• 제목/요약/키워드: Computer usage

검색결과 1,229건 처리시간 0.021초

Understanding the Risks on Saudi Arabian's Youth Being Online Without Having Strong Cyber-Security Awareness

  • Alharbi, Nawaf;Soh, Ben;AlZain, Mohammed A;Alharbi, Mawaddah
    • International Journal of Computer Science & Network Security
    • /
    • 제22권7호
    • /
    • pp.131-146
    • /
    • 2022
  • The Internet is becoming a basic need for many individuals globally in this digital age. The youths became more active online than before, with the majority relying on different platforms to communicate and interact with peers. Saudi Arabia is one of the nations where internet usage is high, with an increasing number of active internet users. The youth in Saudi Arabia are engaged in various online platforms. However, they lack adequate knowledge about cybersecurity and the dangers of internet usage, which exposes them to the risk of falling victims to cybercriminals. The most common dangers of internet usage include viruses, malware, phishing, and hacking, compromising users' sensitive information. Increased awareness of these potential threats helps protect Internet users and secure their data. The understanding of the dangers of Internet usage among youths varies across countries. In this regard, our study explores the risks of internet usage among youth in Saudi Arabia compared to the United States, South Africa, and New Zealand.

What makes University Students to continuously use Cloud Services? - Enjoyment and Social Influence

  • Lee, Jong Man;Lee, Sang Jong
    • 한국컴퓨터정보학회논문지
    • /
    • 제23권1호
    • /
    • pp.123-129
    • /
    • 2018
  • The purpose of this paper is to investigate the influence of utilitarian, hedonic and social motivations on continuance intention to use cloud services. To do this, this study built a research model and examined how ease of use, usefulness, enjoyment, social influence affect the continuance usage intention of cloud services. The survey method was used for this paper, and data from a total of 82 university students were used for the analysis. And structural equation model was used to analyze the data. The results of this empirical study is summarized as followings. First, enjoyment has a direct effect on the continuance usage intention of cloud services. Second, social influence has a direct effect on the continuance usage intention. Further, it will provide meaning suggestion point of the importance of not only utilitarian motivation but also hedonic and social motivations in establishing the use policy of cloud services.

Access, Skills and Constraints of Barangay Officials towards the Use of Information and Communications Technology (ICT)

  • Santiago, Cereneo S. Jr.;Ulanday, Ma. Leah P.;Centeno, Zarah Jane R.;Bayla, Ma. Cristina D.
    • International Journal of Knowledge Content Development & Technology
    • /
    • 제11권2호
    • /
    • pp.37-54
    • /
    • 2021
  • The study determined the access, skills and constraints towards the usage of ICT among barangay officials. A complete enumeration technique was used due to the small size of the population. A total of 121 barangay secretaries and barangay treasurers comprised the study respondents. The findings revealed that most of barangay officials have access to personal computer at home and in the office using their own mobile data and office internet connectivity. With the support from the Local Government Unit (LGU), it was found that most of the respondents are advance and proficient in computer usage. As constraints to ICT usage, the study respondents still experienced slow internet bandwidth that makes connection and communication weak along with the low income status. Consequently, it was found that there were no significant differences in terms of skills and constraints among barangay secretaries and barangay treasurers towards using ICT. It can be concluded that study respondents prefer to use office computer to access the information they need due to the convenience and availability of resources. The study respondents were competent enough to handle their job well but listed slow internet and low financial resources may hamper their ICT usage. Research implications were also offered.

Extraction of ObjectProperty-UsageMethod Relation from Web Documents

  • Pechsiri, Chaveevan;Phainoun, Sumran;Piriyakul, Rapeepun
    • Journal of Information Processing Systems
    • /
    • 제13권5호
    • /
    • pp.1103-1125
    • /
    • 2017
  • This paper aims to extract an ObjectProperty-UsageMethod relation, in particular the HerbalMedicinalProperty-UsageMethod relation of the herb-plant object, as a semantic relation between two related sets, a herbal-medicinal-property concept set and a usage-method concept set from several web documents. This HerbalMedicinalProperty-UsageMethod relation benefits people by providing an alternative treatment/solution knowledge to health problems. The research includes three main problems: how to determine EDU (where EDU is an elementary discourse unit or a simple sentence/clause) with a medicinal-property/usage-method concept; how to determine the usage-method boundary; and how to determine the HerbalMedicinalProperty-UsageMethod relation between the two related sets. We propose using N-Word-Co on the verb phrase with the medicinal-property/usage-method concept to solve the first and second problems where the N-Word-Co size is determined by the learning of maximum entropy, support vector machine, and naïve Bayes. We also apply naïve Bayes to solve the third problem of determining the HerbalMedicinalProperty-UsageMethod relation with N-Word-Co elements as features. The research results can provide high precision in the HerbalMedicinalProperty-UsageMethod relation extraction.

와이브로 서비스 활성화 방안 (A Study on the Factors Promoting the Usage of WiBro Service)

  • 윤종수
    • 한국컴퓨터정보학회논문지
    • /
    • 제16권7호
    • /
    • pp.165-172
    • /
    • 2011
  • 본 연구는 향후 국내에서 WiBro 서비스를 활성화시키기 위한 방안을 모색하는데 목적을 두고 있다. 이러한 연구목적을 달성하기 위하여, 본 연구에서는 국내의 무선인터넷 사용자들을 대상으로 설문조사를 실시함으로써, 무선인터넷 이용 특성(이용수준, 이용장소, 선호요금체계)과 WiBro 서비스 활성화를 위한 요인(기술인프라, 정부정책, 콘텐츠, 단말기, 서비스 사업자)에 대한 인식도 등을 파악하였다. 또한, 설문응답자의 무선인터넷 이용 특성에 따라 WiBro 서비스 활성화를 위한 요인에 대한 인식도가 차이가 있는가를 분석함으로써, 향후 관련 실증연구들에서 활용될 수 있는 연구명제를 제시하였다.

모바일러닝의 사용의도 및 실제사용에 영향을 미치는 요인 분석 (Factors influencing usage intention and actual use of mobile learning)

  • 이정민;노지예
    • 컴퓨터교육학회논문지
    • /
    • 제18권4호
    • /
    • pp.19-30
    • /
    • 2015
  • 본 연구는 고등학생의 모바일러닝 사용의도 및 실제사용에 영향을 미치는 요인들을 규명하고, 이를 높이기 위한 구체적인 전략을 모색하고자 UTAUT모형에 태도를 추가하여 성과기대, 노력기대, 사회적 영향, 촉진조건, 태도, 사용의도, 실제사용 간의 구조적 인과관계를 분석하고자 한다. 이를 위해 고등학교 3학년 재학생 285명의 설문조사를 실시하고, 데이터의 구조적 관계를 구조방정식모형으로 분석하였는데 그 결과는 다음과 같다. 첫째, 성과기대, 노력기대는 태도에 유의한 영향을 미치지만, 사회적 영향은 태도에 영향을 미치지 않는 것으로 나타났다. 둘째, 태도는 사용의도에 유의한 영향을 미쳤으며, 사용의도는 실제사용에 유의한 영향을 미치는 것으로 나타났다. 셋째, 성과기대, 노력기대는 태도를 매개로 사용의도에 영향을 미쳤으며, 태도는 사용의도를 매개로 실제사용에 영향을 미치는 것으로 나타났다. 마지막으로 성별 및 경험에 따른 조절효과는 유의하지 않았다. 본 연구결과를 토대로 고등학생의 모바일러닝 실제사용을 높이기 위한 실천적 전략들을 제안하였다.

UNIX의 Decay Usage 알고리즘에서의 지연시간-사용량 정규화 특성 분석 (Analysis of Delay-Bandwidth Normalization Characteristic in Decay Usage Algorithm of UNIX)

  • 박경호;황호영;이창건;민상렬
    • 한국정보과학회논문지:시스템및이론
    • /
    • 제34권10호
    • /
    • pp.511-520
    • /
    • 2007
  • Decay usage 알고리즘은 CPU를 최근에 적게 사용한 프로세스를 우선시하는 스케줄링 방법으로, UNIX와 같이 계산 위주의 프로세스와 대화형 프로세스가 혼재한 시분할 시스템에서 널리 사용되어 왔다. 하지만, decay usage의 매개변수들이 어떻게 상호작용하며 결국 어떤 서비스 행태를 보이는 지에 대한 분명한 이해가 없었다. 본 논문에서는 decay usage가 사용하는 매개변수들의 상호작용에 따라 서비스의 사용량 및 지연시간이 보이는 행태를 실험적으로 분석한다. 이러한 실험적 분석을 바탕으로, 각 매개 변수가 가지는 의미를 서비스 제공의 관점에서 규명한다. 본 논문의 분석 결과는 decay usage의 매개변수들을 조정하여 응용의 요구에 맞는 서비스를 제공하기 위한 기반이 된다.

주제/배경/시그널 음원의 유통을 위한 블록체인 기반의 이용허락 플랫폼에 관한 연구 (A Study on Copyright Usage Permission Platform Based on Blockchain for Distribution of Theme, Background and Signal Music)

  • 김영모;박병찬;장세영;김석윤
    • 반도체디스플레이기술학회지
    • /
    • 제20권1호
    • /
    • pp.18-24
    • /
    • 2021
  • The current settlement and distribution used in theme, background and signal music market other than conventional music is being carried out with either the comprehensive settlement method or the measured meter-rate settlement method in the payment process of collected user fees and compensation depending on the use-permission types. In this settlement and distribution process, however, the reliability issues are often being raised because of the difficulty of tracking rights due to changes in music source rights management information, etc, and the opaque settlement and distribution method itself. This paper proposes a new settlement and distribution platform using a blockchain for the reliable collection and distribution of copyright fees among music user group, monitoring organization group, trust organization group and copyright holders, based on the monitoring information of the theme, background and signal music usage. This platform also provides the transparency in settlement and distribution process among stakeholders through smart contract system.

실사용에 의한 학습효과가 컴퓨터 시스템의 수용에 미치는 영향에 관한 연구 (A Study on Influence of Usage Learning Effect for Computer System Acceptance)

  • 김종수
    • 산업경영시스템학회지
    • /
    • 제33권3호
    • /
    • pp.176-183
    • /
    • 2010
  • The benefits of information technology cannot be obtained unless potential users utilize it for their work. This led to a lot of research works on computer system acceptance. But most of the works address the early stage of system introduction, leaving the learning effect on system acceptance unexplored. In this longitudinal study, two groups of novice and experienced users have been empirically investigated and compared for their acceptance of computer system and for the learning effect of actual usage. A research model based on the technology acceptance theory has been proposed and applied to the two groups. The result shows that the factor job relevance gets more important and the effect of user training on system acceptance diminishes as time passes. This finding may help introducing computer systems which can be easily accepted by users over the whole life cycle period of computer systems.

A Platform for RFID Security and Privacy Administration

  • Rieback, Melanie R.;Gaydadjiev, Georgi N.;Crispo, Bruno;Hofman, Rutger F.H.;Tanenbaum, Andrew S.
    • 한국정보컨버전스학회:학술대회논문집
    • /
    • 한국정보컨버전스학회 2008년도 International conference on information convergence
    • /
    • pp.75-86
    • /
    • 2008
  • This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an "RFID firewall", enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID Guardian using off-the-shelf components, and our experience has shown that active mobile devices are a valuable tool for managing the security of RFID tags in a variety of applications, including protecting low-cost tags that are unable to regulate their own usage.

  • PDF