• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.054 seconds

정보보호 기술 개발 전략

  • 조현숙
    • Information and Communications Magazine
    • /
    • v.17 no.3
    • /
    • pp.37-44
    • /
    • 2000
  • 정보화 시대의 급속한 진행에 따라 하드웨어에 기반한 기간망의 구축과 함께 다양한 형태의 정보를 안전하게 관리할 수 있는 정보보호 서비스 시스템의 구축이 매우 중요한 시점이다. 세계 시장 경제의 기본 패러다임을 바꾸는 전자상거래 등의 새로운 서비스가 발달함에 따라 정보의 안전과 신뢰를 보장할 수 있는 정보보호 시스템의 필요성은 매우 강조되고 있다. 아직까지 국내의 정보보호 산업은 중소기업 및 벤처기업을 중심으로 제품이 개발되는 초기 단계로 볼 수 있다. 지식과 정보를 보호하기 위한 여러 선진국의 노력을 고려할 때, 국제공도연구를 통한 경쟁력 있는 첨단기술을 확보하는 것은 불가능하다. 따라서 지식과 정보 자원의 유출을 막기 위해서 국자적 차원에서 기업, 연구소, 학교가 함께 범국가적인 차원의 독자적인 기술확보가 필요하다. 전자상거래 등의 인터넷에 기반한 다양한 서비스를 위한 정보보호기술의 표준, 정보보호의 핵심 및 기반 기술, 차세대 통신망 정보보호 기술, 시스템 정보보호기술, 해킹 방지 기술 등을 국가적인 차원에서 추진하고 응용서비스 등의 분야는 민간부문에서 추진하는 것이 바람직하다.

  • PDF

CCPA-LINK Web 서비스 이용방법-한국정보통신진흥협회 제공 통계 DB온라인검색 서비스

  • Go, Jung-Heung
    • 정보화사회
    • /
    • s.102
    • /
    • pp.72-73
    • /
    • 1996
  • 한국정보통신진흥협회는 각종 조사통계를 바탕으로 지난 91년부터 정보통신관련 통계 및 문헌정보 DB를 구축하여, 94년부터 온라인정보검색시스템인 CCPA-LINK를 통해 정보통신산업 DB를 서비스하고 있다. 95년부터는 신뢰성 있는 자료를 보다 많은 이용자에게 편리하게 제공하고자 인터넷을 통해 Web서비스를 시작했다. CCPA-LINK Web 서비스를 통한 한국정보통신진흥협회의 정보통신산업 DB활용이 정보통신업계 기초자료 제공의 창구역할을 할 것으로 기대되고 있다. 특히 한국정보통신진흥협회는 통계청이 지정한 정보통신산업의 통계기관으로서 산업의 각종 통계를 실태조사를 통해 작성, 제공하는 만큼 CCPA-LINK의 서비스 DB 내용이 양과 질적으로 더욱 충실해지고 있어 활용자에게 보다 풍부한 데이타를 제공하게 된다. CCPA-LINK Web 서비스는 일반에게 공개되고 있어 누구나 접속할 수 있다.

  • PDF

FPGA-based Hardware Implementation of Cryptography Algorithm ARIA (암호화 알고리즘 ARIA의 FPGA기반 하드웨어 구현)

  • Kim Young-Soo;Cho Sun-Gu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.7
    • /
    • pp.1229-1236
    • /
    • 2006
  • Group oriented multicast service is a prerequisite for the current application system for remote lecture and customer service. IP multicast is used to be generally accepted as an internet standard. IP multicast which is designed to support network based replication model can efficiently use host and network resource, however it has some weak points that it has to support IP multicast in the internet by adding multicast-capable internet infrastructure such as router and is vulnerable to security by using public IP address for group identifier. Therefore we propose the trigger based application level multicast model that can enhance both scalability and security by separating the functions, which send and receive message to solve these problems. Our suggested model is expected to ensure the promotion of quality of service and reliability.

Design and Implementation of Firewall Log Monitoring System Using XML (XML을 이용한 침입차단 로그 모니터링 시스템 설계 및 구현)

  • 김석훈;손우용;송정길
    • Convergence Security Journal
    • /
    • v.4 no.2
    • /
    • pp.9-15
    • /
    • 2004
  • The Internet is aggregate of trustless networks essentially Because the Internet is very difficult to control flowing of information, taking advantage of enough sporadic resource, security problem that can protect internal important stock from the Internet is risen seriously. Recently, virus accident and generation rate about system intrusion that happen become much higher and various than past. On these time, is progressing researcher for invasion cutout to keep away illegal act vigorouslyand do continuous development. In this paper, reporting administrator log information about invader's illegal act depending on XML format form, and I wished to solve problem that happen in administration side developing invasion interception system that can control to remote.

  • PDF

A Study on Purchasing Model of Internet Shopping Mall (인터넷 쇼핑몰의 구매모델에 관한 연구)

  • Lee Sung-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.2 s.34
    • /
    • pp.199-204
    • /
    • 2005
  • Despite the growth of research interest into electronic commerce, there is still little information available on the ways in which an electronic commerce can be successfully developed. This study reports a set of success factors for electronic commerce, specifically some important implications for managers of internet shopping mall area in Korea. In this study it is found that trust on shopping mall and delivery are very important to increase purchase intention of customer. In addition, the result of this study shows that price and ease of use and loading time and error tolerance are very important to increase purchase intention.

  • PDF

Performance Evaluation of Throughput of 802.11e MAC Protocol for Supporting Internet QoS (인터넷 트래픽의 QoS 지원을 위한 802.11e MAC 프로토콜의 트래픽 처리율 성능평가)

  • Byun, Tae-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.446-452
    • /
    • 2006
  • In this paper, I evaluated the throughput of various multimedia traffic by using computer simulation over wireless LAN environment based on 802.11e MAC protocol. The number of mobile terminals which generate various traffic and have different Internet QoS varies to improve the reliability of performance evaluation by simulation. Therefore, we investigate throughput of traffic that each mobile terminal generates. I expect that the result of study will be utilized as a fundamental data to control priorities of various types of traffic in case of formulating a scheduling policy supporting a variety of Internet QoS over wired and wireless networks.

Developing a Measurement Scale for Service Recovery Quality in Internet Commerce (인터넷 상거래에서의 서비스회복 품질 측정도구 개발)

  • Min, Dong-Kwon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.5
    • /
    • pp.44-54
    • /
    • 2008
  • The objective of this research is to develop a measurement instrument for service recovery quality in the Internet commerce setting. To this same end, Parasuraman et al.(2005) have devised a scale called E-RecS-QUAL, which we revised and supplemented to develop another instrument named eSR-Q. To guarantee its reliability and validity, this instrument went through the refinement and validation processes for internal consistency and construct validity in terms of convergent, discriminant, and nomological validity. Our final scale consists of four dimensions including responsiveness, compensation, contact, and apologies altogether with fourteen measures. Overall, this research deals with the related research background, the scale development and validation processes, its limitations, and future research directions.

  • PDF

Design and Implementation of A mobile SFA system using SyncML. (SyncML을 이용한 무선인터넷상에서의 SFA 시스템의 구현)

  • Choi, Lee-Kwon;Kang, Shin-Sang;Lee, Sang-Bum
    • Annual Conference of KIPS
    • /
    • 2003.05a
    • /
    • pp.165-168
    • /
    • 2003
  • 본 논문에서는 무선 인터넷에 관한 관련 기술을 이용하여 분산 데이터 동기화 표준인 SyncML을 통해 무선 인터터넷 환경에서의 실제적으로 응용 가능한 영업 사원의 업무 자동화 (SPA : Sails Force Automation) 솔루션을 무선디바이스인 PHOPNE 과 PDA 에서 운영할 수 있는 최적 동기화 모듈의 설계와 구현에 목적이 있다. 본고에서는 무선 인터넷 기술, 동기화 기술, 영업사원의 업무 자동화 기술에 언급하고 세 가지 기술을 이용하여 실질적으로 물류, 유통 업무에 사용 할 수 있게 객체 지향 설계 방법과 소스를 분석하여 최적화된 시스템을 도출하고 그것을 통해 무선단에서 경량화된 동기화 최적의 시스템을 설계, 구현하였다. 무선단에서 여러 제약 사항 특히 데이터의 관리에 있어서의 문제점을 동기화 기술을 통해 많은 데이터를 효과적으로 관리함으로써 대용량의 데이터베이스와 디바이스에 상관없이 분산 데이터 일관성과 통합관리 기능을 유지하고 무선단에서 지연성(disconnection)에 대한 신뢰성을 유지 할 수 있는 시스템을 분석과 설계를 통해 객체지향적인 방법으로 고려해서 시스템을 구축하였다.

  • PDF

The Criteria and Methods for Evaluating of Internet Website Documents (인터넷 웹사이트 문서의 평가 기준 및 방법 - 내용적인 측면을 중심으로 -)

  • Lee Eung-Bong
    • Journal of Korean Library and Information Science Society
    • /
    • v.30 no.1
    • /
    • pp.151-169
    • /
    • 1999
  • The availability and growth of the Internet offers users the opportunity to find information and data all over the world. The development of the WWW has made the Internet easier to use, both for finding information and for publishing it electronically. Because so much information is available, and because that information can appear to be fairly 'anonymous', It is necessary to develop skills to evaluate what you find. Every printed information resources you find has been evaluated in one way or another before you ever see it. But when you are using the WWW, none of this applies. There are no filters between you and Internet. In addition, the ease of constructing Web documents results in information of the widest range of quality, written by authors of the widest range of authority, available on an even playing field Excellent information resources reside along side the most dubious. This study discusses the criteria arid methods by which scholars and researchers in most fields evaluate print information, and shows how the same criteria and methods can be used to assess Internet Website document. This study applied seven criteria, that is essential Web document element, authorship, publishing body, point of view or bias, referral to other sources, verifiability and currency. All information, whether in print or by byte, needs to be evaluated by users for some objective criteria and methods mentioned above. If you find information that is 'too good to be true', it probably is. Never use information that you can't verity. Always remember that the best counterfeit looks the most like the real thing. Establishing and learning criteria and methods to filter information you find on the Internet is a good beginning for becoming a critical consumer of information in all forms.

  • PDF

An Approach to Structuralizing Business Information for Internet Shopping Malls (인터넷쇼핑몰의 사업자신원정보 구조화 방안)

  • 장용식
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.1
    • /
    • pp.27-45
    • /
    • 2004
  • While on-line shopping is increasing, the "Consumer Protection Law in Electronic Commerce" obliges each internet shopping mall to provide its business information. Although most internet shopping malls provide their business information in the semi-structured format on the bottom of their homepages, the attributes and expression forms of business information are different each other. It makes consumers difficult to identify their business information and lowers public confidence. Hence this study proposes three approaches - HTML-based structure, XML-based structure, and XML data island-based structure - to structuralizing business information for correct expression. The experiment results showed that the business information extraction time by XML data island-based structure is independent of the size of the web document, while the time by HTML-based structure is dependent on the size. By comparing the business information extraction times, we show that XML data island-based structure is more efficient and effective than HTML-based structure.structure.

  • PDF