• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.031 seconds

A Study on the Design for Contents System of Real Estate based on Web Engineering (웹 공학 기반의 부동산 컨텐츠 시스템 설계에 관한 연구)

  • Kim Young-sun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.6 s.38
    • /
    • pp.55-64
    • /
    • 2005
  • The design for an real estate system offer reliability information at once which of the information to extensive data collection of real estate and an real estate price decision Real estate policy make reflect to the appear and apply. The taste of an real estate buyer is various today that We have been changed into a buyer center in the market of the while of a salesman center Real estate area range of which brokerage business have been reduced gradually which are charging the task of an real estate intermediation. We take the influence to implementation of an real estate information system which real estate field range of brokerage business with real estate mediation business take charge have been reduced gradually. An Real estate circulation market are leading the change of the environment to be brings the change of the method of an real estate transaction. This paper has the purpose that lead new internet age to the design for contents system of real estate based on Web engineering, accomplish revitalization of real estate information system that offer Web service information.

  • PDF

An Implementation of Optimum Tender Price Automatic Calculation System using Statistical Analysis Technique (통계분석 기법을 이용한 최적의 투찰가 자동 산출 시스템의 구현)

  • Kim, Bong-Hyun;Lee, Se-Hwan;Cho, Dong-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.11B
    • /
    • pp.1013-1019
    • /
    • 2008
  • Recently, various information and data are efficiently used by the rapid growth of its Internet in our real life. But, users have spent lots of time finding necessary information for the increased amounts of information. To solve this problem, it can be provided the speed, accuracy of information search with development of intelligent search engines, agent system etc. In this paper, we propose the method of getting the best tender price in the analysis of the construction bid information that needs its professionalism by on the purpose to maximize users' satisfaction. Of course, if it is not under the unit of a results in the future, we put target of this paper on part to heighten supreme successful bid success rate. Therefore, this paper embodies offered system of web based on producing tender price of most suitable through techniques to produce tender price about successful bid that compare with bidder fare by statistical analysis incidental and value approaching successful bidder fare by frequency analysis method.

Queueing Model for Traffic Loading Improvement of DDoS Attacks in Enterprise Networks (엔터프라이즈 네트워크에서 DDoS 공격의 부하 개선을 위한 큐잉 모델)

  • Ha, Hyeon-Tae;Lee, Hae-Dong;Baek, Hyun-Chul;Kim, Sang-Bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.107-114
    • /
    • 2011
  • Today the company adopts to use information management method at the network base such as internet, intranet and so on for the speed of business. Therefore the security of information asset protection and continuity of business within company in relation to this is directly connected to the credibility of the company. This paper secures continuity to the certified users using queuing model for the business interruption issue caused by DDoS attack which is faced seriously today. To do this I have reflected overloaded traffic improvement process to the queuing model through the analysis of related traffic information and packet when there occurs DDoS attack with worm/virus. And through experiment I compared and analyzed traffic loading improvement for general network equipment.

Evaluation of Internet Web-sites Providing Infant Health Related Information for Daycare Staffs (국내 인터넷 상의 보육시설 영유아 건강관련 웹사이트의 평가)

  • Kim, Ji-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.334-342
    • /
    • 2010
  • The purpose of this study was to evaluate web-sites related to infant health at day-care centers. A total of 87 web-sites were ultimately selected through Internet search engines, and educare sites. The basis of assessment in which standards and items were amended for the assessment of health information in previously used, and purpose, content, pertinence, accuracy, confidence, utility, authority, interactivity and continuance was assessed. Though the total score were 32 point, mean score was relatively low, 20.39 point. The score of accuracy and authority was relatively low while that of confidence and interactivity was high. As a result, it was revealed that there were no specific infant health related web-site with reliability guaranteed. Therefore, there is a need to develop a web-site providing accurate health information for infant at day-care centers. It is expected that these results can be utilized as a data for developing reliable web-site related infant health.

Design and Implementation of a Keyboard Input Security System for Safe md Trusted E-Commerce (안전하고 신뢰성있는 전자상거래를 위한 키보드 입력 보안 시스템의 설계 및 구현)

  • Choi Sung-Wook;Kim Ki-Tae
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.55-62
    • /
    • 2006
  • It is growing to use the E-Commerce, recently However, if a cracking tool that detects e keyboard input is set up, users' input values and personal information could be taken away. This paper shows the design and implementation of security system that prevent the keyboard input information leaking. The ideas of thus paper are encrypting the keyboard input values with using the keyboard interrupt hooking, the browser embedding program's decrypting the values in case of need and decrypting all values in the web server. The own input control was developed for direct attacks to the browser, and that the values of password fields which are showed as *(asterisk character) won't be decrypted in the client PC is different from other commercial keyboard input security systems. Consequently, this paper shows the chance of realizing a lot safer customer information protective system than before.

Chatting-based Commerce Platform Enabling Non-Volatile Social Curation Service (비휘발적 소셜 큐레이션 서비스가 가능한 대화형 상거래 플랫폼 개발)

  • Yoo, Keedong
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.145-157
    • /
    • 2018
  • The social curation service that selectively provides information generated by individuals or groups with the same interests can have a synergistic effect when combined with the recently used SNS-based chatting function. If these kinds of chatting-based curation technologies are applied to the Internet shopping malls, particularly, buyers can obtain more reliable information in real time basis, and sellers can provide them with more differentiated and rich information in a continuous manner. This research suggests a chatting-based commerce platform that provides the social curation service based on chats among sellers, existing buyers, and potential buyers. The proposed commerce platform can organize a chat channel for each store and product not only to immediately respond to new and existing customer inquiries about stores, brands, and detailed products, but also to continuously activate differentiated sales strategies to customers subscribed to the channel. In particular, MongoDB is used to permanently save and archive the information and chatting history of each channel, so that the buyer can search and refer to them recorded in the corresponding channel at any time.

Evaluation of Scholarly Information System in STEM (STEM 학술정보시스템 평가)

  • Park, Minsoo
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.5
    • /
    • pp.431-435
    • /
    • 2022
  • The fields of STEM (Science, Technology, Engineering and Medicine) are changing rapidly. Recently, with the remarkable development of Internet and Web technologies, an environment that can be accessed worldwide has been created, thereby lowering the barriers to share STEM knowledge and information. The purpose of this study is to derive improvements by evaluating users' satisfaction with the information system developed by applying the open access model in the STEM field. Through an online survey using a structured questionnaire, a total of 204 users participated from January to February. The collected data were analyzed using quantitative statistical techniques. IPA (Importance Performance Analysis) technique was used. By identifying the importance and satisfaction (performance) between variables, areas with relatively low satisfaction compared to importance were derived. Users' overall satisfaction with the open access information system was 81.2 points and social reliability was 85.9 points, which were relatively high, respectively. What should be paid attention to in this study is the satisfaction with the system use environment, which is the most vulnerable area.

Traceability Number-Driven Livestock Inventory Management IoT System Utilizing Electronic Scale Access Control Technology (전자저울 접근제어 기술을 통한 이력번호 기반의 재고관리 IoT 시스템)

  • Youchan Jeon
    • Smart Media Journal
    • /
    • v.12 no.10
    • /
    • pp.85-92
    • /
    • 2023
  • In December 2014, Livestock and Livestock Products Traceability Act was established, allowing consumers to receive livestock traceability information. While the Livestock Traceability System provides consumers with transparent and fair information about their food, it has brought increased workload and penalty burdens to stakeholders in the livestock industry. In this paper, we propose an IoT system for inventory management based on traceability numbers to enable sellers to conveniently provide livestock traceability information to consumers. We analyzed the protocol for managing data from electronic scales and conducted functional testing and verification on mobile devices. Furthermore, we implemented the design and system functionality, taking into account UI/UX on Android OS-based devices to synchronize and interconnect traceability and product information with electronic scales. We anticipate that the proposed approach will minimize user inconvenience and raise production efficiency in the existing market.

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

HFN-Based Right Management for IoT Health Data Sharing (IoT 헬스 데이터 공유를 위한 HFN 기반 권한 관리)

  • Kim, Mi-sun;Park, Yongsuk;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.10 no.1
    • /
    • pp.88-98
    • /
    • 2021
  • As blockchain technology has emerged as a security issue for IoT, technology which integrates block chain into IoT is being studied. In this paper is a research concerning token-based IoT service access control technology for data sharing, which propose a possessor focused data sharing technic by using the permissioned blockchain. To share IoT health data, a Hyperledger Fabric Network consisting of three organizations was designed to provide a way to share data by applying different access control policies centered on device owners for different services. In the proposed system, the device owner issues access control tokens with different security levels applied to the participants in the organization, and the token issue information is shared through the distributed ledger of the HFN. In IoT, it is possible to lightweight the access control processing of IoT devices by granting tokens to service requesters who request access to data. Furthmore, by sharing token issuance information among network participants using HFN, the integrity of the token is guaranteed and all network participants can trust the token. The device owners can trust that their data is being used within their authorized rights, and control the collection and use of data.