• Title/Summary/Keyword: Mobile Policy

Search Result 996, Processing Time 0.028 seconds

Competing Risk Model for Mobile Phone Service (이동통신시장 서비스를 위한 경쟁위험모형)

  • Lee, Jae Kang;Sohn, So Young
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.32 no.2
    • /
    • pp.120-125
    • /
    • 2006
  • Since Korean government has implemented the "Number Portability System" in the domestic mobile communications market, mobile communication companies have been striving to hold onto existing customers and at the same time to attract new customers. This paper presents a competing risk model that considers the characteristics of a customer in order to predict the customer's life under the "Number Portability System." Three competing risks considered are pricing policy, quality of communication, and usefulness of service. It was observed that the customers who pay more are less sensitive on pricing policy younger people are less sensitive than older people to the quality of communication and women are more sensitive than men to the degree of usefulness of service. We expect that the result of this study can be used as a guideline for effective management of mobile phone customers under the Number Portability System.

Information Security Model in the Smart Military Environment (스마트 밀리터리 환경의 정보보안 모델에 관한 연구)

  • Jung, Seunghoon;An, Jae-Choon;Kim, Jae-Hong;Hwang, Seong-Weon;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.199-208
    • /
    • 2017
  • IoT, Cloud, Bigdata, Mobile, AI, and 3D print, which are called as the main axis of the 4th Industrial Revolution, can be predicted to be changed when the technology is applied to the military. Especially, when I think about the purpose of battle, I think that IoT, Cloud, Bigdata, Mobile, and AI will play many role. Therefore, in this paper, Smart Military is defined as the future military that incorporates these five technologies, and the architecture is established and the appropriate information security model is studied. For this purpose, we studied the existing literature related to IoT, Cloud, Bigdata, Mobile, and AI and found common elements and presented the architecture accordingly. The proposed architecture is divided into strategic information security and tactical information security in the Smart Military environment. In the case of vulnerability, the information security is divided into strategic information security and tactical information security. If a protection system is established, it is expected that the optimum information protection can be constructed within an effective budget range.

A Performance Evaluation of Cooperative Proxy Caching for Continuous Media Services in Mobile Environments (이동환경에서 연속미디어 서비스를 위한 협력적인 프록시 캐슁의 성능평가)

  • Lee Haw-Sei
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.7
    • /
    • pp.943-952
    • /
    • 2005
  • This paper proposes a user's mobility based cooperative proxy caching policy for effective resource management of continuous media objects in mobile environments. This policy is different from the existing proxy caching policies in terms of how to exploit users' mobility. In other words, existing caching policies work based on the information about objects by referring to users' requests within a specified domain whereas the proposed caching policy runs by utilizing a number of users' requests across several domains. So, the proposed policy is applicable to random requests in mobile environments. Moreover, we also propose a replacement policy based on weights and playback time. To check the efficiency of the proposed caching policy, the proposed replacement policy is run with different size of caching unit: object or segment. The result of performance evaluation tells that segment sizes, ratio of users' mobility and weights are major factors for the efficient operation of the cooperative caching.

  • PDF

Status and Policy of Mobile App Authoring Tools for Interoperability and Compatibility (상호운용성과 호환성 확보를 위한 모바일 앱 저작도구 현황 및 지원정책)

  • Lee, Jemin Justin;Lee, Hye Sun;Park, Soo Kyung;Cho, Ji Yeon;Lee, Bong Gyou
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.111-116
    • /
    • 2014
  • Thanks to diffusions of mobile devices and advances of network technologies, demands for mobile app have been increased dramatically. It has resulted in mobile app industries as well as mobile app authoring tools are facing a crisis over subordinate to specific OS and platform such as iOS, Android and Apple App Store. Because these particular OS and platforms are obstacles to overcome for supporting interoperability and compatibility. In this study, we have conducted expert interviews and surveys to analyze status of mobile app markets and needs for mobile app user and developer. As a result, mobile app based on HTML5 leads to interconnect various mobile devises without additional efforts. Thereby, mobile app user and developer take a positive view of HTML5. However, mobile app developers tend to have the technical path dependence, they especially in venture and small enterprises need to government support for professional manpower training.

The Determinants of Usefulness and Intention In Mobile Game Service (모바일 게임 서비스에서 유용성과 수용의도 결정요인에 관한 연구)

  • Han, Hui-Seon;Park, Gi-Ho;Jo, Jae-Wan
    • Journal of Digital Convergence
    • /
    • v.4 no.2
    • /
    • pp.41-49
    • /
    • 2006
  • This study tried to find the determine of intention to mobile game service acceptance. Our research proposes the theoretical model consisting of factors such as perceived usefulness, perceived ease of using the mobile phone, perceived price. The data was analyzed using LISREL based on th structural equation modeling, a second-generation multivariate technique. The result shows that the perceived usefulness have significant effects on the mobile game service acceptance.

  • PDF

Promotion Strategies for Daegu-Kyungbuk Mobile Cluster: Searching for Alternative Regional Innovation Governance (대구.경북 모바일 클러스터 육성전략: 지역혁신 거버넌스의 대안 모색)

  • Lee, Jeong-Hyop;Kim, Hyung-Joo
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.12 no.4
    • /
    • pp.477-493
    • /
    • 2009
  • This research aims to examine Korean regional innovation governance, find structural problems, and explore alternative strategies of regional innovation governance. Especially the alternative governance was searched through the case study of Daegu-Kyungbuk mobile cluster, of which formulation Samsung is the anchor institution. Regional innovation governance in this research is defined as a policy system to link knowledge generation & diffusion subsystem and knowledge application & exploitation subsystem, and institutional conditions to steer the system. "Social Capital Assessment Tool (SOCAT)" of the World Bank was utilized for the appreciation of cluster governance. The regional innovation governance of Daegu-Kyungbuk mobile cluster is characterized as production networks dominated by one-to-one relationship between Samsung and hardware/software developers, decentralized R&D networks and policy networks with multiple hubs. Major policy agents have not developed networks with local companies, and rare are interactions between the policy agents. Local companies, especially software developers, responded they have had experiences to cooperate for local problem solving and shared their community goal, however, the degree of trust in major local project leaders is not high. Local hardware/software developers with core technologies need to be cooperative to develop similar technologies or products in Daegu-Kyungbuk mobile cluster. Regional administrative actors, such as the City of Daegu and Kyungsangbuk-do, and diverse innovation-related institutes should build cooperative environment where diverse project-based cooperation units are incessantly created, taken apart, and recreated.

  • PDF

Remaking Mobile Ecosystem Policies for New Mobile Market (새로운 통신시장 활성화를 위한 모바일 생태계 통신정책)

  • Kwak, Jeong-Ho;Cho, Ji-Yeon;Lee, Yong-Seok;Lee, Bong-Gyou
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.93-106
    • /
    • 2011
  • The Korean mobile telecom market has undergone a sea change since Apple created a new mobile ecosystem with Appstore and iPhone. Many non-telecom operators have been trying hard to come up with new business strategies to gain a competitive edge. The shifting competition landscape requires a new communications policy that can further stimulate the evolving market. This is why countries around the world are upgrading their communications policies: to renew the market foundation and better respond to the ever-changing industry environment. Using the ANP(Analytic Network Process) model, this study identifies policy variables and performs quantitative analysis on their priorities. The analysis results will help prioritize policy variables under the limited amount of resources, and serve as useful guidelines for making mobile ecosystem policies.

Mobile Phone Dependency, Motivations and Effects of Mobile Phone Usage Among Korean Adolescents (청소년의 휴대전화 의존, 이용동기 및 결과에 관한 연구)

  • Sung, Yun Sook
    • Korean Journal of Child Studies
    • /
    • v.29 no.4
    • /
    • pp.181-197
    • /
    • 2008
  • A mobile phone usage survey was administered to a nationwide sample of 3,617 adolescents. Major motivations of mobile phone usage were mobility/real-time connection, show off, information acquisition, entertainment, dialogue, schedule management, and advice. Maintenance of social relationship with the peer group was most important in mobile phone use. Motivations influenced mobile phone dependency : show off had the strongest influence on anxiety/paranoia followed by dialogue, entertainment, mobility/real-time connection. Without their phones, fashion-oriented adolescents showed mobile phone dependency and anxiety. Stronger dialogue and entertainment motivations were associated with weaker real time connection motivation and stronger paranoia symptoms. Mobile phone dependent adolescents had lower grades, showed lack of attention, had little dialogue with their parents and showed withdrawal from the peer group.

  • PDF

Advancement in Mobile Service and Successful Model for Mobile Contents (모바일 서비스의 진화와 성공적인 모바일 콘텐츠 모델)

  • Suh, Byung-Moon
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.4
    • /
    • pp.24-34
    • /
    • 2008
  • The study aims to anticipate evolution direction of mobile content business in the future, and derive successful strategies at the same time with multiple and composite analysis of evolution process and environmental change of mobile business. In conclusion, Firstly, it should strengthen customer approach performance, secondly, approaches with sensitively, and needs opened business model. Fourthly, it needs planning and production of contents which reflects the need of customers, and fifthly, it requires development of mobile platform leading contents group and multiplication of CP business model. In the aspect of industrial policy, sustainable and future-oriented policy should be arranged rather than short-term and simple police, for the continual development of mobile content industry. To establish healthy and active mobile contents industry, the government and regulatory institutes are more preferable to devote to the role of circumstance builder rather than the leader of mobile content market. In other words, they are recommended to focus on establishing basic regulation and order for smooth operation of the market and its management.

  • PDF

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.