• Title/Summary/Keyword: online registration

Search Result 67, Processing Time 0.029 seconds

Designing and Implementing an Online-Helping Systems for Class Registration Management - Relate - Classes Search System Perspective - (학사프로그램을 위한 온라인-도움시스템의 설계 및 구현 - 연계과목 검색 시스템을 중심으로 -)

  • Kim Jun-Woo;Lee Ki-Dong;Kim Hak-Hee
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.27 no.4
    • /
    • pp.147-156
    • /
    • 2004
  • Recently, there is the trend that online and reuse have been focused via digitalization of information and business process that individuals, government and firms own. This study, by designing and implementing a system, has the aim to provide on-line information about the classes and related classes to students on real time. Furthermore, with this system, the students can easily search the necessary class information and understand the curriculum structure. Thus he or she can make a decision about classes and moreover his and her career development. Also this system has been designed to be managed with ease and has more expandibility. Thus this is expected to affect the effort of universities and research centers that the online systems and digital contents have been more applied in order to adapt toward rapidly changing education environment.

A Design and Implementation of Online Exhibition Application for Disabled Artists

  • Seung Gyeom Kim;Ha Ram Kang;Tae Hun Kim;Jun Hyeok Lee;Won Joo Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.8
    • /
    • pp.77-84
    • /
    • 2024
  • In this paper, we design and implement an online exhibition application based on an Android platform that can showcase the artistic works of disabled artists. This application considers user convenience for disabled artists, particularly providing STT(Speech-to-Text) and TTS(Text-to-Speech) features for visually and hearing impaired individuals. Additionally, for the exhibition of works by disabled artists, the application implements disability certification during registration using disability certificates and registration numbers, ensuring that only authenticated disabled artists can exhibit their works. The database storing personal information of disabled artists and information about art pieces is implemented using MySQL. The server module utilizes RestAPI to transmit data in Json format. To address the large data size of art piece information, it is stored using Firebase Storage, eliminating data size limitations on the server. This application can alleviate issues such as a lack of exhibition space for disabled artists and a lack of communication with the general public.

Global Activity of Cancer Registries and Cancer Control and Cancer Incidence Statistics in Korea (암등록과 암관리사업의 최신 국제 경향 및 우리나라 암발생 통계)

  • Shin, Hai-Rim
    • Journal of Preventive Medicine and Public Health
    • /
    • v.41 no.2
    • /
    • pp.84-91
    • /
    • 2008
  • The World Health Organization (WHO) reported that cancer killed 7.6 million people in the world in 2005, and that 40% of all cancer deaths can be prevented. According to the WHO Global Action Plan Against Cancer (GAPAC), monitoring of cancer patients is the essential part of cancer control, and should be conducted through cancer registration. Originally, cancer registries were primarily concerned with the description of cancer patterns, trends of cancer occurrence, and etiology of cancer. In the last 20 years, cancer registries provided not only information on the incidence and characteristics of specific cancers, but also supplied the source of cancer control planning and evaluation and the care of individual cancer patients with survival. Cancer Incidence in Five Continents (CI5) presents incidence data from populations all over the world every five year. Volume IX in the series (data for 1998-2002) has recently (November 2007) been published online at International Agency for Research on Cancer (IARC). Nine data from Korea Central Cancer Registry (National data), Seoul, Busan, Daegu, Gwangju, Incheon, Daejeon, Usan, Jejudo regional cancer registries were included in that volume. In this paper, the editorial process, the characteristics of national data, and quality indices in CI5 IX are being described. In addition, cancer control activities related to cancer registration in some selected countries are also presented.

Safety Improvement Methods of Personal Identification Services using the i-Pin (아이핀 기반 본인확인서비스의 안전성 강화 방안)

  • Kim, Jongbae
    • Journal of Information Technology Services
    • /
    • v.16 no.2
    • /
    • pp.97-110
    • /
    • 2017
  • Due to development of IT, various Internet services via the non-face-to-face are increasing rapidly. In the past, the resident registration numbers (RRN) was used a mean of personal identification, but the use of RRN is prohibited by the relevant laws, and the personal identification services using alternative means are activated. According to the prohibition policy of RRN, i-PIN service appeared as an alternative means to identify a person. However, the user's knowledge-based i-PIN service continues to cause fraudulent issuance, account hijacking, and fraud attempts due to hacking accidents. Due to these problems, the usage rate of i-PIN service which performs a nationwide free personal identification service, is rapidly decreasing. Therefore, this paper proposes a technical safety enhancement method for security enhancement in the i-PIN-based personal identification service. In order to strengthen the security of i-PIN, this paper analyzes the encryption key exposure, key exchange and i-PIN authentication model problems of i-PIN and suggests countermeasures. Through the proposed paper, the i-PIN can be expected to be used more effectively as a substitution of RRN by suggesting measures to enhance the safety of personal identification information. Secured personal identification services will enable safer online non-face-to-face transactions. By securing the technical, institutional, and administrative safety of the i-PIN service, the usage rate will gradually increase.

A Process Model of E-Government Development: A case of E-Government Portals in Town of Amherst

  • Braynov, S.;Rao, H.R.;Song, Y.I.
    • Proceedings of the Korea Technology Innovation Society Conference
    • /
    • 2003.11a
    • /
    • pp.345-357
    • /
    • 2003
  • The paper discusses a novel educational initiative in e-commerce pedagogy where students work on an e-government project. The paper describes a two-semester joint e-government project conducted by the town of Amherst, NY, and the State University of New York at Buffalo. During the first semester, students in a graduate e-commerce course in the School of Management were instructed to identify and analyze management issues valuable for small or middle size local government. In the second semster graduate students from the Department of Computer Science and Engineering designed and implemented prototypes of three e-government portals: an on-line action site for governmental procurement (E-Procurement), a portal for reservation of community recreation facilities (E-Recreation), and a portal for online dog registration (E-DogRegistration) combining a central registry of dog owners with distributed veterinarian databases. The objective of this initiative is twofold. First, it saves the local government resources by eliminating duplication of services and by using students as developers. Second, it provides students with real life hands-on experience. The paper discusses both the technical issues involved in the implementation of the project, and the management issues that need to be taken into account to enhance the e-commerce experience for the ordinary citizen and local governments.

  • PDF

Client Authentication Scheme based on Infinitely Overlapped Hashchains on Hyperledger Fabric (Hyperledger Fabric을 이용한 중첩형 무한 해시체인 기반의 클라이언트 인증기법)

  • Shin, Dong Jin;Park, Chang Seop
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.3-10
    • /
    • 2018
  • Each online user should perform a separate registration and manage his ID and password for each online commerce or SNS service. Since a common secret is shared between the user and the SNS server, the server compromise induces the user privacy breach and financial loss. In this paper, it is considered that the user's authentication material is shared between multiple SNS servers for user authentication. A blockchain service architecture based on Hyperledger Fabric is proposed for each user to utilize an identical ID and OTP using the enhanced hash-chain-based OTP.

  • PDF

Enhancing Consumer Awareness and Privacy Protection in the Era of Over-the-Top(OTT) Services: Focused on Behavioral Information Collection and Personalized Content (OTT(Over The Top) 서비스 시대의 소비자 인식 및 개인정보 보호 강화: 행태정보 수집과 개인화 맞춤형 서비스를 중심으로)

  • Seung-Yeon Lee;Ji-Hyun Jeon;Jun-Hyoung Oh
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.505-513
    • /
    • 2024
  • This study investigates how consumers perceive the collection of behavioral information through 'cookies' on OTT platforms and the impact it has on personalized services. Through SPSS analysis on 120 consumers, which was conducted to examine four hypotheses, correlations were found between awareness of OTT companies' behavioral information collection and online tracking recognition, awareness and willingness to provide cookies, and the extent of confirming behavioral information collection terms during registration and online tracking recognition. The study concludes that consumer knowledge about behavioral information significantly influences the importance and intention to use personalized services, highlighting the need for regulatory measures by both companies and government entities.

Participation Level in Online Knowledge Sharing: Behavioral Approach on Wikipedia (온라인 지식공유의 참여정도: 위키피디아에 대한 행태적 접근)

  • Park, Hyun Jung;Lee, Hong Joo;Kim, Jong Woo
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.97-121
    • /
    • 2013
  • With the growing importance of knowledge for sustainable competitive advantages and innovation in a volatile environment, many researches on knowledge sharing have been conducted. However, previous researches have mostly relied on the questionnaire survey which has inherent perceptive errors of respondents. The current research has drawn the relationship among primary participant behaviors towards the participation level in knowledge sharing, basically from online user behaviors on Wikipedia, a representative community for online knowledge collaboration. Without users' participation in knowledge sharing, knowledge collaboration for creating knowledge cannot be successful. By the way, the editing patterns of Wikipedia users are diverse, resulting in different revisiting periods for the same number of edits, and thus varying results of shared knowledge. Therefore, we illuminated the participation level of knowledge sharing from two different angles of number of edits and revisiting period. The behavioral dimensions affecting the level of participation in knowledge sharing includes the article talk for public discussion and user talk for private messaging, and community registration, which are observable on Wiki platform. Public discussion is being progressed on article talk pages arranged for exchanging ideas about each article topic. An article talk page is often divided into several sections which mainly address specific type of issues raised during the article development procedure. From the diverse opinions about the relatively trivial things such as what text, link, or images should be added or removed and how they should be restructured to the profound professional insights are shared, negotiated, and improved over the course of discussion. Wikipedia also provides personal user talk pages as a private messaging tool. On these pages, diverse personal messages such as casual greetings, stories about activities on Wikipedia, and ordinary affairs of life are exchanged. If anyone wants to communicate with another person, he or she visits the person's user talk page and leaves a message. Wikipedia articles are assessed according to seven quality grades, of which the featured article level is the highest. The dataset includes participants' behavioral data related with 2,978 articles, which have reached the featured article level, with editing histories of articles, their article talk histories, and user talk histories extracted from user talk pages for each article. The time period for analysis is from the initiation of articles until their promotion to the featured article level. The number of edits represents the total number of participation in the editing of an article, and the revisiting period is the time difference between the first and last edits. At first, the participation levels of each user category classified according to behavioral dimensions have been analyzed and compared. And then, robust regressions have been conducted on the relationships among independent variables reflecting the degree of behavioral characteristics and the dependent variable representing the participation level. Especially, through adopting a motivational theory adequate for online environment in setting up research hypotheses, this work suggests a theoretical framework for the participation level of online knowledge sharing. Consequently, this work reached the following practical behavioral results besides some theoretical implications. First, both public discussion and private messaging positively affect the participation level in knowledge sharing. Second, public discussion exerts greater influence than private messaging on the participation level. Third, a synergy effect of public discussion and private messaging on the number of edits was found, whereas a pretty weak negative interaction effect of them on the revisiting period was observed. Fourth, community registration has a significant impact on the revisiting period, whereas being insignificant on the number of edits. Fifth, when it comes to the relation generated from private messaging, the frequency or depth of relation is shown to be more critical than the scope of relation for the participation level.

Secure E-Voting System with Secure Storage Media

  • Allayear, Shaikh Muhammad;Park, Sung-Soon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2005.05a
    • /
    • pp.1075-1078
    • /
    • 2005
  • The Global IT revolution is growing rapidly. Government and business have to be ready to meet the increased demand for effective and secure online services. With the E-Government practicing, day-by-day the public demand is also increasing simultaneously. Now this present moment, one of important research part is secure E-Voting for E-Government service, but for this important factor or Government Issue, it needs information privacy for secure information transaction of citizen’s opinions and secure authentication. This paper has analyzed several approaches E-voting protocols, those are implemented with many digital signature mechanism and maintained many types of cryptographic rules, which are main factor for information privacy. In this paper we have discussed them with a view to voter anonymity and protection from manipulations. The paper then developed an algorithm designed to guarantee anonymity of the voter and to avoid the risk of manipulation of votes. In this paper the proposed algorithm is based upon the strict separation of voter’s registration and submission of votes, which means that certain information has to be stored on a secure storage media.

  • PDF

ID-Based Optimistic Fair Exchange Scheme Based on RSA

  • Youn, Taek-Young;Chang, Ku-Young
    • ETRI Journal
    • /
    • v.36 no.4
    • /
    • pp.673-681
    • /
    • 2014
  • Fairness of exchange is a significant property for secure online transactions, and a fair exchange scheme is a useful tool for ensuring the fairness of exchanges conducted over networks. In this paper, we propose an ID-based optimistic fair exchange scheme based on the RSA function, one which is designed by combining a well-known RSA-based signature scheme and the (naive) RSA function. Note that the main contribution of this paper is to give the first provably secure ID-based fair exchange scheme based on the RSA function, whose security can be proved under fully formalized security models. Our scheme has the following additional strongpoints. The scheme is setup-free; hence, there is no registration step between a user and an arbitrator. Moreover, the proposed scheme is designed in an ID-based setting; thus, it is possible to eliminate the need for certificates and avoid some related problems.