• Title/Summary/Keyword: S&T information service

Search Result 816, Processing Time 0.028 seconds

Study on the personal Information Retrieval of Smartphone Messenger Service (스마트폰 메신저 어플리케이션에서의 개인정보보호에 관한 연구)

  • Kang, Sunghoon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2013
  • The recent increase in smartphone usage has ignited the development of new applications which have changed the way of living in this internet era in the world. Almost all users which have smartphone have used many kinds of applications for lots of part. Especially, Social Network Service is the most popular part for smartphone users. The greater part of smartphone users take messenger service for smartphone. This kinds of applications provide to manage as deactivation of user or change of device. When users take to manage their information, their information would be deleted securely. If secure deletion didn't work correctly and released, their personal information can be easily abused to by others through various means such as internet phishing. In this paper, we analysis that the messenger application's management function keeps on the Personal Information Protection Act and suggest to prevent legally and technically for user's personal information and privacy.

Survivability Analysis of MANET Routing Protocols under DOS Attacks

  • Abbas, Sohail;Haqdad, Muhammad;Khan, Muhammad Zahid;Rehman, Haseeb Ur;Khan, Ajab;Khan, Atta ur Rehman
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.9
    • /
    • pp.3639-3662
    • /
    • 2020
  • The network capability to accomplish its functions in a timely fashion under failures and attacks is known as survivability. Ad hoc routing protocols have been studied and extended to various domains, such as Intelligent Transport Systems (ITSs), Unmanned Aerial Vehicles (UAVs), underwater acoustic networks, and Internet of Things (IoT) focusing on different aspects, such as security, QoS, energy. The existing solutions proposed in this domain incur substantial overhead and eventually become burden on the network, especially when there are fewer attacks or no attack at all. There is a need that the effectiveness of these routing protocols be analyzed in the presence of Denial of Service (DoS) attacks without any intrusion detection or prevention system. This will enable us to establish and identify the inherently stable routing protocols that are capable to survive longer in the presence of these attacks. This work presents a DoS attack case study to perform theoretical analysis of survivability on node and network level in the presence of DoS attacks. We evaluate the performance of reactive and proactive routing protocols and analyse their survivability. For experimentation, we use NS-2 simulator without detection or prevention capabilities. Results show that proactive protocols perform better in terms of throughput, overhead and packet drop.

A Study of Lawyer's Office Service Quality and Customers' Satisfaction (한국 변호사 사무실 서비스 품질과 고객 만족에 관한 연구)

  • Chang, Dae-Sung;Hwang, In-Jung;Kim, Min-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.3
    • /
    • pp.259-270
    • /
    • 2006
  • This study is the first research for the lawyers' office service quality in Korea. Several T-tests' results show that the performance of lawyers of ace service was perceived much lower than the expectation of customers. A causal analysis was conducted to identify which service qualify factors influence customers' satisfaction of the lawyer's office in Korea. The results of the analysis show that tangible and empathy service qualify factors are the most important factors for the lawyers' customers' satisfaction. Thus, lawyers' office should invest some money in selecting location and building including interiors to increase customers' satisfaction in Korea. And then. lawyers should improve the empathy quality factor which make their customers feel their law office comfortable and helpful to them.

  • PDF

Framework of Online Shopping Service based on M2M and IoT for Handheld Devices in Cloud Computing (클라우드 컴퓨팅에서 Handheld Devices 기반의 M2M 및 IoT 온라인 쇼핑 서비스 프레임워크)

  • Alsaffar, Aymen Abdullah;Aazam, Mohammad;Park, Jun-Young;Huh, Eui-Nam
    • Annual Conference of KIPS
    • /
    • 2013.05a
    • /
    • pp.179-182
    • /
    • 2013
  • We develop Framework architecture of Online Shopping Services based on M2M and IoT for Handheld Devices in Cloud Computing. MapReduce model will be used as a method to simplify large scale data processing when user search for purchasing products online which provide efficient, and fast respond time. Therefore, providing user with a enhanced Quality of Experience (QoE) as well as Quality of Service (QoS) when purchasing/searching products Online from big data.

On-Demand Remote Software Code Execution Unit Using On-Chip Flash Memory Cloudification for IoT Environment Acceleration

  • Lee, Dongkyu;Seok, Moon Gi;Park, Daejin
    • Journal of Information Processing Systems
    • /
    • v.17 no.1
    • /
    • pp.191-202
    • /
    • 2021
  • In an Internet of Things (IoT)-configured system, each device executes on-chip software. Recent IoT devices require fast execution time of complex services, such as analyzing a large amount of data, while maintaining low-power computation. As service complexity increases, the service requires high-performance computing and more space for embedded space. However, the low performance of IoT edge devices and their small memory size can hinder the complex and diverse operations of IoT services. In this paper, we propose a remote on-demand software code execution unit using the cloudification of on-chip code memory to accelerate the program execution of an IoT edge device with a low-performance processor. We propose a simulation approach to distribute remote code executed on the server side and on the edge side according to the program's computational and communicational needs. Our on-demand remote code execution unit simulation platform, which includes an instruction set simulator based on 16-bit ARM Thumb instruction set architecture, successfully emulates the architectural behavior of on-chip flash memory, enabling embedded devices to accelerate and execute software using remote execution code in the IoT environment.

A Study on the Difference in Importance and Performance of DINESERV's 5 Dimensions between Korean Native Cattle Beef and Imported Beef Restaurant

  • Cho, Yoon-Shik;Lee, Mi-Ock
    • Journal of the Korean Data and Information Science Society
    • /
    • v.19 no.4
    • /
    • pp.1165-1172
    • /
    • 2008
  • A considerable amount of research has focused on the dimensionality of service quality construct. To achieve and maintain their comprehensiveness and profitability, restaurant managers should manage and aim to continuously improve the level of service quality offered to their customers. This paper is focused on service quality in the Korean native cattle and imported beef restaurant industry in the Korea. So, this paper has adapted DINESERV scale so that restaurant managers can use it to determine how customers perceive the service quality in Korean native cattle beef restaurant and imported beef restaurant. The purpose of this research is to test the difference in importance and actual performance of 5 dimensions between the restaurants that sell the beef of Korean native cattle and imported cattle. The t-value is used to test difference of the importance and actual performance for DINESERV's 5 dimensions of the 2 restaurant types. But, there is no difference between Korean native cattle and imported beef restaurant.

  • PDF

Attack Scenarios and Countermeasures using CoAP in IoT Environment (IoT기기에서 SSDP 증폭 공격을 이용한 공격기법 및 대응 방안)

  • Oh, Ju-Hye;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • DDoS attack has been continuously utilized that caused the excessively large amount of traffic that network bandwidth or server was unable to deal with paralyzing the service. Most of the people regard NTP as the biggest cause of DDoS. However, according to recently executed DDoS attack, there have been many SSDP attack in the use of amplified technique. According to characteristics of SSDP, there is no connection for making a forgery of source IP address and amplified resources feasible. Therefore, it is frequently used for attack. Especially, as it is mostly used as a protocol for causing DDoS attack on IoT devices that constitute smart home including a wireless router, media server, webcam, smart TV, and network printer. Hereupon, it is anticipated for servers of attacks to gradually increase. This might cause a serious threat to major information of human lives, major government bodies, and company system as well as on IoT devices. This study is intended to identify DDoS attack techniques in the use of weakness of SSDP protocol occurring in IoT devices and attacking scenario and counter-measures on them.

An Empirical Study on the Relative Effectiveness of 3.5 Generation Mobile Service Adoption and Use Intention (3.5세대 이동통신서비스 가입의도 및 이용의도의 상대적 영향력에 관한 연구)

  • Lee, Jun Yub;Kim, Chul Hyun;Byun, Daniel
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.4
    • /
    • pp.249-262
    • /
    • 2009
  • HSDPA(High Speed Downlink Packet Access) service has begun nationwide network service since the year 2007 and will be leading technology in mobile service technologies in domestic. But the ARPU(Average Revenue Per Use) from HSDPA has not increased, despite of increasing in subscribers with HSDPA service. It's important to understand why the incresing subscriber with hsdp didn't cause the increasing of its usage. The purpose of this study is to examine factors affecting the intention to adopt and to use HSDPA which refer to the new 3.5 generation communication service, and we are to analyze the relation between the two intentions based on previous studies about technology acceptance.

Design of Marine IoT Wireless Network for Building Fishing Gear Monitoring System (어구 모니터링 시스템 구축을 위한 해상 IoT 무선망 설계)

  • Kwak, Jae-Min;Kim, Se-Hoon;Lee, Seong-Real
    • Journal of Advanced Navigation Technology
    • /
    • v.22 no.2
    • /
    • pp.76-83
    • /
    • 2018
  • In order to prevent overusing the fishing gear and to reduce discarded fishing gear, there is a need for a technique that can efficiently transmit the information including the type and location of the fishing gear and the user's real name to the fishing boat and the control center using IoT-based communication. In order to do this, it is necessary to be able to confirm the position information of a plurality of buoys that can be identified by the base stations on the land. In this paper, in order to service the maritime IoT communication system, we calculate the link budget between the land base station and the targets on the sea to derive the service coverage. To design a marine IoT radio network for building a fishing gear monitoring system, we calculate link budget for wireless service optimization at sea for NB-IoT using 1.8 GHz frequency band and LoRa service using 900 MHz frequency band. In addition, the link budget between the land base station and buoy, the link budget between the land base station and fishing boat are calculated and the results are analyzed.