• Title/Summary/Keyword: External User

Search Result 528, Processing Time 0.025 seconds

Analysis of User Requirements for Development of Vessel Traffic Services Cloud System (선박교통관제 클라우드 시스템 개발에 따른 사용자 요구사항 분석)

  • Lee, Li-Na;Kim, Joo-Sung;Lee, Hong-Hoon;Lee, Jin-Suk;Namgung, Ho
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.28 no.2
    • /
    • pp.314-323
    • /
    • 2022
  • Vessel Traffic Services (VTS) operators perform traffic management tasks using VTS systems and sensor equipment designated as VTS facilities to promote the safety and efficiency of vessel traffic. The necessary VTS information for effective operations could be obtained through the additional access of various information channels other than the designated VTS facility. To unify these various information access windows, the development of the VTS cloud system is in progress. In this study, the operational information analysis for VTS was performed through VTS tasks-facility linkage analysis to identify the user required information according to the introduction of the VTS cloud system. The VTS task analysis was performed through research of the international and domestic literature, and expert interviews. The necessary information were identified and linked according to the VTS facilities. As a result of the analysis, 37 categories of necessary information were identified for internal and external information windows, and 8 information windows were selected other than the present VTS equipment. The identified user requirements would be applied to the structure design of the VTS cloud system. In the future, it is necessary to update user requirements through scenario-based user operation analysis and to conduct additional research on the system interface design.

The Analysis of ALT and Unuse of Learning Time in UCR Based Instruction (UCR활용수업의 실제학습시간 및 소실된 수업시간 분석)

  • Baek, Je-Eun;Kim, Kyung-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.18 no.3
    • /
    • pp.15-24
    • /
    • 2015
  • Appropriate distribution and utilization of learning time in class are regarded as essential and basic conditions for successful education. Nonetheless, among studies about UCR(User Created Robot) based instruction so far is difficult to find the research related to the class. For these reasons, we attempt to analyze the ALT(Actual Learning Time) and unuse of learning time in UCR based instruction. For these purpose, we observed three students who were with third and fourth grade integrated class of elementary school and interviewed the teachers at pre-post class. The result of this study showed the following results: (1) UCR based instruction present lower ALT than traditional classes. (2) Most of the unnecessary time used in their classes tend to be used in preparing and arranging the robot module, a little is used unnecessarily because of the students' unrelated behaviors for their learning, decentralized behaviors and other external influences.

Effect of Constraint and Supporting Features of Mobile Social Networking Games(SNGs) on User's Satisfaction (모바일 소셜 네트워크 게임의 제약과 지원 기능이 사용자의 만족에 미치는 영향)

  • IM, Chae-Rin;SHIN, Young-soo;KIM, Jin-woo;LEE, In-seong
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.7
    • /
    • pp.353-367
    • /
    • 2015
  • From the era of feature phone to the current smart phone which bloomed Social Network Games(SNGs), mobile games have held the top position as killer contents of mobile market. Mobile game has many constraints such as specification of device, network status, and external environment. Based on common perspective of game research, these factors have negative influences on flow of user. Even with these opinions, most mobile gamers have felt satisfaction. To explain this phenomenon, our research focuses on the constraints. Referring to theoretical concepts, we attempt to clarify the relationship between game features and flow through survey methodology. Our finding shows that the constraints have a positive effect on flow even though it disaccords with previous studies. Therefore, we argue that users of mobile game have sense of satisfaction not a cognitive overload as discomforts.

Study on Windows Event Log-Based Corporate Security Audit and Malware Detection (윈도우 이벤트 로그 기반 기업 보안 감사 및 악성코드 행위 탐지 연구)

  • Kang, Serim;Kim, Soram;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.3
    • /
    • pp.591-603
    • /
    • 2018
  • Windows Event Log is a format that records system log in Windows operating system and methodically manages information about system operation. An event can be caused by system itself or by user's specific actions, and some event logs can be used for corporate security audits, malware detection and so on. In this paper, we choose actions related to corporate security audit and malware detection (External storage connection, Application install, Shared folder usage, Printer usage, Remote connection/disconnection, File/Registry manipulation, Process creation, DNS query, Windows service, PC startup/shutdown, Log on/off, Power saving mode, Network connection/disconnection, Event log deletion and System time change), which can be detected through event log analysis and classify event IDs that occur in each situation. Also, the existing event log tools only include functions related to the EVTX file parse and it is difficult to track user's behavior when used in a forensic investigation. So we implemented new analysis tool in this study which parses EVTX files and user behaviors.

The Analyst of Inavi Navigation user Information by Digital Forensic (디지털 포렌식 관점에서의 아이나비 내비게이션 사용정보 분석)

  • Choi, Yong-Seok;Seo, Ki-Min;Lim, Kyung-Soo;Lee, Sang-Jin
    • The KIPS Transactions:PartC
    • /
    • v.17C no.4
    • /
    • pp.327-334
    • /
    • 2010
  • The operated type of navigation is composed of hardware or software. The navigation based on software is stored and ran in the external storage(e.g. SD card). For the convenience of users, Many car navigation systems store user information such as frequently visited place, route, and so on. Those can be used to proving the alibi of users as well as their relationship between the actual owner of the vehicle through data and time information analysis. Therefore, if it is analyzed datas of navigation, we can get a lot of information such as user's movement, route of car. There are important implications in the digital forensics because it's available for investigating the various crimes. This paper demonstrates the necessary information in the digital investigation through the analysis of stored data in the navigation.

The Design and Implementation of Internet Outlet with Multiple User Interface Using TCP/IP Processor (TCP/IP프로세서를 이용한 다중 사용자 인터페이스 지원 인터넷 전원 콘센트의 설계 및 구현)

  • Baek, Jeong-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.9
    • /
    • pp.103-112
    • /
    • 2012
  • Recently, the infrastructure to be connected to the internet is much provided, there is more and more need to connect electric or electronic products to the internet to monitor or control them remotely. However, most of the existing products lack the network interface, so it was very inconvenient to be connected to the internet. Therefore, this article designs and realizes the internet outlet allowing real-time scheduling that can control the power remotely on the internet by using the hardware TCP/IP processor. The realized product consumes low production cost because it can be realized by using the hardware TCP/IP processor and the 8-bit small microprocessor. In addition, the product can be used widely in both wired and wireless environments with a variety of user interface, including the dedicated control program which provides the environment configuration functions; embedded web service that enables the webpage to be saved on the external flash memory; Android smartphone application; motion recognition control environment that uses the OpenCV computer vision library, etc.

Research about Factor Affecting the Continuous Use of Cloud Storage Service : User Factor, System Factor, Psychological Switching Cost Factor (클라우드 스토리지 서비스의 지속적 사용의도에 영향을 미치는 요인 연구 : 사용자 요인, 시스템 요인, 심리적 전환비용)

  • Jun, Chang-Joong;Lee, Jung-Hoon;Jeon, In-Sook
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.1
    • /
    • pp.15-42
    • /
    • 2014
  • Cloud storage service has the potential to be a core infrastructure for the future mobile and Internet service; thus related service providers have been investing in it and trying to attract as many users as possible. In addition, those need to find out what motivates the users to keep using their service not only to attract new customers but also to secure their subscribers. Therefore, this study will examine its relationship with user's motivation based on the extended TAM model with external variables for objective research about continuous use of cloud storage service. As a result, it was found that personal innovativeness, self efficacy, functional attributes, and psychological switching cost influence the continuous use of cloud storage service. Also, it is expected they can guide service providers to the right track when setting up their business strategy in the future.

Android Application Code Protection Scheme Using Fingerprint Authentication and Dynamic Loading (지문 인증과 동적 로딩을 이용한 안드로이드 애플리케이션 코드 보호 기법)

  • Lyoo, Hwahn-il;Suk, Jae-Hyuk;Park, Jin-Hyung;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.6
    • /
    • pp.1361-1372
    • /
    • 2017
  • If an external attacker takes from a victim's smartphone a copy of a secret application or an application to which fingerprinting technique is applied, secret information can be leaked or the legitimate user can be misunderstood as an illegal redistributor, which results in a serious security problem. To solve this problem, this paper proposes an Android application code protection scheme using fingerprint authentication and dynamic loading. The proposed scheme divides one application into CLR(Class LoadeR) and SED(SEperated Dex). CLR is an APK file with the ability to dynamically load the SED, and the SED is a file containing the classes required to run the application. The SED is stored inside the smartphone after being encrypted, and the SED can be decrypted only if the user is successfully authenticated using his or her fingerprint. The proposed scheme can protect the application code from the attacker who physically acquired user's smartphone.

Secure Storage and Management of Vaccination Records Allowing Restrictive Access upon Users' Consent (사용자 동의로 제한적 접근을 허용하는 백신 접종 기록의 안전한 보관 및 관리)

  • Park, Jun-Cheol
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.100-109
    • /
    • 2021
  • As the COVID-19 vaccination begins, it is necessary to safely store and manage the vaccination history for vaccinated people, as well as provide only the minimal information for the requested purpose, not in the form of all or nothing, to the institution requesting vaccination personal information. This paper proposes a scheme to safely store and manage the people's vaccination records in a non-forgeable blockchain, and to ensure that users provide only the minimal information necessary to the verifier from their vaccination personal information. A user authorizes the verifier to access the information he has consented with by entering the fingerprint on his smartphone, and in this process, no personal information or secrets can be exposed to an attacker. In addition, it is guaranteed that it is neither possible to impersonate the user nor to steal user personal information even in the case of theft or loss of the smartphone, or leakage of information from the vaccination history management institution. Using the scheme, users have no fear on external exposure of personal information and follow-up damage due to excessive information provision by giving out only the minimal information suited to the verifier.

A Study on Establishment of Mid- to Long-Term Comprehensive Development Plan for the Bank of Korea Library (시대적 변화에 따른 경제·금융전문도서관 발전 방향 모색에 관한 연구 - 한국은행 도서관을 중심으로 -)

  • Noh, Younghee;Ko, Jae-Min;Chang, Inho;Ro, Ji-Yoon
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.2
    • /
    • pp.65-84
    • /
    • 2021
  • This study aimed to analyze the overall operation status of the Bank of Korea library representing the economic library in Korea, investigate user satisfaction and demand, and to propose a direction for the development of the economic library in the future. To this end, a case study was conducted on changes in the external environment of major libraries at home and abroad, and a user survey was conducted. As a result, the future tasks include introducing smart systems, robotics some library services, non-face-to-face service response spaces that reflect the times, introducing big data analysis services, strengthening user-tailored systems, and activating SNS communication. It proposed developing specialized libraries, online reference and research support services, and providing original DBs for publications to strengthen expertise, maintaining and expanding cloud services, maintaining and expanding cooperative projects, and collecting national knowledge and information.