• Title/Summary/Keyword: personal communication services

Search Result 353, Processing Time 0.032 seconds

The Impact of Trust in Mobile Instant Messenger and Platform on Mobile Contents Purchase Intention: Focusing on Kakao Platform and KakaoTalk Emoticon (모바일 인스턴트 메신저 및 플랫폼 신뢰도가 모바일 콘텐츠 구매의도에 미치는 영향: 카카오플랫폼과 카카오톡 이모티콘을 중심으로)

  • Jung, Bohee;Kim, Hanku
    • The Journal of Information Systems
    • /
    • v.25 no.2
    • /
    • pp.131-152
    • /
    • 2016
  • Purpose Mobile phones increase the frequency and speed of communication. The most popular mobile application in Korea is KakaoTalk, one of the mobile instant messenger(MIM) services. Although studying mobile services such as SMS, SNS and SNG suggests drawing upon theories in marketing, consumer behavior, psychology to investigate their personal use, research on MIM is scarce. We designed this paper to fill this gap. More specifically, this study is focused on the relationships among consumers psychological variables related to purchase intention to emoticons in context of MIM. Design/methodology/approach Data was obtained from 310 KakaoTalk users in Korea via questionnaire. The data was analyzed by structural equation modeling in order to verify the relationship between variables in the model. Specifically, this study is designed to examine the structural relationships among perceived benefits, perceived risks, trust in messenger service, system quality, trust in platform, and emoticons purchase intention. Findings The findings of this study are as follow. First, perceived benefits and perceived risks had a significant impact on trust in MIM service(e.g. KakaoTalk). Specifically, while perceived benefits had a positive effect on trust in MIM service, perceived risks had a negative effect on trust in MIM service. Second, trust in messenger service also had a positive impact on system quality. Third, trust in messenger service and system quality had a positive effect on trust in platform(e.g. Kakao platform) directly. Lastly, trust in platform had a positive influence on emoticons purchase intention in KakaoTalk messenger.

O.P.E.N Triad: The Future Success for Individuals, Institutes, and Industries

  • Kim, Hae-Jung;Forney, Judith;Crowley, Ruth
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.34 no.12
    • /
    • pp.1980-1991
    • /
    • 2010
  • This study proposes the O P E N Triad framework as a future set of tools and perspectives for individual members and institutes to further their professional and academic potential as well as prospect and vitalize the future of the Korean Clothing and Textiles discipline through a global perspective. The millennial generation desires On-demand, Personal, Engaging, and Networked (O P E N) experiences effecting cultural change for creative and influential interaction in transactions, communication, and education. O P E N Individuals offers a WebSphere model as a holistic learning system that has a synergizing value of education across academic courses, industries, and cultures. Through a digitalized and virtualized class, it complements relevant technologies already familiar to the student population. By employing environmental scanning approaches, the most influential and viable future global issues related to the clothing and textiles discipline are identified and dialogued within O P E N Institutes. For future clothing and textiles institutes, this scanning allows them to be open to new ideas, to focus on inter-engagements, to collaborate among individuals, to associate as a part of web of people, organizations, and ideas, to personalize an institutes curricula, and to dialogue generative knowledge. O P E N Industries reveals three dominant future issues that cross academia and industry, sustainability, supply chain management, and social networking. In-depth interviews with U.S. industry experts identified interdependent gaps in global consumer experience practices and suggested the following gaps as future research areas: a standardized business model to the entrepreneurial model, strategic management to a sustainable competitive advantage, standardized to differentiated products, services and operations, market segmentation to global consumer clusters, business-driven marketplaces to consumer-engaged marketspaces, and excellent services to optimal experience. This O P E N Triad framework empowers millennial students, universities, and industries to anticipate and prepare for a radically changing world.

User Authentication System using OCR (광학문자인식을 이용한 사용자 인증 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.9
    • /
    • pp.15-22
    • /
    • 2018
  • As smart devices become popular, users can use authentication services in various methods. Authentication services include authentication using an ID and a password, authentication using a sms, and authentication using an OTP(One Time Password). This paper proposed an authentication system that solves the security problem of knowledge-based authentication using optical character recognition and can easily and quickly authenticate users. The proposed authentication system extracts a character from an uploaded image by a user and authenticates the user using the extracted character information. The proposed authentication system has the advantage of not using a password or an OTP that are easily exposed or lost, and can not be authenticated without using accurate photographs. The proposed authentication system is platform independent and can be used for user authentication, file encryption and decryption.

A Study on Cloud Computing for Financial Sector limited to Processing System of Non-Critical Information: Policy Suggestion based on US and UK's approach (비중요 정보처리시스템으로 한정된 국내 금융권 클라우드 시장 활성화를 위한 제안: 영미 사례를 중심으로)

  • Do, Hye-Ji;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.22 no.4
    • /
    • pp.39-51
    • /
    • 2017
  • In October 2016, the NFSA (National Financial Supervisory Authorities) revised the network separation clause of the Regulation on Supervision of Electronic Financial Activities in order to promote the Cloud Computing implementation in the financial sectors. The new regulation, however, limits the Cloud Computing usage to non-critical information and its processing system. Financial institutions that provide customer data analysis and personalized services based on personal data regard current revision as unchanged as before. The implementation of Cloud Computing has greatly contributed to cost reduction, business innovation and is an essential requirement in ever-changing information communication technology environment. To guarantee both security and reliability of the implementation of the Cloud Computing in financial sectors, a considerable amount of research and debate needs to be done. This paper examines current Cloud Computing policies in the Korean financial sector and the challenges associated with it. Finally, the paper identifies policy suggestions based on both European Union and United States' approach as they have successfully introduced Cloud Computing Services for their financial sectors.

Design and Evaluation of a Fault-Tolerant Distributed Location Management Method in Mobile Environments (이동 환경에서 결함 포용 분산 위치 관리 방법의 설계 및 평가)

  • Bae, Ihn-Han;Oh, Sun-Jin
    • Journal of Internet Computing and Services
    • /
    • v.1 no.1
    • /
    • pp.35-46
    • /
    • 2000
  • One of the main chalenges in personal communication services (PCS) is to locate many mobile terminals that may move frequently from place to place. Such a system operation is called location management. Many network signaling traffic, and database queries are required to achieve such a task. Several strategies have been proposed to improve the efficiency of location management. These strategies use location register databases to store the current location on mobile terminals, and are vulnerable to failure of the location registers. In this paper, we propose a fault-tolerant pointer forwarding with distributed home location register (FT-RFDHLR) to tolerate the failure of location registers. The performance of the proposed method is evaluated by an analytical model, and is compared with thew pointer forwarding with the single home location register (PFSHLR), the pointer forwarding with distributed home location register (PFDHLR), Biaz's bypass forwarding strategy (BFS) and two-path forwarding strategy (TPFS).

  • PDF

Mutual Authentication and Secure Session Termination Scheme in iATA Protocol

  • Ong, Ivy;Lee, Shirly;Lee, Hoon-Jae;Lim, Hyo-Taek
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.4
    • /
    • pp.437-442
    • /
    • 2010
  • Ubiquitous mobile computing is becoming easier and more attractive in this ambient technological Internet world. However, some portable devices such as Personal Digital Assistant (PDAs) and smart phones are still encountering inherent constraints of limited storages and computing resources. To alleviate this problem, we develop a cost-effective protocol, iATA to transfer ATA commands and data over TCP/IP network between mobile appliances and stationary servers. It provides mobile users a virtual storage platform which is physically resided at remote home or office. As communications are made through insecure Internet connections, security risks of adopting this service become a concern. There are many reported cases in the history where attackers masquerade as legitimate users, illegally access to network-based applications or systems by breaking through the poor authentication gates. In this paper, we propose a mutual authentication and secure session termination scheme as the first and last defense steps to combat identity thief and fraud threat in particular for iATA services. Random validation factors, large prime numbers, current timestamps, one-way hash functions and one-time session key are deployed accordingly in the scheme. Moreover, we employ the concept of hard factorization problem (HFP) in the termination phase to against fraud termination requests. Theoretical security analysis discussed in later section indicates the scheme supports mutual authentication and is robust against several attacks such as verifiers' impersonation, replay attack, denial-of-services (DoS) attack and so on.

An Enhancement on the Selection of Information Protection Security Diagnosis Target Firms (정보보호 안전진단 대상자 선정기준의 개선 연구)

  • Ahn, Yeon-Shick;Suh, Jeong-Hoon;Jang, Sang-Soo
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2008.05a
    • /
    • pp.572-577
    • /
    • 2008
  • The information protection security diagnosis institution was applied services since 2004, for the leveling up of public information protection and the establishment of the stability and reliability of information communication. And this security diagnosis was however, recognized by the some firms as one of the unnecessary regulations. And there are some difficulties with collecting the subjective and reliable source data for establishing the information protection security diagnosis target. In this research, the enhanced model on the selection of information protection security diagnosis target firms was suggested by the interview with some expert and the analysis for the related actual data. By the model which are introduced from the statistical analysis of the related data and the summary of some expert's suggestions, information protection security diagnosis target can include the information telecommunication service providers taking 5 billion won as sales in a year, and web service providers like as shopping mall site, with the personal records of 2 million subscribers.

  • PDF

Study of Platform for Real-Time Medical Information Protection and Management (실시간 의료정보 보호 및 관리를 위한 플랫폼에 관한 연구)

  • Jeong, Chang Won;Lee, Sung Gwon;Joo, Su Chong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.8
    • /
    • pp.245-250
    • /
    • 2014
  • In recent years, the developments of medical technology and emergency medical services have been changed to home from the hospital. In this regard, the researches for the prevention or early diagnosis have become actively. In particular, bio-signal monitoring is applied to a variety of u-healthcare application services. The proposed system in this paper is to provide a security technology to protect the medical information measured from the various sensors. Especially, bio-signal information is privacy-sensitive personal information that must be protected. We applied a two-dimensional code technology, QR code, for the protection and management. In the client side, it can analyze the QR code and confirm the results on devices. Finally, with this proposed platform, we show the results of application service to verify the creation and distribution of integrated image file between the bio-signal and medical image information.

Design and Parameter Optimization of Virtual Storage Protocol (iATA) for Mobile Devices (모바일 기기를 위한 가상 스토리지 프로토콜(iATA)의 설계 및 파라메터 최적화)

  • Yeoh, Chee-Min;Lim, Hyo-Taek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.2
    • /
    • pp.267-276
    • /
    • 2009
  • Nowadays, numerous of valuable internet services are available not only for personal computer but also for mobile appliances in wireless network environment. Therefore, as the amount of contents is increased for those services, the storage limitation on mobile devices has became a significant issue. In this paper, we present a new block-level storage network protocol, iATA (Internet Advanced Technology Attachment) as a solution to the above problem. iATA is designed to transport ATA block-level data and command over the ubiquitous TCP/IP network. With iATA, a mobile appliance is able to access and control the ATA storage devices natively through network from anywhere and at anytime as if the storage devices is attached locally. We describe the concepts, design and diverse consideration of iATA protocol. Based on the benchmark experiments and application exploitation, we strongly believe that iATA as a light-weight protocol is efficient and cost-effective to be used as a storage network protocol on a resource limited device that utilizes common-off-the-shelf storage hardware and existing IP infrastructure.

Ultra-Wide Band Sensor Tuning for Localization and its Application to Context-Aware Services (위치추적을 위한 UWB 센서 튜닝 및 상황인지형 서비스에의 응용)

  • Jung, Da-Un;Choo, Young-Yeol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1120-1127
    • /
    • 2008
  • This paper presents implementation of localization system using UWB (Ultra-Wide Band) sensors and its experimental results along with development of context-aware services. In order for precise measurement of position, we experimented various conditions of pitch angles, yaw angles, number of sensors, height of tags along with measuring errors at each installation. As an application examples of the location tracking system, we developed an intelligent health training management system based on context-aware technology. The system provides appropriate training schedule to a trainee by recognizing position of the trainee and current status of gymnastic equipments and note the usage of the equipment through a personal digital assistant (PDA). Error compensation on position data and moving direction of the trainee was necessary for context-aware service. Hence, we proposed an error compensation algorithm using velocity of the trainee. Experimental results showed that proposed algorithm had made error data reduce by 30% comparing with the data without applying the algorithm.