• Title/Summary/Keyword: 스마트폰 활용

Search Result 2,165, Processing Time 0.028 seconds

Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model (건강신념모델을 이용한 소셜네트워크서비스에서의 개인정보보호행위에 관한 연구)

  • Shin, Se-mi;Kim, Seong-jun;Kwon, Do-soon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1619-1637
    • /
    • 2016
  • With wide distribution of smart phones and development of mobile network, social network service (SNS) is displaying remarkable growth rates. Users build new social relations by sharing their interests, which brings surging growth to the SNS based on the combination between the strength of expanding the place for communication and distribution of smart phones featured with easy portability. This study is designed to understand impact factors of SNS on users in Korea and to conduct empirical research on casual relationship between the factors above and the factors affecting personal information behavior through the privacy protection and self-efficacy. In order to accomplish the objective above, the study presented a research model applied with key variables of the Health Belief Model (HBM) predicting behaviors capable of recognizing and preventing individual diseases in the field of health communication. To perform empirical verification on the research model of this study, a survey was conducted upon college students at N university located in Chungcheongnam-do and K university in rural area, who have experiences using the SNS. Through this survey, a total of 186 samples were collected, and path analysis was performed in order to analyze the relationship between the factors. Based on the findings from the survey, first, variables Perceived probability, Perceived severity, Perceived impairment of the HBM, key factors of personal information protection behavior on the SNS, were found to exhibit negative relationship with self-efficacy, and Perceived probability, Perceived benefit, Perceived impairment were found to exhibit negative relationship with privacy protection. But the above, Perceived severity showed positive relationship with privacy protection, and Perceived benefit and self-efficacy also displayed positive relationship. Second, although self-efficacy, a parameter, showed positive relationship with privacy protection, it demonstrated negative relationship with personal information protection behavior. Lastly, privacy protection exhibited positive relationship with personal information protection behavior. By presenting theoretical model reflected with characteristics of prevention based on these findings above unlike previous studies on personal information protection using technologies threatening personal information, this study is to provide theoretical and operational foundation capable of offering explanations how to predict personal information protection behavior on the SNS in the future.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

A survey on the utilization practice and satisfaction of users of food and nutrition information (정보이용자의 식품영양정보 이용 실태와 만족도)

  • Kim, Inhye;Park, Min-Seo;Bae, Hyun-Joo
    • Journal of Nutrition and Health
    • /
    • v.54 no.4
    • /
    • pp.398-411
    • /
    • 2021
  • Purpose: The objective of this study was to investigate food and nutrition information utilization practices of adults aged between 20 and 30 years to provide the basic data for developing customized content. Methods: Statistical analyses were performed using the SPSS program (ver. 24.0) for the 𝛘2-test, t-test, one-way analysis of variance, and Duncan's multiple range test. Results: Of the 570 subjects surveyed, 45.4% were men, 54.6% were women, 66.3% were in their 20s, 33.7% were in their 30s, 41.4% were single-person households, and 58.6% lived with their families. On average, 14.2% of televisions (TVs), 26.0% of personal computers (PCs), and 63.7% of smartphones were used for more than three hours per day. 30.9% of respondents searched for food and nutrition information more than once a week. 70.0% of the respondents had then applied the information in real life and 54.7% of the respondents said they would share information with others. Information retrieval rate was in the order of 'restaurant (64.8%)', 'diet (57.5%)', and 'food recipes (55.7%)'. Overall satisfaction with food and nutrition information averaged 3.33 on a five-point scale. Satisfaction score was in the order of 'enough description and easy to understand (3.43)', 'matching title and content (3.35)', and 'providing new and novel information (3.22)'. Satisfaction scores were significantly higher in the group that searched for information (p < 0.001), the group that used the retrieved information in real life (p < 0.001), and the group that conveyed this information to others (p < 0.001). Conclusion: To improve information user satisfaction, it is necessary to provide customized information that fits the characteristics of information users. For this purpose, it is necessary to continuously conduct surveys and satisfaction evaluations for each target group.

Factors to Affect the Selection of Machine-to-Machine Household Technology (사물지능통신(M2M) 가사기술의 선택 요인)

  • Park, Hye-Kyung;Yoon, Jeong-Ro
    • Journal of Korea Technology Innovation Society
    • /
    • v.16 no.4
    • /
    • pp.954-977
    • /
    • 2013
  • This paper investigates the factors to affect the consumer selection of machine-to-machine (M2M) technology in the purchase and utilization of home appliances. M2M technology, based on mobile internet, allows for automatic operation and remote control of home appliances and equipment. The introduction of M2M technology could lead to the saving of domestic housework and of active social participation for women. With a view to focusing on the liberating potential of M2M technology, this paper analyzes the correlation between four independent variables (gender, income, employment status of married woman, and possession of mobile internet devices) and two dependent variables (intention for purchase and utilization of M2M household appliances). The possession of mobile internet devices such as smart phone and tablet PC turns out to be the most significant factor to affect both the purchase and utilization of M2M household appliances. The employment status (employed or not-employed) affects only the intention for purchase. Neither the income level nor gender has significant correlation with the intention for purchase or utilization. The results differ from the conventional wisdom that the consumer selection of household technology is substantially affected by gender, income and employment of housewife.

  • PDF

A Study on DGPS Framework and Performance Evaluation for High-Accurate Localization based on GPS/AGPS (GPS/AGPS 기반의 고정밀 측위가 가능한 DGPS 프레임워크 및 성능평가에 관한 연구)

  • Seo, Ho-Seok;Jung, Se-Hoon;Oh, Min-Joo;Park, Dong-Gook;Sim, Chun-Bo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.9 no.8
    • /
    • pp.927-938
    • /
    • 2014
  • A number of crime and disease relief situation show a clear increasing trend in domestic and overseas country. In particular, we desperately need a fast location information sharing with high accuracy for dealing with this situation efficiently. In this paper, we propose a DGPS framework and performance evaluation based on Web service enable increase location accuracy using low-cost GPS or AGPS. The framework consists of mobile station to realize the final service by receiving the correction values that are created in the base station closest to the current position from DGPS server, base station system to transmit the correct values to DPGS server by installing at base point and DGPS framework working at DGPS server. Our framework is fundamentally designed to respond based on XML to service request. In addition, for performance evaluation, we make use of 3 sites of Level 2 city base-station among the base stations being operated in Suncheon-si. Through performance evaluation, we show that our framework outperforms about 10%~15% in terms of error improvement rate, compared with the existing schemes. And we have the advantage that various services can be expanded owing to receiving the correction values through mobile device such as, smart phone, smart pad, net-book by using XML based Web services.

Design for Access Control System based on Voice Recognition for Infectious Disease Prevention (전염성 확산 차단을 위한 음성인식 기반의 출입통제시스템 설계)

  • Mun, Hyung-Jin;Han, Kun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.7
    • /
    • pp.19-24
    • /
    • 2020
  • WHO declared a global pandemic on March 11th for Corona 19. However, there is a situation where you have to go to building for face-to-face education or seminars for economic and social activities. The first check method of COVID-19 infection is to measure body temperature, so the primary entrance and exit is blocked for near-field body temperature measurement. However, since it is troublesome to check directly, thermal camera is installed at the entrance of the building, and body temperature is measured indirectly using the infrared camera to control access. In case of middle and high schools, universities, and lifelong education center, we need a system that is possible to interoperate with attendance checks and automatically recognizes whether to wear masks and can authenticate students. We proposed the system that is to confirm whether to wear a mask with a camera that is embedded in a smart mirror, and that authenticates the user through voice recognition of the user who wants to enter the building by using voice recognition technology and determines whether to enter them or not. The proposed system can check attendance if it is linked with near-field temperature measurement and attendance check APP of student's smart phone.

Low-Cost Remote Power-Quality-Failure Monitoring System using Android APP and MCU (안드로이드 앱과 MCU를 이용한 저가형 원격 전원품질이상 감시 시스템)

  • Lim, Ho-Kyoun;Kim, Seo-Hwi;Lee, Seung-Hyeon;Choe, Sangho
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.9
    • /
    • pp.144-155
    • /
    • 2013
  • This paper presents a low-cost remote power-quality-failure monitoring system (RPMS) using Android App and TI MCU (micro-controller unit), which is appliable to a micro-grid. The designed RPMS testbed consists of smart nodes, a server, and Android APPs. Especially, the C2000-series MCU-based RPMS smart node that is low-cost compared to existing monitoring systems has both a signal processing function for power signal processing and a data transmission function for power-quality monitoring data transmission. The signal processing function implements both a wavelet-based power failure detection algorithm including sag, swell, and interruption, and a FFT-based power failure detection algorithm including harmonics such that reliable and real-time power quality monitoring is guaranteed. The data transmission function implements a low-complexity RPMS transmission protocol and defines a simple data format (msg_Diag) for power monitoring message transmission. We may watch the monitoring data in real time both at a server and Android phone Apps connected to the WiFi network (or WAN). We use RS-232 (or Bluetooth) as the wired (or wireless) communication media between a server and nodes. We program the RPMS power-quality-failure monitoring algorithm using C language in the CCS (Code Composer Studio) 3.3 environment.

A DDoS Attack Detection of private mobile network using Time Series Analysis (시계열 분석을 적용한 사설 모바일 네트워크의 DDoS 공격 탐지)

  • Kim, Dae Hwan;Lee, Soo Jin;Pyo, Sang Ho
    • Convergence Security Journal
    • /
    • v.16 no.4
    • /
    • pp.17-24
    • /
    • 2016
  • Many companies and organizations are building a mobile office environment using the LTE network, the national disaster network and Air Force LTE network are built for public safety and national defense. However the recent threats on information security have been evolving from information leakage to DDoS attacks to neutralize the service. Especially, the type of device such as Smart phones, smart pad, tablet PC, and the numbers are growing exponentially and As performance of mobile device and speed of line develop rapidly, DDoS attacks in the mobile environment is becoming a threat. So far, universal countermeasure to DDoS attacks has been interception the network and server step, Yet problem regarding DDoS attack traffic on mobile network and expenditure of network resources still remains. Therefore, this paper analyzes the traffic type distributed in the private mobile network such as the National Disaster Network, and Air Force LTE network in order to preemptively detect DDoS attacks on terminal step. However, as direct analysis on traffic distributed in the National Disaster Network, and Air Force LTE network is restricted, transmission traffics in Minecraft and uploading video file upload which exhibit similar traffic information are analyzed in time series, thereby verifing its effectiveness through establishment of DDoS attacks standard in mobile network and application that detects and protects DDoS attacks

A Study on martial arts when Equipped with Weapons, Clothes and Other Accessories (복식과 무기의 갖춤 상황에서의 무예연구)

  • Hwang, Ho-Young;Choi, Jea-Geun
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.413-421
    • /
    • 2013
  • We, currently settled on the peninsula, have a long history and our ancestors lived over the vast land further to the central Asia and northern China. Normally, our ancestors traded with many countries, but they fought battles when they were on bad terms and many countries emerged and disappeared. In this history, a variety of cultures have been established and the traditional martial arts is a part of those cultures. Our martial arts has been almost severed because of the development of fire weapons in the late Chosun Dynasty, Japan's colonial rule, and 1950-53 Korean War. Fortunately, we can study the traditional martial arts from history books, the records on the martial art books and relics. Muyeadobotongji, the martial art book published in the late Chosun Dynasty, regrets the negligence of martial arts Giyae(arts) after Japanese Invasion of Korea in 1592 and the Manchu war of 1636 and accommodated the martial art skills from Chosun, China and Japan. It is useful for studying martial arts, because it contains detailed description and drawings, clothes and accessories, and the specification of the weapons. However, the problem is the level of Giyae of the martial arts organization and individuals based on Muyeadobotongji vary and some organizations are arguing about the numbers.

A Design of Mobile e-Book Viewer interface for the Reading Disabled People (독서장애인용 모바일 전자책뷰어 인터페이스 설계)

  • Lee, KyungHee;Kim, TaeEun;Lee, Jongwoo;Lim, Soon-Bum
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.1
    • /
    • pp.100-107
    • /
    • 2013
  • As the eBook market grows fast recently, various eBook viewer solutions such as hardware viewers and software readers came out to the market. We can, however, hardly find mobile eBook interfaces for the reading disabled people who have difficulties in reading for their visual impairment or learning disabilities, or dyslexia. An eBook viewer interfaces for the reading disabled people should be carefully and distinctively designed because the reading disabled people cannot use normal versions of eBook viewer. In this paper, we suggest a eBook viewer interface model to make the reading disabled people read eBooks easily. Depending on the type of the reading disabled people: the full blind, the almost blind, the just learning disabled, our model provides an adaptive interface to make them read eBooks effectively. In addition, unlike the existing simple audio books, we also support annotation systems to make the reading disabled people interact with eBook viewer. To show the effectiveness of our model, we implemented an eBook viewer prototype on an android-based mobile device. We are sure that our model and implementation can make the reading disabled people, who is 10% of all the domestic people, read eBooks effectively.