• Title/Summary/Keyword: All-In-One Services

Search Result 855, Processing Time 0.027 seconds

How Can Self Love Lead to Spying on Ex-Partners on Facebook? -The Effects of Ego Factors on Facebook Surveillance -

  • Furbee, Brittany;Ahn, Hongmin
    • International Journal of Advanced Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.187-193
    • /
    • 2019
  • In this study, we attempted to identify the personality traits that influence one's likelihood to stalk an ex-partner on Facebook. Specifically, we focused on self-concept-related traits, given that the motivations for using social network sites (SNS) are highly associated with the concept of self. These include self-esteem, narcissism, and self-efficacy. To assess these factors, we controlled for extraneous variables while assessing the predictive power of personality traits, such as Facebook usage, length of the relationship, and time since the break-up. The results of a self-administered, web-based survey (N=207) showed that self-esteem, narcissism, and self-efficacy are all traits that can predict the stalking of an ex-partner on Facebook. More specifically, we showed a negative association between self-esteem and one's likelihood to stalk an ex-partner on Facebook, while it showed positive relationships between Facebook stalking and both narcissism and self-efficacy.

Exact Decoding Probability of Random Linear Network Coding for Tree Networks

  • Li, Fang;Xie, Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.714-727
    • /
    • 2015
  • The hierarchical structure in networks is widely applied in many practical scenarios especially in some emergency cases. In this paper, we focus on a tree network with and without packet loss where one source sends data to n destinations, through m relay nodes employing random linear network coding (RLNC) over a Galois field in parallel transmission systems. We derive closed-form probability expressions of successful decoding at a destination node and at all destination nodes in this multicast scenario. For the convenience of computing, we also propose an upper bound for the failure probability. We then investigate the impact of the major parameters, i.e., the size of finite fields, the number of internal nodes, the number of sink nodes and the channel failure probability, on the decoding performance with simulation results. In addition, numerical results show that, under a fixed exact decoding probability, the required field size can be minimized. When failure decoding probabilities are given, the operation is simple and its complexity is low in a small finite field.

Appearance Based Object Identification for Mobile Robot Localization in Intelligent Space with Distributed Vision Sensors

  • Jin, TaeSeok;Morioka, Kazuyuki;Hashimoto, Hideki
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.2
    • /
    • pp.165-171
    • /
    • 2004
  • Robots will be able to coexist with humans and support humans effectively in near future. One of the most important aspects in the development of human-friendly robots is to cooperation between humans and robots. In this paper, we proposed a method for multi-object identification in order to achieve such human-centered system and robot localization in intelligent space. The intelligent space is the space where many intelligent devices, such as computers and sensors, are distributed. The Intelligent Space achieves the human centered services by accelerating the physical and psychological interaction between humans and intelligent devices. As an intelligent device of the Intelligent Space, a color CCD camera module, which includes processing and networking part, has been chosen. The Intelligent Space requires functions of identifying and tracking the multiple objects to realize appropriate services to users under the multi-camera environments. In order to achieve seamless tracking and location estimation many camera modules are distributed. They causes some errors about object identification among different camera modules. This paper describes appearance based object representation for the distributed vision system in Intelligent Space to achieve consistent labeling of all objects. Then, we discuss how to learn the object color appearance model and how to achieve the multi-object tracking under occlusions.

USN Secure Communication Design Using Chaotic System Feedback Synchronization (혼돈계의 피드백 동기화를 이용한 USN 보안통신 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1011-1016
    • /
    • 2018
  • Ubiquitous services for the convenience and safety of human beings along with the development of society are being realized through RFID technology and sensor network, and its application range of fields is also broaden. However, since the USN contains all the information of individuals and things, all of its private spaces can be attacked by external attacks; so, that the problem of security continues to arise. We designed a one-way chaotic feedback synchronization method as a secure communication method to fit the USN composed of one sync node and n number of sensor nodes. We designed the method by which the sensor node is synchronized in one direction of the sync node. This method solves the problem that all sensor nodes need to be resynchronized when the sync node is changed, which is shown in bidirectional synchronization. This is a security method that can be effectively applied to 1:n communication such as USN.

How Much Impact do Social Media Make on Chasm and Buyer's Value? : The Information Accessibility and Trust Effect among Adopting Groups (소셜 미디어는 캐즘(Chasm)과 구매 가치에 얼마나 영향을 미치는가? : 채택 집단간 정보력 및 신뢰도 효과)

  • Jung, Byungho;Kwon, Taehyoung
    • Journal of Information Technology Services
    • /
    • v.13 no.1
    • /
    • pp.221-251
    • /
    • 2014
  • This paper is to investigate the degree of impact of social media use on buyer's value. Buyers of innovative digital devise are classified into three groups based on adopting behaviors. This study focuses on the degree of changes in information accessability and trust, and their associations with increased value perceived in resulting quality life. The result shows the gap in information accessability has disappeared while the one in trust remained. This implies that the gap among adopters in diffusion curve, so-called the chasm notion is very likely to be lessened or disappeared due to social network openness. Also, shown are the relationship of these variables with the degree of purchase value more stable with information accessability than with trust, all in varying patterns though. It implies that information sharing through social media be accompanied with source credibility in order to be of more value not only to buyers but also to sellers especially for new interactive devices.

An Exploratory Study on the Differences in Corporate Crisis Management among the Types of Business (업종별 기업의 위기관리 차이에 관한 탐색적 연구)

  • Hong, Han-Kuk;Kang, Byung-Young;Woo, Bo-Hyun;Lee, Bong-Koo
    • Journal of Information Technology Services
    • /
    • v.12 no.4
    • /
    • pp.109-124
    • /
    • 2013
  • Recently domestic companies have struggled to deal with different kinds of crisis accrued from various sources. However, their perception on the crisis and crisis management system are extremely vulnerable. In particular, although almost all companies have had many business related crisis, they have tended to ignore the crisis with simply considering it as unlucky and not to approach it provocatively in preparing some preventive measures and turning it into an opportunity due to the lack of recognizing the importance of risk management. In other words, domestic companies have not systematically prepared detailed plans for potential crisis, rather have tended to recognize the importance of having crisis management system after experiencing a detrimental crisis or accident. Furthermore research on the issue has conducted sparsely in the academic world. The purpose of this study was to investigate the differences among types of businesses in terms of the degree of crisis experienced previously, the perception on the importance of crisis management system, the level of crisis management implementation, and the areas of crisis management being focused in the future. Usable data was collected from 201 companies using an on-site survey. Data was analyzed with SPSS 21.0 using some descriptive statistics and a series of ANOVA (One-way Analysis of Variance). Results and implications were provided, along with some future research directions.

An Efficient and Secure Data Storage Scheme using ECC in Cloud Computing (클라우드 컴퓨팅에서 ECC 암호를 적용한 안전한 데이터 스토리지 스킴)

  • Yin, XiaoChun;Thiranant, Non;Lee, HoonJae
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.49-58
    • /
    • 2014
  • With the fast development of internet, cloud computing has become the most demanded technology used all over the world. Cloud computing facilitates its consumers by providing virtual resources via internet. One of the prominent services offered in cloud computing is cloud storage. The rapid growth of cloud computing also increases severe security concerns to cloud storage. In this paper, we propose a scheme which allows users not only securely store and access data in the cloud, but also share data with multiple users in a secured way via unsecured internet. We use ECC for cryptography and authentication operation which makes the scheme work in a more efficient way.

A Study on the Metaverse Framework Security Service (메타버스 서비스를 위한 보안 모델 연구 )

  • Do-Eun Cho
    • Journal of Platform Technology
    • /
    • v.10 no.4
    • /
    • pp.82-90
    • /
    • 2022
  • emerging. And it shows numerous possibilities and tremendous potentials in the virtual world. This metaverse is not limited to one type, but it is evolving and developing into a service in the form of a virtual convergence economy by breaking down boundaries. As a result, various security issues in metaverse are emerging. Metaverse performs all activities in the virtual space, so various problems such as privacy infringement, virtual asset theft, or fraud can occur. In this paper, a service security model is proposed to provide safe services on metaverse. To this end, we analyze security threats in the metaverse framework and propose a security service model to prevent threats. By evaluating the security of the proposed model, it was shown that safe services are effectively possible on the metaverse.

A Study on Health Service Utilization and it's Determinants in the Low Income Family in Korea (한국 저소득층 주민의 보건의료서비스 이용행태와 그 영향요인에 관한 연구)

  • Im, Mee-Young;Ha, Na-Sun
    • Research in Community and Public Health Nursing
    • /
    • v.13 no.2
    • /
    • pp.272-279
    • /
    • 2002
  • Objectives: The purpose of this study was to analyze health service utilization, and its related factors in low income families who earned half of the average Korean household income. Methods: This was a cross-sectional descriptive survey study in which a nationwide randomization sampling technique was used. The data were collected from July 12 to August 7, 1999, and the total sample size was 5,819 individuals, belonging to 1.753 households. Results: 1) In the utilization of health services for the last 3months, the pharmacy was the type of service that was the most utilized (32.0%), and the health center was the one that was the least utilized (10.3%). About 29% (29.2%) of the respondents could not utilize the health service at all. and 19.8% of the respondents terminated their medical treatments half way to completion because of financial difficulty (89.4%). 2) Analysis of the data using logistic regression showed that living with spouse, level of education, occupation, and income had statistically significant effects on health service utilization. Conclusion: The parameters of health care policies are equity and efficacy for health status, and the health service utilization by low income families. The conclusive resolution for these is the improvement of public health centers for an increased utilization rate of their services.

  • PDF

Analyzing Factors Affecting Customer Loyalty of Internet Only Bank and their Determinants in China (인터넷전문은행의 고객 충성도에 미치는 영향 요인)

  • Joo, Jae-Hun;Ren, Jia
    • The Journal of Information Systems
    • /
    • v.29 no.3
    • /
    • pp.77-101
    • /
    • 2020
  • Purpose Internet only bank is one of the promising untact businesses which are rising in COVID-19 pandemic. Kakaobank and Kbank have been offering banking services since 2017 in Korea and WeBank and MYbank in China opened the services since 2015. It is necessary to examining determinants of customer loyalty beyond intention to use. The purpose of the present study is to analyze factors influencing customer loyalty and their determinants. A research model integrating the relationships among customer loyalty, service satisfaction, trust, and social influence, and their determinants was proposed. Design/methodology/approach Structural equation modelling for validating the research model was employed. 235 valid data were collected from users of Internet only bank in China. Nine latent variables grouped from 38 indicators were reliable and valid and nine hypotheses were tested by using SmartPLS. Findings All nine hypotheses were supported at significant levels of 0.001 and 0.01. Trust, service satisfaction, and social influence had influenced on customer loyalty. Trust not only affected customer loyalty directly, but also had influence on it indirectly through service satisfaction. Empathy and convenience are determinants of trust. Perceived expertise and dispositions believing acquaints had a positive influence on social influence, whereas users' anxiety for technology or change had a negative influence on social influence. Implications for academics and practitioners were suggested.