• Title/Summary/Keyword: User Management System

Search Result 3,214, Processing Time 0.029 seconds

An Inspection/Maintenance Job Scheduling Management Method by Using Location Information based on Wi-Fi AP Connection History (Wi-Fi AP 접속 기록 기반 위치 정보를 이용한 점검/유지보수 작업 스케줄 관리 방법)

  • Gu, Bongen
    • Journal of Platform Technology
    • /
    • v.9 no.4
    • /
    • pp.51-59
    • /
    • 2021
  • In this paper, we propose a location-based service that the user's location is known by connection history to WI-FI AP installed in a facility known its location previously. The location-based service proposed in this paper manages job processing states of technicians who inspect and maintain the facility like elevator by using worker's location and arrival time information. The job scheduling management method proposed in this paper is based on previously scheduled arrival time and actual arrival time to a target facility. And we experimentally implemented the inspection and maintenance system of an elevator to show the feasibility of job schedule management based on location and arrival time information acquired from Wi-Fi AP connection history. Our experimental implementation shows that our proposed method is usefulness in the field of the inspection and maintenance of a facility.

Design of Initial Decision-Making Support Interface for Crop Facility Cultivation (작물 시설재배 초기 의사결정 지원 인터페이스 설계)

  • Kim, Kuk-Jong;Cho, Yong-Yoon
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.71-78
    • /
    • 2022
  • Recently, the number of people wishing to return to farming is increasing, However, the lack of farming experience and management information of returnees is one of the main reasons for increasing the probability of agricultural failure. This study proposes an interface to support early facility cultivation management decision-making for returnees who want facility cultivation. The proposed interface is designed with UML(Unified Modeling Language) and provides key decision-making information such as land/crop suitability, land/facility costs, and management costs according to input data such as cultivation areas, selected crops, and cultivation types selected by the user. Through the proposed interface, facility cultivators can effectively and quickly acquire initial decision-making information for facility cultivation in the desired target area.

An Inspection/Maintenance Job Scheduling Management Method by Using Location Information based on Wi-Fi AP Connection History (Wi-Fi AP 접속 기록 기반 위치 정보를 이용한 점검/유지보수 작업 스케줄 관리 방법)

  • Gu, Bongen
    • Journal of Platform Technology
    • /
    • v.10 no.1
    • /
    • pp.11-19
    • /
    • 2022
  • In this paper, we propose a location-based service that the user's location is known by connection history to WI-FI AP installed in a facility known its location previously. The location-based service proposed in this paper manages job processing states of technicians who inspect and maintain the facility like elevator by using worker's location and arrival time information. The job scheduling management method proposed in this paper is based on previously scheduled arrival time and actual arrival time to a target facility. And we experimentally implemented the inspection and maintenance system of an elevator to show the feasibility of job schedule management based on location and arrival time information acquired from Wi-Fi AP connection history. Our experimental implementation shows that our proposed method is usefulness in the field of the inspection and maintenance of a facility.

Development of Community-based Digital Health Care (지역사회기반 디지털 헬스케어 발전방향)

  • Han, Jeong-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1826-1831
    • /
    • 2022
  • Rapid Aging Society demands the transformation of medical paradigm of diagnosis and treatment towards prevention and management. This paper explores the norm and development of digital health care, focusing on Busan Metropolitan City. Digital health care which combines new ICT technology and medical technology is predictive, preventive, personalized and participatory; and suggests alternative to solve the problem of demographic changes and increasing social cost of medical welfare. Community Health Center in Busan is unique one based in the minimum community of collecting data from self-leading health management. Digital transformation using basic health data and social information can build preventive care system in the community. Easy access leads community center to test bed of developing new technology, as a living lab. In order to use the newly developed goods and service effectively, user-participatory test is nicessary. Finally community nurse and activists can specify health-welfare converged service through digital transformation empowerment training.

A Design of AI Cloud Platform for Safety Management on High-risk Environment (고위험 현장의 안전관리를 위한 AI 클라우드 플랫폼 설계)

  • Ki-Bong, Kim
    • Journal of Advanced Technology Convergence
    • /
    • v.1 no.2
    • /
    • pp.01-09
    • /
    • 2022
  • Recently, safety issues in companies and public institutions are no longer a task that can be postponed, and when a major safety accident occurs, not only direct financial loss, but also indirect loss of social trust in the company and public institution is greatly increased. In particular, in the case of a fatal accident, the damage is even more serious. Accordingly, as companies and public institutions expand their investments in industrial safety education and prevention, open AI learning model creation technology that enables safety management services without being affected by user behavior in industrial sites where high-risk situations exist, edge terminals System development using inter-AI collaboration technology, cloud-edge terminal linkage technology, multi-modal risk situation determination technology, and AI model learning support technology is underway. In particular, with the development and spread of artificial intelligence technology, research to apply the technology to safety issues is becoming active. Therefore, in this paper, an open cloud platform design method that can support AI model learning for high-risk site safety management is presented.

The Technological Method for Safe Processing of Sensitive Information in Network Separation Environments (망분리 환경에서 민감정보를 안전하게 처리하기 위한 기술적 방안)

  • Juseung Lee;Ilhan Kim;Hyunsoo Kim
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.125-137
    • /
    • 2023
  • Companies that handle sensitive information, led by public institutions, establish separate networks for work and the Internet and protect important data through strong access control measures to prevent cyber attacks. Therefore, systems that involve the junction where the Intranet(internal LAN for work purposes only) and the Internet network are connected require the establishment of a safe security environment through both administrative and technical measures. Mobile Device Management(MDM) solutions to control mobile devices used by institutions are one such example. As this system operates by handling sensitive information such as mobile device information and user information on the Internet network, stringent security measures are required during operation. In this study, a model was proposed to manage sensitive information data processing in systems that must operate on the Internet network by managing it on the internal work network, and the function design and implementation were centered on an MDM solution based on a network interconnection solution.

Comparative Analysis of ViSCa Platform-based Mobile Payment Service with other Cases (스마트카드 가상화(ViSCa) 플랫폼 기반 모바일 결제 서비스 제안 및 타 사례와의 비교분석)

  • Lee, June-Yeop;Lee, Kyoung-Jun
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.2
    • /
    • pp.163-178
    • /
    • 2014
  • Following research proposes "Virtualization of Smart Cards (ViSCa)" which is a security system that aims to provide a multi-device platform for the deployment of services that require a strong security protocol, both for the access & authentication and execution of its applications and focuses on analyzing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service by comparing with other similar cases. At the present day, the appearance of new ICT, the diffusion of new user devices (such as smartphones, tablet PC, and so on) and the growth of internet penetration rate are creating many world-shaking services yet in the most of these applications' private information has to be shared, which means that security breaches and illegal access to that information are real threats that have to be solved. Also mobile payment service is, one of the innovative services, has same issues which are real threats for users because mobile payment service sometimes requires user identification, an authentication procedure and confidential data sharing. Thus, an extra layer of security is needed in their communication and execution protocols. The Virtualization of Smart Cards (ViSCa), concept is a holistic approach and centralized management for a security system that pursues to provide a ubiquitous multi-device platform for the arrangement of mobile payment services that demand a powerful security protocol, both for the access & authentication and execution of its applications. In this sense, Virtualization of Smart Cards (ViSCa) offers full interoperability and full access from any user device without any loss of security. The concept prevents possible attacks by third parties, guaranteeing the confidentiality of personal data, bank accounts or private financial information. The Virtualization of Smart Cards (ViSCa) concept is split in two different phases: the execution of the user authentication protocol on the user device and the cloud architecture that executes the secure application. Thus, the secure service access is guaranteed at anytime, anywhere and through any device supporting previously required security mechanisms. The security level is improved by using virtualization technology in the cloud. This virtualization technology is used terminal virtualization to virtualize smart card hardware and thrive to manage virtualized smart cards as a whole, through mobile cloud technology in Virtualization of Smart Cards (ViSCa) platform-based mobile payment service. This entire process is referred to as Smart Card as a Service (SCaaS). Virtualization of Smart Cards (ViSCa) platform-based mobile payment service virtualizes smart card, which is used as payment mean, and loads it in to the mobile cloud. Authentication takes place through application and helps log on to mobile cloud and chooses one of virtualized smart card as a payment method. To decide the scope of the research, which is comparing Virtualization of Smart Cards (ViSCa) platform-based mobile payment service with other similar cases, we categorized the prior researches' mobile payment service groups into distinct feature and service type. Both groups store credit card's data in the mobile device and settle the payment process at the offline market. By the location where the electronic financial transaction information (data) is stored, the groups can be categorized into two main service types. First is "App Method" which loads the data in the server connected to the application. Second "Mobile Card Method" stores its data in the Integrated Circuit (IC) chip, which holds financial transaction data, which is inbuilt in the mobile device secure element (SE). Through prior researches on accept factors of mobile payment service and its market environment, we came up with six key factors of comparative analysis which are economic, generality, security, convenience(ease of use), applicability and efficiency. Within the chosen group, we compared and analyzed the selected cases and Virtualization of Smart Cards (ViSCa) platform-based mobile payment service.

The Effect of Information Quality and System Quality on Knowledge Service Competence: Focusing on Knowledge Service Types (지식서비스의 정보품질과 시스템품질이 지식서비스 역량에 미치는 영향: 지식서비스 유형을 중심으로)

  • Geun-Wan Park;Hyun-Ji Park;Sung-Hoon Mo;Cheol-Hyun Lim;Hee-Seok Choi;Seok-Hyoung Lee;Hye-Jin Lee;Seung-June Hwang;Chang-Hee Han
    • Information Systems Review
    • /
    • v.21 no.4
    • /
    • pp.1-29
    • /
    • 2019
  • The knowledge resources take a role in promoting the sustainable growth of organization. Therefore, it is important for the members of organization to acquire knowledge consistently so that the company can continue to grow. Knowledge service is the field that provides information and infrastructure which enable the members of organization to acquire new knowledge. As we recognized the importance of knowledge services, we analyzed the level of knowledge service management and development through the impact of knowledge quality on user capabilities. First, the matrix of knowledge patterns was presented based on the type of information and the level of customer interaction. According to patterns, the knowledge service was classified into three types of information providing, information analysis, and infrastructure, and then the results of structural model analysis were presented for each type. It found that the impact of knowledge service quality on user competence was different according to the type of service. The results suggested new indicators for measuring the performance of knowledge services, and provided information for reconstructing services based on the user considering the integrated operation of knowledge service and organizational designing knowledge service.

Twitter and Retweet Context: User Characteristics and Message Attributes of Twitter for PR and Marketing (기업의 홍보 마케팅용 트위터의 리트윗 현황 분석: 이용자 특성과 콘텐츠 속성을 중심으로)

  • Cho, Tae-Jong;Yun, Hae-Jung;Lee, Choong-C.
    • Information Systems Review
    • /
    • v.14 no.1
    • /
    • pp.21-35
    • /
    • 2012
  • The rapid growth and popularity of Twitter have been one of the most influential phenomena in the era of social network system and the mobile internet, which also opens up opportunities for new business strategies; in particular, PR and marketing area. This study analyzed use of Twitter in terms of user characteristics and message attributes. Actual field data from the Twitter for PR and Marketing of a representative Korean IT company (Company "K") was used for this analysis. Research findings show that overall corporate twitter users show passive attitude in retweet behavior. Also, users who have relatively small network size (less than 1,000) are more active in retweet than power twitterians that have big network size(over than 10,000). It is showed that the rate of retweet is higher in the order of recruiting, promotional event, IT information, and general PR message. In the conclusion section, practical implications based on the research finding are thoroughly discussed.

  • PDF

Classification of Online Tracking Technology and Implications in User Perspective (온라인 트래킹 기술 분류 및 이용자 관점에서의 시사점)

  • Lee, Bohan;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.16 no.9
    • /
    • pp.159-172
    • /
    • 2018
  • This study searched and analyzed online tracking technologies. It tried to understand what to consider when establishing policies related to online tracking. Online tracking technologies were classified into 'general cookies', 'super cookies', 'fingerprinting', 'device ID tracking' and 'cross-device tracking'. Political considerations should include the layers of online tracking, the subjects of tracking technology, purpose of use, duration and storage format of information, and development of technology. The implications of this study are as follows: first, policy makers and industry should be aware that the degree of risk perceived by users may vary according to the characteristics of online tracking technology. Secondly, it is necessary to understand factors that affect the classification of online tracking technology. Finally, in the industry, preemptive measures such as building an integrated privacy system are needed to relieve anxiety of users and to build trust.