• Title/Summary/Keyword: a internet

Search Result 25,082, Processing Time 0.044 seconds

Analysis on the Security threat factors of the Internet of Things (사물 인터넷의 보안 위협 요인들에 대한 분석)

  • Jeon, Jeong Hoon
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.47-53
    • /
    • 2015
  • Recently, the Internet of Things is an important technology with a Cloud computing services and a Big data in the IT fields. and The Internet of Things is widely used in various industries. This trend may be referred to as the emergence of significant based technologies for realizing a ubiquitous times. But the security problems of Internet of things are expected to increase with being realized in a variety of industries. and it will be have to provide a corresponding technology to the security threat for this. Therefore, this paper will be analyzed to the security threats of the Internet of Things by the cases. Thereby this is expected to be utilized as a basis for the countermeasure of Internet of Things in a future.

Evaluation of an Internet and a Mobile-Based Smoking Cessation Program (인터넷과 모바일 금연교육프로그램의 효과 비교분석)

  • 송태민;최지혜;김혜경
    • Korean Journal of Health Education and Promotion
    • /
    • v.21 no.3
    • /
    • pp.179-193
    • /
    • 2004
  • The potential contribution of the internet and mobile phone to smoking cessation seems huge, given that a majority of Koreans now use internet and have mobile phones. The Korean Ministry of Health and Welfare developed and has been offering an internet-based smoking cessation program from the January, 2002 and a mobile-based program from the April, 2004. Despite the anticipated effectiveness of internet and mobile-based smoking cessation programs, there is little empirical evidence regarding the efficacy of both types of programs. Therefore, this study intended to evaluate the effectiveness of an internet and a mobile-based smoking cessation program and to provide the basic database for the development of effective smoking cessation strategies for the health promotion for the whole nation. Cessation and satisfaction data were obtained from the 434 participants in both programs. The data were analysed for the comparison of quit-smoking rate and the degree of satisfaction between an internet smoking cessation program and a mobile smoking cessation program. The main results of this study were as follows: 1. For the internet program participants, there were statistically significant differences in cessation rate by gender(P<0.05) and age(P<0.01). In contrast, none of general characteristics provided statistically significant differences in cessation rate for the mobile program participants. 2. For the internet program participants, smoking related characteristics(average smoking amount and the reasons for smoking) didn't have an effect on smoking cessation. But, for mobile program participants, there was a statistically significant difference in cessation rate by the reasons for smoking(P<0.05). 3. The cessation rate was 31.9%(abstinence for the previous 30 days) for internet program participants and 17.8% for mobile program participants.

A Glimpse into Brazil Conference (2014 브라질 회의로 가는 길)

  • Chun, Eung Hwi
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.4
    • /
    • pp.63-76
    • /
    • 2013
  • This short report introduces the general background why Brazil conference is being prepared and what topics would be undertaken and what goals are being taken into account. It overviews what differences from traditional telecommunication governance, internet governance has had in its historical development and how such differences had been formed from its technological differences and the regulatory policy shift from common carrier regulation to privatization. Moreover, the fact that open, voluntary, bottom-up, diverse stakeholder's participation had evolved throughout the historical development of the internet, had established the present multistakeholder governance model from technological standardization to addressing scheme policies. ICANN, which has governed internet addressing schemes since the earlier 2000s, had developed address policies including IANA function from Jon Postel and technical community's legacy management system into contract based formation between ICANN and gTLD, ccTLD registries. And it made dispute resolution policies responding to trademark disputes and resolved gTLD monopoly issue by introducing new TLD generation and the separation of registry and registar. However, there had been challenges on the legitimacy of ICANN due to its dependency on the Federal Government of the U.S. particularly in its oversight role over ICANN and IANA contract. WSIS raised up internet governance issues including addressing governance, and set up IGF as a discussion platform for multistakeholders to discuss and share all views on other internet related public policies. IGF's loose and non-binding discussion once frustrated governments and other stakeholders, but more focused discussion and visible outcomes have consolidated its unique role for internet governance discourses. Particularly, IGF addressed many emerging internet related issues like cybersecurity, privacy, net neuratlity, development related issues. WTPF of 2013, after WCIT debate on whether traditional telecommunication regulation could be applied to internet infrastructure, suggested other governance issues such as the transition to ipv6, IXP coordination etc. How to make sure the legitimacy of internet addressing governance and how and where other internet related public policies could be undertaken are fundamental tasks for internet governance. Brazil conference, which has been motivated by the breakdown of trust in internet governance from NSA mass surveillance revealed by Snowden, faces these questions and try to make consensus on principles, institutions and roadmap for internet governance in multistakeholder participation way.

  • PDF

Variable Analysis on University Students' Ethical Utilization of the Internet shown in Internet Ethics Qualification(IEQ) (인터넷 윤리 자격 시험에 나타난 대학생들의 인터넷의 윤리적 활용 변인 분석)

  • Yoon, Mi-Sun;Kim, Bo-Ra;Moon, Young-Bin;Kim, Myuhng-Joo;Park, Jung-Ho
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.3
    • /
    • pp.71-78
    • /
    • 2013
  • Internet ethics has been simply recognized as moral understanding, knowledge of etiquette or a kind of common sense. Recently, however, rapid growth of internet dysfunction such as the inadvertent disclosure of personal information, infringement of copyright and malicious code with hacking, has unavoidably broadened the territory of internet ethics. In this light, education contents of internet ethics must include not only laws and systems but specialized knowledge on prevention and action of internet dysfunction. In this paper, we analyze the variables affecting the educational achievement on diverse domains of internet ethics by investigating internet ethics qualifying examination and afterward we suggest some application methods to strengthen the internet ethics.

  • PDF

An Architecture Design of Distributed Internet Worm Detection System for Fast Response

  • Lim, Jung-Muk;Han, Young-Ju;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.161-164
    • /
    • 2005
  • As the power of influence of the Internet grows steadily, attacks against the Internet can cause enormous monetary damages nowadays. A worm can not only replicate itself like a virus but also propagate itself across the Internet. So it infects vulnerable hosts in the Internet and then downgrades the overall performance of the Internet or makes the Internet not to work. To response this, worm detection and prevention technologies are developed. The worm detection technologies are classified into two categories, host based detection and network based detection. Host based detection methods are a method which checks the files that worms make, a method which checks the integrity of the file systems and so on. Network based detection methods are a misuse detection method which compares traffic payloads with worm signatures and anomaly detection methods which check inbound/outbound scan rates, ICMP host/port unreachable message rates, and TCP RST packet rates. However, single detection methods like the aforementioned can't response worms' attacks effectively because worms attack the Internet in the distributed fashion. In this paper, we propose a design of distributed worm detection system to overcome the inefficiency. Existing distributed network intrusion detection systems cooperate with each other only with their own information. Unlike this, in our proposed system, a worm detection system on a network in which worms select targets and a worm detection system on a network in which worms propagate themselves cooperate with each other with the direction-aware information in terms of worm's lifecycle. The direction-aware information includes the moving direction of worms and the service port attacked by worms. In this way, we can not only reduce false positive rate of the system but also prevent worms from propagating themselves across the Internet through dispersing the confirmed worm signature.

  • PDF

A Customer Oriented Internet Business Implementation Methodology (고객 우선 인터넷 비즈니스 구축 방법론)

  • 이충석;이희석
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 2001.10a
    • /
    • pp.87-90
    • /
    • 2001
  • One of the most important challenges facing companies in the age of internet business is the proper alignment customers needs with internet business system that allaws them to react rapidly and continuously. This paper proposes a methodo1ogy to align analyzing customer's requirements with implementing Internet business system The methodology consists of five Phases. It covers from customer analysis to Internet business system implementation, and each of the five phases has its own activities and outputs. A real- world case is proposed to illustrate the application of the methodology.

  • PDF

Implementation of a Web-based Questionnaire Generating System for the Internet Survey

  • Kim, Young-Bok;Lee, Ji-Yeon
    • Journal of the Korean Data and Information Science Society
    • /
    • v.16 no.4
    • /
    • pp.989-998
    • /
    • 2005
  • The internet survey is more time and cost efficient than the off-line survey. We design and implement a web-based questionnaire generating system for the internet survey. The system guides users to make up a questionnaire step by step. It also generates data code for the statistical packages such as SPSS and SAS when the internet survey has been done.

  • PDF

A Study on the Internet Based Monitoring System (인터넷 기반 계측관리시스템에 관한 연구)

  • 한병원;허인욱;조충붕
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2002.03a
    • /
    • pp.635-642
    • /
    • 2002
  • In this study, a new internet-based methodology to manage the data acquired during the construction and maintenance of structure is study A new internet-based monitoring system to obtain and to manage the measured information regardless of physical location of each user was developed. This method provided an enhanced integration methodology for construction management by implementing common internet or intranet platform

  • PDF

Strategic Alliance and Profit Sharing in the Internet Market with Network Effects (인터넷기업 간 전략적 제휴와 이윤배분: 네트워크 효과를 중심으로)

  • Oh, Jeong-Hun
    • Asia pacific journal of information systems
    • /
    • v.16 no.3
    • /
    • pp.229-241
    • /
    • 2006
  • In this paper, we develop three stage non-cooperative game models to analyze the alliance strategies of companies in internet markets where network effects are present. Regardless of its market share, an internet company's strategic alliance appears to be a superior strategy. The analysis also identifies profit sharing structures in the internet market where a smaller and unknown company is enforced to split its own profits with a larger and well-known company. It is shown that the amount of profit sharing grows as the size of network effects becomes larger.

Design and Implementation of Internet Shopping Mall by Using Virtual Reality-Driven Avatar and Web Decision Support System (가상현실 분신과 웹 의사결정지원 개념에 입각한 인터넷쇼핑몰 설계 및 구현에 관한 연구)

  • 이건창;정남호
    • Proceedings of the Korea Database Society Conference
    • /
    • 1999.06a
    • /
    • pp.361-371
    • /
    • 1999
  • This paper is concerned with designing and implementing the Internet shopping mall by using virtual reality-driven avatar and web decision support system. Traditionally, the Internet shopping mall has been designed based on the combination of several hyperlinks, images, and tents. However, this sort of approach results in a lower performance because possible customers cannot make more accurate shopping decisions. To overcome this kind of pitfalls facing the current Internet shopping malls, we propose using a combination of virtual reality and web DSS. The main virtues of our proposed approach to designing the Internet shopping mall are as follows: First, the virtual reality technique is emerging as one of alternatives guaranteeing a sense of reality for customers' part and facilitating the complex process of shopping decision makings. Especially, the avatar, which is an artificially designed man working on the Internet, can make easy and absorbing the Internet shopping-related decision making processes. Second, the web DSS approach can provide an effective decision support mechanism for customers. Especially, we design a set of intelligent agents for the proposed web DSS. Experimental results with an illustrative example showed that our proposed approach can yield a new Internet shopping mall paradigm with which customers can benefit from a high level of decision support functions.

  • PDF