• 제목/요약/키워드: 전자 정보 서비스

검색결과 3,696건 처리시간 0.031초

A Design of Secure Electronic Health Information Management Protocol in the Internet of Things Environment (사물 인터넷 환경에서 안전한 전자의료정보 관리 프로토콜 설계)

  • Park, Jeong Hyo;Kim, Nak Hyun;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • 제3권10호
    • /
    • pp.323-328
    • /
    • 2014
  • ZigBee based on the most vulnerable part of u-Healthcare system that uses the ZigBee communication is the wireless section. ZigBee communication sectors to identify vulnerabilities in this paper, we propose to compensate. ZigBee has been raised from the existing vulnerabilities organize and ZigBee also uses the 64bit address that uniquely identifies a vulnerability that was defined as exposure. And to prevent the exposure of a unique identifying address was used to address a temporary identification. ZigBee security services, the proposed system during the Network Key for encryption only use one mechanism of Residential Mode is used. Residential Mode on all nodes of the entire network because they use a common key, the key is stolen, your network's security system at a time are at risk of collapse. Therefore, in order to guard against these risks to the security policy Network Key updated periodically depending on the method used to. The proposed evaluation and comparative analysis of the system were exposed in the existing system can hide the address that uniquely identifies a public key Network Key also updated periodically, so that leaks can occur due to reduced risk.

A Study on the Activation of Digital Material Using by the Actual Condition of Digital Material Operation in Public Library (공공도서관 디지털자료 운영실태에 따른 디지털자료 이용 활성화 방안 연구)

  • Noh, Younghee;Kang, Pil Soo;Kim, Yoon-Jeong
    • Journal of the Korean Society for information Management
    • /
    • 제38권1호
    • /
    • pp.25-51
    • /
    • 2021
  • In this study, we tried to provide basic materials necessary for introduction of smart libraries by analyzing present conditions of its operation based on the actual conditions of digital materials. For this study, a survey of actual use of digital materials is conducted for digital material rooms of public libraries in nationwide and 213 persons in charge of digital materials. As a result of this study, the followings are found: first, 80.8% of those public libraries responding to the survey operate digital material rooms and average 1.75 person is in charge of managing digital materials and open type Wi-Fis are installed in those public libraties but only 11.3% of those libraries provide 5G services; second, it is found that the digital data which are owned by those public libraries most are video contents (63.8%), e-books (53.5%) and audio books (53.5%) in order. In addition average number of types of audio books 781, video contents 4,985, nonbook contents except for video 3,616 and other digital data 626. This study is a basic research for introduction of smart library and it is necessary to conduct another study of a plan for future revitalization of digital materials and librarians' awareness on introduction of smart library.

A Study on Determinants of VR Video Content Popularity (VR 영상 조회수 결정요인 연구)

  • Soojeong Kim;Chanhee Kwak;Minhyung Lee;Junyeong Lee;Heeseok Lee
    • Information Systems Review
    • /
    • 제22권2호
    • /
    • pp.25-41
    • /
    • 2020
  • Along with the expectation about 5G network commercialization, interests in realistic and immersive media industries such as virtual reality (VR) are increasing. However, most of studies on VR still focus on video technologies instead of factors for popularity and consumption. Thus, the main objective of this research is to identify meaningful factors, which affect the view counts of VR videos and to provide business implications of the content strategies for VR video creators and service providers. Using a regression analysis with 700 VR videos, this study tries to find major factors that affect the view counts of VR videos. As a result, user assessment factors such as number of likes and sicknesses have a strong influence on the view counts. In addition, the result shows that both general information factors (video length and age) and content characteristic factors (series, one source multi use (OSMU), and category) are all influential factors. The findings suggest that it is necessary to support recommendation and curation based on user assessments for increasing popularity and diffusion of VR video streaming.

An Exploratory Study on Measuring Brand Image from a Network Perspective (네트워크 관점에서 바라본 브랜드 이미지 측정에 대한 탐색적 연구)

  • Jung, Sangyoon;Chang, Jung Ah;Rho, Sangkyu
    • The Journal of Society for e-Business Studies
    • /
    • 제25권4호
    • /
    • pp.33-60
    • /
    • 2020
  • Along with the rapid advance in internet technologies, ubiquitous mobile device usage has enabled consumers to access real-time information and increased interaction with others through various social media. Consumers can now get information more easily when making purchase decisions, and these changes are affecting the brand landscape. In a digitally connected world, brand image is not communicated to the consumers one-sidedly. Rather, with consumers' growing influence, it is a result of co-creation where consumers have an active role in building brand image. This explains a reality where people no longer purchase products just because they know the brand or because it is a famous brand. However, there has been little discussion on the matter, and many practitioners still rely on the traditional measures of brand indicators. The goal of this research is to present the limitations of traditional definition and measurement of brand and brand image, and propose a more direct and adequate measure that reflects the nature of a connected world. Inspired by the proverb, "A man is known by the company he keeps," the proposed measurement offers insight to the position of brand (or brand image) through co-purchased product networks. This paper suggests a framework of network analysis that clusters brands of cosmetics by the frequency of other products purchased together. This is done by analyzing product networks of a brand extracted from actual purchase data on Amazon.com. This is a more direct approach, compared to past measures where consumers' intention or cognitive aspects are examined through survey. The practical implication is that our research attempts to close the gap between brand indicators and actual purchase behavior. From a theoretical standpoint, this paper extends the traditional conceptualization of brand image to a network perspective that reflects the nature of a digitally connected society.

Analyzing Topic Trends and the Relationship between Changes in Public Opinion and Stock Price based on Sentiment of Discourse in Different Industry Fields using Comments of Naver News (네이버 뉴스 댓글을 이용한 산업 분야별 담론의 감성에 기반한 주제 트렌드 및 여론의 변화와 주가 흐름의 연관성 분석)

  • Oh, Chanhee;Kim, Kyuli;Zhu, Yongjun
    • Journal of the Korean Society for information Management
    • /
    • 제39권1호
    • /
    • pp.257-280
    • /
    • 2022
  • In this study, we analyzed comments on news articles of representative companies of the three industries (i.e., semiconductor, secondary battery, and bio industries) that had been listed as national strategic technology projects of South Korea to identify public opinions towards them. In addition, we analyzed the relationship between changes in public opinion and stock price. 'Samsung Electronics' and 'SK Hynix' in the semiconductor industry, 'Samsung SDI' and 'LG Chem' in the secondary battery industry, and 'Samsung Biologics' and 'Celltrion' in the bio-industry were selected as the representative companies and 47,452 comments of news articles about the companies that had been published from January 1, 2020, to December 31, 2020, were collected from Naver News. The comments were grouped into positive, neutral, and negative emotions, and the dynamic topics of comments over time in each group were analyzed to identify the trends of public opinion in each industry. As a result, in the case of the semiconductor industry, investment, COVID-19 related issues, trust in large companies such as Samsung Electronics, and mention of the damage caused by changes in government policy were the topics. In the case of secondary battery industries, references to investment, battery, and corporate issues were the topics. In the case of bio-industries, references to investment, COVID-19 related issues, and corporate issues were the topics. Next, to understand whether the sentiment of the comments is related to the actual stock price, for each company, the changes in the stock price and the sentiment values of the comments were compared and analyzed using visual analytics. As a result, we found a clear relationship between the changes in the sentiment value of public opinion and the stock price through the similar patterns shown in the change graphs. This study analyzed comments on news articles that are highly related to stock price, identified changes in public opinion trends in the COVID-19 era, and provided objective feedback to government agencies' policymaking.

A Rule-based JMS Message Routing System for Dynamic Message Communication in based Distributed Systems (분산환경에서 동적 메시지 교환을 위한 룰 기반 JMS 메시지 라우팅 시스템)

  • Cho, Poong-Youn;Choi, Jae-Hyun;Park, Jae-Won;Lee, Nam-Yong
    • The Journal of Society for e-Business Studies
    • /
    • 제13권3호
    • /
    • pp.1-20
    • /
    • 2008
  • Today's computing environment which is getting distributed to communicate with various systems needs dynamic inter-connectivity of the systems. MOM(Message Oriented Middleware) is popularly used for transmitting XML messages among the distributed systems for the inter-connectivity. But, they do not support event-based message routing functionalities with XML transformation for processing effective message routing, which is essential to inter-connectivity, and there is no integrated platform to cope with these requirements. Although event-based message routing and XML transformation have been studied in a wide range of computer science areas, development of message routing systems is considered as a tough job due to the technological difficulties. In order to address these requirements, we proposed a novel system, named RMRS(Rule-based Message Routing System), which supports event-based message routing as well as XML message transformation. To make the proposed system easy to use, we also redesigned ECA(Event- Condition-Action) rule to fit in our system and developed a tool to map source XML structure into target XML structure.

  • PDF

A Study on Method for User Gender Prediction Using Multi-Modal Smart Device Log Data (스마트 기기의 멀티 모달 로그 데이터를 이용한 사용자 성별 예측 기법 연구)

  • Kim, Yoonjung;Choi, Yerim;Kim, Solee;Park, Kyuyon;Park, Jonghun
    • The Journal of Society for e-Business Studies
    • /
    • 제21권1호
    • /
    • pp.147-163
    • /
    • 2016
  • Gender information of a smart device user is essential to provide personalized services, and multi-modal data obtained from the device is useful for predicting the gender of the user. However, the method for utilizing each of the multi-modal data for gender prediction differs according to the characteristics of the data. Therefore, in this study, an ensemble method for predicting the gender of a smart device user by using three classifiers that have text, application, and acceleration data as inputs, respectively, is proposed. To alleviate privacy issues that occur when text data generated in a smart device are sent outside, a classification method which scans smart device text data only on the device and classifies the gender of the user by matching text data with predefined sets of word. An application based classifier assigns gender labels to executed applications and predicts gender of the user by comparing the label ratio. Acceleration data is used with Support Vector Machine to classify user gender. The proposed method was evaluated by using the actual smart device log data collected from an Android application. The experimental results showed that the proposed method outperformed the compared methods.

A Study on the Impact of the App-Book Purchasing Behavior of Smart phone Users in Korea (국내 스마트폰 사용자들의 앱북 구매행위에 미치는 영향요인 연구)

  • Lee, Jong-Ok;Kim, Yong-Moon
    • The Journal of Society for e-Business Studies
    • /
    • 제18권3호
    • /
    • pp.45-67
    • /
    • 2013
  • In order to research the factors influencing on the intentions for smart phone users to purchase "App-Book" in Korea, the study examines the levels of influences using on an additional variable, "cost", as well as the four key variables(performance expectancy, effort expectancy, social influence, and facilitating conditions) proposed by Unified Theory of Acceptance and Use of Technology(UTAUT; Venkatesh et al., 2003) validation. The result of the research confirms that the hypotheses of UTAUT model variable are generally supported by the information technology and many related previous researches. There is one exception, however, that facilitating conditions do not influence on the App-Book purchasing behavior by smart phone. It is revealed that the "age" and "experience" of the independent variables, as the proposed control variables, are most visible effect of control on the purchase intention and purchase behavior. This study has an academic significance of presenting a new integrated model to perform the research of the similar next App-Book services and purchase behavior related to the acceptance of new media. It also clarifies to the related companies that the usefulness of App-Book, the easiness of use, the cost and the social influence of purchasing App-Book by Outsider's intent. These aspects have practical implications as being presented.

Fast and Secure Handoff Mechanism for IEEE 802.11i System (IEEE 802.11i 환경에서 신속하고 보안성 있는 핸드오프 메커니즘)

  • Park, Jae-Sung;Lim, Yu-Jin
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • 제43권11호
    • /
    • pp.159-167
    • /
    • 2006
  • IEEE 802.11i standard specifies full authentication and preauthentication for secure handoff in 802.11 wireless LAN (WLAN). However, the full authentication is too slow to provide seamless services for handoff users, and preauthentication may fail in highly populated WLAN where it is highly probable that the cache entry of a preauthenticated user is evicted by other users before handoff. In this paper, we propose a fast and secure handoff scheme by reducing authentication and key management delay in the handoff process. When a user handoffs, security context established between the user and the previous access point (AP) is forwarded from the previous AP to the current AP, and the session key is reused before the handoff session terminates. The freshness of session key is maintained by regenerating session keys after handoff session is terminated. The proposed scheme can achieve considerable reduction in handoff delay with providing the same security level as 802.1X authentication by letting an AP authenticate a handoff user before making an robust security network association (RSNA) with it.

Cybertrap : Unknown Attack Detection System based on Virtual Honeynet (Cybertrap : 가상 허니넷 기반 신종공격 탐지시스템)

  • Kang, Dae-Kwon;Hyun, Mu-Yong;Kim, Chun-Suk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • 제8권6호
    • /
    • pp.863-871
    • /
    • 2013
  • Recently application of open protocols and external network linkage to the national critical infrastructure has been growing with the development of information and communication technologies. This trend could mean that the national critical infrastructure is exposed to cyber attacks and can be seriously jeopardized when it gets remotely operated or controlled by viruses, crackers, or cyber terrorists. In this paper virtual Honeynet model which can reduce installation and operation resource problems of Honeynet system is proposed. It maintains the merits of Honeynet system and adapts the virtualization technology. Also, virtual Honeynet model that can minimize operating cost is proposed with data analysis and collecting technique based on the verification of attack intention and focus-oriented analysis technique. With the proposed model, new type of attack detection system based on virtual Honeynet, that is Cybertrap, is designed and implemented with the host and data collecting technique based on the verification of attack intention and the network attack pattern visualization technique. To test proposed system we establish test-bed and evaluate the functionality and performance through series of experiments.