• Title/Summary/Keyword: 스마트 모바일

Search Result 2,474, Processing Time 0.032 seconds

A study on security independent behavior in social game using expanded health belief model (건강신념모델을 확장한 소셜게임(Social Game) 보안의지행동에 관한 연구)

  • Ahn, Ho-Jeong;Kim, Sung-Jun;Kwon, Do-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.99-118
    • /
    • 2016
  • With the development of Internet and popularization of smartphones over recent years, social network services are experiencing rapid growth. On top of this, smartphone gaming market is showing a rapid growth and the use of mobile social games is on the significant rise. The occurrence of game data manipulation targeting these services and personal information leakage is highlighting the importance of social gaming security. This study is intended to propose development plans effective and efficient in social game services by figuring out factors putting effects on security dependent behavior of social game users in Korea and carrying out a practical study on the casual relationship between factors influencing security dependent behavior through recognized behavioral control and attitudes for privacy infringement of these factors. To do this, proposed was a study model in which the HBM(Health Belief Model) allowing the social game user to influence security dependent behavior was expanded and applied as a major variable. To verify the study model of this study practically, a survey was conducted among university students in Seoul-based K University and S University who had experienced using social game services. According to the study findings, firstly, the perceived seriousness turned out to provide positive influence to trust. But, the perceived seriousness turned out not to put positive effects on self-efficacy. Secondly, the perceived probability turned out not to put positive effects on self-efficacy and trust. Thirdly, the perceived gain turned out to put positive effects on self-efficacy and trust. Fourthly, the perceived disorder turned out not to put positive effects on self-efficacy and trust. Fifthly, self-efficacy turned out to put positive effects on trust. But, self-efficacy turned out not to put positive effects on security dependent behavior. Sixthly, trust turned out not to put positive effects on security dependent behavior. This study is intended to make a strategic proposal so that social game users can raise awareness of their level of security perception and security willingness through this.

  • PDF

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

The Present Situation and Challenges of the Russian Music Industry: Centered on the Digital Sound Sources (러시아 음악 산업 현황과 과제 - 디지털 음원을 중심으로 -)

  • Kwon, ki-bae;Kim, Se-il
    • Cross-Cultural Studies
    • /
    • v.50
    • /
    • pp.395-424
    • /
    • 2018
  • The purpose of this paper is to examine the current situation and background of the Russian consumer music market, where digital music sources are making great strides in the noted recent years. In addition, music storage technology, media and change are considered together in this report. Moreover, Russia is the 12th largest music market in the world. The Russian music industry is following the recent trend of the global music industry, where the digital music market is growing rapidly on many different levels. The explosive growth of the digital sound sources in Russia's music industry is attributed to the explosive increase in available consumer downloads, streaming sound source service, and the increase in the number of digital sound sources using mobile technologies due to the development of the Internet. In particular, the sales of the available and accessible streaming sound sources are expected to grow explosively by the year 2020, which is expected to account for more than 85% of total digital music sales. In other words, the spread of smartphones and the resulting changes in the lifestyle of the Russians have created these changes for the global consumer of music. In other words, the time has come for anyone to easily access music and listen to music without a separate audio or digital player. And the fact that the Russian government's strong policy on the eradication of illegal copying of music is becoming an effective deterrent, as is also the factor that led to the increase of the share of the digital sound source to increase sales in Russia. Today, the Russian music industry is leading this change through the age and process of simply adapting to the digital age. Music is the most important element of cultural assets, and it is the beneficial content, which drives the overall growth of the digital economy. In addition, if the following five improvements(First, strengthen the consciousness of the Russian people about copyright protection; Second, utilizing the Big Data Internet resources in the digital music industry; Third, to improve the monopoly situation of digital music distributors; Fourth, distribution of fair music revenues; and Fifth, revitalization of a re-investment in the current Russian music industry) are effective and productive, Russia's role and position in the world music market is likely to expand.

The Effects of Game User's Social Capital and Information Privacy Concern on SNGReuse Intention and Recommendation Intention Through Flow (게임 이용자의 사회자본과 개인정보제공에 대한 우려가 플로우를 통해 SNG 재이용의도와 추천의도에 미치는 영향)

  • Lee, Ji-Hyeon;Kim, Han-Ku
    • Management & Information Systems Review
    • /
    • v.37 no.4
    • /
    • pp.21-39
    • /
    • 2018
  • Today, Mobile Instant Message (MIM) has become a communication means which is commonly used by many people as the technology on smart phones has been enhanced. Among the services, KakaoGame creates much profits continuously by using its representative Kakao platform. However, even though the number of users of KakaoGame increases and the characteristics of the users are more diversified, there are few researches on the relationship between the characteristics of the SNG users and the continuous use of the game. Since the social capital that is formed by the SNG users with the acquaintances create the sense of belonging, its role is being emphasized under the environment of social network. In addition, game user's concerns about the information privacy may decrease the trust on a game APP, and it also caused to threaten about the game system. Therefore, this study was designed to examine the structural relationships among SNG users' social capital, concerns about the information privacy, flow, SNG reuse intention and recommendation intention. The results from this study are as follow. First of all, the participants' bridging social capital had a positive effect on the flow of an SNG, but the bonding social capital had a negative effect on the flow of an SNG. In addition, awareness of information privacy concern had a negative effects on the flow of an SNG, but control of information privacy concern had a positive effect on the flow of an SNG. Lastly, the flow of an SNG had a positive effect on the reuse intention and recommendation intention of an SNG. Also, reuse intention of an SNG had a positive effect on the recommendation intention. Based on the results from this study, academic and practical implications can be drawn. First, This study focused on KakaoTalk which has both of the closed and open characteristics of an SNS and it was found that the SNG user's social capital might be a factor influencing each user's behaviors through the user's flow experiences in SNG. Second, this study extends the scope of prior researches by empirically analysing the relationship between the concerns about the SNG user's information privacy and flow of an SNG. Finally, the results of this research can provide practical guidelines to develop effective marketing strategies considering them for SNG companies.

Development of unified communication for marine VoIP service (해상 VoIP 서비스를 위한 통합 커뮤니케이션 기술 개발)

  • Kang, Nam-seon;Yim, Geun-wan;Lee, Seong-haeng;Kim, Sang-yong
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.39 no.7
    • /
    • pp.744-753
    • /
    • 2015
  • This paper presents the results of research on developing marine unified communications to provide VoIP service based on marine satellites. With the recent popularity of smart-phones and other mobile devices, the demand for Internet-based wired and wireless unified technology has been growing in marine environments, and increasing interest is being directed to VoIP products and service models with high price competitiveness and the ability to deliver a variety of services. In this regard, this research designed three instruments, developed their unit modules, and verified their performances. These three instruments included the following: (1) a marine VoIP module equipped with an analogue gateway that can be linked to the existing devices used in vessels, which is more than 80% smaller than that of a land system; (2) a text/voice/video engine for marine satellite communications that runs on technology that minimizes communication data usage, which is a core technology for a marine VoIP service; and (3) a unified communication service that can support multilateral cloud-based message conversations, telephone number-based call functions, and voice/video calling between a private space in a ship and shore.

Three-Dimensional Positional Accuracy Analysis of UAV Imagery Using Ground Control Points Acquired from Multisource Geospatial Data (다종 공간정보로부터 취득한 지상기준점을 활용한 UAV 영상의 3차원 위치 정확도 비교 분석)

  • Park, Soyeon;Choi, Yoonjo;Bae, Junsu;Hong, Seunghwan;Sohn, Hong-Gyoo
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.5_3
    • /
    • pp.1013-1025
    • /
    • 2020
  • Unmanned Aerial Vehicle (UAV) platform is being widely used in disaster monitoring and smart city, having the advantage of being able to quickly acquire images in small areas at a low cost. Ground Control Points (GCPs) for positioning UAV images are essential to acquire cm-level accuracy when producing UAV-based orthoimages and Digital Surface Model (DSM). However, the on-site acquisition of GCPs takes considerable manpower and time. This research aims to provide an efficient and accurate way to replace the on-site GNSS surveying with three different sources of geospatial data. The three geospatial data used in this study is as follows; 1) 25 cm aerial orthoimages, and Digital Elevation Model (DEM) based on 1:1000 digital topographic map, 2) point cloud data acquired by Mobile Mapping System (MMS), and 3) hybrid point cloud data created by merging MMS data with UAV data. For each dataset a three-dimensional positional accuracy analysis of UAV-based orthoimage and DSM was performed by comparing differences in three-dimensional coordinates of independent check point obtained with those of the RTK-GNSS survey. The result shows the third case, in which MMS data and UAV data combined, to be the most accurate, showing an RMSE accuracy of 8.9 cm in horizontal and 24.5 cm in vertical, respectively. In addition, it has been shown that the distribution of geospatial GCPs has more sensitive on the vertical accuracy than on horizontal accuracy.

A Study on Digital Divide from Socio-Technical Convergence: With Focus on Korean Women's Travel Activities (사회기술융합적 관점에서 살펴본 디지털기기 이용한계에 대한 연구: 한국 여성의 관광유형을 중심으로)

  • Lee, Seung-Jae
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.177-185
    • /
    • 2015
  • The gender difference in social roles affects digital devices' utilization differences in man and woman even in the 21st Century. Prior studies analyze the digital divide (genders, ages, etc.) from the assessment perspectives of digital equipment, such as PCs. In the area of high speed internet, most functions of PCs have been replaced with smartphones, and around 80% of the mobile phone users adopt smartphones. Subsequently the inequality of physical access to the digital devices is no longer a criterion for digital divide. The focus on digital divide should be shifted from the physical access to other factors, such as socio-technical or socio-cultural ones. This paper examines utilization of women's digital equipment, in particular, preparing for tourism activities, which is popular but sensitive to the technology. A survey was conducted with participants of [Suncheon Garden Expo] 2013. The results of this study capture the inactive use of digital devices particularly women over 50s. This phenomenon (high utilization of the digital devices for social or informative purposes, but low utilization of the digital payment) implies other aspects of Korean women (economic independence, low self-assertion, technical difficulties, etc.), which is considered from the socio-technological convergence perspective. This study also has a practical implication on the side of the digital device developers as well as marketing, where the qualitative communication is likely to be incorporated for the women over 50s.

Geographical Name Denoising by Machine Learning of Event Detection Based on Twitter (트위터 기반 이벤트 탐지에서의 기계학습을 통한 지명 노이즈제거)

  • Woo, Seungmin;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.10
    • /
    • pp.447-454
    • /
    • 2015
  • This paper proposes geographical name denoising by machine learning of event detection based on twitter. Recently, the increasing number of smart phone users are leading the growing user of SNS. Especially, the functions of short message (less than 140 words) and follow service make twitter has the power of conveying and diffusing the information more quickly. These characteristics and mobile optimised feature make twitter has fast information conveying speed, which can play a role of conveying disasters or events. Related research used the individuals of twitter user as the sensor of event detection to detect events that occur in reality. This research employed geographical name as the keyword by using the characteristic that an event occurs in a specific place. However, it ignored the denoising of relationship between geographical name and homograph, it became an important factor to lower the accuracy of event detection. In this paper, we used removing and forecasting, these two method to applied denoising technique. First after processing the filtering step by using noise related database building, we have determined the existence of geographical name by using the Naive Bayesian classification. Finally by using the experimental data, we earned the probability value of machine learning. On the basis of forecast technique which is proposed in this paper, the reliability of the need for denoising technique has turned out to be 89.6%.

Factors Influencing the Using Intention of Shared Economy Services (공유경제서비스 이용의도 영향 요인에 관한 연구)

  • Cho, Eun-Joo;Suh, Sang-Hyuk
    • Journal of Korea Technology Innovation Society
    • /
    • v.21 no.4
    • /
    • pp.1411-1444
    • /
    • 2018
  • The shared economy has been growing rapidly in recent years, creating an innovative economic paradigm based on the growing interest in sustainable development in the environmental aspect, the development of ICT technology, and the spread of mobile, Internet and smart environments. The purpose of this study is to investigate the factors influencing of the shared economy on the intention of domestic consumers using shared economy services. Also we would like to find out if personal orientation on sustainable development actually have a valid impact on perceived values and intentions of using Shared Economy services. The result of the study shows that the factors affecting the intention to use Shared Economy service were perceived usefulness, subjective norm, perceived risk, and sustainable orientation which are characteristics of Shared Economy service. In addition the result of the indirect effect study Find that the individual felt the emotional value through the perceived usefulness and have the greatest influence on intention to use. Therefore, it implies that the marketing strategy of the Shared Economy service should take into consideration the elements that can feel emotional value through usability. In the future, We research on domestic success and failure cases of Shared Economy services and robust verification of influential factors could be continue.

A Case Study: ICT and the Region-based Sharing Economy of a Start-up Social Enterprise (ICT 기반 지역 공유경제형 사회적 기업 사례 연구)

  • Roh, Taehyup
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.157-175
    • /
    • 2016
  • Under the market economy of capitalism, several limitations reveal the inequity and redistribution problem of wealth, inefficiency of over-manufacturing and over-consumption, pollution of the natural environment, and the constraint of human liberty and dignity. The new challenge of symbiotic relationships that encourage individual corporations coincides with the need to practice social responsibility and share values to overcome these limitations. Social economy and the social enterprises that simultaneously pursue the making of corporate private profits and the realization of social values have been suggested and disseminated as alternative social value creators. Furthermore, the concept of a sharing economy, which refers to the sharing of things rather than owning them, is growing traction as a new paradigm of capitalism. However, these efforts of social enterprises have fallen short against the conflicts between private profit and social values. This study deals with the case of a start-up social corporation, "Purun Bike Sharing Inc.," which is based on a regional sharing economy business model about bike rental services that use Information and Communication Technology (ICT). This corporation pursues harmonic management to achieve a balance between private profit and social value. Its corporate mission is to achieve sharing, coexistence, and contribution for public welfare. This mission is a possible idea for use in the local community network as a core key for sustainable social enterprises. The model can also be an alternative approach to overcome the structural friction in the social corporation. This study considers the case of Purun Bike Sharing as a sustainable way to practice a sharing economy business model based on a regional cooperation network, which can be combined with social value, and to apply ICT to a sharing economy system. It also examines the definition and current state of social enterprises and the sharing economy, and the cases of the sharing economy business model for the review of prior research.