• 제목/요약/키워드: Information Providing

검색결과 6,799건 처리시간 0.032초

인터넷에서의 아동의 프라이버시 보호와 어머니의 역할 (The Role of Mothers in Children's Privacy Protection on the Internet)

  • 김소라
    • 대한가정학회지
    • /
    • 제46권2호
    • /
    • pp.59-71
    • /
    • 2008
  • The purpose of this study was to discuss the role of mothers in children's privacy protection on the Internet. Specifically, the study explored 1)children's privacy protection efforts on the Internet, 2)types of personal information children provided at Web sites, and 3)the effect of mothers' privacy protection efforts on their children's privacy protection levels. The Internet survey was conducted and total of 153 mothers and their children aged 12-13 were included for statistical analysis. The descriptive statistics and Ordinary Least Squares were used. The results yield that children showed relatively high levels in providing personal information on the Internet, while they have no sufficient competency at privacy protection. The effect of mothers' privacy protection efforts on children's privacy protection was partially supported. The longer hours of Internet use and frequent participation in online events increased the potential consequences of children's privacy invasion. Providing privacy standards for online service providers and marketers targeting children could help protect children's privacy. Moreover, education program targeting parents and children could contribute them reduce potential consequences of children's privacy invasion.

An Energy Efficient Multichannel MAC Protocol for QoS Provisioning in MANETs

  • Kamruzzaman, S.M.;Hamid, Md. Abdul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제5권4호
    • /
    • pp.684-702
    • /
    • 2011
  • This paper proposes a TDMA-based multichannel medium access control (MAC) protocol for QoS provisioning in mobile ad hoc networks (MANETs) that enables nodes to transmit their packets in distributed channels. The IEEE 802.11 standard supports multichannel operation at the physical (PHY) layer but its MAC protocol is designed only for a single channel. The single channel MAC protocol does not work well in multichannel environment because of the multichannel hidden terminal problem. Our proposed protocol enables nodes to utilize multiple channels by switching channels dynamically, thus increasing network throughput. Although each node of this protocol is equipped with only a single transceiver but it solves the multichannel hidden terminal problem using temporal synchronization. The proposed energy efficient multichannel MAC (EM-MAC) protocol takes the advantage of both multiple channels and TDMA, and achieves aggressive power savings by allowing nodes that are not involved in communications to go into power saving "sleep mode". We consider the problem of providing QoS guarantee to nodes as well as to maintain the most efficient use of scarce bandwidth resources. Our scheme improves network throughput and lifetime significantly, especially when the network is highly congested. The simulation results show that our proposed scheme successfully exploits multiple channels and significantly improves network performance by providing QoS guarantee in MANETs.

로테르담규칙상 송하인의 책임에 관한 고찰 (A Study on the Responsibility of Shipper under the Rotterdam Rules)

  • 한낙현;김영곤
    • 무역상무연구
    • /
    • 제53권
    • /
    • pp.101-133
    • /
    • 2012
  • The paper aims to analyse the obligations and Responsibilities of shipper in the Rotterdam Rules. The Rotterdam Rules, has underlying intention that it will provide uniform law for the international carriage of goods by sea. It is highly expected that the Rotterdam Rules will create the new international legal regime replacing Hague-Visby Rules and Hamburg Rules. Rotterdam Rules provide the obligations and responsibilities of shipper in express. The shippers obliged to provide, (a) duty as to the condition in which the cargo has to be delivered to the carrier, (b) cooperation of the shipper and the carrier in providing information and instruction, and (c) shipper's obligation to provide information, instructions and documents. The shipper is liable for loss or damage sustained by the carrier if the carrier proves that such loss or damages was caused by a breach of the shipper's obligations. However, the shipper is relieved of all or part of its liability if the cause or one of the causes of the loss or damage is not attributable to its fault or to the fault. But, the shipper shall indemnify the carrier against loss or damage resulting from the inaccuracy of such information. Rotterdam Rules is providing rather concrete as to the shipper's responsibilities and burden of proof in separate chapter. The question is whether such burden of proof of the fault should be imposed to the shipper.

  • PDF

웹 컨텐츠 선호도 측정을 위한 대용량 웹로그 분석기 구현 (Implementation of big web logs analyzer in estimating preferences for web contents)

  • 최은정;김명주
    • 디지털산업정보학회논문지
    • /
    • 제8권4호
    • /
    • pp.83-90
    • /
    • 2012
  • With the rapid growth of internet infrastructure, World Wide Web is evolving recently into various services such as cloud computing, social network services. It simply go beyond the sharing of information. It started to provide new services such as E-business, remote control or management, providing virtual services, and recently it is evolving into new services such as cloud computing and social network services. These kinds of communications through World Wide Web have been interested in and have developed user-centric customized services rather than providing provider-centric informations. In these environments, it is very important to check and analyze the user requests to a website. Especially, estimating user preferences is most important. For these reasons, analyzing web logs is being done, however, it has limitations that the most of data to analyze are based on page unit statistics. Therefore, it is not enough to evaluate user preferences only by statistics of specific page. Because recent main contents of web page design are being made of media files such as image files, and of dynamic pages utilizing the techniques of CSS, Div, iFrame etc. In this paper, large log analyzer was designed and executed to analyze web server log to estimate web contents preferences of users. With mapreduce which is based on Hadoop, large logs were analyzed and web contents preferences of media files such as image files, sounds and videos were estimated.

경영혁신을 위한 일류시스템 평가구조 및 기준에 대한 연구 (An evaluation structure and criteria of Workflow Management Systems for Business Process Reengineering)

  • 김용우;김진우;문재윤;정철범;한정필
    • 경영과학
    • /
    • 제12권3호
    • /
    • pp.17-44
    • /
    • 1995
  • The changing business environment requires that firms reengineer their fundamental processes in order to retain their competitive advantage. Most Business Proess Reengineering (BPR) projects, however, have failed partly because the essential enabler, ie. information technology, was unable to perpetuate the original vision. The information systems were unable to support the collaboration among the workers participating in the process. Workflow Management Systems (WfMS) have the potential to enhance not only individual performance as did traditional information systems, but also the group performance essential to the success of BPR by providing an effective means of communications through connectivity. It also enhances productivitiy through proceduralization of the fundamental processes, thus making it possible to empower the employee even while it controls the flow, and ultimately the delaly that originally made the BPR effort necessary. Therefore, though it is not a panacea, WfMS's can improve chances for the success of BPR projects. Managers who have realized this are faced with another obstacle - that of selecting the WfMS that best meets the particular organization's needs. This paper provids an evaluation structure of WfMS functions with emphasis on those functions that are essential for BPR, classifying the functions into an attribute hierarchy according to the Analytic Hierarchy Process (AHP) approach. It also suggests specific evaluation criteria for the main workflow functions provided by most vendors today, thus providing managers with a comprehensive guideline to facilitate the decision process.

  • PDF

인터넷 서비스 기반의 선체외판 가공 연구 (Curved Hull Plate Forming based on SOAP Internet Services)

  • 김찬석;손승혁;신종계;이필립
    • 대한조선학회논문집
    • /
    • 제53권1호
    • /
    • pp.69-75
    • /
    • 2016
  • Fabrication of the hull plate demands a lot of man-hour and a high degree of technology. In recent years, commercial shipping orders have been fallen because of intensifying competition with low price of order and labor cost. In order to solve this problem, a countermeasure such as a cost reduction is required. In this study, we are dealing with the method of supplying the forming information of the hull to the production site. We reviewed studies of hull forming that have been proposed so far to develop a method for providing hull forming information. On the basis of given production plans from the production site of shipyard, we discuss how to convert shell plate to production plan. Then, we will discuss the efficiency of the distribution method through the network about the method of hull forming. Thus, we have modified the distribution method which was proposed before. Finally, we will introduce the enhanced method for providing fabrication information of the hull plate to the small and medium-sized shipyards.

지식 추상화 계층을 이용한 근사해 생성 (Providing Approximate Answers Using a Knowledge Abstraction Hierarchy)

  • 허순영;문개현
    • Asia pacific journal of information systems
    • /
    • 제8권1호
    • /
    • pp.43-64
    • /
    • 1998
  • Cooperative query answering is a research effort to develop a fault-tolerant and intelligent database system using the semantic knowledge base constructed from the underlying database. Such knowledge base has two aspects of usage. One is supporting the cooperative query answering process for providing both an exact answer and neighborhood information relevant to a query. The other is supporting ongoing maintenance of the knowledge base for accommodating the changes in the knowledge content and database usage purpose. Existing studies have mostly focused on the cooperative query answering process but paid little attention to the dynamic knowledge base maintenance. This paper proposes a multi-level knowledge representation framework called Knowledge Abstraction Hierarchy(KAH) that can not only support cooperative query answering but also permit dynamic knowledge maintenance, On the basis of the KAH, a knowledge abstraction database is constructed on the relational data model and accommodates diverse knowledge maintenance needs and flexibly facilitates cooperative query answering. In terms of the knowledge maintenance, database operations are discussed for the cases where either the internal contents for a given KAH change or the structures of the KAH itself change. In terms of cooperative query answering, four types of vague queries are discussed, including approximate selection, approximate join, conceptual selection, and conceptual join. A prototype system has been implemented at KAIST and is being tested with a personnel database system to demonstrate the usefulness and practicality of the knowledge abstraction database in ordinary database application systems.

  • PDF

서비스 전달 플랫폼 기반 분산 센서 디바이스 자원 객체 연동 서비스 제공 시스템 연구 (Research on Distributed Sensor Device Resource Object Collaboration Service Providing System based on Service Delivery Platform)

  • 윤장우
    • 전자공학회논문지
    • /
    • 제52권6호
    • /
    • pp.144-150
    • /
    • 2015
  • 본 논문은 분산된 센서 디바이스의 리소스 오브젝트 연동 서비스 제공 시스템에 관한 것으로 서비스 전달 플랫폼을 기반으로 한다. 시스템은 서비스 전달 플랫폼(SDP: Service Delivery Platform)과 프록시로 구성되어 있다. 서비스 전달 플랫폼은 분산된 서비스 기능을 인에이블러로 설정하며 인에이블러들의 조합으로 융합서비스를 생성한다. 또한 생성된 서비스를 분산 환경에서 전달하는 역할을 한다. 프록시는 분산된 디바이스들과 서비스 전달 플랫폼을 연결하도록 설정되며 서비스 전달 플랫폼이 분산된 디바이스를 자원으로 인식하여 인에이블러로 정의할 수 있도록 한다. 개발된 시스템을 통하여 분산된 센서 기능이 인에이블러로 정의되어 일반 서비스 기능과 동일한 형태로 융합서비스의 생성 및 전달에 사용될 수 있다.

상황인식기반지능형 홈 서비스에 관한 연구 (A Method for Providing of Intelligent Home Services based on Context Awareness)

  • 노영식;변영철
    • 한국정보통신학회논문지
    • /
    • 제11권4호
    • /
    • pp.678-686
    • /
    • 2007
  • 유비쿼터스 서비스는 사용자 및 주변의 상황(context) 정보를 능동적으로 인식하여 사용자에게 제공되는 차별화된 고품질의 서비스로서, 이를 구현하기 위한 핵심 기술 중의 하나가 상황인지 미들웨어 기술이다. 본 논문에서는 일정 한 사용자 공간에서 유비쿼터스 서비스를 효과적으로 제공할 수 있는 방법에 대하여 제안한다. 즉, 다양한 센서로부터 상황 정보를 입력받아 현재의 상황에 적절한 서비스를 추론하여 결정하고 이를 사용자에게 제공하는 상황인식기반 지능형 홈서비스 미들웨어를 설계하고 구현한다.

Trust based Secure Reliable Route Discovery in Wireless Mesh Networks

  • Navmani, TM;Yogesh, P
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권7호
    • /
    • pp.3386-3411
    • /
    • 2019
  • Secured and reliable routing is a crucial factor for improving the performance of Wireless Mesh Networks (WMN) since these networks are susceptible to many types of attacks. The existing assumption about the internal nodes in wireless mesh networks is that they cooperate well during the forwarding of packets all the time. However, it is not always true due to the presence of malicious and mistrustful nodes. Hence, it is essential to establish a secure, reliable and stable route between a source node and a destination node in WMN. In this paper, a trust based secure routing algorithm is proposed for enhancing security and reliability of WMN, which contains cross layer and subject logic based reliable reputation scheme with security tag model for providing effective secured routing. This model uses only the trusted nodes with the forwarding reliability of data transmission and it isolates the malicious nodes from the providing path. Moreover, every node in this model is assigned with a security tag that is used for efficient authentication. Thus, by combining authentication, trust and subject logic, the proposed approach is capable of choosing the trusted nodes effectively to participate in forwarding the packets of trustful peer nodes successfully. The simulation results obtained from this work show that the proposed routing protocol provides optimal network performance in terms of security and packet delivery ratio.