• Title/Summary/Keyword: 보안수준

Search Result 1,073, Processing Time 0.026 seconds

Understanding Individual's Switching Intentions to Cloud Computing Service: Based on the Social Exchange Theory (개인 클라우드 컴퓨팅 서비스로의 전환의도에 관한 연구: 사회교환이론을 중심으로)

  • Shin, Seonjin;Park, Sung-Uk
    • Journal of Korea Technology Innovation Society
    • /
    • v.18 no.1
    • /
    • pp.176-203
    • /
    • 2015
  • While the importance of adopting cloud computing service has been emerged, comparatively little research has been conducted on examining factors of an individual user's intention to switch toward cloud computing service. Hereafter, this study presents and empirically tests users' intention to switch to cloud computing. Our model posits that the characteristics of cloud computing such as effectiveness, economics, accessability, switching cost, security concern, and satisfaction toward existing IT service to cloud service affect perceived value, which in turn, influences intention to switch. An experimental study using student subjects provided empirical validation for our proposed model. Survey data from 204 respondents was used to test the model using partial least square analysis. As the result of the analysis, five hypotheses out of seven hypotheses were supported. According to our results, among the characteristics of cloud computing, effectiveness, economics, switching cost, and security concern were found to have significant impact on users' intention to switch that mediated by perceived value. Based on our research findings, we hope that this research will stimulate researchers' interest in the emerging area of cloud computing adoption.

User Authentication System using Base Password and Member Registration Information (기본 패스워드와 회원 가입 정보를 이용한 사용자 인증 시스템)

  • Jeong, Jongmun;Hwang, Mintae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2289-2296
    • /
    • 2016
  • The password rules to be applied for the user account creation are often different by websites. Thus we often forget the password to sign in website and it creates waste of time for frequent password reset. In order to solve this problem we propose a new authentication method in this paper. When user forget the password to sign in, the existing methods require a password reset step but our proposed method provides new sign in scheme through the additional authentication step with base password and personal information registered at the member sign up stage. From the result of performance comparison the proposed method is considered to be more efficient than others because it provides not only an equivalent level of security with others but also requires only a half of the number of transactions and the time required for password reset step.

Review of the suitability to introduce new identity verification means in South Korea : Focused on Block Chain and FIDO (우리나라의 본인확인수단에 관한 신규 인증수단의 도입 적합성 검토 : Block Chain과 FIDO를 중심으로)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.5
    • /
    • pp.85-93
    • /
    • 2018
  • This study investigates the suitability of the blockchain and FIDO among non-face-to-face authentication means in order to secure diversity of identfication means operated in South Korea. In order to do this, the study selected and analyzed seven conformance criteria (universality, persistence, uniqueness, convenience, security, applicability, and economics), and the results were appropriate. Accordingly, in order to apply the blockchain and FIDO as the identification means, the related regulations and notices should be revised to improve the identification procedure. In addition, differentiated certification standards should be established for each service field to apply various authentication means as well as existing identification means, and the authentication means should be continuously developed and linked with the service. In the future, the identification means will bring security of the information circulation environment in the IoT, so it should be implemented in a variety of services by supporting application of identification means.

Utilization Outlook of Medical Big Data in the Cloud Environment (클라우드 환경에서 의료 빅데이터 활용 및 전망)

  • Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.341-347
    • /
    • 2014
  • Among methods of the big data process, big data process under the cloud environment is becoming a main topic. As part of solving faced problem and strengthening industrial competitiveness in the medical and health industry, discussion on ways to activate big data is actively being conducted. Because the reason is a paradigm shift, saving pressure for increasing health care costs, and increased consumer interest for the level of service. In this paper, we find out the relationship between the cloud and big data. And we are to research and analysis a cloud-based big data case in the medical field. Finally we propose the efficient utilization and future outlook. For the smooth functioning of cloud-based medical big data, we have to solve the problems like infrastructure extension, analysis/application software development, and professional manpower training. In addition, we have to correct insufficient laws maintenance to the Cloud utilization, and improve the security and the recognition to personal information, and solve authority for data centralization.

A Framework for Quality Dimensions Measurement of Context Information (상황정보의 품질요소 측정 프레임워크)

  • Kim, Young-Hee;Lee, Keum-Suk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.6 s.44
    • /
    • pp.201-210
    • /
    • 2006
  • This study proposed a framework to clarify a viewpoint of quality problems, and to consider reliance, of context information in ubiquitous computing environments. The framework is structured as a sequence of steps in measuring the quality of context information. The first step in measuring the qualify of context information is to determine users of the context information. This is important because the type of users or applications determines the type of context information and thus the methods of measuring the qualify dimensions and the thresholds for evaluating the quality of context information. The other steps include methods for measuring each quality dimensions to allow quantitative evaluation of quality, establishing acceptable quality targets. We selected accuracy, completeness, up-to-dateness, access security, and representation as quality dimensions and proposed their measurement methods and concrete procedures. We enabled objective evaluation of quality level through proposal of methods suitable to quality measurement of context information.

  • PDF

The Empirical Study on Factors of Effect of Introducing Cloud-Based Remote Education System: Focusing on Successful of Cyber University Construction (클라우드 기반 원격 교육시스템 도입 효과 요인에 관한 실증 연구: 사이버대학교 구축 성공사례 중심으로)

  • Kang, Tae-Gu
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.293-300
    • /
    • 2020
  • With constant relaxation of regulations by the government in the 4th industrial innovation era, it has brought huge changes to the education environment as it has created solutions to hindrance factors against introduction of the cloud. Universities are getting more interested in the introduction of the cloud Computing but they still remain at the level of recognition diffusion and creating ambience. The study has analyzed empirical factors of the effect of introduction of the successful case "K Cyber University's Construction of Cloud-Based Remote Education System" through the previous studies on trait factors affecting the introduction of the cloud computing and the analysis of factors in terms of expandability, agility, compatibility, economic feasibility, security, stability and institutional support. Factors drawn through this are meaningful for empirical studies on presenting strategies and the directivity to introduce the cloud computing successfully. This study can be used as the background for further studies which will require various factors prior to introducing the cloud computing.

Study on ″Policy-based Network service Management System for DEN″ (DEN 서비스를 위한 PBNM 개발)

  • 전준현;백성혁;구태원
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.4
    • /
    • pp.1-10
    • /
    • 2004
  • In NGNs(Next Generation Networks), It is necessary for Integrated management of resource and information to satisfy high-quality users'demands, such as stable speed, guarantee of high level service and service requirement in various fields. In relation to this, technology for efficiently using limited resources is becoming interesting things more and more. Therefore policy of network service is dealt essentially. Recently, DEN(Directory Enabled Network)-based personalization service is user-dependent services in NGNs, and integrated management and efficient use of limited resources. Also, PBNM(Policy-Based Network Management) is new technology defined and applied by policies of communication service environments and users on demand. Subsequently to study on how to optimizing the PBNM is of great importance. In this paper, we propose a technology of the PBNM based on DEN standardized in DMTF(Distributed Management Task Force).

A Study on Development of the Digital Competence Measurement Tool for University Student

  • Kim, Dong-Man;Lee, Tae-Wuk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.191-199
    • /
    • 2019
  • In this paper, we propose to develop a diagnosis tool for measuring digital competence for university student. To this end, 223 students participated for the survey research. Based on the survey by 6 domain and 40 questions, 6 factors and 18 questions for digital competence measurement were drawn throughout the factors analysis. The results of the confirmatory factor analysis showed the fact that 6 factors and 18 questions that satisfied the model-fit indexes statistically were finally confirmed. And the developed tool demonstrated good results in reliability and validity verification, which were suitable for measuring digital competence for university students. The developed measurement tool of digital competence for university students consisted of 6 sub-components such digital device operation, communication and collaboration, information searching, processing, and management, problem solving and learning, security, digital ethics. The digital competence measuring tool developed in this study is expected to be used to identify the current level of competences for university student, and to enhance their own digital competences through educational supports.

Proposal of IT Trend and Prospect-Conscious Research Issues on Internet (인터넷 관련 IT 동향 및 전망을 통한 연구이슈 제안)

  • Song, In Kuk
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.153-160
    • /
    • 2017
  • Due to the endeavors and performances of many IT firms, as well as the government supports, the IT capability of Korea was ranked in the top 8th position by Huawei in 2015. Specifically, as far as the wire & wireless network and Internet speed, Korea has taken pride in possessing the competitive advantage. However, many academic and practical experts began to point out the lack of systematic research management on Internet. The purpose of the study is to identify various research issues on Internet and to verify their appropriateness. In addition, the study examined their recent trends and provided the prospect of the future Internet-related researches. Consequently, the finding indicates that the rigorous endeavors and outcomes for each proposed research issue have been resulted in and will be continued. The study anticipates the growing demands of researches in the fields of future network, multimedia application, big data, artificial intelligence, and Internet security.

A Study on Standardization Methods Using the Order of Priorities (우선순위를 이용한 점수 표준화 방법 연구)

  • Song, Bang-weon;Kim, Won-sik;Kang, Seok-joong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2500-2506
    • /
    • 2015
  • Proposal assessments for new weapon system development such as C4I system have been applying a qualitative assessment. The main problem of qualitative assessment is that the results vary depending on the evaluator's subjective preferences and priorities. Also, if there is no discrimination of technical skills degrade, the company will be selected by bid price regardless of technical power. In order to making a fairness, We need a method to compensate for the evaluator's subjectivity and to enhance discrimination. Previous standardization method is limited because targets of the proposal assessment are minority and have similar skill level. So, The new standardized evaluation methods applicable to the proposal was presented. This way is using the priority instead of the score and has better performance than existing methods as the target numbers are smaller.