• Title/Summary/Keyword: Future internet

Search Result 2,243, Processing Time 0.031 seconds

A Study on the Effects of Internet to Assist Collection Management of Library in the Computer Mediated Communication (컴퓨터 매개 커뮤니케이션 환경에서 인터넷이 도서관 장서관리에 미치는 영향 분석)

  • 문경화;남태우
    • Journal of the Korean Society for information Management
    • /
    • v.16 no.4
    • /
    • pp.7-36
    • /
    • 1999
  • In this paper, we have studied the technical contribution of internet as a computer mediated communication(CMC) tool for collection management. A new communication process is appearing due to the development of information technology and telecommunications technology which enable users to have an access to information without the help of librarian. Also, internet makes collection management possible in the absence of vendors. This study found out that internet reinforces the traditional functions of collection management and enables librarians to better perform their roles. The future library manager should become actively involved in the development of technology in order to manage resources of internet focusing on the needs of user. Also, we have concluded that collection management should be modernized and transformed with its emphasis on the new evaluation method and assessment of quality when offering resources of internet in the communication process using computers.

  • PDF

A Study on active use of Daily Hanbok through sales on The Internet (인터넷 판매를 통한 생활한복의 활성화 연구)

  • 소현정;심화진
    • Journal of the Korean Society of Costume
    • /
    • v.50 no.4
    • /
    • pp.181-195
    • /
    • 2000
  • This study was conducted from Sep., 1999. to Nov., 1999. It researched approximately 60 specialized manufacturers who had homepages on the Internet. Of the 60 manufacturers, 20 of them were chosen for the study all of whom had relatively were made homepages that were geared towards sales. 1. Daily Hanboks on the homepages were put in an electronic catalog. They were photographed and well described. Each picture could be enlarged when needed. 2. The Hanbok's were made for men, women and children. There were every couple's Hanboks. The Hanboks used natural material, mixed spinning and chemical textile, which was easily kept and washed. It was intended, as clothes for everyday wear Silk was used for formal clothes. 3. The prices ranged from low-middle to high clothing for everyday life is reasonable and street wear and formal dresses are priced high. The color of the dresses are not vibrant, but natural and light. As Hanboks become more in demand, there will be more choices available. 4. As matter of the sizes shows weakness. In general they use the western size system. The purpose of this study is to show the direction that Hanbok manufacturers may take for the internet sales and for being more active to promote the spread of the dress. This research came to the fellowing conclusion. Even though Hanbok manufacturers operate homepages. it seems that they are not well used. However, many internet shopping malls have been opened and they have put Daily Hanboks into one of their sales categories. The internet malls are getting more active and are expanding more. Therefore the market value of the Hanboks in the future look optimistic. If smaller sized manufacturers of Daily Hanbok's establish cooperative network that have no time and space limit, they can use the strong power of the market as the market development for Daily Hanboks is endless.

  • PDF

The Strategies for Cyber Shopping Mall Business: A Comparative Case Study (사업 기반에 따른 인터넷 종합쇼핑몰 고객전략에 관한 연구)

  • 조남재;정연준;박상혁
    • Journal of Information Technology Application
    • /
    • v.3 no.2
    • /
    • pp.83-102
    • /
    • 2001
  • Internet-based shopping business spread rapidly in Korea. Companies are trying to develop and use various strategic competences. The strategies employed by those companies include activities related to the design of shopping site, market positioning, assistance of purchasing process, payment mechanism, and provision of various consumer services. However, the success of these strategies depends on various environmental factors and internal capability of the companies. In this study, I examined four successful Internet shopping mall companies and compared them to draw useful guidelines for Internet-based intermediary business. These four companies were selected because they are all considered successful by now, but brought different background. We found follows. First, each company tried to economize their own historical and developmental background. All of the selected companies were alike in their focus on the whole Internet user group. Customer needs analysis was performed more systematically. The Importance of customer information and the use of it are not sufficient. Second, Each companies consistently emphasized the importance of market-related activities. Despite the differences in initial states, all companies used similar strategies and had similar focus in target market and products. Conclusively, implications from this research for Internet shopping business can be summarized as follows. First, One of the important future directions for Internet shopping mall business is to broaden target market. Second, the provisions of carefully designed customized services are one success factor. Third, As customer traffic increased, the provision of differential customer service becomes a key success factor.

  • PDF

Development of IoT Service Classification Method based on Service Operation Characteristic (세부 동작 기반 사물인터넷 서비스 분류 기법 개발)

  • Jo, Jeong hoon;Lee, HwaMin;Lee, Dae won
    • Journal of Internet Computing and Services
    • /
    • v.19 no.2
    • /
    • pp.17-26
    • /
    • 2018
  • Recently, through the emergence and convergence of Internet services, the unified Internet of thing(IoT) service platform have been researched. Currently, the IoT service is constructed as an independent system according to the purpose of the service provider, so information exchange and module reuse are impossible among similar services. In this paper, we propose a operation based service classification algorithm for various services in order to provide an environment of unfied Internet platform. In implementation, we classify and cluster more than 100 commercial IoT services. Based on this, we evaluated the performance of the proposed algorithm compared with the K-means algorithm. In order to prevent a single clustering due to the lack of sample groups, we re-cluster them using K-means algorithm. In future study, we will expand existing service sample groups and use the currently implemented classification system on Apache Spark for faster and more massive data processing.

Influences of Internet Shopping Mall Pattern Interactivity on Satisfaction Degree and Recommendation Intention (인터넷쇼핑몰 유형별 상호작용성이 만족도와 추천의도에 미치는 영향)

  • Moon, Jae-Hak
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.1
    • /
    • pp.239-246
    • /
    • 2010
  • This research sees that even interactivities have differences by the types of internet shopping malls and compared and analyzed the interactivities by classifying them into open market and special malls. The research survey was conducted aiming at those who purchased products in Internet shopping malls within the latest 6 months, and, then, a statistical analysis was carried out. The analysis result showed the interactivity in internet shopping malls was deduced as 2 perspectives while it was confirmed that there are differences according to shopping mall types. For open markets, interactivities of both 'between company and customers' and 'between customers and customers' have significant influences on the satisfaction degree. Especially, the interactivity of 'between company and customers' have higher influences on the satisfaction degree. However, for the specialty malls, it was shown that only the interactivity of 'between company and customers' have significant influences on the customer satisfaction degree. Additionally, it was confirmed that the satisfaction degree toward a shopping mall has positive influence even on future recommendation intentions. Such research results confirmed that distinctive strategies which consider the patterns of shopping malls should be applied in order for a company to effectively utilize the interactivity in internet shopping mall markets.

A Study on the Effective in the Internet News site of Banner Advertisement (인터넷 뉴스사이트 배너광고의 표현에 관한 연구)

  • 김문석
    • Archives of design research
    • /
    • v.12 no.2
    • /
    • pp.199-207
    • /
    • 1999
  • The internet technology is sufficient to attract our curiosity and adequate for enterprises to advertise its commercial message very effectively. It is a network that makes the computer be a major media. We have leading concerns in the internet advertisement because we expect that it will be the tool of a chief communication in the future. The banner advertisement in the Internet is considered as an active media. The banner advertisement is greatly various as the effective marketing tool from commercial banner to the personal homepage. Considering to the user's computer environment and Internet environment, this thesis shows what the banner advertisement of the enterprise's marketing and general understanding Influences expressions of the banner advertisement's creative factors and effective methods. It also suggests the analysis about the banner advertisement expression's creative factors. According to the analysis of banner advertisement in the domestic news site, It might be investigated the creative factor's absence and problems in design field.

  • PDF

IoT Environment and Security Countermeasures in 4th Industrial Revolution (4차 산업혁명 시대의 사물인터넷 현황 및 보안 대응책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.195-200
    • /
    • 2019
  • The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security protocol. The spread of things Internet technology is changing our lives a lot. IT companies all over the world are already focusing on products and services based on things Internet, and they are going to the era of all things internet that can communicate not only with electronic devices but also with common objects. People, people, people and objects, things and things interact without limitation of time and space, collecting, analyzing and applying information. Life becomes more and more smart, but on the other hand, the possibility of leakage of personal information becomes greater. Therefore, this study proposed security threats that threaten the protection of personal information and countermeasures, and suggested countermeasures for building a secure IoT environment suitable for the Fourth Industrial Revolution.

Cognitive Virtual Network Embedding Algorithm Based on Weighted Relative Entropy

  • Su, Yuze;Meng, Xiangru;Zhao, Zhiyuan;Li, Zhentao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1845-1865
    • /
    • 2019
  • Current Internet is designed by lots of service providers with different objects and policies which make the direct deployment of radically new architecture and protocols on Internet nearly impossible without reaching a consensus among almost all of them. Network virtualization is proposed to fend off this ossification of Internet architecture and add diversity to the future Internet. As an important part of network virtualization, virtual network embedding (VNE) problem has received more and more attention. In order to solve the problems of large embedding cost, low acceptance ratio (AR) and environmental adaptability in VNE algorithms, cognitive method is introduced to improve the adaptability to the changing environment and a cognitive virtual network embedding algorithm based on weighted relative entropy (WRE-CVNE) is proposed in this paper. At first, the weighted relative entropy (WRE) method is proposed to select the suitable substrate nodes and paths in VNE. In WRE method, the ranking indicators and their weighting coefficients are selected to calculate the node importance and path importance. It is the basic of the WRE-CVNE. In virtual node embedding stage, the WRE method and breadth first search (BFS) algorithm are both used, and the node proximity is introduced into substrate node ranking to achieve the joint topology awareness. Finally, in virtual link embedding stage, the CPU resource balance degree, bandwidth resource balance degree and path hop counts are taken into account. The path importance is calculated based on the WRE method and the suitable substrate path is selected to reduce the resource fragmentation. Simulation results show that the proposed algorithm can significantly improve AR and the long-term average revenue to cost ratio (LTAR/CR) by adjusting the weighting coefficients in VNE stage according to the network environment. We also analyze the impact of weighting coefficient on the performance of the WRE-CVNE. In addition, the adaptability of the WRE-CVNE is researched in three different scenarios and the effectiveness and efficiency of the WRE-CVNE are demonstrated.

Analyzing Effects of PC Competence on Life Satisfaction: Emphasis on Mediating Role of Internet Service Usage (PC 이용능력이 삶의 만족도에 미치는 영향: 인터넷서비스 이용의 매개효과를 중심으로)

  • Kim, Si Hyun;Lee, Kun Chang
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.55-60
    • /
    • 2019
  • It is widely known that farmers and fishermen group is typically alienated from information. In this regards, it has become a national policy to help them get benefits from using PC. Therefore, this study investigates the effects of PC competence on their life satisfaction by using the 2017 report on the digital divide. Especially, we are focused on analyzing mediating role of Internet service usage. Empirical analysis with public database showed that PC competence has a positive effect on life satisfaction. Internet service usage also revealed a mediating role between PC competence and Internet service usage. Implication for policy makers is that government needs to exercise PC competence level of farmers and fishermen, and their ability to utilize Internet service for the sake of improving their life satisfaction level. We recommend future research with hierarchical linear model to measure the effect of regional differences.

Cybersecurity Threats and Countermeasures of the Smart Home Ecosystem

  • Darem, Abdulbasit;Alhashmi, Asma A.;Jemal, H.A.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.3
    • /
    • pp.303-311
    • /
    • 2022
  • The tremendous growth of the Internet of things is unbelievable. Many IoT devices have emerged on the market over the last decade. This has made our everyday life easier inside our homes. The technology used at home has changed significantly over the past several decades, leading to what is known today as the smart home. However, this growth has also brought new challenges to our home security and privacy. With the smart home becoming more mainstream, cybersecurity issues have become a fundamental concern. The smart home is an environment where heterogeneous devices and appliances are interconnected through the Internet of Things (IoT) to provide smart services to residents. These services include home climate control, energy management, video on demand, music on-demand, remote healthcare, remote control, and other similar services in a ubiquitous manner. Smart home devices can be controlled via the Internet using smartphones. However, connecting smart home appliances to wireless networks and the Internet makes individuals vulnerable to malicious attacks. Remote access within the same environment or over the Internet requires an effective access control mechanism. This paper intends to shed light on how smart home devices are working as well as the type of security and privacy threats of the smart home. It also illustrated the types of authentication methods that can be used with smart home devices. In addition, a comparison of Smart home IoT-based security protocols was presented along with a security countermeasure that can be used in a smart home environment. Finally, a few open problems were mentioned as future research directions for researchers.