• Title/Summary/Keyword: 이 콜 시스템

Search Result 104, Processing Time 0.023 seconds

The Service Features Influencing the Acceptance of Telecommunication-Broadcasting Bundling in Convergence Environment (컨버전스 환경 하에서 통신.방송 결합상품 수용의도에영향을 미치는 서비스 특성 연구)

  • Sim, Jin-Bo
    • Journal of Technology Innovation
    • /
    • v.18 no.2
    • /
    • pp.59-89
    • /
    • 2010
  • One of the key words that represent the culture and social phenomena in this 21st century is 'Digital Convergence'. Presently our society is going through the second evolving phase of the convergence, integration between industries. Integration between industries refers to the phenomenon of integrating various industrial areas such as broadcasting, communication, finance, automobile, and medical treatment as the range of IT utilization becomes extended. The telecommunication-broadcasting bundling is a typical example of integration between industries. This study analyzed the effect of the service features of the bundling on the customer's acceptance intention by applying the innovative technology product acceptance model, TAM, in the process of accepting the telecommunication-broadcasting bundling. This study suggests three independent variables, the 'low cost(discount)', 'service integrity', and 'selectability', which affect perceived usefulness, perceived ease of use, and perceived risk, and figures out the actual influence as follows. In conclusion, these results suggest that in order to accept and spread the telecommunication-broadcasting bundling, it is necessary to establish (1) the cost discounting strategy realize (price strategy), (2) the fee noticing system, payment system, call-service system, and systemic integration including installation and A/S system integration, and develop (service strategy), (3) the bundling or related options that can provide users with selectability (product strategy).

  • PDF

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.

An Empirical Study on Bank Capital Channel and Risk-Taking Channel for Monetary Policy (통화정책의 은행자본경로와 위험추구경로에 대한 실증분석)

  • Lee, Sang Jin
    • Economic Analysis
    • /
    • v.27 no.3
    • /
    • pp.1-32
    • /
    • 2021
  • This study empirically analyzes whether bank capital channel and risk-taking channel for monetary policy work for domestic banks in South Korea by analyzing the impact of the expansionary monetary policy on the rate spread between deposit and loan, capital ratio, and loan amount. For the empirical analysis, the Uhlig (2005)'s sign-restricted SVAR(Structural Vector Auto-Regression) model is used. The empirical results are as follows: the bank's interest rate margin increases, the capital ratio improves, risk-weighted asset ratio increases, and the amount of loans increases in response to expansionary monetary shock. This empirical results confirm that bank capital channel and risk-taking channel work in domestic banks, similar to the previous research results. The implications of this study are as follows. Although the expansionary monetary policy has the effect of improving the bank's financial soundness and profitability in the short term as bank capital channel works, it could negatively affect the soundness of banks by encouraging banks to pursue risk in the long run as risk-taking channel works. It is necessary to note that the capital ratio according to the BIS minimum capital requirement of individual banks may cause an illusion in supervising the soundness of the bank. So, the bank's aggressive lending expansion may lead to an inherent weakness in the event of a crisis. Since the financial authority may have an illusion about the bank's financial soundness if the low interest rate persists, the authority needs to be actively interested in stress tests and concentration risk management in the pillar 2 of the BIS capital accord. In addition, since system risk may increase, it is necessary to conduct regular stress tests or preemptive monitoring of assets concentration risk.

Design of V2I Based Vehicle Identification number In a VANET Environment (VANET 환경에서 차대번호를 활용한 V2I기반의 통신 프로토콜 설계)

  • Lee, Joo-Kwan;Park, Byeong-Il;Park, Jae-Pyo;Jun, Mun-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7292-7301
    • /
    • 2014
  • With the development of IT Info-Communications technology, the vehicle with a combination of wireless-communication technology has resulted in significant research into the convergence of the component of existing traffic with information, electronics and communication technology. Intelligent Vehicle Communication is a Machine-to-Machine (M2M) concept of the Vehicle-to-Vehicle. The Vehicle-to-Infrastructure communication consists of safety and the ease of transportation. Security technologies must precede the effective Intelligent Vehicle Communication Structure, unlike the existing internet environment, where high-speed vehicle communication is with the security threats of a wireless communication environment and can receive unusual vehicle messages. In this paper, the Vehicle Identification number between the V2I and the secure message communication protocol was proposed using hash functions and a time stamp, and the validity of the vehicle was assessed. The proposed system was the performance evaluation section compared to the conventional technique at a rate VPKI aspect showed an approximate 44% reduction. The safety, including authentication, confidentiality, and privacy threats, were analyzed.