• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.025 seconds

SEED and Stream cipher algorithm comparison and analysis on the communication (통신에서의 SEED와 스트림 암호 알고리즘의 비교 분석)

  • Ahn, In-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.199-206
    • /
    • 2010
  • Society of digital information becomes gradually advancement, and it is a situation offered various service, but it is exposed to a serious security threat by a fast development of communication such as the internet and a network. There is required a research of technical encryption to protect more safely important information. And we require research for application of security technology in environment or a field to be based on a characteristics of market of an information security. The symmetric key cipher algorithm has same encryption key and decryption key. It is categorized to Block and Stream cipher algorithm according to conversion ways. This study inspects safety and reliability of proposed SEED, Stream cipher algorithm. And it confirms possibility of application on the communication environments. This can contribute to transact information safely by application of suitable cipher algorithm along various communication environmental conditions.

An Analysis on the Status Quo of International Students' Media Information Literacy in Social Network Environment (소셜 네트워크 환경에서 국내 외국인 유학생의 미디어 정보 리터러시 현황분석)

  • Choi, Jin-Sik;Lee, Young-Suk;Uh, Je-Sun;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1323-1332
    • /
    • 2018
  • The purpose of this study is to analyze the level of Media Information Literacy of international students in K-university, who attend the courses in which the classes are delivered only in English. A survey was carried out to find out the level of media information literacy. In order to verify the validity and reliability of the measurement result gathered from the responses, an item analysis was carried out with SPSS21.0, a statistics analysis software, and the diversity of utilizing media information literacy was also measured according to the factors of each analysand group. The analysis result gathered through ${\chi}^2-test$, a frequency analysis tool, shows that international students use domestic media information literacy mainly for daily life activities such as the internet shopping and the bank transaction.

An IP Traceback "M"echanism with "E"nhanced "I"ntegrity for IPv6-based NGN Environment (IPv6 기반 NGN 환경에서 무결성을 제공하는 역추적 기법)

  • Jang, Jae-Hoon;Yeo, Don-Gu;Choi, Hyun-Woo;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.3
    • /
    • pp.31-41
    • /
    • 2010
  • It is difficult to identify attacker's real location when the attacker spoofs IP address in current IPv4-based Internet environment. If the attacks such as DDoS happen in the Internet, we can hardly expect the protection scheme to respond to these attacks in active or real-time manner. Many traceback techniques have been proposed to protect against these attacks, but most traceback schemes were designed to work with the IPv4-based Internet and found to be lack of verification of whether the traceback related information is forged or not. Few traceback schemes for IPv6-based network environment have been suggested, but it has these disadvantages that needs more study. In this paper, we propose the reliable IP traceback scheme supporting integrity of traceback-related information in IPv6 network environment, simulate it, and compare our proposed scheme with exsisting traceback mechanisms in terms of overhead and functionality.

Criteria of Evaluating Clothing and Web Service on Internet Shopping Mall Related to Consumer Involvement (인터넷 쇼핑몰 이용자의 소비자 관여에 따른 의류제품 및 웹 서비스 평가기준에 관한 연구)

  • Lee, Kyung-Hoon;Park, Jae-Ok
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.12 s.159
    • /
    • pp.1747-1758
    • /
    • 2006
  • Rapid development of the information technology has influenced on the changes in every sector of human environments. One prominent change in retail market is an increase of electronic stores, which has prompted practical and research interest in the product and store attributes that include consumer to purchase products from the electronic shopping. Therefore many marketers are paying much attention to the criteria of evaluating clothing and web service on internet shopping malls. The purpose of this study is to examine differences of clothing and web service criteria of consumer groups (High-Involvement & High-Ability, Low-Involvement & High-Ability, High-Involvement & Low-Ability, and Low-Involvement & Low-Ability) who are classified into consumer involvement and internet use ability. The subjects of this study were 305 people aged between 19 and 39s, living in Seoul and Gyeonggi-do area, and having experiences in buying products on the internet shopping. Statistical analyses used for this study were the frequency, percentage, factor analysis, ANOVA and Duncan test. The results of this study were as follows: Regarded on the criteria of evaluating clothing, the low different groups had significant differences in the esthetic, the quality performance and the extrinsic criterion. Both HIHA group and HILA group showed the similar results. They considered every criterion of evaluating clothing more important, compared with other groups. Regarded on the criteria of evaluating web service related to the low different groups, there were significant differences in the factors related to the shopping mall reliance, the product, the satisfaction after purchase, and the promotion and policy criterion. Both HIHA group and HILA group showed the similar results as well. They considered every criterion of evaluating web service more important, compared with other groups. In conclusion, HI groups perceive relatively more dangerous factors which can be occurred during internet shopping. Therefore, internet shopping malls need to provide clothing that can satisfy the HI groups as well as make efforts to remove the dangerous factors on the internet.

A Study on Mission Critical Factors for Software Test Enhancement in Information Technologies Development of Public Sector (Mission Critical 공공 정보화 구축 시험평가 개선 지표 연구)

  • Lee, Byung-hwa;Lim, Sung-ryel
    • Journal of Internet Computing and Services
    • /
    • v.16 no.6
    • /
    • pp.97-107
    • /
    • 2015
  • Up until recently, Korea has ranked the first place in UN e-Government Survey for three consecutive years. In keeping with such accomplishment, the size of budget execution has been consistently growing in accordance with Korea's Government 3.0 policy and vision, leading to increase in big-sized informatization projects in the business. Especially in mission critical public sector's infrastructure where it affects many people, growing demand for establishing high-quality information system with new technologies being brought to attention in order to meet the complex needs of citizens. National defense information system, being one of representative domains examples in the concerned area, established high military competency by applying breakthrough technology. Network-oriented national defense knowledge informatization was set as the vision in order to implement core roles in making efficient national defense management; and effort has been made to materialize the vision by making advancement in national defense's information system and its informatization implementation system. This research studies new quality index relevant to test and evaluation (T&E)of informatization business in national defense which is the representative example of mission critical public sector's infrastructure. We studied international standards and guidelines, analyzed actual T&E cases, and applied them to the inspection items that are currently in use, complying with the e-government law (Act No. 12346, Official Announcement Date 2014. 1.28., Enforcement Date 2014. 7.29.) As a result of productivity analysis, based on hypothesis in which suggested model was applied to T&E of the national defense informatization business, we confirmed the possibility of enhancement in the T&E productivity by assessing reliability, expertise, and safety as evaluation factors.

A Study on the Development of Intelligent Markup Indicator (IMI) Technology for Underground Facilities Management Using IoT (IoT를 이용한 지하매설물관리용 지능형표지기(IMI) 기술개발에 관한 연구)

  • Kim, Tai-Dal
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.129-136
    • /
    • 2017
  • Geographic Information System The geographic information system (GIS) has been limited to the government and some public sectors. Recently, the market has been diversified by combining with other areas such as mobile and CRM (Customer Relationship Management). The development direction of GIS technology in the 21st century is Web GIS, 3D GIS, mobile GIS, LBS, etc. as general technology for GIS application system development and spatial information service. In this study, we developed a new concept marking nail (a marking nail with built - in intelligent storage memory device) from the function of simple positioning of a marking nail related to a previously used underground item,, Burial depth, pipe thickness, piping material, management agency, contractor, contact, etc.) and store it in DB server, if necessary.Make it available in the right place. Through this research, it is possible to prevent and minimize various accidents caused by irregular excavation works, etc., and to provide information for establishing countermeasures related to sink holes. In order to provide systematic and reliable information on underground burial management, it was proposed to input information conveniently in the field, and the purpose was to reduce the incidence of buried underground pipes absolutely.

A Contents-based Drug Image Retrieval System Using Shape Classification and Color Information (모양분류와 컬러정보를 이용한 내용기반 약 영상 검색 시스템)

  • Chun, Jun-Chul;Kim, Dong-Sun
    • Journal of Internet Computing and Services
    • /
    • v.12 no.6
    • /
    • pp.117-128
    • /
    • 2011
  • In this paper, we present a novel approach for contents-based medication image retrieval from a medication image database using the shape classification and color information of the medication. One major problem in developing a contents-based drug image retrieval system is there are too many similar images in shape and color and it makes difficult to identify any specific medication by a single feature of the drug image. To resolve such difficulty in identifying images, we propose a hybrid approach to retrieve a medication image based on shape and color features of the medication. In the first phase of the proposed method we classify the medications by shape of the images. In the second phase, we identify them by color matching between a query image and preclassified images in the first phase. For the shape classification, the shape signature, which is unique shape descriptor of the medication, is extracted from the boundary of the medication. Once images are classified by the shape signature, Hue and Saturation(HS) color model is used to retrieve a most similarly matched medication image from the classified database images with the query image. The proposed system is designed and developed especially for specific population- seniors to browse medication images by using visual information of the medication in a feasible fashion. The experiment shows the proposed automatic image retrieval system is reliable and convenient to identify the medication images.

Personal Credit Evaluation System through Telephone Voice Analysis: By Support Vector Machine

  • Park, Hyungwoo
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.63-72
    • /
    • 2018
  • The human voice is one of the easiest methods for the information transmission between human beings. The characteristics of voice can vary from person to person and include the speed of speech, the form and function of the vocal organ, the pitch tone, speech habits, and gender. The human voice is a key element of human communication. In the days of the Fourth Industrial Revolution, voices are also a major means of communication between humans and humans, between humans and machines, machines and machines. And for that reason, people are trying to communicate their intentions to others clearly. And in the process, it contains various additional information along with the linguistic information. The Information such as emotional status, health status, part of trust, presence of a lie, change due to drinking, etc. These linguistic and non-linguistic information can be used as a device for evaluating the individual's credit worthiness by appearing in various parameters through voice analysis. Especially, it can be obtained by analyzing the relationship between the characteristics of the fundamental frequency(basic tonality) of the vocal cords, and the characteristics of the resonance frequency of the vocal track.In the previous research, the necessity of various methods of credit evaluation and the characteristic change of the voice according to the change of credit status were studied. In this study, we propose a personal credit discriminator by machine learning through parameters extracted through voice.

A Study on Success Strategies for Generative AI Services in Mobile Environments: Analyzing User Experience Using LDA Topic Modeling Approach (모바일 환경에서의 생성형 AI 서비스 성공 전략 연구: LDA 토픽모델링을 활용한 사용자 경험 분석)

  • Soyon Kim;Ji Yeon Cho;Sang-Yeol Park;Bong Gyou Lee
    • Journal of Internet Computing and Services
    • /
    • v.25 no.4
    • /
    • pp.109-119
    • /
    • 2024
  • This study aims to contribute to the initial research on on-device AI in an environment where generative AI-based services on mobile and other on-device platforms are increasing. To derive success strategies for generative AI-based chatbot services in a mobile environment, over 200,000 actual user experience review data collected from the Google Play Store were analyzed using the LDA topic modeling technique. Interpreting the derived topics based on the Information System Success Model (ISSM), the topics such as tutoring, limitation of response, and hallucination and outdated informaiton were linked to information quality; multimodal service, quality of response, and issues of device interoperability were linked to system quality; inter-device compatibility, utility of the service, quality of premium services, and challenges in account were linked to service quality; and finally, creative collaboration was linked to net benefits. Humanization of generative AI emerged as a new experience factor not explained by the existing model. By explaining specific positive and negative experience dimensions from the user's perspective based on theory, this study suggests directions for future related research and provides strategic insights for companies to improve and supplement their services for successful business operations.

A study on security independent behavior in social game using expanded health belief model (건강신념모델을 확장한 소셜게임(Social Game) 보안의지행동에 관한 연구)

  • Ahn, Ho-Jeong;Kim, Sung-Jun;Kwon, Do-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.99-118
    • /
    • 2016
  • With the development of Internet and popularization of smartphones over recent years, social network services are experiencing rapid growth. On top of this, smartphone gaming market is showing a rapid growth and the use of mobile social games is on the significant rise. The occurrence of game data manipulation targeting these services and personal information leakage is highlighting the importance of social gaming security. This study is intended to propose development plans effective and efficient in social game services by figuring out factors putting effects on security dependent behavior of social game users in Korea and carrying out a practical study on the casual relationship between factors influencing security dependent behavior through recognized behavioral control and attitudes for privacy infringement of these factors. To do this, proposed was a study model in which the HBM(Health Belief Model) allowing the social game user to influence security dependent behavior was expanded and applied as a major variable. To verify the study model of this study practically, a survey was conducted among university students in Seoul-based K University and S University who had experienced using social game services. According to the study findings, firstly, the perceived seriousness turned out to provide positive influence to trust. But, the perceived seriousness turned out not to put positive effects on self-efficacy. Secondly, the perceived probability turned out not to put positive effects on self-efficacy and trust. Thirdly, the perceived gain turned out to put positive effects on self-efficacy and trust. Fourthly, the perceived disorder turned out not to put positive effects on self-efficacy and trust. Fifthly, self-efficacy turned out to put positive effects on trust. But, self-efficacy turned out not to put positive effects on security dependent behavior. Sixthly, trust turned out not to put positive effects on security dependent behavior. This study is intended to make a strategic proposal so that social game users can raise awareness of their level of security perception and security willingness through this.

  • PDF