• Title/Summary/Keyword: 클라우드 컴퓨팅서비스

Search Result 825, Processing Time 0.033 seconds

An Empirical Study on Factors Affecting an Individual User's Behavioral Intention to Use SaaS (개인 사용자의 SaaS 사용의도에 영향을 미치는 요인에 관한 실증적 연구)

  • Hong, Il-Yoo;Lee, Seung-Min;Cho, Hwi-Hyung
    • Informatization Policy
    • /
    • v.25 no.3
    • /
    • pp.75-94
    • /
    • 2018
  • Today, Software as a Service(SaaS) is being recognized as a key means to enable the innovation of software distribution. Despite the increase in the interest in SaaS, individuals as well as businesses are not yet making an extensive use of it. This research is aimed at identifying and analyzing the antecedents of intentions to use SaaS. We proposed a research model to predict an individual's intention to use SaaS based on the Technology Acceptance Model(TAM). To this end, we conducted a questionnaire survey in which actual software users participated. An empirical analysis has been performed to test the reliability and validity and the hypotheses using SPSS and AMOS software packages. The results of the analysis revealed that functionality, interoperability and economic benefits have positive effects on the intention to use SaaS, while system quality has no significant effect on the behavioral intention. We discussed practical as well as academic implications, and provided research directions.

A Study on Cloud Computing for Detecting Cyber Attacks (사이버공격 탐지를 위한 클라우드 컴퓨팅 활용방안에 관한 연구)

  • Lee, Jun-Won;Cho, Jae-Ik;Lee, Seok-Jun;Won, Dong-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.6
    • /
    • pp.816-822
    • /
    • 2013
  • In modern networks, data rate is getting faster and transferred data is extremely increased. At this point, the malicious codes are evolving to various types very fast, and the frequency of occurring new malicious code is very short. So, it is hard to collect/analyze data using general networks with the techniques like traditional intrusion detection or anormaly detection. In this paper, we collect and analyze the data more effectively with cloud environment than general simple networks. Also we analyze the malicious code which is similar to real network's malware, using botnet server/client includes DNS Spoofing attack.

Application of 4th Industrial Revolution Technology to Records Management (제4차 산업혁명 기술의 기록관리 적용 방안)

  • An, Dae-jin;Yim, Jin-hee
    • The Korean Journal of Archival Studies
    • /
    • no.54
    • /
    • pp.211-248
    • /
    • 2017
  • This study examined ways to improve records management by using the new technology of the Fourth Industrial Revolution. To do this, we selected four technologies that have a huge impact on the production and management of records such as cloud, big data, artificial intelligence, and the Internet of Things. We tested these technologies and summarized their concepts, characteristics, and applications. The characteristics of the changed production records were analyzed by each technology. Because of new technology, the production of records has rapidly increased and the types of records have become diverse. With this, there is also a need for solutions to explain the quality of data and the context of production. To effectively introduce each technology into records management, a roadmap should be designed by classifying which technology should be applied immediately and which should be applied later depending on the maturity of the technology. To cope with changes in the characteristics of production records, a flexible data structure must be produced in a standardized format. Public authorities should also be able to procure Software as a Service (SaaS) products and use digital technology to improve the quality of public services.

A Study on the Current Status and Perception of Library Automation Systems for System Improvement (도서관자동화시스템 개선을 위한 현황 및 인식 연구)

  • Byoung-goon An;Youngim Jung;Hyekyong Hwang
    • Journal of Korean Library and Information Science Society
    • /
    • v.55 no.1
    • /
    • pp.263-288
    • /
    • 2024
  • This study aims to analyze the current status of library automation systems and explore future directions for improvement. The study was conducted by surveying librarians at institutions participating in the KESLI and KCUE consortia to investigate the current status and satisfaction with library automation systems, and the current status and awareness of open source-based library automation systems. The study found that most automation systems currently in use in libraries were developed through outsourcing in the 2000s or 2010s, and that more than 50% of respondents were satisfied with the overall library automation system. Overall satisfaction was found to be influenced by satisfaction with the functionality, customer support services and construction and operational management of the system. Most current library automation systems are not based on open source software or cloud services, but the intention to use them in the future is high, with more than 40% of respondents saying they would use them within three years. This study is expected to serve as an important foundation for building an open source-based library automation system in the future.

Toward Mobile Cloud Computing-Cloudlet for implementing Mobile APP based android platform (안드로이드 기반의 모바일 APP 개발을 위한 모바일 클라우드 컴퓨팅)

  • Nkenyereye, Lionel;Jang, Jong-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.6
    • /
    • pp.1449-1454
    • /
    • 2015
  • Virtualization lacks capabilities for enabling the application to scale efficiently because of new applications components which are raised to be configured on demand. In this paper, we propose an architecture that affords mobile app based on nomadic smartphone using not only mobile cloud computing-cloudlet architecture but also a dedicated platform that relies on using virtual private mobile networks to provide reliable connectivity through LTE(Long Term Evolution) wireless communication. The design architecture lies with how the cloudlet host discovers service and sends out the cloudlet IP and port while locating the user mobile device. We demonstrate the effectiveness of the proposed architecture by implementing an android application responsible of real time analysis by using a vehicle to applications smartphone interface approach that considers the smartphone to act as a remote users which passes driver inputs and delivers outputs from external applications.

Marine Contents Use and Service Plans for the Educational Purpose (교육용 해양 콘텐츠 활용 및 서비스 방안)

  • Youn, Jae-Hong;Choi, Hyo-Seung;Jeong, Seung-Moon
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.3
    • /
    • pp.480-486
    • /
    • 2012
  • There has been an increasing interest in new industry and demand creations by the convergence and integration between IT and infrastructure and BT, NT, and CT and the convergence of IT and spread of cloud computing have changed the IT service environment. Even in the educational field, the convergence and integration of contents with various IT have rapidly emerged and learning equipments for the educational purpose have expanded to the mobile media platform from PCs so that learning without limitations to time, place and equipment has become possible. Contents necessary for the smart education are under way by research development utilizing cyber reality and simulation, and 3D technologies. The purpose of this study is to propose marine contents use and service plans for the educational purpose in order to produce various types of contents for the marine life and environment, to improve the school achievement by stimulating interest and to provide individually customized learning.

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

Design and Implementation of Hybrid Apps Design based on Spring MVC (스프링 MVC 기반에서 하이브리드 앱 디자인 설계 및 구현)

  • Lee, Myeong-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.395-400
    • /
    • 2019
  • The Web environment of the frontend domain is increasingly competitive to preempt the new standard of presentation layer. N-Screen, a service that enables users to seamlessly use one content in various devices in Korea, is competing for market preemption by recognizing it as a core service of the future. In the cloud computing, N-screen is a typical service type. However, most of the frontend research required for groupware in enterprise environments has been limited to responsive web design for the web and native apps for mobile. Gradually, the need for MVC design patterns is increasingly widening in enterprise environments to overcome the cultural differences of companies and to support one source multi-use strategy supporting multiple devices and development productivity. Therefore, in this study, we will analyze and design JPetStore with hybrid application design based on Spring MVC, e-government standard framework environment of next generation web standard, and provide reference model of frontend hybrid apps design in future enterprise environment.

Reference Model for the Service of Smart City Platform through Case Study (사례 연구를 통한 스마트 시티 플랫폼의 서비스를 위한 참조 모델)

  • Kim, Young Soo;Mun, Hyung-Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.241-247
    • /
    • 2021
  • As a way to solve the side effects of urban development, a smart city with information and communication technology converges in the city is being built. For this, a smart city platform should support the development and integration of smart city services. Therefore, the underlying technology and the functional and non-functional requirements that the smart platform must support were analyzed. As a result of this, we classified the Internet of Things, cloud computing, big data and cyber-physical systems into four categories as the underlying technologies supported by the smart city platform, and derived the functional and non-functional requirements that can be implemented and the reference model of the smart city platform. The reference model of the smart city platform is used for decision-making on investment in infrastructure technology and the development scope of services according to functional or non-functional requirements to solve specific city problems for city managers. It provides platform developers with guidelines to identify and determine the functional and non-functional requirements and implementation technologies of software platforms for building smart cities.

Malware Behavior Analysis based on Mobile Virtualization (모바일 가상화기반의 악성코드 행위분석)

  • Kim, Jang-Il;Lee, Hee-Seok;Jung, Yong-Gyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.1-7
    • /
    • 2015
  • As recent smartphone is used around the world, all of the subscribers of the mobile communication is up to 47.7% about 24 million people. Smartphone has a vulnerability to security, and security-related incidents are increased in damage with the smartphone. However, precautions have been made, rather than analysis of the infection of most of the damage occurs after the damaged except for the case of the expert by way of conventional post-countermeasure. In this paper, we implement a mobile-based malware analysis systems apply a virtualization technology. It is designed to analyze the behavior through it. Virtualization is a technique that provides a logical resources to the guest by abstracting the physical characteristics of computing resources. The virtualization technology can improve the efficiency of resources by integrating with cloud computing services to servers, networks, storage, and computing resources to provide a flexible. In addition, we propose a system that can be prepared in advance to buy a security from a user perspective.