• Title/Summary/Keyword: Interface Security

Search Result 374, Processing Time 0.019 seconds

Menu Layout for Touch-screen Phones Based on Various Grip Postures (다양한 파지 방법에 따른 터치스크린 폰 메뉴 레이아웃에 관한 연구)

  • Cho, Sung-Il;Park, Sung-Joon;Jung, Eui-S.;Im, Young-Jae;Choe, Jea-Ho
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.36 no.1
    • /
    • pp.52-58
    • /
    • 2010
  • The level of competition has reached the limits in cellular phone market and the cellular phone manufacture companies started to focus their solution in user interface. Design issues with controllability led the development and renovation of such products to the use of the touch-screen phone. Depending upon the readability, technical advances, portability and controllability, user satisfaction of touch-screen phones could vary significantly. In this research, the controllability was dealt in regard to various grip postures, in order to improve menu layout which fits for using the thumbs of both hands and a thumbs of single hand. Regression models are found to the suggest the location of buttons on the screen by redesigning the menu layout, it is expected to improve both controllability and satisfaction of the user. This result can be applicable not only to mobile phone design, but also to the design of various hand-held devices using a touch screen.

Design and Implementation of a Web based Mail Agent System using Service Engine (서비스 엔진을 이용한 웹 기반 메일 에이전트 시스템의 설계 및 구현)

  • Im, Yang-Won;Gwon, Gi-Hun;Im, Han-Gyu
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2S
    • /
    • pp.608-620
    • /
    • 2000
  • A web based E-mail system consists of serves which supply mail accounts and service, and clients which take part of interfacing with users. The web browsers such as Netscape Navigator and Internet Explorer are the popular clients. Users who cannot afford to get an E-mail id in general mail servers are, therefore, able to reach a e-mailing service in the web environment by using client programs in connection with a mail server. Although the quality of service has been upgraded a lot in recent days, it doesn't provide with satisfactory services anymore. In this paper, we intend to design a mail agent system based on the web environment. Through this system we could reach a convenient user interface based on Internet Explorer and could easily access administratory environment on the basis of NT Server 4.0. Using the service engine dominent in mail agent system, it could provide with convenient user interfacing tools like responding the absence of users, mail filtering and refusing messages, etc. And it would ultimately make possible a constant system security, by preventing system failure phenomena caused by extraordinary uses beyond its capability.

  • PDF

Influence on the Use Intention of Alipay Payment Service by Chinese Tourists Visiting Korea

  • HE, Ming-Guang;KIM, Hwa-Kyung;LEE, Jong-Ho
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.11
    • /
    • pp.7-13
    • /
    • 2019
  • Purpose: In the past, the South Korean government made various efforts to attract Chinese tourists, resulting in gradually more inbound tourists. In 2016, the number of Chinese tourists to South Korea peaked at 8.06 million and became the top source market. Nevertheless, increasing numbers of consumers choose to adopt the mobile payment tool instead of cash and credit cards in modern times with developed IT services. Research design, data, and methodology: IBM SPSS AMOS 23.0 and IBM Statistics 23.0 were used to analyze the data, which was collected from hotel employees in China from March 25 to May 10. Results: First, Interactivity, security, convenience, local information supply and user interface had positive effects on satisfaction and reliability. Second, it was believed that the convenience of Alipay played a positive role in increasing reliability and satisfaction through verification. Third, the role of use rate was found to be important in the development of Alipay functions. Conclusions: Based on the result, an analysis on the development of the Alipay market and the use of Alipay in South Korea is warranted. Furthermore, this paper will serve as a basis for flexible strategic plans for the development of Alipay and SMEs in South Korea.

Smart Windows and Doors Platform for Providing Optimized Inner Environment (최적의 실내 환경을 제공하기 위한 스마트 창호 플랫폼)

  • Cho, Yong-Hyun
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.5
    • /
    • pp.464-469
    • /
    • 2015
  • This paper presents the smart system platform for remotely controlling the windows and doors system(WDS), which gathers and analyzes the state of WDS and the environmental data for preventing crimes and keeping a pleasant indoor. In particular, standard API between the smart WDS platform and the smart home platform has been presented to be easy to a home services, such as security, safety, and home appliance control. The private gateway of wire and wireless communication interfaces has been developed to remotely control and monitor the WDS for anytime and anyplace solving the crime prevention and ventilation problem. Web-and App-based user interface in order to detect the opening and shutting states and remotely control WDS have also been developed to support the mobile environment, respectively.

Analysis and New Agenda of e-Government program (전자정부의 의의와 추진실적 및 향후 과제)

  • HwangBo, Yeoul
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.3 no.1
    • /
    • pp.141-158
    • /
    • 2003
  • This paper examines new phenomenon and transformation that arise from the expansion of knowledge-based economy, envisions the meaning of e-government through comparing traditional administration with new governance, formulates the e-government model, and presents a direction for next e-government for the conclusion. These new phenomenon include a transformation to product and service convergence model, cyber sovereignty dilemma, privacy and information security threats, and various others. Also, there is a gradual transformation from government-oriented administrative approach to a new governance model that strengthens the role of NGO. And, e-government must work together to realize this new governance ideology. New e-government must be transformed where government and citizens can implement and manage e-government together. Therefore, expanding applications of Public Key Infrastructure (PKI) technologies, promotion of e-Democracy, and improvement of user interface to improve usability must be emphasized.

The Design and Implementation of Library for RTOS Q+ (실시간 운영체제 Q+를 위한 라이브러리 설계 및 구현)

  • Kim, Do-Hyeong;Park, Seung-Min
    • The KIPS Transactions:PartD
    • /
    • v.9D no.1
    • /
    • pp.153-160
    • /
    • 2002
  • This paper describes the design and implementation of library for real-time operating system Q+, that was developed for the internet appliance. The library in the real-time operating system should be defined according to the standard interface and support the functions that are adequate to the real-time application. To ensure the compatibility between application programs, the Q+ library follows industrial and international standards, such as POSIX.1, ISO 7942 GKS. And, to support the Q+ application, library provides C standard functions, graphic/window functions, network functions, security support functions, file system functions. The Q+ library was implemented using the Q+ kernel, Digital TV set-top box, and KBUG debugging tool.

A Study on the Wireless Door Lock System with Advanced Encryption Standard(AES) in Design (암호화기술을 적용한 무선 도어락시스템 디자인에 대한 연구)

  • 유보현
    • Archives of design research
    • /
    • v.17 no.1
    • /
    • pp.179-190
    • /
    • 2004
  • The human effort to make personal privacy and safety from outer environment has brought the improvement of security system through the technological development. Especially as a apartment dwelling and lifestyle is general, the role and function of door lock system is more important than ever. The research for user-centered approach and design on the door lock system should be implemented under the circumstances. This study has focused on the development of making safety as well as easy interface to design door lock system. The price also is competitive as compared with other door lock products. The goal of this study is to propose the alternatives not only to develop door lock design but also to search the innovative way of locking system design.

  • PDF

A Forgery detection protocol for protection of mobile agent execution results (이동 에이전트 수행 결과에 대한 부정 검출 프로토콜)

  • Kim, Hee-Yeon;Shin, Jung-Hwa;Shin, Weon;Rhee, Kyung-Hyune
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.517-522
    • /
    • 2002
  • Mobile agent systems offer a new paradigm for distributed computation and a one of solution for limitation of existent Client-server model. Mobile agent systems provide interface that can migrate from host to host in a heterogenous network. For secure execution, it must solve security problem of mobile code before. In this paper, we are propose the protocol that applied signature technique and hash chain technique. This protocol enable one to offer forward integrity, non-repudiation, and forgery detection, when mobile agents are perform the task by migrating a network.

A Comparative Study of Internet Banking Satisfaction Model in South Korea and Indonesia

  • Wati, Yulia;Koo, Chul-Mo
    • Asia pacific journal of information systems
    • /
    • v.19 no.4
    • /
    • pp.1-28
    • /
    • 2009
  • Banking industries have continuously innovated through technology-enhanced products and services. Many studies have recognized the importance of the Internet in banking industries, arguing that it has been widely adopted. Many studies published on the Internet banking in specific countries are mostly related with such issues as internet banking adoption and acceptance, security and risks of online banking system, and interface design. Several studies have been done to examine the differences and similarities between other banking channels and the Internet banking. However, to the best of our knowledge, only a limited number of studies has examined the differences and similarities between two specific countries in order to create a new customer satisfaction model. In this research, we studied the internet banking satisfaction model by comparing two countries: South Korea and Indonesia. We conducted an empirical study based on the data collected in both two countries. In this research, we found that countries which have adopted electric banking services, particularly between a country with high ICT adoption and a country with low ICT adoption, show different satisfaction trends. Based on the study results, herein we provide discussion, managerial, and practical implications.

Development of Outage Data Management System to Calculate the Probability for KEPCO Transmission Systems (한전계통의 송전망 고장확률 산정을 위한 상정고장 DB 관리시스텀(ezCas) 개발)

  • Cha S. T.;Jeon D. H.;Kim T. K.;Jeon M. R.;Choo J. B.;Kim J. O.;Lee S .H
    • Proceedings of the KIEE Conference
    • /
    • summer
    • /
    • pp.88-90
    • /
    • 2004
  • Data are a critical utility asset. Collecting correct data on site leads to accurate information. Data, when gathered with foresight & properly formatted, are useful to both existing database and easily transferable to newer, more comprehensive historical outage data. However, when investigating data items options, the task, can be an arduous one, often requiring the efforts of entire committees. This paper firstly discusses the KEPCO's past 10 years of historical outage data which include meterological data, and also by several elements of the National Weather Service, failure rate, outage duration, and probability classification, etc. Then, these collected data are automatically stored in an Outage Data Management System (ODMS), which allows for easy access and display. ODMS has a straight-forward and easy-to-use interface. It lets you to navigate through modules very easily and allows insertion, deletion or editing of data. In particular, this will further provide the KEPCO that not only helps with probabilistic security assessment but also provides a platform for future development of Probability Estimation Program (PEP).

  • PDF