류에 따른 정보 설계 및 메뉴디자인의 특성 연구)

  • 배윤선;이현주
    • Archives of design research
    • /
    • v.16 no.1
    • /
    • pp.241-250
    • /
    • 2003
  • With the increasing number and variety of internet users as well as the development of internet technology, web contents have been taking a more comprehensive, integrated, and practical form. This change has brought to our attention the importance of the information architecture and menu design, both of which are required for the users to navigate vast amount of data promptly, correctly and easily for effective communication in the web sites. In this study, web sites were categorized by the service levels provided to the users, and sampling was performed accordingly. Then, information architecture, the layout and the presentation of the menu design were analyzed. The result of the analysis show that there are distinguishable characteristics in how the menus were expressed and designed, and that these characteristics reflect the users' characteristics in the web interface menu design. With the result of this study, we present a guideline for information architecture and web interface menu design, which reflects user characteristics thereby strengthening usability. Using this guideline, we expect the development of web interface design which should support more efficient communication on the web.

  • PDF

Fake SNS Account Identification Technique Using Statistical and Image Data (통계 및 이미지 데이터를 활용한 가짜 SNS 계정 식별 기술)

  • Yoo, Seungyeon;Shin, Yeongseo;Bang, Chaewoon;Chun, Chanjun
    • Smart Media Journal
    • /
    • v.11 no.1
    • /
    • pp.58-66
    • /
    • 2022
  • As Internet technology develops, SNS users are increasing. As SNS becomes popular, SNS-type crimes using the influence and anonymity of social networks are increasing day by day. In this paper, we propose a fake account classification method that applies machine learning and deep learning to statistical and image data for fake accounts classification. SNS account data used for training was collected by itself, and the collected data is based on statistical data and image data. In the case of statistical data, machine learning and multi-layer perceptron were employed to train. Furthermore in the case of image data, a convolutional neural network (CNN) was utilized. Accordingly, it was confirmed that the overall performance of account classification was significantly meaningful.

A Study on the Operation Support and Activation of Drone Geospatial Information Service (드론 공간정보 서비스 운영지원 및 활성화에 대한 연구)

  • Ok, Jin-A;Yoo, Soonduck
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.6
    • /
    • pp.147-153
    • /
    • 2021
  • The purpose of this study is to establish strategic suggestions for the direction of the drone-related business by Gyeonggi-do through a survey on the operation and actual conditions of the drone geospatial information service business experienced by Gyeonggi-do civil servants. For this purpose, as a result of surveying the demand survey of 219 people in charge of drone field work, it was analyzed by dividing it into four categories: technology-based operation support, business discovery and support, legal and institutional support, and education and public relations. As an improvement measure, technology-based operation support is to secure service operation efficiency by establishing a dedicated manpower and a dedicated organization and securing drone-related experts.The plan for improvement of project discovery and support is as follows. 1) The government proactively discovers prior research projects for project discovery and support; 2) Legal and institutional support requires support services for simplification of administration such as drone geospatial data shooting schedules and permits, 3) legal and institutional review on improving the scope and restrictions for using drone geospatial data. In the field of education and publicity, it is necessary to operate an education program on the overall operation of drones, and to conduct seminars for each field and use, and to seek activation methods through practical application guidelines for the application process and system. The limitation of this study is that the survey subjects are related to Gyeonggi-do, and in the future, survey analysis through a wide range of participants is required.

A Recommendation System Based on Customer Preference Analysis and Filter Management (고객 성향 분석과 필터 관리 기반 추천 시스템)

  • 이성구
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.4
    • /
    • pp.592-600
    • /
    • 2004
  • A recommendation system, which is an application area of e-CRM in e-commerce environment, provides individualized goods recommendation service that meets the demand of individual users. In general, existing recommendation systems require extensive historic user information in application domains. However, the method of recommendation based on static historic user information needs to respond flexibly to users'demand that changes rapidly and sensitively over time and in domains including a variety of users. In addition, it is difficult to recommend for new users who are not fall into any of existing domains. To overcome such limitations and provide flexible recommendation service, this study designed and implemented CPAR (Customer Preference Analysis Recommender) system that supports customer preference analysis and filter management. The filtering management capacity of the present system eases the necessity of extensive information about new users. In addition, CPAR system was implemented in XML-based wireless Internet environment for recommendation service independent from platforms and not limited by time and place.

  • PDF

Self-Design Producing System and Method for Logo Design Using Network (네트워크를 이용한 셀프디자인 시스템에 관한 연구 - 로고디자인을 중심으로)

  • 박진숙
    • Archives of design research
    • /
    • v.14 no.1
    • /
    • pp.187-197
    • /
    • 2001
  • Conventional design producing systems using the Internet are largely classified into two groups: a basic type in which an operator of a design producing site receives an order for manufacture of a design from a purchaser, produces the design based on the content of the received order, and delivers the produced design to the purchaser; and a type in which a purchaser inspects given designs and select one of them for purchasing. Such conventional design producing systems have following problems. Firstly, receiving an order over the internet and delivering a produced design to a purchaser has nearly the same procedure as a conventional logo design procedure with the sole exception that an order can be received through the Internet. Therefore, the production of a design still costs a great deal and takes much time. Secondly, inspecting given designs, selecting one and producing the selected design is like simply selecting a picture, and thus a purchaser is not allowed to modify a design. To solve the above problems, it is an object of the present a new solution to provide a self-design producing system and method using network, in which a purchaser searches a design database for a design suitable for the purchaser's company, determines a design database by modifying design conditions, and makes an order for manufacture of a product to which the determined design is applied, through the Internet.

  • PDF

An Implementation of a Component Repository based on J2EE Application Model (J2EE 어플리케이션 모델 기반의 컴포넌트 저장소 구현)

  • 안성아;최희석;염근혁
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.1
    • /
    • pp.77-93
    • /
    • 2002
  • Now we are following component-based software development as a solution to improve the reusability, reliability, and extensibility of the software. To support these, the developed components must be reused through component repository at software development. However, traditional centralized repositories couldn't activate component markets since not only the number of users were restricted but also most of the provided components were those on clients like user interface and so on. Recently, a lot of server-side components, reused in a specific domain, have appeared thanks to the development of both Internet technology and component technology such as EJB, DCOM, etc. Therefore, component repositories, based on domain information, classify and provide components and must offer web-based service for many users to use it stably. This study introduces the implementation of a component repository based on J2EE application model. It provides application developers with the service to search and extract appropriate components, and supplies them reliable services in web environment.

  • PDF