• Title/Summary/Keyword: surfing

Search Result 152, Processing Time 0.024 seconds

The Current Status and Affecting Factors of Elementary Students' Internet Addiction in Comparison with Secondary Students (중.고등학생과 비교한 초등학생의 인터넷 중독 실태와 영향 요인)

  • Jo, Mi-Heon
    • Journal of The Korean Association of Information Education
    • /
    • v.10 no.1
    • /
    • pp.47-57
    • /
    • 2006
  • As teenagers' Internet use increases and Internet takes an important part in their everyday lives, many people become concerned with Internet addiction. In this study, I attempt to analyze the current status of teenagers' Internet addiction using an evaluation tool developed for students, and to compare elementary students' Internet addiction level with secondary students. Also I analyze factors affecting Internet addiction. For the analysis, 18 variables are selected from the areas such as demographic background, the experience of Internet use, family-related traits and social activities. A survey was conducted to 1,155 elementary students and 1,822 secondary students selected from nationwide schools. The main finding of this study is that among the elementary students 5.0% of the sample students are in the stage of serious addiction, and 19.7% in the stage of early addiction. In addition, the level of elementary students' Internet addiction is significantly higher than the level of secondary students. Also, the degree of elementary students' Internet addiction is significantly affected by some factors such as gender, surfing time, surfing purpose, satisfaction with parental relationship, parents' interference in Internet use, conversation frequency among family members, and satisfaction with school life.

  • PDF

Study on relationship of patients' information need, e-Health system use and outcomes: CHIS system in patients with breast cancer center (환자들의 정보요구가 e-Health 시스템 사용과 성과에 미치는 영향에 관한 연구: 유방암환자대상 수요자의료정보시스템을 중심으로)

  • Lee, Seog-Jun;Park, Sung-Sik;Hahm, Yukeun;Gustafson, D.
    • The Journal of Information Systems
    • /
    • v.22 no.2
    • /
    • pp.105-129
    • /
    • 2013
  • Recently, since the interest with well-being has been getting higher than ever, people want reliable source of information related with health and medical treatment. Because of the characteristics of information related with medical care, there have been difficulties to find the information from books, television and internet surfing, for treating disease. Misinformation that can be obtained when considering dangerous situations or side effects, the role of the e-Health system is becoming more important. The objective of this study is an analysis of correlation and effect among patient's information need, e-Health system use and system outcome. To achieve the object of this study, e-Health system had been given to patients of breast cancer in Wisconsin and Detroit for 16 weeks. As a result, 282 sample was gathered and modified to meet purpose of the study. As a result, the information needs of patients due to the performance of the e-Health systems and shown to affect even the perception of patients' emotional and physical health and social support.

A Secure Authentication Method for Smart Phone based on User's Behaviour and Habits

  • Lee, Geum-Boon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.65-71
    • /
    • 2017
  • This paper proposes a smart phone authentication method based on user's behavior and habit that is an authentication method against shoulder surfing attack and brute force attack. As smart phones evolve not only storage of personal data but also a key means of financial services, the importance of personal information security in smart phones is growing. When user authentication of smart phone, pattern authentication method is simple to use and memorize, but it is prone to leak and vulnerable to attack. Using the features of the smart phone pattern method of the user, the pressure applied when touching the touch pad with the finger, the size of the area touching the finger, and the time of completing the pattern are used as feature vectors and applied to user authentication security. First, a smart phone user models and stores three parameter values as prototypes for each section of the pattern. Then, when a new authentication request is made, the feature vector of the input pattern is obtained and compared with the stored model to decide whether to approve the access to the smart phone. The experimental results confirm that the proposed technique shows a robust authentication security using subjective data of smart phone user based on habits and behaviors.

Study of Biometrics using Tritone Paradox (트라이톤 패러독스를 이용한 생체인증의 고찰)

  • Jung, Changhoon;Shin, DongOh;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1085-1095
    • /
    • 2015
  • In music theory, the triton is defined as a musical interval composed of three adjacent whole tones(or six semitones), which generates a harmonic and melodic dissonance. The triton paradox is an auditory illusion which is heard as ascending by some people and as descending by others. In this paper we examine an emerging non-static biometric technique that aims to identify users based on analyzing uniqueness and consistency through the user experiences. We also propose some authentication schemes which provides protection against key logging, shoulder surfing, and brute force attacks.

Mobile Agent Middleware for Travel Information Service (여행정보 서비스를 위한 모바일에이전트 미들웨어)

  • Kang, Gi-Soon;Yoon, Yong-Ik
    • Journal of Korea Spatial Information System Society
    • /
    • v.6 no.2 s.12
    • /
    • pp.85-95
    • /
    • 2004
  • Nowadays, the interests in travel are increasing with the changes into the ubiquitous computing environments, hence, our location-based travel information service system would be potentially invaluable to graft the Internet business models. Most of existing travel information services are provided in a one-way push manner from the contents providers to users, and they have drawbacks of enforcing users to search their needed information with the general Web surfing. Therefore, this paper propose the travel information system for gathering user information and for providing services that satisfy user requirements by filtering based on these information.

  • PDF

A Study on Providing Secure Storage and User Authentication Using MTM on Mobile Platform (모바일 플랫폼에서 MTM을 이용한 보안영역 제공 및 인증에 관한 연구)

  • Lee, Sun-Ho;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.293-302
    • /
    • 2011
  • The various information services can be delivered by smartphone through advanced high-speed mobile communication. A smartphone is a mobile device that offers more powerful computing capacity than feature phone. Therefore this device can provide such as web surfing, editing documents, playing video, and playing games. A lot of personal information stored on smartphone. Because it has High usability. Personal information Leaks if the smart phone is lost or stolen may become a big problem. In this paper we have analyzed existing method for providing secure storage and user authentication on mobile platform and derived security requirement. Therefore we propose the following scheme that satisfy security requirement. Proposed scheme providing secure storage with preventing authentication bypass, and availability from damaged data to access secure area.

A Hybrid Platform Technology for Personalization Service based on Contents of Open Software (공개 소프트웨어 콘텐츠의 기반한 개인화 서비스를 위한 하이브리드 플랫폼 기술)

  • Hong, Yo-Hoon;Park, Sungkon
    • Journal of Digital Contents Society
    • /
    • v.15 no.4
    • /
    • pp.465-471
    • /
    • 2014
  • This paper, describes software hybrid platform that display a individual service environment, a standard concomitant web-browsing with interface form by WYSIWYG method webpage specific location as webpage addition without professional programming skill. That provides a controlled individual service working environment, personal platform of low cost/high efficiency the exiting internet webpage without modification. so these skill provide software or contents surfing web site that browsing web site and a distribution environment. this paper proposes a individual hybrid platform of compositional ecosystem that enrich a exiting web site.

A Study on Homepage Analysis of Family Restaurant thorough Marketing Mix (마케팅 믹스를 활용한 패밀리레스토랑의 홈페이지 분석에 관한 연구)

  • 진양호;전진화
    • Culinary science and hospitality research
    • /
    • v.9 no.2
    • /
    • pp.44-63
    • /
    • 2003
  • This study is about internet marketing of family restaurant through marketing mix and we found out the way which can make to activate by means of analysis of family restaurant's homepage. This study was done as following precedure. First, we've compared between characteristic was based on contents distinctive quality of family restaurant's homepage through the marketing mix. And in the next step, we've compared and ana lysed homepage of family restaurant which was chosed by the internet surfing. In the last, we evaluate strategy of marketing mix which is going well in the each field of business and then research of the way can improve internet-marketing. We draw the findings which is seperated by goods, price, promotion, distribution, other service according to marketing constituents. As a result of study, it is found that each company has given much more weight on some part in internet marketing's field of activity. In general, they put an emphasis on activity of goods and promotion. On the other hands they don't consider prices and delivery to be important compared with other parts. One of the most important things about internet-marketing is that fast and exact feedback and community makes each firm to be able to help to communicate with customer. It's like off-line-restaurant make use of free-coupon and an anniversary service.

  • PDF

Analysis of Studies on Image of the Nurses Performed in Korea (간호 이미지에 대한 논문분석)

  • Kim, Jung-A;Lee, Soon-Hee
    • The Journal of Korean Academic Society of Nursing Education
    • /
    • v.9 no.2
    • /
    • pp.199-211
    • /
    • 2003
  • Purpose: The purpose of this study was to review and summarize the trend of nursing research on image of nurses performed in Korea and to get the preliminary data for future research. Method: This study queried 18 Korean studies performed from 1990 to 2002, selected by two online databases surfing. The studies were analyzed in terms of several standards Lee, Myung Ha(1996) suggested in her study. Result: (1) The first study on image of nursing performed at 1992. (2) 33.4% of the studies included in this analysis were performed for a thesis for a degree, 61.2% hired non-experimental research design, and only 5.6% selected study sample by simple random sampling. (3) Almost studies used the research instruments developed by Korean nursing scientist and collected research data with questionnaires. (4) The variety variables were analyzed to identify the relationship between image of nurses and the variables. (5) 88.9% of the studies included in this analysis included the suggestions for future study. Conclusion: The research findings were summarized and strategic planning for future study on image of nurses were discussed.

  • PDF

Reduction of Channel Change Delay Using Adjacent Channel Delivery in P2P Based IPTV Systems (P2P방식의 IPTV시스템에서 인접채널 전송방식을 이용한 채널변경 지연시간의 단축)

  • Kim, Ji-Hoon;Kim, Young-Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.46 no.5
    • /
    • pp.115-121
    • /
    • 2009
  • In this paper, we propose an algorithm that reduces channel change delay time in the P2P based IPTV system. Channel change delay time is considered to be one of the most important performance measures in IPTV system. Proposed algorithm presents a method to reduce the channel change delay time effectively. The algorithm eliminates the first channel change delay time and reduces delay time on a continuous channel surfing. We will show the mathematical models to evaluate the performance of proposed scheme with respect to the channel change delay time.