• Title/Summary/Keyword: Accessible Service

Search Result 199, Processing Time 0.021 seconds

A Study of Relationship between Dataveillance and Online Privacy Protection Behavior under the Advent of Big Data Environment (빅데이터 환경 형성에 따른 데이터 감시 위협과 온라인 프라이버시 보호 활동의 관계에 대한 연구)

  • Park, Min-Jeong;Chae, Sang-Mi
    • Knowledge Management Research
    • /
    • v.18 no.3
    • /
    • pp.63-80
    • /
    • 2017
  • Big Data environment is established by accumulating vast amounts of data as users continuously share and provide personal information in online environment. Accordingly, the more data is accumulated in online environment, the more data is accessible easily by third parties without users' permissions compared to the past. By utilizing strategies based on data-driven, firms recently make it possible to predict customers' preferences and consuming propensity relatively exactly. This Big Data environment, on the other hand, establishes 'Dataveillance' which means anybody can watch or control users' behaviors by using data itself which is stored online. Main objective of this study is to identify the relationship between Dataveillance and users' online privacy protection behaviors. To achieve it, we first investigate perceived online service efficiency; loss of control on privacy; offline surveillance; necessity of regulation influences on users' perceived threats which is generated by Dataveillance.

A Framework for Legal Information Retrieval based on Ontology

  • Jo, Dae Woong;Kim, Myung Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.87-96
    • /
    • 2015
  • Professional knowledge such as legal information is commonly not accessible or cannot be easily understood by the public. By using the legal ontology which is previously established, the legal information retrieval based on ontology is to use for the information retrieval. In this paper, we propose the matters required for the design and develop of the framework for the legal information retrieval based on ontology. The framework is composed of the query conversion engine of SPARQL base for query to OWL ontology and user query type engine and return value refinement engine and web interface engine. The framework does the role as the infrastructure which retrieval the legal ontology effectually and which it serves and can be used in the semantic legal information retrieval service.

Privacy-Preserving NFC-Based Authentication Protocol for Mobile Payment System

  • Ali M. Allam
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.5
    • /
    • pp.1471-1483
    • /
    • 2023
  • One of the fastest-growing mobile services accessible today is mobile payments. For the safety of this service, the Near Field Communication (NFC) technology is used. However, NFC standard protocol has prioritized transmission rate over authentication feature due to the proximity of communicated devices. Unfortunately, an adversary can exploit this vulnerability with an antenna that can eavesdrop or alter the exchanged messages between NFC-enabled devices. Many researchers have proposed authentication methods for NFC connections to mitigate this challenge. However, the security and privacy of payment transactions remain insufficient. We offer a privacy-preserving, anonymity-based, safe, and efficient authentication protocol to protect users from tracking and replay attacks to guarantee secure transactions. To improve transaction security and, more importantly, to make our protocol lightweight while ensuring privacy, the proposed protocol employs a secure offline session key generation mechanism. Formal security verification is performed to assess the proposed protocol's security strength. When comparing the performance of current protocols, the suggested protocol outperforms the others.

Special Topic: The Impact of ChatGPT in Society, Business, and Academia

  • Kyoung Jun Lee;Taeho Hong;Hyunchul Ahn;Taekyung Kim;Chulmo Koo
    • Asia pacific journal of information systems
    • /
    • v.33 no.4
    • /
    • pp.957-976
    • /
    • 2023
  • ChatGPT has had a significant impact on society, business, and academia by influencing individuals and organizations through knowledge generation and supporting users in locating conversational inquiries and answers. It can transform how people seek answers by combining human-like conversational skills with AI. By eradicating the cumbersome process of selecting from multiple options, users can conduct preliminary research or create optimized solutions. The purpose of this research is to investigate how consumers use ChatGPT and digital transformation, specifically in terms of knowledge development, searching and recommending, and optimizing accessible possibilities. Using many linked theories, we address the potential implications and insights that can be gained from ChatGPT's early stages and its integration with other applications such as robotics, service automation, and the metaverse. Finally, the application of ChatGPT has practical, theoretical, and phenomenological impacts, in addition to improving users' experiences.

Development of a Shoe Recommendation Model for Matching Outfits Using Generative Artificial Intelligence (생성형 인공지능을 활용한 신발 추천 모델 개발)

  • Jun Woo CHOI
    • Journal of Korea Artificial Intelligence Association
    • /
    • v.1 no.1
    • /
    • pp.7-10
    • /
    • 2023
  • This study proposes an AI-based shoe recommendation model based on user clothing image data to solve the problem of the global fashion industry, which is worsening due to factors such as the economic downturn. Shoes are an important part of modern fashion, and this research aims to improve user satisfaction and contribute to economic growth through a generative AI-based shoe recommendation service. By utilizing generative AI in the personalized consumer market, we show the feasibility, efficiency, and improvements through an accessible web-based implementation. In conclusion, this study provides insights to help fulfill consumer needs in the ever-changing fashion market by implementing a generative AI-based shoe recommendation model.

Development of WIPI-based Artificial Reefs Search Contents (WIPI기반 인공어초 검색 콘텐츠 개발)

  • Kwak Ho-Young;Han Kyoung-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.5
    • /
    • pp.238-247
    • /
    • 2005
  • The development of IT related technology has made it possible to offer 'Any Time, Any Where, Any Service' to the users and internet-based service became accessible while on the move through wireless internet service. Moreover, the development of various wireless contents has been provided diverse ioy and convenience to life. However, the existing wireless contents had been subordinate to the wireless internet platform because it had not been set up for a standardized environment. Therefore, repeated developments of contents have been causing waste of resource, time and manpower. This paper aims at suggesting WIPI-bases artificial reefs search contents which have become independent from platform by using JAVA. Artificial reefs facilities are a government project for increasing the revenue of fishermen but only few fishermen know the information about the location of artificial reefs and most of them are not aware of the location of these facilities. There(ore this thesis plans to develop WIPI-bases artificial reefs search contents to provide information such as the location, the depth, and the bottom material to anglers and those fishermen who do not know the location of artificial reefs so that the fishermen can have the opportunity to increase their revenue and also the opportunity to catch a big fish for anglers.

  • PDF

The Spatial Accessibility of Women in Childbearing Age for Delivery Services in Gangwon-do (강원도 지역 가임기 여성의 분만서비스 접근성 분석)

  • Choi, Soyoung;Lee, Kwang-Soo
    • Health Policy and Management
    • /
    • v.27 no.3
    • /
    • pp.229-240
    • /
    • 2017
  • Background: This study purposed to analyze the spatial accessibility of women in childbearing age to the healthcare organizations (HCOs) providing delivery services in Gangwon-do. Methods: Network analysis was applied to assess the spatial accessibility based on the travel time and road travel distance. Travel time and travel distance were measured between the location of HCOs and the centroid of the smallest administrative areas, eup, myeon, and dong in Gangwon-do. Korean Transport Database Center provided road network GIS (Geographic Information System) Database in 2015 and it was used to build the network dataset. Two types of network analysis, service area analysis and origin-destination (OD)-cost matrix analysis, applied to the created network dataset. Service area analysis defined all-accessible areas that are within a specified time, and OD-cost matrix analysis measured the least-cost paths from the HCOs to the centroids. The visualization of the number of the HCOs and the number of women in childbearing age on the Ganwon-do map and network analysis were performed with ArcGIS ver. 10.0 (ESRI, Redlands, CA, USA). Results: Twenty HCOs were providing delivery services in Gangwon-do in 2016. Over 50% of the women in childbearing age were aged more than 35 years. Service area analysis found that 89.56% of Gangwon-do area took less than 60 minutes to reach any types of HCOs. For tertiary hospitals, about 74.37% of Gangwon-do area took more than 60 minutes. Except Wonju-si and Hoengseong-gun, other regions took more than 60 minutes to reach the tertiary hospital. Especially, Goseong-gun, Donghae-si, Samcheok-si, Sokcho-si, Yanggu-gun, Cheorwon-gun, and Taebaek-si took more than 100 minutes to the tertiary hospital. Conclusion: This study provided that the accessibility toward the tertiary hospital was limited and it may cause problems in high-risk delivery patients such as over 35 years. Health policy makers will need to handle the obstetric accessibility issues in Gangwon-do.

Hash-based SSDP for IoT Device Security (IoT 기기 보안을 위한 해시 기반의 SSDP)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.5
    • /
    • pp.9-16
    • /
    • 2021
  • Due to the prolonged infectious disease of COVID-19 worldwide, there are various security threats due to network attacks on Internet of Things devices that are vulnerable to telecommuting. Initially, users of Internet of Things devices were exploited for vulnerabilities in Remote Desktop Protocol, spear phishing and APT attacks. Since then, the technology of network attacks has gradually evolved, exploiting the simple service discovery protocol of Internet of Things devices, and DRDoS attacks have continued to increase. Existing SSDPs are accessible to unauthorized devices on the network, resulting in problems with information disclosure and amplification attacks on SSDP servers. To compensate for the problem with the authentication procedure of existing SSDPs, we propose a hash-based SSDP that encrypts server-specific information with hash and adds authentication fields to both Notify and M-Search message packets to determine whether an authorized IoT device is present.

Analysis of Urban Planning Facility Service Area according to Bus Passenger Traffic in Jinju (진주시 버스 이용객 통행에 따른 도시계획시설 서비스 권역 분석)

  • Bae, Su-Min;Lee, So-Yeong;Joo, Hee-Sun
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.24 no.4
    • /
    • pp.1-8
    • /
    • 2022
  • This study aims to investigate the gap in accessibility to urban planning facilities between living spheres in local small and medium-sized cities. In this study, OD data between administrative dongs of public transportation users was constructed to analyze the living shpere, and community analysis was conducted based on cohesion between data. As a result of the analysis, it was confirmed that a total of 10 clusters (mid-living areas) were formed, and the topographical difference between the 11 middle living areas established in the existing Jinju City Basic Plan and the single living areas were actively exchanged to form a community with other administrative dongs. Next, the analysis of the service area of urban planning facilities for mid-living areas was conducted based on the road network. As a result of analyzing the area accessible within 5, 10, and 15 minutes, educational facilities, public facilities, cultural facilities, tourism, and green facilities could be reached within 15 minutes in most mid-living areas. On the other hand, there were many areas where access to transportation facilities, medical facilities, and cultural facilities was difficult within 15 minutes. In particular, the accessibility of the outer living area and the central living area were different. To improve the quality of life of citizens, using urban planning facilities in Jinju-si and establishing related plans in urban basic plans, it is necessary to conduct a study on service areas through network analysis.

A Method for Migration of Legacy System into Web Service (레거시 시스템의 웹서비스화를 위한 마이그레이션 기법)

  • Park, Oak-Cha;Choi, Si-Won;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.583-594
    • /
    • 2009
  • Most of the SOA solutions applicable to businesses and organizations are taking a top-down methodology. It starts with an analysis of an organization's requirements, followed by definition of business models and identification of candidate services and ends with finding or developing required services. Challenges in adopting SOA while abandoning legacy systems involve time and cost required during the process. Many businesses and organizations want to gradually migrate into SOA while making the most of the existing system. In this paper, we propose A Method for Migration of Legacy System into Web Service(M-LSWS); it allows legacy system to be migrated into web service accessible by SOA and be used as data repositories. M-LSWS defines procedures for migration into reusable web services through analysis of business processes and identification of candidate services based on design specification and code of legacy system. M-LSWS aims to migrate of legacy system into web service appropriate for SOA. The proposed method consists of four steps: analysis of legacy system, elicitation of reusable service and its specification, service wrapping and service registration. Each step has its own process and guideline. The eligibility of the proposed method will be tested by applying the method to book management system.