• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.027 seconds

The Effect of Screen Golf Course Service Quality on Revisit (스크린골프장 서비스품질이 재이용에 미치는 영향)

  • Kuk-Gwen Lee;Seon-Gyeong, Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.343-348
    • /
    • 2023
  • This study attempted to verify and examine the effect of screen golf course service quality on reuse. A total of 300 copies were distributed, and a total of 247 copies were used for analysis, excluding 53 questionnaires with poor responses or many missing questions. Based on these results, the following implications were derived. First, screen golf course users were mainly used by friends, acquaintances, and social groups, and information was obtained through human and Internet, and empathy and reliability among service quality affected the reuse of screen golf courses. When users experience high-quality services, they have high satisfaction and high service quality, and they can increase the probability of forming loyalty and recommending and promoting them to people around them. However, experiencing poor quality services can disappoint customers and leave negative comments on people around them, which reduces the likelihood of reuse. Therefore, in order to increase the reuse of golf courses, quality management, customer opinions and feedback must be accepted, and problems must be dealt with quickly to improve the quality of services and provide services that satisfy customers. Second, although the types, responsiveness, and certainty of sub-factors of screen golf course service quality were not significant in this study, management strategies should be used to increase survival in the highly competitive screen golf industry and reuse them by providing differentiated services.

QoS guaranteed IP multicast admission control mechanism (품질 보장형 IP 멀티캐스트 수락 제어 메커니즘)

  • Song, kang-ho;Rhee, wooo-Seop
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.51-55
    • /
    • 2008
  • Request High-Images, High-quality, duplex transmission, BcN Voice telephone, Broadcast, Data internet service came to be all possible and demolished original communication service area. Also, The quality is guaranteed stablely to new business and ISP the requirement comes to become a multicasting quality guarantee mechanism which there is the reliability for a information communication and High-quality multimedia service. Like this, a multicast mechanism to be guaranteed must become air control End-to-End QoS for a service supply, a transmission delay a packet loss or requirement which the user requests guarantee and multicast Path-NET which there is the reliability must be provided. Therefor, we proposed IP base multicast new join the present the multicast mechanism of Probing packet foundation which there is the efficiently a linking acceptance, we used ns-2 simulator for the performance evaluation of the proposed.

  • PDF

An Implementation of a Component Repository based on J2EE Application Model (J2EE 어플리케이션 모델 기반의 컴포넌트 저장소 구현)

  • 안성아;최희석;염근혁
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.1
    • /
    • pp.77-93
    • /
    • 2002
  • Now we are following component-based software development as a solution to improve the reusability, reliability, and extensibility of the software. To support these, the developed components must be reused through component repository at software development. However, traditional centralized repositories couldn't activate component markets since not only the number of users were restricted but also most of the provided components were those on clients like user interface and so on. Recently, a lot of server-side components, reused in a specific domain, have appeared thanks to the development of both Internet technology and component technology such as EJB, DCOM, etc. Therefore, component repositories, based on domain information, classify and provide components and must offer web-based service for many users to use it stably. This study introduces the implementation of a component repository based on J2EE application model. It provides application developers with the service to search and extract appropriate components, and supplies them reliable services in web environment.

  • PDF

Review of the principle of election - Focusing on the Estonia e-voting case (선거의 원칙에 대한 재고찰 - 에스토니아 전자투표 사례를 중심으로)

  • Moon, Eun-Young
    • Informatization Policy
    • /
    • v.29 no.4
    • /
    • pp.67-90
    • /
    • 2022
  • The March 2022 presidential election held at the peak of the COVID-19 pandemic drew flak for undermining the principle of universal suffrage by failing to guarantee properly the voting rights of confirmed and quarantined persons. Guaranteeing their voting rights requires thinking about e-voting that can fundamentally overcome the temporal and spatial limitations of current paper voting polling stations. The question is how to deal with the increased possibility of contradicting or violating the principles of equality and direct and secret suffrage due to the expansion of universal suffrage. In order to obtain implications for this, we looked at the case of Estonia, which has been holding 11 national elections without any problems since the introduction of e-voting in 2005. Estonia was successfully building trust in the system, government, and society through the institutionalization and routinization of the overall socio-technical system of e-voting, along with political and constitutional agreements on the principles of elections. Therefore, we should not only consider the possibility of e-voting in terms of technological development and level but also discuss the establishment of trust by mediating conflicts between election principles from a normative point of view to reach a social consensus.

A Study on Trust and Commitment between Buyer and Supplier of Industrial Parts, and Their Usage of Information Technology (산업재 부품 구매자와 공급자의 신뢰와 몰입, 그리고 정보기술의 이용에 관한 연구)

  • Kim, Jong-Hun;Yun, Hui-Taek
    • Proceedings of the Korean DIstribution Association Conference
    • /
    • 2006.08a
    • /
    • pp.47-68
    • /
    • 2006
  • This study aims to determine the association structure of the behavioral relationship variables, such as trust, commitment, cooperation, communication and coercive power, in the relationship between the buyers and suppliers of industrial parts. It also investigates the impact of the use of IT technologies on the relationships quality. Data was collected from 216 part suppliers of machinery, electronics and automobiles located in Incheon. Data supported all of the proposed hypotheses. First, it was confirmed that parts suppliers' trust in buyers leads to the commitment into relationships with buyers. Second, cooperation and communication showed a positive influence on parts suppliers' trust in buyers, and coercive power gave a negative influence on trust. Third, the use of IT technologies like Internet and E-Mail between parts suppliers and buyers was verified to have generally a positive influence on the quality of relationships. At the same time, cooperation and communication were confirmed to have a positive influence on each other, and cooperation and coercive power as well as communication and coercive power were confirmed to have negative influence on each other. This study is a pioneering attempt to examine the relationships between suppliers and buyers of industrial parts, and the influence IT technologies on the relationship quality. Also, the findings will be practically much helpful to find how to reinforce the relationships between parts suppliers and buyers.

  • PDF

Expert Recommendation Scheme by Fields Using User's interesting, Human Relations and Response Quality in Social Networks (소셜 네트워크에서 사용자의 관심 분야, 인적 관계 및 응답 품질을 고려한 분야별 전문가 추천 기법)

  • Song, Heesub;Yoo, Seunghun;Jeong, Jaeyun;Park, Jaeyeol;Ahn, Jihwan;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.11
    • /
    • pp.60-69
    • /
    • 2017
  • Recently, with the rapid development of internet and smart phones, social network services that can create and share various information through relationships among users have been actively used. Especially as the amount of information becomes enormous and unreliable information increases, expert recommendation that can offer necessary information to users have been studied. In this paper, we propose an expert recommendation scheme considering users' interests, human relations, and response quality. The users' interests are evaluated by analyzing their past activities in social network. The human relations are evaluated by extracting the users who have the same interesting fields. The response quality is evaluated by considering the user's response speed and response contents. The proposed scheme determines the user's expert score by combining the users' interests, the human relations, and the response quality. Finally, we recommend proper experts by matching queries and expert groups. It is shown through various performance evaluations that the proposed scheme outperforms the existing schemes.

Delay Control using Fast TCP Prototype in Internet Communication (인터넷 통신에서 고속 TCP 프로토타입을 이용한 지연 제어)

  • 나하선;김광준;나상동
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1194-1201
    • /
    • 2003
  • Measurements of network traffic have shown that self-similarity is a ubiquitous phenomenon spanning across diverse network environments. We have advance the framework of multiple time scale congestion control and show its effectiveness at enhancing performance for fast TCP prototype control. In this paper, we extend the fast TCP prototype control framework to window-based congestion control, in particular, TCP. This is performed by interfacing TCP with a large time scale control module which adjusts the aggressiveness of bandwidth consumption behavior exhibited by TCP as a function of "large time scale" network state. i.e., conformation that exceeds the horizon of the feedback loop as determined by RTT. Performance evaluation of fast TCP prototype is facilitated by a simulation bench-mark environment which is based on physical modeling of self-similar traffic. We explicate out methodology for discerning and evaluating the impact of changes in transport protocols in the protocol stack under self-similar traffic conditions. We discuss issues arising in comparative performance evaluation under heavy-tailed workload. workload.

An Effective Mixed Steganography Based on LSB and LDR (LSB와 LDR을 기반한 효과적인 혼합 스테가노그래피)

  • Ji, Seon-Su
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.6
    • /
    • pp.561-566
    • /
    • 2019
  • In the Internet space, integrity and security must be maintained for secure and confidential communication, which ensures reliability between sender and receiver. Cryptography is an important factor in maintaining robustness against external attacks. For this purpose, encryption and steganography methods are used. Steganography is a method of hiding confidential information without making statistically significant changes to digital media. I propose a method of transforming the Hangul-Jamo consisting of choseong, jungseong and jongseong, and inserting them into RGB pixel values of the cover image. In order to improve security, a new blending method was used to hide the altered information in the lowest region. In this case, a mixture of LSB and LDR techniques was applied. PSNR was calculated for image quality. The PSNR of the proposed method is 43.225dB, which satisfies the lowest level.

Design and Implementation of VIES for Integrity Evaluation in VPN (VPN의 데이터 무결성 평가를 위한 VIES 설계 및 구현)

  • Lee, Dong-Chun;Kim, Jeom-Gu;Jo, Seok-Pal
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.481-488
    • /
    • 2002
  • Guarantee of the data integrity is important to the Virtual Private Network (VPN) which can be improved cost decreasing and effective work by applying on Internet as the private network. Thus, the integrity function in the VPN must be maintained and the security manager must be check it occasionally. In this paper we propose the VPN Integrity Evaluation System (VIES) which is collecting, and evaluating automatically the vulnerable data of VPN against current hacking mechanisms in information security system. And this VIES obtain to the results which have objectivity and fairness of evaluation by driving off the evaluation scenario based on Common Criteria (CC), and general users or non-specialist can utilize easy the security evaluation of organization.

Key Management for Secure Internet of Things(IoT) Data in Cloud Computing (클라우드 컴퓨팅에서 안전한 사물인터넷 데이터를 위한 키 관리)

  • Sung, Soon-hwa
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.353-360
    • /
    • 2017
  • The Internet of Things(IoT) security has more need than a technical problem as it needs series of regulations and faultless security system for common purposes. So, this study proposes an efficient key management in order that can be trusted IoT data in cloud computing. In contrast with a key distribution center of existing sensor networks, the proposed a federation key management of cloud proxy key server is not central point of administration and enables an active key recovery and update. The proposed key management is not a method of predetermined secret keys but sharing key information of a cloud proxy key server in autonomous cloud, which can reduce key generation and space complexity. In addition, In contrast with previous IoT key researches, a federation key of cloud proxy key server provides an extraction ability from meaningful information while moving data.