• Title/Summary/Keyword: Bring Your Own Device

Search Result 30, Processing Time 0.028 seconds

E-Government Case Studies for Fixed Mobile Convergence and its security (해외국가사례분석을 통한 국가공공기관의 유무선서비스 활성화 제도 방안 및 보안)

  • Park, Yongsuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1350-1354
    • /
    • 2014
  • Although there were many activities to provide FMC (Fixed Mobile Convergence) service by several foreign countries such as United States, FMC service could not make a good success for a number of reasons for example, customers indifference and lack of needs. On the other hand, recently FMC is showing its good progress at B2B market in foreign government such as in Germany and US satisfying e-government and BYOD (Bring Your Own Device) needs. This paper studies FMC service of foreign countries and as a result makes a analysis presenting issues for Korean e-government service. Also, we make several suggestions to energize FMC service success.

A Secure Telemedicaine System in Smart Health Environment using BYOD (BYOD를 활용한 스마트헬스 환경에서 안전한 원격의료 시스템)

  • Cho, Young-bok;Woo, Sung-hee;Lee, Sang-ho;Park, Jong-bae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2473-2480
    • /
    • 2015
  • In telemedicaine, people can make their health checked at anywhere from temporal and spatial constraints and It's environment can provide continuous health information regardless of the location of customers through PCs and smart phones. In addition, personal health information collected utilizing the BYOD(bring your own device) is the most important factor data security and guaranteed personal privacy because it's directly connected to the individual's health and life. In this paper, we provide a signature of the private key encryption system and method for providing the security of personal health information data collected utilizing the BYOD. Against replay attacks and man-in-the-middle attacks on security issues that are emerging as a smart environmental health was used as the timestamp and signature methods. Proposed method provides encryption overhead, while a communication was lower compared to the pre-encrypted with a mean 1.499mJ 1.212mJ shown by simulation to respond quickly in an emergency situation to be about 59%.

Design of a Wi-Fi Remote Ordering System Using the BYOD Environment (BYOD 환경을 활용한 WiFi 원격주문 시스템 설계)

  • Suk, Myung-gun;Jang, Seok-woo;Kim, Chang-jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.759-762
    • /
    • 2015
  • As a result of the popularization of smart devices, smart phones or the tablets have become necessities in modern society. In this current of the times, the bring-your-own-device environment, in which personally owned smart devices are utilized in life, is attracting attention. In this context, this paper designed a Wi-Fi remote ordering system focused on the BYOD environment. If the Wi-Fi remote ordering system based on the BYOD environment is popularized, positive effects can be expected such as the enhancement of efficiency and the increase of customer benefits. As a typical example, real-time customer requests via smart devices enable the provision of fast services. This paper designed a mobile app for customers' remote ordering and web pages on which member stores can inquire details of orders, manage a menu, and register statistical data on sales. If the Wi-Fi remote ordering system designed by this paper is widely distributed internationally, it is expected that the system will be used usefully by many people.

  • PDF

Smart Office Implementation for Korea m-Government (한국전자정부의 Smart Office 구현)

  • Park, Yongsuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.68-70
    • /
    • 2014
  • Korean e-goverment has shown its development phase upgrade following the world' e-government evolution. By United Nations, Korea was ranked number one in e-government yet it was not even in top ten for past years. Even now, a number of Korean government organizations such as Ministry of Security and Public Administration and Ministry of Science, ICT and Future Planning have presented and executed various directions and strategies (for example, e-gov 3.0). On the other hand, World Economic Forum put Korea out of top 10 in Networked Readiness Index and hence wireless mobile communication of Korea is a weak point making difficulties for smart office and Bring Your Own Device (BYOD) implementation. This paper details the analysis of leading countries' strategies and policies on m-Government and provides some suggestions for Korean m-government.

  • PDF

A Novel Design of Cloud-based Management Solution for Android Containers

  • Xuan, Nam Pham Nguyen;Chun, Hojin;Jung, Souhwan
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.67-75
    • /
    • 2019
  • The Android container is used for various purposes such as Bring Your Own Device (BYOD) solution and Android malware analysis. The strong point of android container than other technologies is it can simulate an android device like a real android phone on a hardware layer. Therefore, automatic management solutions for android container are necessary. This paper introduces a new design of cloud-based management solution for android containers. Through the proposal, android containers are managed automatically from a cloud platform - OpenStack with various tasks like: container configuration, deployment, destroy, android version, hardware device. In addition, the system monitoring and system statistics for android containers and hardware devices are also provided.

An Established Cloud Platform for Data Loss Prevention on Mobile Device (모바일 단말에서의 정보 유출 방지를 위한 클라우드 플랫폼 구축)

  • Song, Wangeun;Jung, Seungwook;Jung, Souhwan
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.358-361
    • /
    • 2015
  • BYOD(Bring your own device) 환경에서는 개인의 스마트 기기를 이용하여 회사 시스템을 이용하는 것으로, 개인의 단말을 업무에 이용하는 만큼 사원의 개인정보, 고객의 개인정보, 신규 사업 아이템, 상품의 거래내역, 계좌번호 등 유출시 막대한 손해를 발생시키는 사내 정보 유출에 대한 문제가 발생 가능하다. 회사 시스템을 관리하기 위해 개개인이 사용하는 다양한 종류의 단말에 맞는 설정이 필요함으로 즉각적인 대응이 어렵다. 때문에 위 같은 문제를 해결하고자 삼성이 개발한 듀얼 OS 구조의 KNOX가 제안되었으나, 특정 단말과 OS에 의존적이어서 다양한 종류의 단말에 적용하기 위해서는 지속적 개발이 필요한 단점이 있다. 다른 방법으로 MDM(Mobile Device Management) 시스템을 제안하였지만 새로운 모바일 단말에 대한 즉각적인 대응이 힘들며, 유지보수에 많은 시간과 투자가 필요한 단점이 있다. 따라서 본 논문에서는 단말에 의존적이지 않으면서, 기업의 정보를 보호하기 위하여 클라우드 기반 정보 유출 방지 플랫폼을 설계하고 제안한다.

Examining High School Students' BYOD Use under Office of Education-led Policy: Insights from the Technology Acceptance Model

  • Songhee KIM ;Jaejin LEE
    • Educational Technology International
    • /
    • v.24 no.2
    • /
    • pp.263-293
    • /
    • 2023
  • Offices of Education in Korea is planning and implementing the BYOD (bring your own device) policy. In particular, the Seoul Metropolitan Education Office promoted the 'Dibud' (digital buddy) policy. Due to the relative newness of the policy, coupled with opposition from the council, it hasn't been fully implemented. This study focuses on a rare example of a high school that experienced BYOD under the Office of Education-led policy in all three grades. This study adapted key variables from the Technology Acceptance Model (TAM). The regression results showed that both perceived usefulness (PU) and perceived ease of use (PEOU) significantly influenced intention to use Chromebooks and students' perceived learning outcomes. Analysis of the open-ended questionnaires revealed that students perceived positive benefits from using Chromebooks, such as easier data retrieval, improved academic performance, and increased learning productivity. Although the majority of respondents said there were no negative aspects to Chromebooks, negative factors included non-academic use, wireless network inconvenience, and device performance issues. The results of this study can provide data and understanding for future BYOD policies, specifically Chromebooks.

A Proposal on the Service Usage Context information based Extended Security Policy Framework in BYOD, Telework Environment (BYOD, 스마트워크 환경에서 확장된 이용 상황정보 기반 보안 정책 구조 제안)

  • Park, Hyun-Seung;Kang, Dong-Wan;Im, Chae-Tae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.375-378
    • /
    • 2014
  • 예전 기업 그룹웨어 환경은 기업 소유의 기기을 활용하는 사내에 출근한 직원들 대상으로만 서비스 하였다. 그러나, 스마트폰 보급이 확대되면서 사외에서 기업내부로 접근하여 그룹웨어 등을 활용할 수 있는 스마트워크 서비스가 발전하였다. 또한 사내로 반입된 개인 소유 단말 기기가 그룹웨어 서비스를 접속할 수 있는 BYOD 도입 기업들이 증가하고 있다. BYOD, 스마트워크 환경에서 기기 접속 위치, 시간 등 다양한 접속 상황을 활용한 보안정책 관리 구조를 연구하였다. 본 논문에서는 서비스 접속 이후 보안에 취약한 서비스 접근 상황정보 중심 보안정책의 한계를 개선하기 위하여 서비스 웹/DB 서비스 이용 상황정보 기반 보안정책 구조를 제안한다.

  • PDF

A Study on the Usage Pattern Based Detection of Abnormal Behavior in BYOD Environment using Regression (BYOD 환경에서 회귀분석을 활용한 비정상 행위 탐지 방법에 관한 연구)

  • Jurn, Jee-Soo;Kim, Tae-Eun;Jo, Chang-Min;Kim, Hwan-Kuk;Son, Kyung-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.10a
    • /
    • pp.646-647
    • /
    • 2015
  • 정보통신의 발달로 개인의 모바일 기기를 업무에 활용하는 BYOD(Bring Your Own Device) 시대가 도래 하면서 기업들은 기밀정보 유출 방지, 접근 제어 및 효율적인 자원 관리를 위해 다양한 시스템을 도입하였다. 하지만 접근제어 정책은 획일화 되어 사용자에게 적용되고 있고, 기기의 잦은 분실과 도난, 낮은 보안성 등으로 인한 보안 위협이 존재하기 때문에 BYOD는 적극적으로 도입되지 못하고 있다. 따라서 개인화된 상황정보 수집을 통하여 유연한 정책 설정 및 비정상 사용자를 탐지 및 통제하는 방법이 필요하다. 본 논문에서는 BYOD 환경에서 발생할 수 있는 비정상 행위를 탐지하기 위해 사용자의 서비스 이용속도 분석하여 비정상 행위를 탐지하는 방안에 대해 논의한다.

A Proposal of Agent based on Tagging and Process Behavior Inspection on the SmartPhone Environments (스마트폰 환경에서 Tagging 기반 프로세스 행위 감시 에이전트 제안)

  • Hong, Ji-Hoon;Kim, Nam-Uk;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2015.04a
    • /
    • pp.434-437
    • /
    • 2015
  • 스마트폰 사용자가 급격하게 증가함에 따라 BYOD(Bring Your Own Device)정책을 펼치는 회사들이 많아졌지만 스마트폰 악성코드로 인해 회사 네트워크 전체가 위험한 상황에 직면해있다. 현재 다양한 스마트폰 악성코드 탐지 기법들이 연구되고 있지만 대부분 단일 어플리케이션을 대상으로 탐지를 수행하고 네트워크 환경과는 독립적으로 탐지한다는 단점이 존재한다. 따라서 본 논문에서는 네트워크 환경을 고려한 Tagging 기반의 프로세스 행위 감시 에이전트를 제안한다.