• Title/Summary/Keyword: User Internet

Search Result 4,231, Processing Time 0.03 seconds

A Study on Deaf Students' Use of Internet Games (청각장애 학생의 인터넷 게임 이용 실태 연구)

  • Yi, Seung-Hoon;Kim, Jung-Soo
    • Journal of Korea Game Society
    • /
    • v.14 no.3
    • /
    • pp.15-24
    • /
    • 2014
  • This research examined the actual state of deaf students' use of Internet games by administering an Internet game addiction scale test to 201 deaf students from elementary, middle or high schools. The research findings indicated that middle and high school students were more likely to be left at home after school without their protector's presence than elementary school students. The average daily sleep hours of deaf students were similar to or fewer than those of general students, and the amount of their Internet access time and the one spent on Internet games were greater than that of non disabled students. As for the Internet user types, more male deaf students were categorized into risk user type than female deaf students, and the number of deaf risk user type students was significantly higher than that of non disabled risk user type students. The results suggest that the on-going national research on the actual state of Internet game users should include disabled students and that there is an urgent need to develop prevention programs of computer games overindulgence.

Implementation of User Connection Prevention System through LAN Monitoring from Internet Harmful Site (LAN 모니터링을 통한 인터넷 유해 사이트의 사용자 접속 방지 시스템 개발)

  • Park, Hyoung-Bae;Chung, Joong-Soo
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.8
    • /
    • pp.1-7
    • /
    • 1999
  • The Internet is emerging as a powerful tool in the area of information and communication technology. The WWW has been especially contributed to increase the internet demand because of its browser which has "Graphic User Interface". Nowadays number of hosts that supply harmful information such as pornographic materials, and the infringement of human rights is rapidly increased. Access to such materials is very easy. Therefore security system which will protect young users from access to harmful host is needed. This paper presents implementation of user system has database about harmful hosts at the Internet and monitors that the user traffic over LAM get touch with the hosts. The system can not make the user access the harmful host because it can over LAN. The performance analysis on the developed system monitoring the traffic over LAN of Andong university is carried out. The performance analysis of monitoring results satisfies with preventing users from the connection to the internet harmful sites.

  • PDF

Internet ID Management System based on ID Federation: e-IDMS (ID 연계 기반의 인터넷 ID Management System: e-IDMS)

  • Cho Yeong-Sub;Jin Seung-Hun;Moon Phil-Joo;Chung Kyo-Il
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.7 s.349
    • /
    • pp.104-114
    • /
    • 2006
  • In order to use an Internet service, it is a general procedure that user subscribes to the service and then registers her or his id(identifier). As Internet has been more widely used, however, user has more and more ids than ever before. In this environments, whenever user uses an Internet service, she or he must authenticate to the service provider, which makes her or him inconvenient. As user's data is scattered and unmanaged on various web sites, user privacy has been revealed more often. This paper specifies e-IDMS which ETRI has been developing to solve such problems. e-IDMS is an Internet ID(IDentity) management system based on ID Federation Mechanism e-IDMS provides ID Federation-based facilities such as composite authentication, Internet SSG, ID information management, privacy protection and interactive query. e-IDMS is used in establishing integrated ill management system for public institutions.

Design of Query Processing based on Profiles for Efficient Searching Events (효율적인 이벤트 검색을 위한 프로파일 기반 질의 처리 방법)

  • Kim, ChangHoon;Kim, TaeYoung;Kim, JongMin;Ban, ChaeHoon;Kim, DongHyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.10a
    • /
    • pp.249-252
    • /
    • 2009
  • Recently, it is possible for users to acquire necessary data easily as the various schemes of the searching information are developed. Since these data rise continuously like stream data, it is required to extract the appropriate data for the user's needs from the mass data on the internet. In the traditional scheme, they are acquired by processing the user queries after the occurred data are stored at a database. However, it is inefficient to process the user queries over the large volume of continuous data by using the traditional scheme. In this paper, we propose the query processing scheme to extract the data efficiently for the user requirements from the large volume of continuous data. On the proposed scheme, we present the Event-Profile Model to define the data occurrence on the internet as the events and the user's requirements as the profiles. We also show the filtering scheme to process the events and the profiles efficiently.

  • PDF

Proposal for Service Model for Internet Identity Management (인터넷 ID관리를 위한 서비스 모델 제안)

  • Song, Jung-Hwan;Kang, Yeon-Jung;Jang, Hwan-Seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.4
    • /
    • pp.143-152
    • /
    • 2008
  • The incredible progress of information and communication technology has allowed various information and communication services to emerge in the Web environment. Such a service is initiated when the user provides his/her personal information to the service provider and is then given an identifier and authentication data. A series of the processes is inconvenient as it requires authentication by the service provider each time that the user requests the service. Furthermore, as the user subscribes to more services, the volume of ID and authentication information increases. This compels the users to use an ID that is easy to remember or to register the same ID over and over, increasing the risk of ID hacking. It is clear that such threats will become more serious as our lives become more dependent upon the Internet and as the Internet service environment advances. With the introduction of different services, the need to efficiently manage ID has been raised. In this paper, a Internet Identity Management Service that enables the control of the flow of the user’s personal information, which is used and stored for the Internet service, is proposed from the user's perspective.

Research about development process of game tendencious advertisement contents that drive active participation of internet user (인터넷 유저의 능동적인 참여를 유도하는 게임성향 광고 콘텐츠 개발 과정에 관한 연구)

  • Lim, Woo-Soung;Ryu, Seuc-Ho
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2004.11a
    • /
    • pp.101-109
    • /
    • 2004
  • Internet got into popularization by development of digitech today, and according as Internet user increases, advertisement that use internet is increasing. Specially, advertisement that use internet regardless of time customer and company both direction(interactive) communication possible because, image about special quality of product or company feature that can be active to customer and offer effectively have. There is charm that both direction communication that internet advertisement can attract to unspecified multitude internet connecter regardless of time this are available, internet user can do participation more easily. Interaction of Banner advert or different advertisement that form commentary of current internet advertisement is inert with internet posthumous work. It can become more efficient advertisement if take advantage of prognostication that most important element of game is interaction in internet advertisement. Investigator who aim in this point wishes to do on the basis of special quality of internet advertisement and interaction attribute of game and present actuality design process case of internet ad of game inclination.

  • PDF

WiFi Access User Authentication in Broadband Wireless Access Network (광대역 무선 엑세스 망에서 WiFi 액세스 사용자 인증)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of Industrial Technology
    • /
    • v.28 no.B
    • /
    • pp.33-37
    • /
    • 2008
  • Recently, there have been intensive researches on the wireless Internet access through WiFi WLAN using WiRro network as backhaul link in the Internet service providing business area. However, in the wireless Internet access method, we need to solve the compatibility problem for different user authentications between licensed WiBro network and unlicensed WiFi network for billing and user management. In this paper, we propose an authentication method for WiFi users by BWAN operators through WiNNERs which is RS connecting the two networks, and discuss the effectiveness of the method.

  • PDF

Design and Implementation of User authentication and Roaming Schemes in public WLAN environments (WLAN 서비스에서 사용자 인증과 로밍방식의 설계)

  • Kim, Dong-Ok;Kang, Dong-Jin
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.208-210
    • /
    • 2009
  • Currently, Wireless LAN(WLAN) service is widely deployed to provide high speed wireless Internet access through the mobile stations such as notebook and PDA. To provide enhanced security and user access control in the public WLAN area, WLAN access points should have the capability of IEEE 802.1x-based user authentication and authorization functionality. In this paper, we provide a brief understanding of IEEE 802.1x standards and related protocols like EAPOL(Extended Authentication Protocol Over LAN), EAP, RADIUS and describe how the IEEE 802.1x is designed and implemented in our embedded linux-based WLAN AP which is named i-WiNG. (Intelligent Wireless Internet Gateway). For the network security and user authenti -cation purposes, a supplicant who wants to access Internet should be authorized to access the AP port using the EAPOL.

  • PDF

Design of User Agent System for Internet Telephony Services (인터넷 전화 단말 서비스를 위한 User Agent 기능 설계)

  • 허미영;강신각
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.556-559
    • /
    • 2001
  • VoIP(Voice over IP) Technology, turn voice services over traditional telephone network into internet, is highlighted because of easy adopting the value added services related voice In this paper, we described the user agent system architecture for internet telephony services based on SIP (Session Initiation Protocol)

  • PDF

The Study on the User Interface in the Internet Newspapers (인터넷 전자신문의 이용자 인터페이스에 관한 연구)

  • Kim Sun-Ho
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.31 no.4
    • /
    • pp.319-348
    • /
    • 1997
  • This study is the result of the analysis on the user interface of the Korean internet newspapers. To investigate the user interfaces, the home pages of the 6 internet newspaper were selected as the samples. Then, the information procedures, designs. information presentations, and searching routines of that samples were analyzed. For the home-page design of the internet newspaper and the education of the article search by the journalist-librarian with the press or the librarian in common. the results of the paper will be helpful.

  • PDF