• Title/Summary/Keyword: usage model

Search Result 1,970, Processing Time 0.025 seconds

A Preliminary Research on the Impact of Perception of Personal Information Leakage Incidents on the Behavior of Individual Information Management in the Mobile Banking Contexts (모바일 뱅킹 이용자의 개인정보 유출사고 인지가 개인정보관리 준수행동에 미치는 영향에 대한 사전 연구)

  • Kim, Jungduk;Lim, Se-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.735-744
    • /
    • 2016
  • Recently, personal information leakage incidents with increased usage of mobile services are increasing. Personal information leakage incidents can have a significant impact on an individual's mobile banking services. Accordingly, we examine relationships among individual's psychological characteristics, intention and behavior regarding compliance in an individual's perception on personal information leakage incidents in mobile banking contexts. In this study, for explaining our research model and understanding with personal psychology and behavior in mobile banking contexts, we adopted two theories, theory of interpersonal behavior and stimulus-response theory. We collected the 55 data using online surveyor and then analyzed structural equation model in order to find causal relationships among research variables. The results of this study should be useful to the mobile banking services companies in promoting service users to follow the information privacy policies.

The Vulnerability Improvement Research Using Pseudo-Random Number Generator Scheme in EncFS (의사 난수 생성 방식을 이용한 EncFS의 취약점 개선 연구)

  • Jeong, Won-Seok;Jeong, Jaeyeol;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1539-1550
    • /
    • 2016
  • In modern society, the number of applications, which needs storage, is increased. Among them, the advance of FinTech increased the importance of storage encryption. FinTech storage, storing sensitive information, should be kept secure. Unless the storage is kept, many users will be damaged monetarily. To prevent this problem, we should encrypt the storage. A EncFS, which is one of the most popular storage encryption application, uses different IVs for each block to provide higher levels of security in the encryption algorithm. However, there is a vulnerability related to the usage of same IVs. In this paper, we propose a technique that decrypts the ciphertexts without knowing the secret key by using the vulnerability. Moreover, we show that the EncFS is not secure under IND-CPA model and propose a new scheme which is secure under IND-CPA model.

Analysis of Power Consumption for Embedded Software using UML State Machine Diagram (UML 상태 기계를 이용한 임베디드 소프트웨어의 소모 전력 분석)

  • Lee, Jae-Wuk;Hong, Jang-Eui
    • The KIPS Transactions:PartD
    • /
    • v.19D no.4
    • /
    • pp.281-292
    • /
    • 2012
  • A wide variety of smartphone applications is increasing the usage time of smartphone. Due to the increased time, it becomes difficult to providing stable services to users with limited battery capacity. The past works have been performed the power management of mobile device toward long-lasting battery development or low-power electric devices. However as the complexity of software embedded into system are increased, the research interests of the software power analysis is also increased. Among these studies on the software power analysis, model-based analysis technique is one of major interests because it can be able to analyze the power consumption before the development of source codes, then the analysis result can be used in the development of the software system, This paper suggests a model-based power analysis technique using UML state machine diagram. Our proposed technique estimates the power consumption by the simulation of Perti-net which is transformed from the state machine diagram.

The study on th effects of system quality of Smart Phone on use of intention (스마트폰의 정보시스템 품질이 사용의도에 미치는 영향에 관한 연구)

  • Cho, Hyen-Suk;Yang, Seong-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.5
    • /
    • pp.147-152
    • /
    • 2011
  • The main Objectives of this paper are as follows. First, we investigated effects of Smart Phone quality on the usefulness and ease of use of Smart Phone. Then, we investigated effects of the usefulness and ease of use of Smart Phone on the intention of use. Our research model is based on TAM(Technology Acceptance Model). To accomplish the purpose of this paper effectively and efficiently, a survey was conducted based on the usage of Smart Phone. Then we conducted regression analyses on the collected data and found following results. First, Smart Phone quality have a significant effect on the usefulness and ease of use of Smart Phone. Second, the usefulness and ease of use of Smart Phone have significant effects on the intention of use. Third, Smart Phone users are more satisfied with the system quality than cellular phone users. And the continuous use intention of Smart-Phone users is higher than that of cellular phone users.

Design and Implementation of a Mobile Learning System for Improving Reading Ability of Hearing-impaired Persons (청각장애인의 읽기 능력 향상을 위한 2Bi 접근 모형을 활용한 모바일 학습 시스템의 설계 및 구현)

  • Jung, Mi-A;Jun, Woo-Chun
    • Journal of The Korean Association of Information Education
    • /
    • v.14 no.1
    • /
    • pp.1-12
    • /
    • 2010
  • For hearing-impaired students, it is known that reading ability is the most important means of communication. In the meanwhile, with recent development of wireless communication technologies, mobile devices are used in various education fields. The purpose of this study is to design and implement a mobile system to improve reading ability of hearing-impaired students. For this purpose, "Question Generation Strategy", known as one of the effective methods for improving reading ability, is adopted to make study contents. Also, 2Bi (Bilingual-Bicultural) Approach Model, an attractive model for improving reading ability of hearing-impaired students, is used. Characteristics of the proposed mobile system are as follows. First, the system is developed to let students learn written language usage through repetition and difference of two organically-related curriculums for hearing-impaired students. Second, study contents are made to increase sentence understanding ability using an activity that is to let students read articles, make questions and answer questions for themselves. Third, the proposed system is designed and implemented to allow students to choose study contents individually anytime anywhere depending on their study levels.

  • PDF

Design and Implementation of Peer-to-Peer Electronic Commerce Systems based on the File Sharing Method between Users (이용자간 파일공유방식에 기반한 P2P 전자상거래 시스템 설계 및 구현)

  • Kim Chang-Su;Seo Young-Suk
    • The Journal of Information Systems
    • /
    • v.15 no.1
    • /
    • pp.1-20
    • /
    • 2006
  • Peer-to-peer systems (P2P) are rapidly growing in importance on the Internet environment, quickly extending the range of their usage. However, peer-to-peer systems have not been widely applied in electronic commerce because they have not been established as an appropriate business model. Therefore, we firstly review the previous research relevant to peer-to-peer systems, and then analyze the business models for P2P systems presented by previous researchers. Furthermore, this study categorizes major issues in terms of the technical and business model aspects. On the basis of these reviews, we develop P2P electronic commerce systems based on the file sharing method between users, focusing on user interface friendliness. A developed P2P electronic commerce systems are programmed by using the C# based on the Microsoft.net solution. A database is implemented using the MSSQL2000. A main application technology is designed that P2P electronic commerce systems make it possible. for user to extend into BtoB Solution by using WSDL (Web Services Description Language), UDDI (Universal Description, Discovery, and Integration) and the XML that is a document for users. User interface is made as form of Internet messenger for a user's convenience and is possible to develop into a commodity transaction system based on XML. In this study, it is possible for the P2P electronic commerce system to have extended application to fields such as Internet shopping mall and property transaction in a nonprofit organization, a public institution and a large scale nonprofit institution that have a similar structure as compared with a structure of a nonprofit educational institution.

  • PDF

A study on the Influence of Usage Intention of IoT Healthcare service for Elderly (노인의 IoT 기반 스마트 건강관리서비스 이용의도에 미치는 영향)

  • Hong, Sung Jung;Lee, Sung-Hyun;Kim, Kyung Mi
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.341-349
    • /
    • 2020
  • The purpose of this study was conducted to explain the intention of use of IoT (internet of things) healthcare service for elderly using TAM (Technology Acceptance Model). The exogenous variables were professional support, personalization, interaction, and convenience, The endogenous variables were usefulness and intention. Data were collected from 220 elderly residents aged 65 over in welfare center and were analyzed using structural equation modeling using AMOS 25.0. The result of this study showed that professional support and personalization did not significantly difference perceived usefulness, and there were significant differences interaction, and convenience. Futhermore, perceived usefulness influence intention of use of IoT healthcare service for elderly. IoT health care service for elderly is affected by perceived usefulness. This study systematically verified the elderly's intention of using IoT-based smart healthcare services. The result of this study would be able to be used as basic data for preparing strategies to enhance their intention to use the services.

A Study on Data Security Control Model of the Test System in Financial Institutions (금융기관의 테스트시스템 데이터 보안통제 모델 연구)

  • Choi, Yeong-Jin;Kim, Jeong-Hwan;Lee, Kyeong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.6
    • /
    • pp.1293-1308
    • /
    • 2014
  • The cause of privacy extrusion in credit card company at 2014 is usage of the original data in test system. By Electronic banking supervision regulations of the Financial Supervisory Service and Information Security business best practices of Finance information technology (IT) sector, the data to identify the customer in the test system should be used to convert. Following this guidelines, Financial firms use converted customer identificaion data by loading in test system. However, there is some risks that may be introduced unintentionally by user mistake or lack of administrative or technical security in the process of testing. also control and risk management processes for those risks did not studied. These situations are conducive to increasing the compliance violation possibility of supervisory institution. So in this paper, we present and prove the process to eliminate the compliance violation possibility of supervisory institution by controlling and managing the unidentified conversion customer identification data and check the effectiveness of the process.

A Study on the Application of Phase Change Material for Electric Vehicle Battery Thermal Management System using Dymola (전기자동차 배터리팩 열관리시스템에서 상변화물질 적용에 관한 고찰)

  • Choi, Chulyoung;Choi, Woongchul
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1889-1894
    • /
    • 2017
  • Global automobile manufacturers are developing electric vehicles (EVs) to eliminate the pollutant emissions from internal combustion vehicles and to minimize fossil fuel consumptions for the future generations. However, EVs have a disadvantage of shorter traveling distance than that of conventional vehicles. To answer this shortfall, more batteries are installed in the EV to satisfy the consumer expectation for the driving range. However, as the energy capacity of the battery mounted in the EV increases, the amount of heat generated by each cell also increases. Naturally, a better battery thermal management system (BTMS) is required to control the temperature of the cells efficiently because the appropriate thermal environment of the cells greatly affects the power output from the battery pack. Typically, the BTMS is divided into an active and a passive system depending on the energy usage of the thermal management system. Heat exchange materials usually include gas and liquid, semiconductor devices and phase change material (PCM). In this study, an application of PCM for a BTMS was investigated to maintain an optimal battery operating temperature range by utilizing characteristics of a PCM, which can accumulate large amounts of latent heat. The system was modeled using Dymola from Dassault Systems, a multi-physics simulation tool. In order to compare the relative performance, the BTMS with the PCM and without the PCM were modeled and the same battery charge/discharge scenarios were simulated. Number of analysis were conducted to compare the battery cooling performance between the model with the aluminum case and PCM and the model with the aluminum case only.

The Energy Performance & Economy Efficiency Evaluation of Microturbine Installed in Hospital buildings (대형병원에서 마이크로터빈 이용한 열병합시스템 에너지성능 및 경제성 분석)

  • Kim, Byung-Soo;Gil, Young-Wok;Hong, Won-Pyo
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.12
    • /
    • pp.176-183
    • /
    • 2009
  • Distributed generation(DG) of combined cooling, heat, and power(CCHP)has been gaining momentum in recent year as efficient, secure alternative for meeting increasing energy demands. This paper presents the energy performance of microturbine CCHP system equipped with an absorption chiller by modelling it in hospital building. The orders of study were as following. 1)The list and schedule of energy consumption equipment in hospital were examined such as heating and cooling machine, light etc. 2) Annual report of energy usage and monitoring data were examined as heating, cooling, DHW, lighting, etc. 3) The weather data in 2007 was used for simulation and was arranged by meteorological office data in Daejeon. 4) Reference simulation model was built by comparison of real energy consumption and simulation result by TRNSYS and ESP-r. The energy consumption pattern of building were analyzed by simulation model and energy reduction rate were calculated over the cogeneration. As a result of this study, power generation efficiency of turbine was about 30[%] after installing micro gas turbine and lighting energy as well as total electricity consumption can be reduced by 40[%]. If electricity energy and waste heat in turbine are used, 56[%] of heating energy and 67[%] of cooling energy can be reduced respectively, and total system efficiency can be increased up to 70[%].