• Title/Summary/Keyword: internet service provider

Search Result 361, Processing Time 0.024 seconds

Research on Application of Service Design Methodology in IOT Environment

  • Kim, Byung-Taek;Cho, Yun-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.53-60
    • /
    • 2017
  • The purpose of this study is to provide empirical and quantitative analysis on user's perceived privacy, security, and user satisfaction when providing visualization information about objects and service provider behaviors that users can not perceive in internet service process. Through previous research, we have examined the importance of privacy and security factors as a key factor to be considered for the characteristics of the Internet of things and the Internet of things. In addition, service blueprint, which is one of the service design methodologies to examine the flow of service usage in providing Internet service of things, was examined. In the flow of things internet service utilization, it is found that the things that are out of the user's cognitive area and the behavior of the service provider take up a large part. Therefore, the hypothesis that the trust of the Internet service security and the satisfaction of the user experience can be improved by providing the security visualization information about the behavior of the object and the invisible service provider in the non-contact aspect of the user and the object. In order to verify the hypothesis, we conducted experiments and questionnaires on the use of virtual objects' internet environment and conducted statistical analysis based on them. As a result, it was analyzed that visual information feedback on non - contact and invisible objects and service provider's behaviors had a positive effect on user's perceived privacy, security, and satisfaction. In addition, we conclude that it can be used as a service design evaluation tool to eliminate psychological anxiety about security and to improve satisfaction in internet service design. We hope that this research will be a great help for the research on application method of service design method in Internet environment of objects.

Global Manager - A Service Broker In An Integrated Cloud Computing, Edge Computing & IoT Environment

  • Selvaraj, Kailash;Mukherjee, Saswati
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1913-1934
    • /
    • 2022
  • The emergence of technologies like Big data analytics, Industrial Internet of Things, Internet of Things, and applicability of these technologies in various domains leads to increased demand in the underlying execution environment. The demand may be for compute, storage, and network resources. These demands cannot be effectively catered by the conventional cloud environment, which requires an integrated environment. The task of finding an appropriate service provider is tedious for a service consumer as the number of service providers drastically increases and the services provided are heterogeneous in the specification. A service broker is essential to find the service provider for varying service consumer requests. Also, the service broker should be smart enough to make the service providers best fit for consumer requests, ensuring that both service consumer and provider are mutually beneficial. A service broker in an integrated environment named Global Manager is proposed in the paper, which can find an appropriate service provider for every varying service consumer request. The proposed Global Manager is capable of identification of parameters for service negotiation with the service providers thereby making the providers the best fit to the maximum possible extent for every consumer request. The paper describes the architecture of the proposed Global Manager, workflow through the proposed algorithms followed by the pilot implementation with sample datasets retrieved from literature and synthetic data. The experimental results are presented with a few of the future work to be carried out to make the Manager more sustainable and serviceable.

VIRTUAL TELEMATICS SERVICE PROVIDER SYSTEM

  • Jang, In-Sung;Lee, Jun-Wook
    • Proceedings of the KSRS Conference
    • /
    • v.2
    • /
    • pp.836-839
    • /
    • 2006
  • Telematics, one of the so-called New Growth Engine of IT839, is a leading IT service where wireless internet service represented by information and mobility is extended to the area of transportation. To provide telematics service, Telematics service provider have to connect with various Contents Provider or Service Provide server - for example - LBSS(Location Based Service Server), ASPS(Application Service Provider Server), TELICS(TELematics Information Center Server), GMS(Geo-mobility Server), WTPS(World Telematics Protocol Server) and MAUS(Map Air Update Server). Presently, It is nearly impossible or very difficult for the company that are manufacturing and testing telematics device to develop and test telematics solution without connecting Telematics Service Provider, Service Provider, Contents Provider. And, it is very difficult to connect in TSP, CP, SP having the product to be developed. In this paper, we proposed virtual telematics service provider. The proposed Virtual Telematics Service Provider is to provide telematics services and functionalities by integrating telematics servers into TSP gateway virtually. In other words, VTSP is performs with the role of TSP, CP, SP. And the VTSP support integration of telematics servers, interfacing and monitoring between terminal and the integrated servers.

  • PDF

The Impacts of Perceived Usefulness, Ease of Use, Reputation, and Usage Fee of the Internet Entertainment Service on the Use of the Service (인터넷 오락 서비스의 유용성, 용이성, 명성, 그리고 유료화가 그 서비스 사용에 미치는 영향)

  • Kim, Chy-Heon;Kim, Joon-S.
    • Asia pacific journal of information systems
    • /
    • v.13 no.3
    • /
    • pp.85-106
    • /
    • 2003
  • Recently, firms which have offered a "free Internet service" to their customers, are considering a "charged Internet service" for increasing a company's profit. But they have doubts about the results, because consumers may fly away from their web-site easily and may discontinue using their services. The purpose of this study is to investigate which factors make consumers use the charged Internet services. To do this, the factors, which are ease of using the service, usefulness of the service, the reputation of the service provider, service cost, and the intention to use the service as a mediator, are analyzed. To achieve this research objective, a structural equation model was constructed and a field study method was used. The findings are summarized as follows: First, ease of using the service, usefulness of the service, and service cost have significant impacts on the charged Internet service usage through the intention to use. Especially, although service cost influences on the service usage largely, the usefulness of the service has a bigger impact on the charged Internet service usage than service cost. Second, the reputation of the service provider does not have any impact on the service usage. Third, consumers using only the free Internet service tend to hesitate about using the "charged Internet service" because they doubt its ease of use and usefulness in spite of the service cost.

Criminal liability of Internet Service Provider who leave illegal positing to take its own course (인터넷불법게시물을 방임하는 인터넷서비스제공자의 형사책임)

  • Yoo, In-Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.163-170
    • /
    • 2012
  • Nowadays Internet is the greatest and most participating media of prompting expression with 37 million users in Korea. Internet enables collective communications between social members and contributes to form sound public opinions and to develop democracy while it has negative aspect to distribute massively crime by illegal posting which is forbidden by the Criminal Act. Criminal actors who involve to diffuse information on Internet consist of three categories of information provider, user and internet service provider. Illegal posting generated on Internet is originated from IP and the criminal regulation on it is useless and meaningless because of its countless of users and ambiguous boundary with liberty for expression. Accordingly, the only criminal policy means to prevent danger by illegal posting on Internet is to regulate ISP which saves illegal posting and mediates contacts among users. In spite of it, legislation to regulate ISP is unprepared. The prudent legislative review should be done. And it should be accordance with the doctrines of propriety and vagueness of the principle of "nulla poena sine lege".

Novel Pre-pushing & Downloading Model in Mobile Peer-assisted Streaming Network

  • Lin, Fuhong;Zhou, Xianewi;Chen, Changjia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.12
    • /
    • pp.3135-3148
    • /
    • 2013
  • The popularization of streaming networks and mobile devices brings a new kind of network called mobile peer-assisted streaming network. In this network, service provider not only offers downloading services, but also pre-pushes resources to users for caching. Users can download their demanded resources while working as servers for uploading the cached data. Also the mobile characteristic makes high package losing probability in this network. So we study how the service provider pre-pushes or the user downloads resources efficiently and effectively while considering the package losing in this paper. We build utility models for service provider and user, and solve the models using Bellman's theory to achieve Nash Equilibrium which shows the service provider's optimal pre-pushing speed and user's optimal downloading speed. The numerical simulation demonstrates the efficiency and effectiveness of our proposed pre-pushing and downloading scheme by comparing to the traditional scheme.

Authenticated IGMP for Controlling Access to Multicast Distribution Tree (멀티캐스트 분배트리 접근제어를 위한 Authenticated IGMP)

  • Park, Chang-Seop;Kang, Hyun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.3-17
    • /
    • 2007
  • Receiver access control scheme is proposed to protect multicast distribution tree from DoS(Denial-of Service) attack induced by unauthorized use of IGMP(Internet group management protocol), by extending the security-related functionality of IGMP. Based on a specific network and business model adopted for commercial deployment of IP multicast applications, key management scheme is also presented for bootstrapping the proposed access control as well as accounting and billing for CP(Content Provider), NSP(Network Service Provider), and group members.

A Framework for Trustworthy Open Shared Authentication Protocol (신뢰적인 개방형 공유 인증 프로토콜 프레임워크)

  • Park, Seung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.18C no.6
    • /
    • pp.389-396
    • /
    • 2011
  • Recently, researches on the shared authentication based on single sign-on have been actively performed so as to solve the problems of current service provider-centric and isolated Internet authentications, including low usability, high cost structure, and difficulty in privacy protection. In order for the shared authentication model, where the authentications of an authentication provider are shared by several Internet service providers, to be accepted in real Internet environment, trustworthiness among users, service providers, and authentication providers on the level of authentication assurance and the level of authentication information protection is necessarily required. This paper proposes a framework for trustworthy and privacy-protected shared authentication protocol based on the user-centric operation and open trust provider network. The proposed framework is differentiated from previous works in the points that it is able to provide interoperable shared authentication services on the basis of open trust infrastructure.

Optimal Provider Mobility in Large-Scale Named- Data Networking

  • Do, Truong-Xuan;Kim, Younghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4054-4071
    • /
    • 2015
  • Named-Data Networking (NDN) is one of the promising approaches for the Future Internet to cope with the explosion and current usage pattern of Internet traffic. Content provider mobility in the NDN allows users to receive real-time traffic when the content providers are on the move. However, the current solutions for managing these mobile content providers suffer several issues such as long handover latency, high cost, and non-optimal routing path. In this paper, we survey main approaches for provider mobility in NDN and propose an optimal scheme to support the mobile content providers in the large-scale NDN domain. Our scheme predicts the movement of the provider and uses state information in the NDN forwarding plane to set up an optimal new routing path for mobile providers. By numerical analysis, our approach provides NDN users with better service access delay and lower total handover cost compared with the current solutions.

Neutrality between a Vertically Integrated Cable Provider and an Over-the-Top Video Provider

  • Dai, Wei;Baek, Ji Won;Jordan, Scott
    • Journal of Communications and Networks
    • /
    • v.18 no.6
    • /
    • pp.962-974
    • /
    • 2016
  • We are concerned with whether a vertically integrated broadband and content provider can unreasonably advantage itself over competing content providers, either by selling quality-of-service (QoS) to content providers at unreasonably high prices, or by refusing to provide access to QoS to competing content. We address this question by modeling the competition between one such vertically integrated provider and one over-the-top (OTT) content provider. The broadband provider decides whether to deploy QoS, and if so it also determines the QoS price if sold to either the OTT content provider or directly to users. We analytically determine when the broadband provider will sell QoS and when the OTT content provider or users will purchase QoS. We characterize the optimal QoS and video service prices. The Internet service provider (ISP)'s market share increases with the difference in the value of the two video services and decreases with the difference in the corresponding costs. Numerical results illustrate the effect of QoS price on content price, the variation of prices and profit with QoS price, and the variation of prices and market shares with the benefit of QoS. The ISP may sell QoS to users at a lower price than when QoS is sold to the OTT provider.