• Title/Summary/Keyword: Internet-of-Thing

Search Result 221, Processing Time 0.033 seconds

A Effect of Internet Shopping Mall' Perceived Ease of Use and Usefulness on Trust, Satisfaction and Loyalty (인터넷 쇼핑몰의 지각된 이용편리성과 유용성이 신뢰, 만족, 애호도에 미치는 영향)

  • Park Sang-Kyu;Won Gu-Hyun;Ham Hong-Sik
    • Korean Management Science Review
    • /
    • v.22 no.1
    • /
    • pp.83-101
    • /
    • 2005
  • We are going to make clear three things through the examination of the subject of this study. The first thing is to verify whether perceived usefulness and ease of use of usage have positive effects on trust and satisfaction which determine the loyalty of a shopping mall. The second Is to find out the effect of perceived usefulness and ease of use of using internet shopping mall on shopping mall's loyalty through variable intermediation of trust and satisfaction. The third is to emphasize the importance of perceived usefulness and ease of use of using a shopping mall web sites and carrying out a through analyzing path that usefulness and ease of use are intermediated by trust and satisfaction to loyalty. We made a poll to people who had ever used internet shopping mall and got Information. The results are below. The easer internet shopping mail users feel when using shopping mall sites, the more they feel them useful. Perceived usefulness and ease of use of usage have positive effects on trust and satisfaction which are major preceding factors of Internet shopping mall loyalty. The perceived ease of use, trust, and satisfaction intermediate between the perceived ease of use and shopping mall's loyally while users are accepting internet shopping mali. And trust and satisfaction intermediate between the perceived usefulness and shopping mall's loyalty. These results show that the degree of usefulness and feeling easiness in using shopping mall of users should be considered seriously. The only easiness of shopping mall doesn't create shopping mail's loyalty, but, It's created when users acknowledge the usefulness, trust, and satisfy.

CoAP/6LoWPAN-based Smart Home Network system using DTLS (DTLS 보안기술이 적용된 CoAP/6LoWPAN 기반의 스마트 홈네트워크 시스템)

  • Kim, Yeon-Su;Kim, Ki-Tae;Lee, Bo-Kyung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.53-61
    • /
    • 2018
  • Recently, technologies related to the Internet of Things have developed rapidly and research on mobile environment home network systems is actively in progress. The Internet Engineering Task Force (IETF) Working Group proposed the CoAP/6LoWPAN technology as a suitable protocol for internetworking IoT devices with the Internet in a limited environment and adopting it as a standard. However, the existing home network systems hardly include security protocols. IETF recommends DTLS(Datagram Transport Layer Security) on UDP as security protocol suitable for IoT environments. In this paper, smart home network system based on CoAP/6LoWPAN by using DTLS is implemented in mobile environments. The data transfer time is measured according to each procedure of the DTLS protocol and the need to improve DTLS protocol is suggested.

A Study on the Development of Simulation for Make-up Coordination (Make-up Coordination의 Simulation 개발에 관한 연구)

  • 김효숙;강인애
    • Journal of the Korean Home Economics Association
    • /
    • v.39 no.12
    • /
    • pp.65-77
    • /
    • 2001
  • The purpose of this study is to propose development of simulation for make-up coordination by computer graphics and web animation program. In the 20th century, the power of the internet and www has been growing at such a rapid speed and also has provided the possibility of numerous market. Especially the internet marketing of womens products like cosmetics come into the spotlight as the way of sales. Many companies advertise their new products and give useful guidline of make-up technic on the website. So the contents of the website is one of the important thing to lead customer to purchasing. For the reason, this study tries develope a simulation of model in which customer can select their shape of face, color and theme whatever necessary. The model, color, theme palletes were designed by 'PHOTOSHOP 6.0'and the web image of simulation was made by 'FLASH ANIMATION 5.0'. As a result of this study is 1. It can give the chance to customer to make their own image of shape, color and theme through the simulation more speedly and exactly. 2. It can help company to advertise their new products, offer service for customers and lead customers to purchasing. 3. By accummulating the database, it can help to develop educational make-up system.

  • PDF

Development of a Real-time Safest Evacuation Route using Internet of Things and Reinforcement Learning in Case of Fire in a Building (건물 내 화재 발생 시 사물 인터넷과 강화 학습을 활용한 실시간 안전 대피 경로 방안 개발)

  • Ahn, Yusun;Choi, Haneul
    • Journal of the Korean Society of Safety
    • /
    • v.37 no.2
    • /
    • pp.97-105
    • /
    • 2022
  • Human casualties from fires are increasing worldwide. The majority of human deaths occur during the evacuation process, as occupants panic and are unaware of the location of the fire and evacuation routes. Using an Internet of Things (IoT) sensor and reinforcement learning, we propose a method to find the safest evacuation route by considering the fire location, flame speed, occupant position, and walking conditions. The first step is detecting the fire with IoT-based devices. The second step is identifying the occupant's position via a beacon connected to the occupant's mobile phone. In the third step, the collected information, flame speed, and walking conditions are input into the reinforcement learning model to derive the optimal evacuation route. This study makes it possible to provide the safest evacuation route for individual occupants in real time. This study is expected to reduce human casualties caused by fires.

The Construction of Electronic Commerce infra for Bank usin Internet (인터넷에서의 금융권 전자상거래 인프라 구축)

  • 신현호;조범준
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 1999.05a
    • /
    • pp.131-137
    • /
    • 1999
  • In order to operate Internet Banking, there is a important thing to precede, That is to carry out a scheme of one-stop to let clients transact anything they want to buy and establish the preservation of public security system between existing banking networks. (of course, that should be designed handily to the clients). In this paper, the protocol which is determined between banking network and Internet to maintain the preservation of public security. In other words, each XPM(X.25 Packet Manager) is a program to manage both system security and service at each other side; manage all packets which are connected by X.25 protocol. If other condition like law and institution is improved, it will be adopted to real operation with various service. Further more, we tan construct Electronic Commerce and adopt various digital money like electronic coin or check.

  • PDF

The Criteria and Methods for Evaluating of Internet Website Documents (인터넷 웹사이트 문서의 평가 기준 및 방법 - 내용적인 측면을 중심으로 -)

  • Lee Eung-Bong
    • Journal of Korean Library and Information Science Society
    • /
    • v.30 no.1
    • /
    • pp.151-169
    • /
    • 1999
  • The availability and growth of the Internet offers users the opportunity to find information and data all over the world. The development of the WWW has made the Internet easier to use, both for finding information and for publishing it electronically. Because so much information is available, and because that information can appear to be fairly 'anonymous', It is necessary to develop skills to evaluate what you find. Every printed information resources you find has been evaluated in one way or another before you ever see it. But when you are using the WWW, none of this applies. There are no filters between you and Internet. In addition, the ease of constructing Web documents results in information of the widest range of quality, written by authors of the widest range of authority, available on an even playing field Excellent information resources reside along side the most dubious. This study discusses the criteria arid methods by which scholars and researchers in most fields evaluate print information, and shows how the same criteria and methods can be used to assess Internet Website document. This study applied seven criteria, that is essential Web document element, authorship, publishing body, point of view or bias, referral to other sources, verifiability and currency. All information, whether in print or by byte, needs to be evaluated by users for some objective criteria and methods mentioned above. If you find information that is 'too good to be true', it probably is. Never use information that you can't verity. Always remember that the best counterfeit looks the most like the real thing. Establishing and learning criteria and methods to filter information you find on the Internet is a good beginning for becoming a critical consumer of information in all forms.

  • PDF

Secure Configuration Scheme of Pre-shared Key for Lightweight Devices in Internet of Things (사물인터넷의 경량화 장치를 위한 안전한 Pre-shared Key 설정 기술)

  • Kim, Jeongin;Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.1-6
    • /
    • 2015
  • The IoT(Internet of things) technology enable objects around user to be connected with each other for sharing information. To support security is the mandatory requirement in IoT because it is related to the disclosure of private information but also directly related to the human safety. However, it is difficult to apply traditional security mechanism into lightweight devices. This is owing to the fact that many IoT devices are generally resource constrained and powered by battery. PSK(Pre-Shared Key) based approach, which share secret key in advance between communication entities thereafter operate security functions, is suitable for light-weight device. That is because PSK is costly efficient than a session key establishment approach based on public key algorithm. However, how to safely set a PSK of the lightweight device in advance is a difficult issue because input/output interfaces such as keyboard or display are constrained in general lightweight devices. To solve the problem, we propose and develop a secure PSK configuration scheme for resource constrained devices in IoT.

IoT-enabled Solutions for Tour Photography Services

  • Jeong, Isu;Baek, Seungwoo;An, Eunsol;Kim, Yujin;Choi, Jiwoo;Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.127-135
    • /
    • 2020
  • In this paper, we propose an IoT-enabled solution for tour photography services with small-size investment and resources in the travel and tourism industries, being able to impact on economic, social, and cultural values. An IoT-enabled camera is developed based on an open hardware and software platform complying with oneM2M, which can make traditional embedded systems oneM2M-compliant devices due to a middleware solution called TAS (thing adaptation software). IoT cameras deployed around photo zones in a tour site could be remotely controlled via an IoT gateway with a Web-based application on a smartphone. Users would perform a pan and tilt camera control if they want and then take and download a perfect photo picture (even though they are away from the tour site). We expect that the proposed solution will promote the deployment IoT-enabled technologies in tour and travel industries which are important parts of the tertiary sector.

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT

  • Deng, Yinjuan;Wang, Shangping;Zhang, Qian;Zhang, Duo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.445-466
    • /
    • 2022
  • As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.

A Study on Efficient Mixnet Techniques for Low Power High Throughput Internet of Things (저전력 고속 사물 인터넷을 위한 효율적인 믹스넷 기술에 대한 연구)

  • Jeon, Ga-Hye;Hwang, Hye-jeong;Lee, Il-Gu
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.246-248
    • /
    • 2021
  • Recently data has been transformed into a data economy and society that acts as a catalyst for the development of all industries and the creation of new value, and COVID-19 is accelerating digital transformation. In the upcoming intelligent Internet of Things era, the availability of decentralized systems such as blockchain and mixnet is emerging to solve the security problems of centralized systems that makes it difficult to utilize data safely and efficiently. Blockchain manages data in a transparent and decentralized manner and guarantees the reliability and integrity of the data through agreements between participants, but the transparency of the data threatens the privacy of users. On the other hand, mixed net technology for protecting privacy protects privacy in distributed networks, but due to inefficient power consumption efficiency and processing speed issues, low cost, light weight, low power consumption Internet Hard to use. In this paper, we analyze the limitations of conventional mixed-net technology and propose a mixed-net technology method for low power consumption, high speed, and the Internet of things.

  • PDF