• Title/Summary/Keyword: Internet Applications

Search Result 2,462, Processing Time 0.03 seconds

Evaluating Internet Pricing Schemes: A Three-Dimensional Visual Model

  • Nguyen, Thuy T.T.;Armitage, Grenville J.
    • ETRI Journal
    • /
    • v.27 no.1
    • /
    • pp.64-74
    • /
    • 2005
  • Traditional Internet pricing schemes are coming under continual pressure to adapt to, and encourage, a changing mix of Internet applications and consumer usage patterns. Much research effort over the last decade has been focused on developing more efficient and attractive charging schemes. However, none of the proposed models has been widely deployed. This raises questions regarding the inhibiting factors and missing pieces that make pricing the Internet such a challenge. In this paper, we discuss the problems with current Internet pricing schemes, review the history of Internet pricing research over the last ten years, and summarize the key features and motivations of the most significant models. We develop a novel visual approach to comparing and evaluating such schemes using a three-dimensional (3D) metric encompassing technical efficiency, economic efficiency, and social impact. We address and discuss the important factors that have inhibited the deployment of the reviewed models and suggest productive areas of focus for future Internet pricing research.

  • PDF

The Relationship between the Formation of Internet Community and Marketing Performances : The Mediating Role of Trust and Commitment (인터넷 커뮤니티의 형성과 마케팅 성과간의 관계에 있어서 신뢰와 몰입의 매개역할)

  • 송인암;김태근;조현래
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.125-148
    • /
    • 2004
  • It is quite sure that e-commerce through internet has significant impacts on consumer behavior and marketing activities as well. In this context, the concept of 'Internet Community' has been emerged and highlighted in consumer marketing. Internet community means social relationships and linkages which can be established through continuous and iterative internet-mediated communications among people with homogeneous interests and concerns. It has been a current trend to exchange product information among consumers by forming internet communities, which would affect sales performance directly or indirectly. It, therefore, is necessary to study the community's behavior and its impact on its marketing performance. This article focuses on the following points : ① the structural concept and factors of forming traditional consumer community and internet community : ② the role of trust and commitment as mediating variables between the internet community formation and marketing performance : ③ the performance and implications of the internet community on marketing.

  • PDF

A Data-Mining Model to Support new Customer Acquisition for Internet Telephony(VoIP) (인터넷전화(VoIP)의 신규고객 유치를 지원하는 데이터마이닝 모델)

  • Ha, Sung-Ho;Yang, Jeong-Won;Song, Young-Mi
    • Journal of Information Technology Applications and Management
    • /
    • v.17 no.2
    • /
    • pp.133-154
    • /
    • 2010
  • Recently, Internet Telephony has become increasingly popular in telecommunication industry. However, previous research on Internet Telephony has focused on analyzing specific Internet Telephonysolutions, identifyingthe Internet Telephony movement itself. The research on prediction models about Internet Telephony adoption has been minimal. The main propose of this study is to develop models for predicting transition intention from using traditional telephones to using Internet Telephony. To do so, this study uses data mining methods to analyze demands in the IT communications market and to provide management strategies for Internet telephony providers. Especially this study uses discriminant analysis, logistic regression, classification tree, and neural nets to develop those prediction models toward Internet Telephony adoption. The models are compared with each other and a superior model is chosen.

  • PDF

A New Class-Based Traffic Queue Management Algorithm in the Internet

  • Zhu, Ye
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.3 no.6
    • /
    • pp.575-596
    • /
    • 2009
  • Facing limited network resources such as bandwidth and processing capability, the Internet will have congestion from time to time. In this paper, we propose a scheme to maximize the total utility offered by the network to the end user during congested times. We believe the only way to achieve our goal is to make the scheme application-aware, that is, to take advantage of the characteristics of the application. To make our scheme scalable, it is designed to be class-based. Traffic from applications with similar characteristics is classified into the same class. We adopted the RED queue management mechanism to adaptively control the traffic belonging to the same class. To achieve the optimal utility, the traffic belonging to different classes should be controlled differently. By adjusting link bandwidth assignments of different classes, the scheme can achieve the goal and adapt to the changes of dynamical incoming traffic. We use the control theoretical approach to analyze our scheme. In this paper, we focus on optimizing the control on two types of traffic flows: TCP and Simple UDP (SUDP, modeling audio or video applications based on UDP). We derive the differential equations to model the dynamics of SUDP traffic flows and drive stability conditions for the system with both SUDP and TCP traffic flows. In our study, we also find analytical results on the TCP traffic stable point are not accurate, so we derived new formulas on the TCP traffic stable point. We verified the proposed scheme with extensive NS2 simulations.

A Cross-National Study on the Determinants of Trust in Internet Shopping Mall : Focusing on Korean and Chinese Users (인터넷 쇼핑몰의 신뢰 결정요인에 관한 국가 간 비교 연구 : 한국.중국 이용자를 대상으로)

  • Jung, Chul-Ho;Chung, Young-Su
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2007.05a
    • /
    • pp.321-349
    • /
    • 2007
  • The objective of this study is to investigate factors influencing trust on internet shopping mall and to examine whether these factors on trust have differences between Korean and Chinese users. Based on the literature reviews, this study employs six factors in two groups of influencing factors, web-site characteristics and individual characteristics as key determinants of trust in internet shopping mall. Analysis of 470 responses (Korean: 320 users, Chinese: 150 users) of survey questionnaire indicates the following: In terms of the relationship between web-site characteristics factors and the trust, the results showed clear differences between Korean and Chinese samples. For the Korean samples, transaction security and interactivity were the only significant influencing factors. For the Chinese samples, perceived reputation and perceived size were the only significant factors. In terms of individual characteristics factors, the influencing factors were found identical for the samples. Both propensity to trust and familiarity were significant factors in both Korean and Chinese samples. Based on the findings, managerial implications are discussed in building user trust in internet shopping mall in Korean and Chinese market.

  • PDF

A Fault-Tolerant Mobile Agent Framework and Replication Study for Internet Applications (인터넷 응용을 위한 고장 감내 이동 에이전트 프레임워크와 레플리케이션 연구)

  • Park, Kyeong-mo
    • The KIPS Transactions:PartA
    • /
    • v.10A no.6
    • /
    • pp.701-708
    • /
    • 2003
  • This paper addresses the issue involved in dependability of distributed mobile agents in the Internet environment. We propose an architectural framework for the Internet applications making mobile agents into fault-tolerant. The replication of agents and data is of great importance to achieve fault tolerance in distributed systems over the Internet. This research focuses on the replication component for the proposed fault-tolerant mobile agent framework. We present and analyze the performance results obtained when doing simulation study on the effects of the degree of replication, the active and passive replication strategies, and the replication scale.

An Empirical Study on the Determinants of Trust in Internet Shopping Mall : The Comparison of Korean and Chinese Users (인터넷 쇼핑몰의 신뢰 결정요인에 관한 실증연구 : 한.중국 이용자 비교 분석)

  • Jung, Chul-Ho;Chung, Young-Soo
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2006.06a
    • /
    • pp.437-462
    • /
    • 2006
  • The objective of this study is to investigate what factors influence a major role in building trust on Internet shopping mall and to examine whether these factors on trust have differences between Korean and Chinese users. Based on relevant literature review, this study posits six factors of transaction security, perceived reputation, Perceived size, interactivity, propensity of trust, and familiarity as key determinants of trust in internet shopping mall. Analysis of 470 responses(Korean: 320 users, Chinese: 150 users) of survey questionnaire indicates the following; First, in terms of the relationship between influencing factors and the trust, five factors of transaction security, perceived reputation, perceived size, interactivity, and propensity to trust have a significant positive effects on the trust. Second, the differences between Korean and Chinese users are transaction security, perceived size, and familiarity. In conclusions, we suggested the factors to create user trust in internet shopping mall. Also we suggested differences in the determinant factors between Korean and Chinese users, and discussed some policies to build the trust in each user types.

  • PDF

Key-based dynamic S-Box approach for PRESENT lightweight block cipher

  • Yogaraja CA;Sheela Shobana Rani K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.12
    • /
    • pp.3398-3415
    • /
    • 2023
  • Internet-of-Things (IoT) is an emerging technology that interconnects millions of small devices to enable communication between the devices. It is heavily deployed across small scale to large scale industries because of its wide range of applications. These devices are very capable of transferring data over the internet including critical data in few applications. Such data is exposed to various security threats and thereby raises privacy-related concerns. Even devices can be compromised by the attacker. Modern cryptographic algorithms running on traditional machines provide authentication, confidentiality, integrity, and non-repudiation in an easy manner. IoT devices have numerous constraints related to memory, storage, processors, operating systems and power. Researchers have proposed several hardware and software implementations for addressing security attacks in lightweight encryption mechanism. Several works have made on lightweight block ciphers for improving the confidentiality by means of providing security level against cryptanalysis techniques. With the advances in the cipher breaking techniques, it is important to increase the security level to much higher. This paper, focuses on securing the critical data that is being transmitted over the internet by PRESENT using key-based dynamic S-Box. Security analysis of the proposed algorithm against other lightweight block cipher shows a significant improvement against linear and differential attacks, biclique attack and avalanche effect. A novel key-based dynamic S-Box approach for PRESENT strongly withstands cryptanalytic attacks in the IoT Network.

A Resource Management Scheme Based on Live Migrations for Mobility Support in Edge-Based Fog Computing Environments (에지 기반 포그 컴퓨팅 환경에서 이동성 지원을 위한 라이브 마이그레이션 기반 자원 관리 기법)

  • Lim, JongBeom
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.4
    • /
    • pp.163-168
    • /
    • 2022
  • As cloud computing and the Internet of things are getting popular, the number of devices in the Internet of things computing environments is increasing. In addition, there exist various Internet-based applications, such as home automation and healthcare. In turn, existing studies explored the quality of service, such as downtime and reliability of tasks for Internet of things applications. To enhance the quality of service of Internet of things applications, cloud-fog computing (combining cloud computing and edge computing) can be used for offloading burdens from the central cloud server to edge servers. However, when devices inherit the mobility property, continuity and the quality of service of Internet of things applications can be reduced. In this paper, we propose a resource management scheme based on live migrations for mobility support in edge-based fog computing environments. The proposed resource management algorithm is based on the mobility direction and pace to predict the expected position, and migrates tasks to the target edge server. The performance results show that our proposed resource management algorithm improves the reliability of tasks and reduces downtime of services.

Perceived Trustworthiness of the Internet Merchant and Consumer자s Psychological Factors Influencing Consumer Trust in Internet Shopping (인터넷쇼핑에 대한 소비자신뢰에 인터넷쇼핑몰의 지각된 특성과 소비자의 심리적 특성이 미치는 영향)

  • 이용균
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.101-124
    • /
    • 2004
  • The exponential growth of the Internet has been the advent of buying and selling products and services over the Internet. In Korea, electronic commerce including Internet commerce reached a ₩6,534 billion industry in the year 2002. This paper presents the importance of understanding and managing consumer trust to sellers succeed in Internet commerce. We tested a trust model that includes seller's trustworthiness-based factors and consumer's personality-based factors. We found that seller's trustworthiness-based factors lead to greater consumer trust in Internet shopping through the consumer's perceptions about integrity, benevolence, reputation, and size, but consumer's personality-based factors containing five traits, extraversion, agreeableness, conscientiousness, openness, and trust propensity, have not a significant effect on consumer trust. We also confirmed a positive relationship between consumer trust in Internet shopping and consumer intention to buy.

  • PDF