• Title/Summary/Keyword: security services

Search Result 2,899, Processing Time 0.026 seconds

Factors Affecting Continuous Intention to Use Mobile Wallet : Based on Value-based Adoption Model (모바일 지갑의 가치와 지속사용의도의 영향요인 : VAM 모형을 기반으로)

  • Lee, Chungah;Yun, Haejung;Lee, Chunghun;Lee, Choong C.
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.1
    • /
    • pp.117-135
    • /
    • 2015
  • Mobile wallet that can keep coupons and membership cards for mobile is one of rapidly growing services due to its usability and financial benefit. However, in spite of its rapid growth, the increase of users who do not use continuously it is an important consideration to service providers for making a profit. This study aims to test the effects of factors affecting the continuous use intention of mobile wallet based on VAM (Value-based Adoption Model) which can analyse them in both benefit and sacrifice aspects, so as to suggest considerations to increase the use period of mobile wallet for service providers. The research findings supported the hypotheses regarding to the effects of usefulness, value-expression, perceived security and enjoyment in the benefit aspect and technicality in the sacrifice aspect on perceived value. In addition, the causal path from perceived value to continuous use intention was significant. The study results are expected to be used in marketing or service improvement for short-term users by taking account of emotional factors as well as functional factors.

Convergence and Integration Review of Fire fighter Image through Disaster Movies (재난 영화를 통해 본 소방관 이미지에 대한 융·복합적 고찰)

  • Lee, In-Seob;Kim, Jee-Hee;Kim, Yun-Jeong
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.2
    • /
    • pp.91-97
    • /
    • 2017
  • The purpose of the study was to investigate the fire fighter image through disaster movies in Korea and other countries. From September 1 to 7, 2016, the movie search methods were carried out using movie title and key words via Wikipedia and various internet web sites from 1903 to 2016. The results included that the fire fighters had been considered as the precious person of volunteer activity regarding fire suppression, investigators, and self-sacrifice. Through the convergence and integration review of the disaster movie, this research suggested that the national based establishment of the welfare and safety system for the posttraumatic stress disorder(PTSD) and critical incident stress management(CISM) education program. This study will provide the basic data for the development of welfare and safety management for the fire fighters and let the people know the sacrifice of the fire fighters including the motto, "First in and the last out".

Log Management System of Web Server Based on Blockchain in Cloud Environment (클라우드 환경에서 블록체인 기반의 웹서버 로그 관리 시스템)

  • Son, Yong-Bum;Kim, Young-Hak
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.7
    • /
    • pp.143-148
    • /
    • 2020
  • Recently, web services have been expanded to various areas with the evolution of cloud environment. Whenever a user accesses a web service, the user's log information is stored in the web server. This log information is used as data to analyze the user's web service tendencies and is also used as important data to track the user's system access when a security problem in the system occurs. Currently, most web servers manage user log information in a centralized manner. When user log information is managed in a centralized manner, it is simple in the side of operation, but has a disadvantage of being very vulnerable to external malicious attacks. In the case of centralized management, user log information stored in the web server can be arbitrarily manipulated by external attacks, and in severe cases, the manipulated information can be leaked. In this case, it not only decreases the trust of the web service, but also makes it difficult to trace the source and cause of the attack on the web server. In order to solve these problems, this paper proposes a new method of managing user log information in a cloud environment by applying blockchain technology as an alternative to the existing centralized log management method. The proposed method can manage log information safely from external attacks because user log information is distributed and stored in blockchain on a private network with cloud environment.

Open IPTV Platform using Overlay Multicast and Content Delivery Network (오버레이 멀티캐스트 및 콘텐츠 전달 네트워크를 적용한 개방형 IPTV 플랫폼)

  • Jung, Seung-Moon;Kang, Im-Chul;Jeon, Jin-Han
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.528-536
    • /
    • 2009
  • Recently, the importance of IPTV providing multimedia service over IP based networks managed to provide the required level of quality of service and experience, security, interactivity and reliability has been gradually increasing by the commercialization of its service. However, the original purposes of IPTV service - contents are produced and consumed anytime, anywhere, and over any device at the same time - have not been satisfied by service providers because most services offered by service providers depend on closed IPTV platform. In this paper, we propose an open IPTV service platform that an individual or small company can easily produce contents and offer IPTV service independently from the existing closed IPTV platform.. The proposed IPTV platform exploits overlay multicast scheme to offer reasonable service under the environment where network bandwidth and processor resource are limited. It also uses CDN-like scheme to ensure the quality of transmitted contents. The performance evaluation shows that the proposed IPTV platform has the possibility of being an open IPTV platform considering its results such as the quality of transmitted contents, the transmission rate, the channel zapping time, and so on. It also shows that proposed IPTV platform could be applied to real IPTV service with continuous enhancement of its functions and user interfaces.

A Recognition for Community Based Rehabilitation by Public Health Center Physical Therapists in Kyoungki Province (경기도 보건소 물리치료사들의 지역사회심재활에 대한 인식)

  • Kim Chan-Mun;Jong Jae-Hoon
    • The Journal of Korean Physical Therapy
    • /
    • v.10 no.1
    • /
    • pp.75-80
    • /
    • 1998
  • To survey the recognition of Community Based Rehabilitation (CBR) by Public Health Center(PHC) Physical Therapists in Kyoungki Province. This study analysed general characteristic of Physical Therapists and congnition, participation, education, problems and requireanents for CBR. The objects of this study were 37 therapists who work at 27 of 39 PHC in Kyoungki province and data was collected for 20days from Jan. 12 to 31. 1998 and the results computed from 32 responses. First, Female therapists outnumber males. The age category 30 to 35 old represneted $56.2\%$ of the total number studied. $59.4\%$ of therapists had worked more than 7 years and therapists usually$(46.9\%)$ worked from 6 month to 2 years at the PHC. Junior college graduates were $84.4\%$, and respondents with family responsibilirt were $65.6\%$. Second, Recently pain control has become the major requirment of patiants at PH$(53.1\%)$. If they offered expaneded services - a rehabilitation program $(53.1\%)$, home vistation $(31.3\%)$. when asked about a working guide book, nobody had one. Third, $68.7\%$ of therapists were aware of the present level of CBR, $40.9\%$ of them had gotten an information from educated colleagues, and $68.7\%$ of therapists were aware of the present level of CBR, $86.4\%$ of therapists felt responsible to provide rehabilitation Fourth, For CBR, $93.7\%$ had positive ideas in which they could participate. $73.3\%$ wished to composed a team of various rehabilitational specialists. $73.3\%$ wished for the meeting day to be flexible and $86.6\%$ desired to meet once or twice a week. Fifth, Almost all$(96.9\%)$ desired more educational opportunity about CBR. Example, once or twice a year$(56.2\%)$ and training period of 4-7 days $(43.7\%)$. They wanted to learn theory and practice together$(74.2\%)$ and $74.2\%$ wanted the mational multi-rehabilitation center as a educational managing organization. Sixth, The most important requirment for accomplishing CBR by physical therapists was job security and an adequate number of therapists$(84.4\%)$ Required number of physical therapists in the PHC was 3 $(43.7\%)$. The cooperative agency should be the district goverment organization $(56.2\%)$. Factors inhibiting the execution of CBR were lack of administrative support, physical therapists, and equipments for pain control and for therapeutic exercise.

  • PDF

An Analysis on the Evolutionary Characteristics of Ubiquitous City through Evolutionary Map of Ubiquitous City (유시티 진화 지도를 통한 유시티 진화 특성 분석)

  • JO, Sung-Soo;LEE, Sang-Ho;LEEM, Youn-Taik
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.18 no.2
    • /
    • pp.75-91
    • /
    • 2015
  • This study aims to analyse the U-City characteristics through the U-City historical mapping. The U-City characteristics were analysed by building the U-City historical map in terms of STIM model which consists of service, technology, infrastructure and management. The data for analysis is the National Informatization White Paper published by the NIA (National Information Society Agency) from 2002 to 2013. As a result, first, the U-City service were evolved from administration informatization, enterprise informatization, administration/living informatization and administration/space/private informatization through the intelligence facilities and space. Second, the U-City technology were changed through wire network, sensor/network, processing/super-highway network, convergence of network/security. Third, the U-City infrastructure have had evolutionary process such as wire computer network, wire/wireless network, intellectualization facility and intelligent facility space. Forth, the U-City management were carried out with making the unit network/infrastructure management, information connection/operating management and information integration/participation management. Therefore, the history of U-City has been making rapid development in government computerization, computer oriented society, information city and ubiquitous city.

The Distributed Authentication and Key Exchange Protocols for Smartcard (스마트카드에 적용가능한 분산형 인증 및 키 교환 프로토콜)

  • Oh Heung-Ryongl;Yoon Ho-Sun;Youm Heung-Youl
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.17-30
    • /
    • 2005
  • A PAK(Password-Authenticated Key Exchange) protocol is used as a protocol to provide both the mutual authentication and allow the communication entities to share the session key for the subsequent secure communication, using the human-memorable portable short-length password, In this paper, we propose distributed key exchange protocols applicable to a smartcard using the MTI(Matsumoto, Takashima, Imai) key distribution protocol and PAK protocol. If only one server keeps the password verification data which is used for password authentication protocol. then It could easily be compromised by an attacker, called the server-compromised attack, which results in impersonating either a user or a server, Therefore, these password verification data should be distributed among the many server using the secret sharing scheme, The Object of this paper Is to present a password-based key exchange protocol which is to allow user authentication and session key distribution, using the private key in a smartcard and a password typed by a user. Moreover, to avoid the server-compromised attack, we propose the distributee key exchange protocols using the MTI key distribution protocol, And we present the security analysis of the proposed key exchange protocol and compare the proposed protocols with the existing protocols.

  • PDF

A Study of Java-based PKI System for Secure Authentication on Mobile Devices (모바일 단말기 상에서 안전한 인증을 위한 자바 기반의 PKI 시스템 연구)

  • Choi, Byeong-Seon;Kim, Sang-Kuk;Chae, Cheol-Joo;Lee, Jae-Kwang
    • The KIPS Transactions:PartC
    • /
    • v.14C no.4
    • /
    • pp.331-340
    • /
    • 2007
  • Mobile network environments are the environments where mobile devices are distributed invisible in our daily lives so that we can conventionally use mobile services at my time and place. The fact that we can work with mobile devices regardless of time and place, however, means that we are also in security threat of leaking or forging the information. In particular, without solving privacy concern, the mobile network environments which serve convenience to use, harmonized without daily lives, on the contrary, will cause a serious malfunction of establishing mobile network surveillance infrastructure. On the other hand, as the mobile devices with various sizes and figures, public key cryptography techniques requiring heavy computation are difficult to be applied to the computational constrained mobile devices. In this paper, we propose efficient PKI-based user authentication and java-based cryptography module for the privacy-preserving in mobile network environments. Proposed system is support a authentication and digital signature to minimize encrypting and decrypting operation by compounding session key and public key based on Korean standard cryptography algorithm(SEED, KCDSA, HAS160) and certificate in mobile network environment. Also, it has been found that session key distribution and user authentication is safety done on PDA.

Adoption of the Use of Smart Technology by Health-care Workers in Nursing Homes: an Exploratory Study (노인요양시설의 스마트 기술 도입에 대한 탐색적 연구 -요양시설 종사자 답변을 중심으로-)

  • Lee, Sunhyung;Ahn, Joonhee
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.8
    • /
    • pp.156-171
    • /
    • 2014
  • The purpose of this exploratory study is to examine if the application of smart technology(ST) would assist adjustment to the nursing home facilities in the elderly. Since there is not much previous research on this subject, we generated survey questionnaires on our own. Data were collected from the survey of 127 employees at 6 nursing homes including geriatric care workers, social workers and nurses who provide direct as well as indirect care services. Results showed that the utilization of ST would benefit the areas of family relationship support, health support, leisure support, and physical environment adjustment. As for physical environment adjustment, study participants reported that ST would help elders familiarize employees and find directions for specific space the most. As for health support, ST would be best utilized as a security sensor and program alarm system. As for support for family relationship, ST was expected to be utilized as looking at family pictures and playing with self pictures/videos. As for leisure support, ST was expected to assist elders to listen to music and watch movies/TV. These results were different according to the characteristics of the participants and the smartifacts. These results of the study will show the direction for more in-depth studies on application of smart technology for the elderly in the future.

Design of NePID using Anomaly Traffic Analysis and Fuzzy Cognitive Maps (비정상 트래픽 분석과 퍼지인식도를 이용한 NePID 설계)

  • Kim, Hyeock-Jin;Ryu, Sang-Ryul;Lee, Se-Yul
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.4
    • /
    • pp.811-817
    • /
    • 2009
  • The rapid growth of network based IT systems has resulted in continuous research of security issues. Probe intrusion detection is an area of increasing concerns in the internet community. Recently, a number of probe intrusion detection schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems, are useful only for the existing patterns of probe intrusion. They can not detect new patterns of probe intrusion. Therefore, it is necessary to develop a new Probe Intrusion Detection technology that can find new patterns of probe intrusion. In this paper, we proposed a new network based probe intrusion detector(NePID) using anomaly traffic analysis and fuzzy cognitive maps that can detect intrusion by the denial of services attack detection method utilizing the packet analyses. The probe intrusion detection using fuzzy cognitive maps capture and analyze the packet information to detect syn flooding attack. Using the result of the analysis of decision module, which adopts the fuzzy cognitive maps, the decision module measures the degree of risk of denial of service attack and trains the response module to deal with attacks. For the performance evaluation, the "IDS Evaluation Data Set" created by MIT was used. From the simulation we obtained the max-average true positive rate of 97.094% and the max-average false negative rate of 2.936%. The true positive error rate of the NePID is similar to that of Bernhard's true positive error rate.