• Title/Summary/Keyword: usable security

Search Result 49, Processing Time 0.029 seconds

Graduates' Progression Tracking System

  • Amjad Althubiti;Razan Alharthi;Rneem Alqarni;Haya Alharthi;Fawziah Alzahrani;Shahad Alotaibi;Mona Al-Qahtaniy;Mrim Alnfiai
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.119-130
    • /
    • 2024
  • Universities are open systems that aim to prepare students to meet academic and industrial programs' expectations. It is important for universities to recognize these expectations and to make sure that they are achievable. To do so, graduates' progression tracking system is an essential tool for universities' development to ensure graduate students meet the market requirements. The purpose of this paper is to create automatic tracing system that captures information about students after graduation and creates annual report that represents the status of university students in term of employment or completing their study. It mainly assists graduates to find appropriate jobs that meet their desires or enabling them to complete their higher education by providing all these opportunities in one platform. The system main objective is to improve communication between graduate students, the university and companies. It also aims to identify the difficulties associated with graduate employability and changes are required to serve current students in term of creating new programs or activities. This helps universities to identify and address the existing curriculums and program's strengths and weaknesses and their adequacy, quality and competencies of a graduate in the labor market, which enhances the quality of higher education. we analyzed and implemented the tracing system using PHP language, which speeds up custom web application development and MySQL database, which guarantee data security, high performance, and other features. Graduate students found the proposed system usable and valuable.

Big Data Processing Scheme of Distribution Environment (분산환경에서 빅 데이터 처리 기법)

  • Jeong, Yoon-Su;Han, Kun-Hee
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.311-316
    • /
    • 2014
  • Social network server due to the popularity of smart phones, and data stored in a big usable access data services are increasing. Big Data Big Data processing technology is one of the most important technologies in the service, but a solution to this minor security state. In this paper, the data services provided by the big -sized data is distributed using a double hash user to easily access to data of multiple distributed hash chain based data processing technique is proposed. The proposed method is a kind of big data data, a function, characteristics of the hash chain tied to a high-throughput data are supported. Further, the token and the data node to an eavesdropper that occurs when the security vulnerability to the data attribute information to the connection information by utilizing hash chain of big data access control in a distributed processing.

A Design of Lightweight RFID Authentication Protocol Errors Correction Using Re-Counter (재카운터를 이용해 오류를 수정하는 경량화 RFID 인증 프로토콜 설계)

  • OH, Gi-Oug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.149-157
    • /
    • 2011
  • Passive tags are inferior to active tags in processing efficiency, so they have difficulty in largevolume processing. The proposed protocol reduces the volume of computation in passive tags and, at the same time, improves authentication for enhanced safety and security. That is, different from existing RFID protocols that return the same value even if an error happens when the reader reads a tag, the improved RFID security protocol returns a new value using a re-counter and processes the computation part of a tag in the reader or in a back.end system. Even if the information of a tag is acquired by an malicious way, it is not actual information but encrypted information that is not usable. In addition, even if tag information is read in sequence, it is changed in each read, so the protocol is safe from Location Tracking.

A Comparison of the Benefits for Online Clothing Purchase between Korean and U.S. Consumers (한국과 미국 소비자의 온라인 의복구매시 추구혜택비교)

  • Kim, Eun-Young
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.7
    • /
    • pp.1074-1085
    • /
    • 2009
  • This study compares the benefits for online clothing purchases between Korean and U.S. consumers. A total of 464 usable questionnaires were obtained from respondents who resided in Korea (n=253) and the United States (n=21l). Data were analyzed by descriptive statistics, factor analysis, and MANOVA. For online clothing purchases, the benefit consisted of five factors: product attribute, transaction services, security, country of origin, and brand symbolism. Results showed that the main effect of nationality and gender on the benefit factors were significant; there was an effect of nationality on product attributes, transaction services, and country of origin. Compared with Korean consumer, U.S. consumers were more likely to consider the benefits of product attributes, transaction services, and country of origin for clothing in online purchases. In addition, there was a gender difference in benefit factors of product attributes, transaction services, country of origin, and brand symbolism. Females were more likely than males to consider the benefits for clothing in online purchases. An interaction effect of nationality and gender was not significant in online purchases for clothing. The managerial implications are discussed for global fashion marketing across the countries.

Enhancement technology for unwanted emission of logistics tracking device (물류트랙킹 장비의 전자파불요방사 개선 기술)

  • Lee, Eun-Kyu;Choi, Sung-Pill;Moon, Young-Sik;Jeon, Mi-Jin;Jo, Jae-Hui;Kim, Jae-Joong;Choi, Hyung-Rim
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.898-899
    • /
    • 2013
  • In recent years, logistics tracking Device using to improve logistics efficiency are being extensively researched. The purpose of this paper is to Enhancement technology for unwanted emission of logistics tracking device usable cargo container security transport.

  • PDF

Analysis on Field Professionals' Assessment of Alternative Fire Escape Methods in Apartment Building (공동주택 대안적 화재 피난방식에 대한 건설전문가 평가조사)

  • Lee, Myung Sik;Lee, So Young
    • KIEAE Journal
    • /
    • v.9 no.5
    • /
    • pp.21-28
    • /
    • 2009
  • In apartment buildings, casualties, especially fatalities have occurred in balcony areas in fires if residents fail to escape to the main entrance. Potential consequences of a particular infrequent event should be considered. In attempting to design apartment buildings for fire safety, alternative escape methods such as vertical penetration could be considered. The purpose of this study is to investigate present building regulations regarding apartment buildings and examine pros and cons of the current escape method and alternative escape methods. Focus group interview was conducted to discuss problems of fire escape methods. In addition, questionnaires were distributed to field professionals working in architecture, construction and related industries. Among 500 questionnaires distributed, 192 questionnaires were collected. Usable 162 questionnaires were analyzed using SPSS 15. Regarding alternative fire escape methods, several concerns were mentioned. Safety, privacy, security, effectiveness of escape, water proof problems were raised. Based on the opinions, vertical penetration between apartment unit appeared more safe, secure, effective than horizontal penetration. However, both methods have its own pros and cons under specific contexts. Alternative escape methods need be considered for a selective options for residents in case of fire.

Why Consumers Use Mobile Commerce? - International Comparative Study of M-Commerce Model

  • Han, Sang-Lin;Nguyen, T.P. Thao;Nguyen, V. Anh
    • Asia Marketing Journal
    • /
    • v.18 no.3
    • /
    • pp.65-88
    • /
    • 2016
  • Development of information and communication technology is changing commerce environment and consumer purchasing behavior has also been changed. Globalization is becoming increasingly prevalent in the world today and many factors such as culture, politics, and economics may influence the applicability of management theories. Concurrently, corporate managers are faced with the challenge of offering usable and useful applications to the local users. Besides, many scholars strongly support that the criteria for M-Commerce adoption in developing countries are different from that of developed countries, due to cultural, security, social, political, economic, and technological aspects. This research tried to investigate the differences on the adoption of mobile commerce between developed and developing countries. In this study, the motivation for studying advanced mobile phone services adoption in the South Korea and Viet Nam is presented. Second, M-Commerce adoption model is introduced as a starting point for the research model. We then integrate price, personal innovativeness, quality dimension and perceived of playfulness into our model. Next, we describe our method and report the results of our analysis. The paper concludes with a discussion of the results from both the South Korea and Viet Nam with implications.

Examining Factors that Determine the Use of Social Media Privacy Settings: Focused on the Mediating Effect of Implementation Intention to Use Privacy Settings

  • Jongki Kim;Jianbo Wang
    • Asia pacific journal of information systems
    • /
    • v.30 no.4
    • /
    • pp.919-945
    • /
    • 2020
  • Social media platforms such as Instagram and Facebook lead to potential security risks, which consequently raise public concerns about privacy. However, most people rarely make active efforts to protect their personal data, even though they have shown increasing concerns about privacy. Therefore, this study examines the factors that determine social media users' behavior of using privacy settings and testifies the existence of privacy paradox in such a context. In addition, it investigates the mediating effects of implementation intentions on the relationship between intentions and behaviors. In the study, we collected data through questionnaires, and the respondents were undergraduate and graduate students in South Korea. After a pilot test (n = 92) and a set of face-to-face interviews, 266 usable responses were retrieved for data analysis finally. The results confirmed the existence of the privacy paradox regarding the use of social media privacy settings. And the implication intention did positively mediate the relationship between intention and behavior in the context of social media privacy settings. To the best of our knowledge, our study is the first in the information privacy literature to introduce the notion of implementation intention which is a much more powerful explanation and prediction of actual behavior than the (behavioral) intention.

Web application firewall technology trends and testing methodology (웹방화벽 기술동향 파악 및 시험방법론)

  • Jo, In-june;Kim, Sun-young;Kim, Chan-joong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.132-138
    • /
    • 2012
  • Existing network layer firewall security support is one that does not support the higher layer, the application layer of a vulnerable web application security. Under these circumstances, the vulnerability of web applications to be able to defend a Web Application Firewall is positioned as a solver to solve the important security issues of businesses spotlighted in the next generation of security systems, and a very active market in the market other than domestic is expected to be formed. However, Firewall Web has not yet proposed a standard which can be used to test the performance of the Web Application Firewall Web Application Firewall and select the products of trust hardly Companies in BMT conduct their own individual problems and the cost of performance testing technologies, there is a limit. In this study, practically usable BMT model was developed to evaluate the firewall vendor. Product ratings ISO / IEC 9126, eight product characteristics meet the performance and characteristics of a web application firewall entries are derived. This can relieve the burden on the need to be evaluated in its performance testing of Web firewall, and can enhance the competitiveness of domestic-related sectors, by restoring confidence in the product can reduce the dependence on foreign products.

  • PDF

A Security Model Analysis Adopt to Authentication State Information in IPTV Environment (IPTV 환경에서 가입자의 인증 상태정보를 이용한 인증보안 모델 설계)

  • Jeong, Yoon-Su;Jung, Yoon-Sung;Kim, Yong-Tae;Park, Gil-Cheol;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.421-430
    • /
    • 2010
  • Now a days, as a communications network is being broadband, IPTV(Internet Protocol Television) service which provides various two-way TV service is increasing. But as the data which is transmitted between IPTV set-top box and smart card is almost transmitted to set-top box, the illegal user who gets legal authority by approaching to the context of contents illegally using McComac Hack Attack is not prevented perfectly. In this paper, set-top box access security model is proposed which is for the protection from McComac Hack Attack that tries to get permission for access of IPTV service illegally making data line which is connected from smart card to set-top box by using same kind of other set-top box which illegal user uses. The proposed model reports the result of test which tests the user who wants to get permission illegally by registration the information of a condition of smart card which is usable in set-top box in certification server so that it prevents illegal user. Specially, the proposed model strengthen the security about set-top box by adapting public key which is used for establishing neighbor link and inter-certification process though secret value and random number which is created by Pseudo random function.