• Title/Summary/Keyword: security services

Search Result 2,899, Processing Time 0.027 seconds

Discovery of Market Convergence Opportunity Combining Text Mining and Social Network Analysis: Evidence from Large-Scale Product Databases (B2B 전자상거래 정보를 활용한 시장 융합 기회 발굴 방법론)

  • Kim, Ji-Eun;Hyun, Yoonjin;Choi, Yun-Jeong
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.4
    • /
    • pp.87-107
    • /
    • 2016
  • Understanding market convergence has became essential for small and mid-size enterprises. Identifying convergence items among heterogeneous markets could lead to product innovation and successful market introduction. Previous researches have two limitations. First, traditional researches focusing on patent databases are suitable for detecting technology convergence, however, they have failed to recognize market demands. Second, most researches concentrate on identifying the relationship between existing products or technology. This study presents a platform to identify the opportunity of market convergence by using product databases from a global B2B marketplace. We also attempt to identify convergence opportunity in different industries by applying Structural Hole theory. This paper shows the mechanisms for market convergence: attributes extraction of products and services using text mining and association analysis among attributes, and network analysis based on structural hole. In order to discover market demand, we analyzed 240,002 e-catalog from January 2013 to July 2016.

Research for the Element to Analyze the Performance of Modern-Web-Browser Based Applications (모던 웹 브라우저(Modern-Web-Browser) 기반 애플리케이션 성능분석을 위한 요소 연구)

  • Park, Jin-tae;Kim, Hyun-gook;Moon, Il-young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.278-281
    • /
    • 2018
  • The early Web technology was to show text information through a browser. However, as web technology advances, it is possible to show large amounts of multimedia data through browsers. Web technologies are being applied in a variety of fields such as sensor network, hardware control, and data collection and analysis for big data and AI services. As a result, the standard has been prepared for the Internet of Things, which typically controls a sensor via HTTP communication and provides information to users, by installing a web browser on the interface of the Internet of Things. In addition, the recent development of web-assembly enabled 3D objects, virtual/enhancing real-world content that could not be run in web browsers through a native language of C-class. Factors that evaluate the performance of existing Web applications include performance, network resources, and security. However, since there are many areas in which web applications are applied, it is time to revisit and review these factors. In this thesis, we will conduct an analysis of the factors that assess the performance of a web application. We intend to establish an indicator of the development of web-based applications by reviewing the analysis of each element, its main points, and its needs to be supplemented.

  • PDF

Mutual Authentication Method between Wireless Mesh Enabled MSAPs in the Next-generation TICN (차세대 전술정보통신체계에서의 무선 메쉬 MSAP 노드 간 상호 인증 기법)

  • Son, Yu-Jin;Bae, Byoung-Gu;Shon, Tae-Shik;Ko, Young-Bae;Lim, Kwang-Jae;Yun, Mi-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.5B
    • /
    • pp.385-394
    • /
    • 2012
  • The tactical mobile communication network, which comprises a part of the next-generation Tactical Information and Communication Network (TICN), provides means of communication and control for Tactical Multi-Functional Terminals (TMFT) belonging to a Mobile Subscriber Access Point (MSAP). The next-generation of MSAP is capable of constructing a backbone network via LCTR and HCTR directional antennas. At the same time, WMN modules are used to create and manage a wireless mesh backbone. When directional antennas are used in mobile environments, seamless services cannot be efficiently supported as the movement of the node prevents the angle of the antenna to constantly match. Therefore, data communication through the wireless mesh networks is required to provide direct communication between mobile MSAPs. Accordingly, mutual authentication and data encryption mechanisms are required to provide reliable data transmission in this environment. To provide efficient mutual authentication between MSAP devices, the process of verifying a certificate of the other MSAP device through its own authentication server is required. This paper proposes mutual authentication mechanisms where the MSAP requiring authentication and the MSAP that permits it initiates low-cost and efficient authentication in a distributed way. More specifically, we propose a method of applying EAP-ELS (Extensible Authentication Protocol-Transport Layer Security) in the next-generation TICN.

Spatial-Sensor Observation Service for Spatial Operation of GeoSensor (GeoSensor의 공간연산을 확장한 Spatial-Sensor Observation Service)

  • Lee, Hyuk;Lee, Yeon;Chung, Weon-Il;Bae, Hae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.35-44
    • /
    • 2011
  • Advances in science and technology have made a lot of changes in our life. Especially, sensors have used in various ways to monitor in real time and analyze the world effectively. Traditional sensor networks, however, have used their own protocols and architecture so it had to be paid a lot of additional cost. In the past 8 years, OGC and ISO have been formulating standards and protocols for the geospatial Sensor Web. Although the OGC SWE initiatives have deployed some components, attempts have been made to access sensor data. All spatial operations had to calculate on the client side because traditional SOS architecture did not consider spatial operation for GeoSensor. As a result, clients have to implement and run spatial operations, and it caused a lot of overload on them and decreased approachableness. In this paper we propose S-SOS for in-situ and moving GeoSensor that extends 52 North SOS and provides spatialFilter and spatialFinder operations. The proposed S-SOS provides an architecture that does not need to edit already deployed SOSs and can add spatial operations as occasion. Additionally we explain how to express the spatial queries and to be used effectively for various location based services.

Effects of Different Suicide Rates and Social Welfare Related Factors by Region (지역 간 자살률 차이와 사회복지요인이 미치는 영향)

  • Lee, Yong-Jae;Kim, Kyung-Mi
    • Journal of Digital Convergence
    • /
    • v.18 no.7
    • /
    • pp.9-19
    • /
    • 2020
  • The purpose of this study is to analyze the difference in suicide rates between regions and to determine the effect of social workers on the regional suicide rate. The main analysis results are as follows. First, the suicide rates in metropolitan cities were lower than was lower than in other regions, and cities and districts were lower than those in the county area. Second, suicide rates were high in areas with many cultural and social welfare facilities per population. Suicide rates were high in low mental health facilities and low social welfare budgets. The suicide rate in rural areas was high. Third, suicide rates were high in areas with low economic requirements, areas with a high proportion of the elderly, divorce rates, and areas with a small number of social security recipients and living alone. In other words, the suicide rate in rural areas was high. Finally, social workers did not affect the difference in local suicide rates. Local social services and budgets have no real impact on suicide rates. In the future, it is necessary to improve the quality and quantity of community welfare practices that can lower community suicide rates.

Proposal Strategy and Performance Analysis of Electronic Human Resources Management Pilot Project (건설근로자공제회 전자인력관리(전자카드제)시범사업 성과 분석 및 추진전략 도출)

  • Kim, Inchie;Chin, Sangyoon;Kim, Seongah;Kim, Yeasang;Lee, Sangjun;Park, Soohun
    • Korean Journal of Construction Engineering and Management
    • /
    • v.19 no.4
    • /
    • pp.3-11
    • /
    • 2018
  • The Construction Workers Mutual Aid Association is carrying out a number of strategic tasks with the goal of "contributing to improving employment and stabilizing the return of workers to construction workers through employment welfare and retirement deduction services." One of them is the retirement deduction system. The retirement allowance system is a system for the retirement income and livelihood security of construction workers who are not adequately protected by the Labor Standards Act, such as retirement allowances due to the nature of day labor. The Construction Workers Mutual Aid Association has promoted the introduction of electronic manpower management. For the efficient management of the pilot sites and the plans for the future, comprehensive evaluation of the pilot sites as well as the evaluation of the status and operation results of each pilot project site are needed. Therefore, in this study, we will develop performance indicators to evaluate the current state of electronic manpower pilot projects and analyze the actual situation of pilot project sites through actual application, and try to derive future implementation strategies.

A Secure Mobile Message Authentication Over VANET (VANET 상에서의 이동성을 고려한 안전한 메시지 인증기법)

  • Seo, Hwa-Jeong;Kim, Ho-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1087-1096
    • /
    • 2011
  • Vehicular Ad Hoc Network(VANET) using wireless network is offering the communications between vehicle and vehicle(V2V) or vehicle and infrastructure(V2I). VANET is being actively researched from industry field and university because of the rapid developments of the industry and vehicular automation. Information, collected from VANET, of velocity, acceleration, condition of road and environments provides various services related with safe drive to the drivers, so security over network is the inevitable factor. For the secure message authentication, a number of authentication proposals have been proposed. Among of them, a scheme, proposed by Jung, applying database search algorithm, Bloom filter, to RAISE scheme, is efficient authentication algorithm in a dense space. However, k-anonymity used for obtaining the accurate vehicular identification in the paper has a weak point. Whenever requesting the righteous identification, all hash value of messages are calculated. For this reason, as the number of car increases, a amount of hash operation increases exponentially. Moreover the paper does not provide a complete key exchange algorithm while the hand-over operation. In this paper, we use a Received Signal Strength Indicator(RSSI) based velocity and distance estimation algorithm to localize the identification and provide the secure and efficient algorithm in which the problem of hand-over algorithm is corrected.

The Effect of Cultural Marketing Activities on a Corporate Brand Asset (문화마케팅 활동이 기업브랜드 자산에 미치는 영향)

  • You, Hee-Bong;Ha, Kyu-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.6
    • /
    • pp.1856-1868
    • /
    • 2008
  • This paper is about what is the effect of cultural marketing - which is affecting business ethics and social responsibility - on corporate image and formation of brand asset, and about which is getting more influence by cultural marketing among factors that is forming corporate image and brand asset. The results are like below. First, cultural marketing activities had an indirect influence on the corporate brand asset. Second, cultural marketing had an direct influence on the corporate brand image. Third, cultural marketing had a positive impact on reminding of the brand image. Fourth, social responsibility and business ethics had an indirect influence on the brand loyalty. Fifth, corporate social responsibility and business ethics had a positive impact on the brand image. Sixth, among the corporate social responsibility, community activities played a control variables. Seventh, regarding the characteristics of the respondents it showed that there's perception gaps among marketing, responsibility and ethics as well as brand assets. All in all, cultural marketing had an indirect effect on formulating corporate brand asset by the means of corporate image. The result is pointing out the importance of establishing a strategic marketing plan that is taking harmony between the character of cultural marketing and media, continuous and long-term plan, connection with the type of the brand asset into account. Moreover, as people realized that corporate business activities are brining not only economic consequences, such as providing goods and services but also social consequences, such as uneven distribution of wealth, dirty links between business and politics, consumers' security, pollution, and etc., companies are reconsidering its own role in society. This reconsideration is called corporate social responsibility and this pushed the company to keep business ethics together with their business.

The Mechanism of Proxy Mobile IPv4 to Minimize the Latency of Handover Using MIH Services (MIH 서비스를 활용한 Proxy Mobile IPv4의 핸드오버 지연 최소화 방안)

  • Kim, Sung-Jin;You, Heung-Ryeol;Rhee, Seuck-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2008.08a
    • /
    • pp.211-217
    • /
    • 2008
  • Recently, there are many efforts to support seamless mobility in 802.11 WLANs using IP Layer mobility protocols. The IP layer mobility protocols are the most efficient mechanism to guarantee the service session continuity when IP subnet is changed during handover. Even if the IP layer mobility protocols are quite efficient, the feature of the protocols that had been designed to consider only L3 layer makes it difficult to improve the performance of hand over more and more. Nowadays, to overcome this limitation of IP mobility protocols, many researchers have worked on the mobility protocols integration of different layers (e.g., L2 layer). In this paper, we propose the enhanced Proxy MIPv4 to minimize the latency of handover using MIH protocol in 802.11 WLANs. The proposed mechanism minimizes the latency of authentication by exchanging security keys between Access Routers during handover. Moreover, it also minimizes packet losses by Inter-AP Tunneling and data forwarding.

  • PDF

An Investigation of Users' Privacy Protection Behaviors: Factors Affecting Privacy Protection Technology Adoption (개인정보보호 기술 수용행동에 영향을 미치는 요인에 대한 연구)

  • Choi, Bomi;Park, Minjung;Chai, Sangmi
    • Information Systems Review
    • /
    • v.17 no.3
    • /
    • pp.77-94
    • /
    • 2015
  • As Internet has become a popular media for sharing information, users create and share tremendous volume of information including large amount of personal information in cyberspace. Sharing private information online can enhance strength of social relationship but it could also bring negative consequences like information privacy invasion. Although many companies and governments address the importance of information privacy online, there are countless cases of crimes and hackings relating personal information online world wide. Since there are some researches investigating the role of governments and organizations on online privacy domain but there is little research regarding users' privacy protection behaviors. This study investigates relationship between Internet users' information privacy protection behavior and environmental factors. Especially, this study focuses on users' behaviors regarding information privacy protection technology adoption. According to our research results, users' online privacy protective behaviors positively affected by governmental regulations expressed as an information privacy protection law. In addition, if user is allowed to use anonymity when he or she uses online services, they have more tendencies to adopt privacy protection technologies. The detailed research findings and contribution are discussed as well.