• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.029 seconds

Designing Region-specific information provided utilizing crowdsourcing service (크라우드 소싱을 활용한 지역특화 정보 제공 서비스 설계)

  • Kim, Jun-sik;Oh, Ji-yeon;Jo, Min-gi;Park, Suhyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.469-471
    • /
    • 2017
  • Those who travel to another area for work or travel acquire cquire information through various media such as Internet websites before going to the area. The way to determine whether the information you collect is reliable is to go directly to that area. However, many users may overlook the date the post was posted. when you arrive at a delicious restaurant for a travel purpose, it can happen that the restaurant is gone. In order for Smartphone Users to be able to provide reliable information about a specific region through an application, it is possible to receive information from a specific local user using the application through crowd sourcing techniques. Collect suggestions from users when there are changes in the same area, rather than accepting indiscriminate information and when duplicate content exists, it is marked on the application map so that it can be viewed by other users. It provides not only simple restaurant information, but also area-specific information such as additional information about tourist attractions or information on restrooms to solve physiological phenomena that may occur in the area where they first arrive. Application users can get information about nearby public facilities and restaurants on a GPS basis.

  • PDF

A Study on Establishment of Cyber Threat Information Sharing System Focusing on U.S. Case (사이버 위협정보 공유체계 구축방안에 관한 연구 - 미국 사례를 중심으로 -)

  • Kim, Dong Hee;Park, Sangdon;Kim, So Jeong;Yoon, Oh-Jun
    • Convergence Security Journal
    • /
    • v.17 no.2
    • /
    • pp.53-68
    • /
    • 2017
  • Today, information sharing is recognized as a means to effectively prevent cyber attacks, which are becoming more intelligent and advanced, so that many countries such as U.S., EU, UK, Japan, etc. are establishing cyber threat information sharing system at national level. In particular, the United States has enacted the "Cyber Threat Information Sharing Act (CISA)" in December 2015, and has been promoting the establishment of a legal and institutional basis for sharing threat information and the implementation of the system. Korea is sharing cyber threat information in public and private sectors mainly through the National Cyber Security Center(NCSC) and the Korea Internet & Security Agency(KISA). In addition, Korean government is attempting to strengthen and make legal basis for unified cyber threat information sharing system through establishing policies. However, there are also concerns about issues such as leakage of sensitive information of companies or individuals including personal identifiable information that may produced during the cyber threat information sharing process, reliability and efficiency issues of the main agents who gather and manage information. In this paper, we try to derive improvement plans and implications by comparing and analyzing cyber threat information sharing status between U.S. and Korea.

A Study on the Use of IoT in Infant Care (영아 돌봄에서 IoT 활용에 대한 일고찰)

  • Yee, YoungHwan;Hwang, Sheenhai
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.4
    • /
    • pp.59-66
    • /
    • 2017
  • These days, IoT attached diaper are available in markets. It measures child's temperature, oxygen rate, or even humidity of diaper and send the result directly to parent's smartphone. This research emphasize the followings, due to the fact that use of IoT in context of infant care should ultimately be leaded to infant's wellbeing and healthy development. First, there can be many problems when you only focus on usability without careful consideration of the accuracy of the infant's health information produced by the IoT. Second, infant's needs and nature of child should be reflected when developing IoT which supports infant care. The use of the IoT should not take away the chance of physical contact such as eye-contact or patting and hugging between the caregiver and baby. IoT is very important, however in terms of infant development, connect with IoT cannot antecede contact with child.

Analysis of Operation Areas for Automatically Tuning Burst Size-based Loss Differentiation Scheme Suitable for Transferring High Resolution Medical Data (고해상도 의학 데이터 전송에 적합한 자동 제어 버스트 크기 기반 손실 차등화 기법을 위한 동작 영역 분석)

  • Lee, Yonggyu
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.459-468
    • /
    • 2022
  • In medical area, very high resolution images, which is loss sensitive data, are used. Therefore, the use of optical internet with high bandwidth and the transmission of high realiability is required. However, according to the nature of the Internet, various data use the same bandwidth and a new scheme is needed to differentiate effectively these data. In order to achieve the differentiation, optical delay line buffers are used. However, these buffers is constructed based on some optimal values such as the average offered load, measured data burst length, and basic delay unit. Once the buffers are installed, they are impossible to reinstall new buffers. So, the scheme changing burst length dynamically was considered. However, this method is highly unstable. Therefore, in this article, in order to guarantee the stable operation of the scheme, the analysis of operation conditions is performed. With the analysis together with the scheme, high resolution medical data with the higher class can transmit stably without loss.

Analysis of the Relationship between Service Quality, Satisfaction and Repurchase Intention of On-line Fashion Shopping Malls and the Moderating Effect of Online Reviews (중국 온라인 패션쇼핑몰의 서비스 품질, 만족, 재구매의도간의 관계 및 온라인 리뷰의 조절효과 분석)

  • Jiang, Bao-Zhi;Lee, Young-sook;Lee, Jieun
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.47-54
    • /
    • 2022
  • The development of the Internet of Things led to new services that did not exist before. This required a change to the existing network. This study aims to verify the service quality, satisfaction, repurchase intention relationship, and the moderating effect of online reviews of Chinese consumers using fashion shopping malls. The results of the study showed that from the perspective of consumers in their 20s and 30s in China, the type, reliability, convenience, and interaction of service quality had a positive effect on customer satisfaction and repurchase intention. In addition, negative reviews among online reviews had a great influence on repurchase intention. Based on the results of the study, it will help improve the effect on online product reviews and in-depth understanding of the acceptance of online product reviews for online fashion shopping malls, and establish strategies for fashion companies to effectively manage online product reviews information.

Implementation and Verification of User Centric Constant Measurement for Pre-management of IPTV Service Quality (IPTV 서비스 품질의 사전 관리를 위한 서비스 이용자 중심의 상시 측정 방안 구현과 검증)

  • Kim, Beom-Joon;Kim, Chin-Chol;Park, Jae-Sung
    • The KIPS Transactions:PartC
    • /
    • v.18C no.1
    • /
    • pp.23-30
    • /
    • 2011
  • Recently internet protocol television (IPTV) service is becoming a typical emerging service enabled on broadband networks. Through the Internet which cannot support quality of service (QoS) beyond best-effort (BE) policy, how to manage and maintain its service quality is an important and essential issue for successful deployment and settlement of IPTV service. In particular, the current measurement scheme that mostly depends on specific equipments should be replaced with one that supports realtime and constant measurement achieved on a user's own will. Therefore, this paper proposes a scheme so-called 'user centric realtime measurement' of IPTV service. The developed software, which is installed in a set-top box (STB) at a user's premise, measures and reports the quality of IPTV service in realtime. In order to verify the performance and accuracy of the developed software, a number of tests are performed comparing to the measurement values from two major measurement equipments. The result of the tests shows that the measurement by the implemented software is significantly reliable.

An Agent System Protection Mechanism for Secure Action of Mobile Agent in Open Network Systems (Open Network 시스템에서 이동에이전트의 안전한 역할 수행을 위한 에이전트 보호메커니즘)

  • Jung, Chang-Ryul;Yoon, Hong-Sang;Koh, Jin-Gwang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.2
    • /
    • pp.371-378
    • /
    • 2002
  • In the resent years, the term mobile agent is probably one of the most overused words in many appliable areas of distributed open systems as electronic commerce and electronic data interchange, and it has very different meanings in the area of artificial intelligence, network management, or distributed systems. However, the use of mobile agent adds significant problems, primarily in the area of EC/EDI. Therefore it is very important to control the roaming agents to keep one's privacy or property in distributed open networks. The surge in secure intranets for commercial applications provides a robust, secure environment to which trading partners can increasingly entrust their interactions to some mobile agents. In this paper, we introduce a mechanism to protect mobile agent itself from the malicious server he is visiting and also we introduce a mechanism to protect vital resources of the open systems as internet.

Design of r-Sensor Protocol and Hardware Implementation for Intelligent Home Service (지능형 홈서비스를 위한r-Sensor프로토콜설계 및 하드웨어 구현)

  • Kwak, Tae-Kil;Lee, Bum-Sung;Jung, Jin-Wook;Jin, Kyo-Hong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.11
    • /
    • pp.2113-2119
    • /
    • 2006
  • In this paper, we design the r-Sensor protocol for reliable data transmission in the Intelligent Home Service based on the wireless sensor network environment. The r-Sensor protocol improve the reliability of data transmission and node fairness using simple routing algorithm, congestion control, and loss recovery method that minimize the load of relay node. Reposed routing algorithm find out upstream and downstream nodes using the Network Management packet. Meanwhile, loss recovery algorithm uses the Aggregated-Nack. To apply supposed algorithm, the IHS-AMR(Intelligent Home Service - Automatic Meter Reader) and sensor node are designed and implemented in hardware. The IHS-AMR provides remote metering service and also offers home safety service by internetworking with sensor network, mobile phone network and internet.

A Study on the Secure Storage Device for Protecting Cryptographic Keys in Untrusted DRM Client Systems (신뢰할 수 없는 DRM 클라이언트 시스템 하에서 키 보호를 위한 Secure Storage Device의 연구)

  • 이기정;권태경;황성운;윤기송
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.2
    • /
    • pp.3-13
    • /
    • 2004
  • DRM is the ability to brand digital contents with features that ensure copy Protection and affect the way in which digital contents are played back. DRM is a technology that enables the secure distribution, promotion and sale of digital contents on the Internet. The DRM Client System that operates on the untrusted user environments has to meet the requirements of the contents owner, including copyright and contents protection. After the DRM Client System is installed on the untrusted user environments, it verifies and plays digital contents. With these procedures it cuties out user authentication, contents decryption, and license management. During these procedures, the sensitive data, including authentication information, decryption data and license data, must be secured against any illegal access from users. The goal of this thesis is to introduce the implementation of Secure Storage Device which can protect user's authentication key, cryptographic key, and license data in safe where the DRM Client System is running.

A Study on the Design of Test Item Framework for the Reliability of Frozen and Refrigerated Products with IoT Function (IoT 기능을 보유한 냉동·냉장 제품의 신뢰성 확보를 위한 시험항목 프레임워크 설계에 관한 연구)

  • Cho, Kyoung Rok;Lee, Jung Jae;Lee, Eun-Ser
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.6
    • /
    • pp.211-222
    • /
    • 2021
  • Recently, frozen and refrigerated appliances on the market are being released with additional IoT functions, but there are few tests on IoT functions. In particular, the existing test system does not have IoT test items for IoT-based frozen and refrigerated appliances, making it difficult for companies to find the cause even if defects occur, and test institutions are also restricted from selecting IoT-related test items and conducting correct performance tests. In this paper, we design a test item framework that can identify product defects and identify causes in the performance test process of frozen and refrigerated products with IoT functions among products in the home appliance field, and propose test methods and management measures using them. Through the proposed research, manufacturers and testing institutions can test the correct performance of IoT-based frozen and refrigerated products, thereby enhancing the completeness and securing reliability of the products.