• Title/Summary/Keyword: used smart phone

Search Result 593, Processing Time 0.04 seconds

Analysis of Smart Grid Network Vulnerability Using Smart Phone (Smart Phone을 통한 Smart Grid 네트워크 접속에서 취약성)

  • Lee, Jae-Hyun;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.240-243
    • /
    • 2010
  • Smart Phone supplies are diffused and substitute the Internet PC with Mobile communications which they are applied. Smart Phone in Smart Grid where electric power watch and the IT of existing amalgamate are used with business. Consequently from Smart Grid network connections which lead Smart Phone in about connection and control in about security vulnerabilities and Smart Grid networks the research is necessary in about vulnerability. It uses Smart Phone from the present paper and when approaching electric power watch systems which lead Smart Grid networks, it researches in about connection vulnerability. Also it uses Smart Phone and after connecting in Smart Grid networks a vulnerability in seizure possibility and, electric power information and control information, about private data etc. access authority it analyzes with the problem point which occurs it confronts it researches. And the research direction for a security reinforcement under presenting boil in about Smart Grid network security vulnerabilities which lead Smart Phone.

  • PDF

The Effect of Self-Identity on Smart phone Addiction

  • Kim, Jung-ae
    • International Journal of Advanced Culture Technology
    • /
    • v.5 no.2
    • /
    • pp.44-53
    • /
    • 2017
  • The purpose of this study was to investigate the relationship between self-identity and smart phone addiction among University students. This study used descriptive cross sectional study to analyze the relationship between self-identity and smart phone addiction. Study participants included 357 University students located in C province who selected through volunteered, but 10 missing data were excluded and finally 347 participants completed the study. The study data were collected using self-identity tool made by Park A chung in 1996 which was composed of Independence, Proprioception, Future conviction, Goal orientation, Initiate, and Intimacy and Smart phone addiction tool made by National information society agency. The self-identity's Cronbach's alpha was .937 and Smart phone was .670. All data analyses were performed using SPSS 18.0. Results showed that most students were not addicted(97.1%) in Smart phone using and middle level(73.2%) of self identity. Also, there was a difference in self - identity level according to gender and grade(the ratio of smart phone general users, not at all addicted, was 90.79% for males and 98.53% for females), and there was difference in Smart phone addiction level according to gender and residence type(the ratio of Smart phone general users, not at all addicted, is 99.32% for commute, 97.04% for dormitory, and 89.66% for self governing). Also there were strongly related with self-identity and Smart phone addiction(p < .001). This results reveled that self-identity affect to Smart phone addiction, therefore it is important to raise self-identity to prevent Smart phone addiction for University students.

Forensic data extracts of Android and Windows Mobile O.S. Smart Phone (Google Android와 Windows Mobile Smart Phone의 포렌식 자료 추출)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.235-239
    • /
    • 2010
  • Use of mobile phones reached saturation point, the recent use of the iPhone, including the Smart Phone is increasing rapidly. How to extract forensic data from current mobile phones and SYN, JTAG, Revolving There are three ways. Mobile phone and Smart Phone, but the technology and how to use forensic data because of the difference must have different extraction methods. In this paper, in the Smart Phone will study how to extract forensic data. Commonly used in the Google Android Smart Phone and Windows Mobile Smart Phone OS in the specification and analysis for analysis, the data analysis. Also, Google Android and Windows Mobile Smart Phone to extract forensic data to generate evidence. The present study tested the Mobile Smart Phone technology research will contribute to the development of forensic techniques.

  • PDF

Developing a Smart Phone Application for the OMAHA System Guidelines (오마하 시스템 가이드라인의 스마트폰 애플리케이션 개발)

  • Hong, Hae-Sook;Lee, In-Keun;Hong, Sung-Jung;Kim, Hwa-Sun
    • Research in Community and Public Health Nursing
    • /
    • v.21 no.4
    • /
    • pp.512-521
    • /
    • 2010
  • Purpose: The remarkable progress in information and communication technology has had a great effect on the healthcare delivery system. The development of smart phone applications is a new field. The aim of our research was to provide assistance in developing smart phone applications for community health nursing. Methods: Based on an informative approach, this study developed persona and site maps, followed by a storyboard as a way of analyzing users' requirements and designing responses in the context of smart phone application development methodology. Results: We developed persona, user interface and database design successfully, and then seven nurses selected four nursing problems (income, residence, pain, and digestion hydration). The search time in seconds for the 2005 English OMAHA guidelines to find three nursing interventions for these problems was used to evaluate the effectiveness of the smart phone application. The results showed that smart phone applications' search was 21 times faster on the average than book guidelines. Conclusion: An English version of the OMAHA system application was developed for the Android smart phone market. It is hoped that smart phone applications such as this will be used internationally for nursing education.

An Empirical Study on Perceived Value and Continuous Intention to Use of Smart Phone, and the Moderating Effect of Personal Innovativeness (스마트폰의 지각된 가치와 지속적 사용의도, 그리고 개인 혁신성의 조절효과)

  • Han, Joonhyoung;Kang, Sungbae;Moon, Taesoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.53-84
    • /
    • 2013
  • With rapid development of ICT (Information and Communications Technology), new services by the convergence of mobile network and application technology began to appear. Today, smart phone with new ICT convergence network capabilities is exceedingly popular and very useful as a new tool for the development of business opportunities. Previous studies based on Technology Acceptance Model (TAM) suggested critical factors, which should be considered for acquiring new customers and maintaining existing users in smart phone market. However, they had a limitation to focus on technology acceptance, not value based approach. Prior studies on customer's adoption of electronic utilities like smart phone product showed that the antecedents such as the perceived benefit and the perceived sacrifice could explain the causality between what is perceived and what is acquired over diverse contexts. So, this research conceptualizes perceived value as a trade-off between perceived benefit and perceived sacrifice, and we need to research the perceived value to grasp user's continuous intention to use of smart phone. The purpose of this study is to investigate the structured relationship between benefit (quality, usefulness, playfulness) and sacrifice (technicality, cost, security risk) of smart phone users, perceived value, and continuous intention to use. In addition, this study intends to analyze the differences between two subgroups of smart phone users by the degree of personal innovativeness. Personal innovativeness could help us to understand the moderating effect between how perceptions are formed and continuous intention to use smart phone. This study conducted survey through e-mail, direct mail, and interview with smart phone users. Empirical analysis based on 330 respondents was conducted in order to test the hypotheses. First, the result of hypotheses testing showed that perceived usefulness among three factors of perceived benefit has the highest positive impact on perceived value, and then followed by perceived playfulness and perceived quality. Second, the result of hypotheses testing showed that perceived cost among three factors of perceived sacrifice has significantly negative impact on perceived value, however, technicality and security risk have no significant impact on perceived value. Also, the result of hypotheses testing showed that perceived value has significant direct impact on continuous intention to use of smart phone. In this regard, marketing managers of smart phone company should pay more attention to improve task efficiency and performance of smart phone, including rate systems of smart phone. Additionally, to test the moderating effect of personal innovativeness, this research conducted multi-group analysis by the degree of personal innovativeness of smart phone users. In a group with high level of innovativeness, perceived usefulness has the highest positive influence on perceived value than other factors. Instead, the analysis for a group with low level of innovativeness showed that perceived playfulness was the highest positive factor to influence perceived value than others. This result of the group with high level of innovativeness explains that innovators and early adopters are able to cope with higher level of cost and risk, and they expect to develop more positive intentions toward higher performance through the use of an innovation. Also, hedonic behavior in the case of the group with low level of innovativeness aims to provide self-fulfilling value to the users, in contrast to utilitarian perspective, which aims to provide instrumental value to the users. However, with regard to perceived sacrifice, both groups in general showed negative impact on perceived value. Also, the group with high level of innovativeness had less overall negative impact on perceived value compared to the group with low level of innovativeness across all factors. In both group with high level of innovativeness and with low level of innovativeness, perceived cost has the highest negative influence on perceived value than other factors. Instead, the analysis for a group with high level of innovativeness showed that perceived technicality was the positive factor to influence perceived value than others. However, the analysis for a group with low level of innovativeness showed that perceived security risk was the second high negative factor to influence perceived value than others. Unlike previous studies, this study focuses on influencing factors on continuous intention to use of smart phone, rather than considering initial purchase and adoption of smart phone. First, perceived value, which was used to identify user's adoption behavior, has a mediating effect among perceived benefit, perceived sacrifice, and continuous intention to use smart phone. Second, perceived usefulness has the highest positive influence on perceived value, while perceived cost has significant negative influence on perceived value. Third, perceived value, like prior studies, has high level of positive influence on continuous intention to use smart phone. Fourth, in multi-group analysis by the degree of personal innovativeness of smart phone users, perceived usefulness, in a group with high level of innovativeness, has the highest positive influence on perceived value than other factors. Instead, perceived playfulness, in a group with low level of innovativeness, has the highest positive factor to influence perceived value than others. This result shows that early adopters intend to adopt smart phone as a tool to make their job useful, instead market followers intend to adopt smart phone as a tool to make their time enjoyable. In terms of marketing strategy for smart phone company, marketing managers should pay more attention to identify their customers' lifetime value by the phase of smart phone adoption, as well as to understand their behavior intention to accept the risk and uncertainty positively. The academic contribution of this study primarily is to employ the VAM (Value-based Adoption Model) as a conceptual foundation, compared to TAM (Technology Acceptance Model) used widely by previous studies. VAM is useful for understanding continuous intention to use smart phone in comparison with TAM as a new IT utility by individual adoption. Perceived value dominantly influences continuous intention to use smart phone. The results of this study justify our research model adoption on each antecedent of perceived value as a benefit and a sacrifice component. While TAM could be widely used in user acceptance of new technology, it has a limitation to explain the new IT adoption like smart phone, because of customer behavior intention to choose the value of the object. In terms of theoretical approach, this study provides theoretical contribution to the development, design, and marketing of smart phone. The practical contribution of this study is to suggest useful decision alternatives concerned to marketing strategy formulation for acquiring and retaining long-term customers related to smart phone business. Since potential customers are interested in both benefit and sacrifice when evaluating the value of smart phone, marketing managers in smart phone company has to put more effort into creating customer's value of low sacrifice and high benefit so that customers will continuously have higher adoption on smart phone. Especially, this study shows that innovators and early adopters with high level of innovativeness have higher adoption than market followers with low level of innovativeness, in terms of perceived usefulness and perceived cost. To formulate marketing strategy for smart phone diffusion, marketing managers have to pay more attention to identify not only their customers' benefit and sacrifice components but also their customers' lifetime value to adopt smart phone.

The Mediating Effects of Self-Control and Impulsiveness On Self-Esteem and Smart Phone Addition In College Students

  • Kim, Kyung-Sook;Lee, Duk-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.6
    • /
    • pp.183-188
    • /
    • 2019
  • This study aimed to analyse the effects of self-control and impulsiveness of college students on smart phone addition and whether self-esteem has mediating effects on them. For the purposes, this study interviewed 4-year college students in Gwangju City with the use of a questionnaire and 314 copies of the responses were used for a final analysis. The data collected was analysed with the use of SPSS 22.0 and the results are presented as follows: First, behavior impulsiveness has a positive effect on self-esteem and smart phone addiction. Second, self-esteem had a positive effect on smart phone addiction. Third, it was discovered that behavior impulsiveness had a positive effect on smart phone addiction through an analysis of mediating effects while self-esteem had an indirect effect on it. Therefore, it was suggested that more care should be paid on smart phone addiction and development of programs against it should be facilitated.

A Secure Authentication Method for Smart Phone based on User's Behaviour and Habits

  • Lee, Geum-Boon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.9
    • /
    • pp.65-71
    • /
    • 2017
  • This paper proposes a smart phone authentication method based on user's behavior and habit that is an authentication method against shoulder surfing attack and brute force attack. As smart phones evolve not only storage of personal data but also a key means of financial services, the importance of personal information security in smart phones is growing. When user authentication of smart phone, pattern authentication method is simple to use and memorize, but it is prone to leak and vulnerable to attack. Using the features of the smart phone pattern method of the user, the pressure applied when touching the touch pad with the finger, the size of the area touching the finger, and the time of completing the pattern are used as feature vectors and applied to user authentication security. First, a smart phone user models and stores three parameter values as prototypes for each section of the pattern. Then, when a new authentication request is made, the feature vector of the input pattern is obtained and compared with the stored model to decide whether to approve the access to the smart phone. The experimental results confirm that the proposed technique shows a robust authentication security using subjective data of smart phone user based on habits and behaviors.

Correlation Between Shoulder Gradient, Range of Motion of the Neck, and Subjective Pain level of the Potential Risk Group of Smart-phone Addiction (스마트폰 중독 잠재위험군의 어깨 기울기, 목 관절가동범위 및 주관적 통증 정도의 상관관계)

  • Jeong, Yeonwoo
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.5 no.2
    • /
    • pp.83-90
    • /
    • 2017
  • Purpose : The purpose of this study was to investigate the correlation between shoulder gradient, range of motion of the neck, and subjective pain level of the potential risk group of smart-phone addiction. Methods : The subjects of this study were 90 women's who had potential risk of smart-phone addiction. VAS was used to measure subjectively pain intensity. Global Postural System was used to measure forward head posture. CROM was used to measure flexion, extension, lateral flexion of cervical range of motion. Results : The results of this study showed that was significant positive correlation between the both shoulder gradient, and cervical range of motion(p<.05). Statistically significant negative correlation between the VAS and left lateral flexion(p<.05). Conclusions : The difference between the gradient of both shoulders increased with the use of smart-phone addiction, and the cervical left lateral flexion decreased as the pain increased. This suggests that recognition on decrease of using smart phone and postural correction is necessary.

Development of a Cryptographic Dongle for Secure Voice Encryption over GSM Voice Channel

  • Kim, Tae-Yong;Jang, Won-Tae;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.4
    • /
    • pp.561-564
    • /
    • 2009
  • A cryptographic dongle, which is capable of transmitting encrypted voice signals over the CDMA/GSM voice channel, was designed and implemented. The dongle used PIC microcontroller for signals processing including analog to digital conversion and digital to analog conversion, encryption and communicating with the smart phone. A smart phone was used to provide power to the dongle as well as passing the encrypted speech to the smart phone which then transmits the signal to the network. A number of tests were conducted to check the efficiency of the dongle, the firmware programming, the encryption algorithms, and the secret key management system, the interface between the smart phone and the dongle and the noise level.

Bus Information System based on Smart-Phone Apps using GPS Information (위치정보를 활용한 스마트폰 기반의 버스정보시스템)

  • Kim, Seung-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.169-174
    • /
    • 2011
  • This paper provides Bus Information System(BIS) implementation based on the Smart-phone APPs using GPS information. Nearly all of recent smart-phones are equipped with the GPS feature. Bus driver's smart-phone can send the position information using its GPS information periodically and on events. On receiving those information, servers can process those into the information that can be used by individual users and bus stop information panel. The proposed BIS based on smart-phone APPs is expected to be used publicly with the special process that enables the smart-phone APPs only in the specific bus.