• Title/Summary/Keyword: Internet Uses

Search Result 1,473, Processing Time 0.026 seconds

A Determination of the Factors Contributing to Internet Banking (인터넷뱅킹 요인 결정에 대한 연구)

  • John, Yongjean
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.137-144
    • /
    • 2012
  • Seventeen domestic banks, Hongkong & Shanghai Banking Corporation Ltd. and Korea Post provide their subscribers with banking services such as statement service, funds transfer, and application for loans through Internet banking sites, which have become ever-increasing banking services for individual and corporation and government subscribers. First, this study aimed at presenting a process of determining factors to measure customers' perception while using Internet banking for doing transactions. Secondly, this paper attempted to unveil a list of major factors that Internet banking customers perceive while accessing the web sites to do their business with their banks. This study also suggested the features of those factors, which would help improve our understanding of Web usage for Internet banking. This result of the paper will lead further understanding of factors associated with Internet uses in other economic activities, which enable practitioners such as web designers and security specialists to provide Internet banking subscribers with better services in a safe and convenient web pages.

Mechanism of China's Internet Regulation (중국의 인터넷 통제 메커니즘)

  • Kim, Jin Yong
    • Informatization Policy
    • /
    • v.20 no.1
    • /
    • pp.61-84
    • /
    • 2013
  • This article examines how the Chinese government blocks the inflow of undesirable information, focusing on the technical aspect of the control mechanism. Unlike Cuba and North Korea, which regulate the whole Internet, China uses both state-of-the-art technological supervision and labor-intensive physical control due to economic reasons in order to prepare for actors who can threaten the Communist party. The Chinese government will not overlook the inflow of information which can be the link between demonstrations and democratization. This is because stronger protests utilizing information technology will trigger the Chinese government's flexible control based on large scale violation and technology. In this article, we first review the concept of universal internet control involved in internet regulation in nations, and then focus on China's internet censorship and its regulatory control from the '90s to the present. Finally, we analyze how the Chinese government actively controls the internet access by utilizing the relationship dynamics between the central and local governments, depending on protest issue. This thesis will assume that it is difficult for China to become democratized due to its information interception, and search how the government manages the internet.

  • PDF

Route Optimization Scheme in Nested NEMO Environment based on Prefix Delegation (프리픽스 할당에 기반한 중첩된 NEMO 환경에서의 경로최적화 기법)

  • Rho, Kyung-Taeg;Kang, Jeong-Jin
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.5
    • /
    • pp.95-103
    • /
    • 2008
  • The Network Mobility (NEMO) basic support protocol extends the operation of Mobile IPv6 to provide uninterrupted Internet connectivity to the communicating nodes of mobile networks. The protocol is not efficient to offer delays in data delivery and higher overheads in the case of nested mobile networks because it uses fairly sub-optimal routing and multiple encapsulation of data packets. In this paper, our scheme combining Hierarchical Mobile IPv6 (HMIPv6) functionality and Hierarchical Prefix Delegation (HPD) protocol for IPv6, which provide more effective route optimization and reduce packet header overhead and the burden of location registration for handoff. The scheme also uses hierarchical mobile network prefix (HMNP) assignment and tree-based routing mechanism to allocate the location address of mobile network nodes (MNNs) and support micro-mobility and intra-domain data communication. The performance is evaluated using NS-2.

  • PDF

Multi-View Video Coding Using Illumination Change-Adaptive Motion Estimation and 2D Direct Mode (조명변화에 적응적인 움직임 검색 기법과 2차원 다이렉트 모드를 사용한 다시점 비디오 부호화)

  • Lee, Yung Ki;Hur, Jae Ho;Lee, Yung Lyul
    • Journal of Broadcast Engineering
    • /
    • v.10 no.3
    • /
    • pp.321-327
    • /
    • 2005
  • A MVC (Multi-view Video Coding) method, which uses both an illumination change-adaptive ME (Motion Estimation)/DC (Motion Compensation) and a 2D (Dimensional) direct mode, is proposed. Firstly, a new SAD (Sum of Absolute Difference) measure for ME/MC is proposed to compensate the Luma pixel value changes for spatio-temporal motion vector prediction. Illumination change-adaptive (ICA) ME/MC uses the new SAD to improve both MV (Motion Vector) accuracy and bit saving. Secondly, The proposed 2D direct mode that can be used in inter-view prediction is an extended version of the temporal direct mode in MPEG-4 AVC. The proposed MVC method obtains approximately 0.8dB PSNR (Peak Signal-to-Noise Ratio) increment compared with the MPEG-4 AVC simulcast coding.

A Structure on Classification Service System of Internet Documents (인터넷 문서의 자동분류 서비스 시스템에 관한 구현)

  • Hwang Sung-Ha;Choi Kwang-Nam;Lee Dae-Kyu;Lee Sang-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2005.11a
    • /
    • pp.66-71
    • /
    • 2005
  • Using for the internet information is easy or difficult. The effort to obtain the useful information is developed the various technique such as search as well as the information repository, classification, processing and the utilization. Specially, such developments are remarkable to the Agent of various uses and the classification, conversion in processing techniques. The study introduces the classification service system of internet documents which is processing from the repository of internet information to the automatic classification and search service.

  • PDF

The Analysis of Random Propagating Worms using Network Bandwidth

  • Ko, Kwang-Sun;Jang, Hyun-Su;Park, Byuong-Woon;Eom, Young-Ik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.2
    • /
    • pp.191-204
    • /
    • 2010
  • There is a well-defined propagation model, named the random constant spread (RCS) model, which explains worms that spread their clones with a random scanning strategy. This model uses the number of infected hosts in a domain as a factor in the worms' propagation. However, there are difficulties in explaining the characteristics of new Internet worms because they have several considerable new features: the denial of service by network saturation, the utilization of a faster scanning strategy, a smaller size in the worm's propagation packet, and to cause maximum damage before human-mediated responses are possible. Therefore, more effective factors are required instead of the number of infected hosts. In this paper, the network bandwidth usage rate is found to be an effective factor that explains the propagations of the new Internet worms with the random scanning strategy. The analysis and simulation results are presented using this factor. The simulation results show that the scan rate is more sensitive than the propagation packet for detecting worms' propagations.

The Role of Subjective Well Bing in Internet Continuance (인터넷의 지속적 이용에 있어서 주관적안녕감의 역할)

  • Kwon, Soon-Jae
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2009.11a
    • /
    • pp.73-82
    • /
    • 2009
  • Although the Internet has been a important communication tool in modern societies, researchers did not pay attention to its' positive impacts on individual's psychological process. The Internet provides users with a unique environment such as visual isolation, non face-to-face communication, and easiness to escape from social influences. This environment enables people to take free action according to their personality and disclose themselves. From the uses and gratification perspective, the current research reveals that individuals with high extraversion are inclined to maintain social networking sites and those with high openness participate in web communities. The findings indicate that individuals' social use of the Internet may reflect their personality. To fill the research void like this, this study proposes a new research model in which well bing as well as perceived value are positively linked to satisfaction and continuance to use. The statistical results obtained by applying PLS to the valid 150 questionnaires showed that the well bing has stronger positive influence on satisfaction and continuance to use than the perceived value. Therefore, a practical implication is suggested that the web site need to be designed in a way of arousing users' well bing more strongly.

  • PDF

Security Architecture and Authentication Protocol in Portable Internet (휴대인터넷의 보안 구조 및 인증 프로토콜)

  • Lee, Ji-Yong;Choo, Yeon-Seong;Ahn, Jeong-Cheol;Ryu, Dae-Hyeon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.872-875
    • /
    • 2005
  • Portable Internet extended from wireless LAN has a large cell size, similar to a wireless mobile communication, and can provides the seamless service which offers middle-low speed mobility. IEEE 802.16e, the international standard of Portable Internet, uses PKMv2(Privacy Key Management) protocol for authorization and key exchange between a MSS(Mobile Subscriber Station) and a BS(Base Station). This paper first reviews and studies overall security architecture of TTA HPi standard and IEEE 802.16e which supports mobility based on WMAN(Wireless Metropolitan Area Network) standard(IEEE 802.16)

  • PDF

A Credit Card based Authentication and Key Exchange Protocol for Mobile Internet (무선 인터넷을 위한 신용카드 기반의 인증 및 키 교환 프로토콜)

  • 이현주;이충세
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1732-1742
    • /
    • 2003
  • WPP protocol based a Credit card payment in mobile Internet uses WTLS which is security protocol of WAP. WTLS can't provide End­to­End security in network. In this paper, we propose a protocol both independent in mobile Internet platform and allow a security between user and VASP using Mobile Gateway in AIP. In particular, our proposed protocol is suitable in mobile Internet, since session key for authentication and initial payment process is generated using Weil Diffie­Hellman key exchange method that use additive group algorithm on elliptic curve.

IFTTT-based smart home service remote control design (IFTTT 기반의 스마트홈 서비스 리모컨 설계)

  • Kwon, Dong-hyeon;Lim, Ji-yong;Heo, Sung-uk;Oh, Am-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.267-269
    • /
    • 2017
  • As the Internet technology of things is developed, a variety of things Internet devices are emerging. Manufacturers of such Internet devices are registering with the IFTTT to control the device so that the user can use the service. However, most object Internet devices are controlled by smartphone applications, so when a manufacturer uses different devices, many applications should be installed and used. In this paper, we design a smart home service remote control that can control various smart home devices in cooperation with IFTTT automated service platform.

  • PDF