• Title/Summary/Keyword: ICT (Information and Communications Technologies)

Search Result 107, Processing Time 0.03 seconds

System Access Control Technique for Secure Cloud Computing

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.8
    • /
    • pp.67-76
    • /
    • 2019
  • Along with the diversification of digital content services using wired/wireless networks, the market for the construction of base systems is growing rapidly. Cloud computing services are recognized for a reasonable cost of service and superior system operations. Cloud computing is convenient as far as system construction and maintenance are concerned; however, owing to the security risks associated with the system construction of actual cloud computing service, the ICT(Information and Communications Technologies) market is lacking regardless of its many advantages. In this paper, we conducted an experiment on a cloud computing security enhancement model to strengthen the security aspect of cloud computing and provide convenient services to the users. The objective of this study is to provide secure services for system operation and management while providing convenient services to the users. For secure and convenient cloud computing, a single sign-on (SSO) technique and a system access control technique are proposed. For user authentication using SSO, a security level is established for each user to facilitate the access to the system, thereby designing the system in such a manner that the rights to access resources of the accessed system are not abused. Furthermore, using a user authentication ticket, various systems can be accessed without a reauthorization process. Applying the security technique to protect the entire process of requesting, issuing, and using a ticket against external security threats, the proposed technique facilitates secure cloud computing service.

The Structural Relationships among Innovation Characteristics, Consumer Characteristics, Innovation Resistance, and Intention to Acceptance of Wearable Device Customers: Based on Innovation Resistance Model and Theory of Perceived Risk (웨어러블 디바이스 소비자의 혁신특성, 소비자특성, 혁신저항, 그리고 수용의도와의 구조적 관계: 혁신저항모형과 인지된 위험이론을 기반으로)

  • Bae, Jae Kwon
    • The Journal of Information Systems
    • /
    • v.25 no.4
    • /
    • pp.87-104
    • /
    • 2016
  • Purpose As the smartphone market arrived at its saturation, from world leading information and communications technologies (ICT) businesses to startups, companies are competing to develop innovative wearable device products and suitable contents. Utility, technology, design, price, and various killer contents development targeting every customer's need should be considered for a success in the wearable device market. Design/methodology/approach Prior studies on innovation technology of ICT field have mainly focused on the innovation diffusion theory, expectation confirmation theory, and technology acceptance model, this study suggested the innovation resistance factors of adopting the smart wearable devices based on the innovation resistance model and theory of perceived risk. The model comprises the following two characteristics factors: 1) innovation characteristics which include perceived relative advantages, perceived compatability, perceived complexity, and perceived risk, 2) consumer characteristics which include attitudes towards innovation and existing products (i.e., mobile devices and analog watches). This study developed an extended innovation resistance model to explain the intention to acceptance of wearable devices consumers and collected 284 online survey responses from the non-consumers of the wearable devices. Findings The findings of this study suggest that perceived relative advantage, perceived compatibility, perceived complexity, perceived risk, attitudes towards innovation and attitudes towards existing analog watches affected the innovation resistance which has negative influence on the intention to adoption of wearable devices.

Research Trends and Considerations of Security Technology of Smart Home IoT (스마트 홈 IoT 보안 기술 연구 동향 및 고찰)

  • Lee, Young Hun;Jo, Jeong Hoon;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.174-177
    • /
    • 2019
  • 최근 ICT(Information Communications Technologies)의 발전과 센서 제조 공정의 발전을 통해 저용량, 경량 디바이스를 이용한 스마트 홈 시장이 성장하고 있다. 특히 스마트 홈 IoT의 환경은 모든 사물을 인터넷으로 연결하고 상호 통신을 통해 다양하고 많은 양의 정보를 수집하여 일상생활을 편리하게 해주는 IoT(Internet of Things)가 계속 증가하고 있다. 하지만, 이러한 증가량과 함께, 스마트 홈 환경에서 대한 기술표준화가 이루어지지 않았으며 원활한 서비스 제공 뿐만 아니라 보안 문제가 발생하고 있다. 특히, 이기종 네트워크, 디바이스를 사용하는 스마트 홈 IoT의 경우 다양한 인증 방법이 존재하며, 이에 따른 취약점이 발생하게 된다. 보안 취약점을 이용한 공격으로 개인정보 유출이나 경제적 손실 등 피해를 발생시키고 있으며, 추후 인명피해까지 발생할 수 있다. 따라서, 본 논문에서는 스마트홈 환경의 IoT 보안 방안에 대해 알아보고, 관련 보안사고의 사례 및 인증 기술을 살펴봄으로써 미래 스마트 홈 IoT 보안 기술의 발전과 적합한 보안 대책과 보안 취약점에 대한 보안 체계를 마련하는 것에 도움이 될 것이다.

Convergence Security Technology of OPC-UA Protocol Gateway based on DPI & Self-Similarity for Smart Factory Network (스마트 팩토리 망에서 DPI와 자기 유사도 기술 기반의 OPC-UA 프로토콜 게이트웨이 융합 보안 기술)

  • Shim, Jae-Yoon;Lee, June-Kyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1305-1311
    • /
    • 2016
  • The smart factory, a combination of ICT technology to the entire production process of a product, means can you intelligent factory is to achieve such reduction and process improvement of the production cost. To implement the smart factory, inevitably must have an internal equipment connections to the external network, this is by equipment which is operated by the existing closure network is exposed to the outside network, the security vulnerability so that gender is increased. In order to solve this problem, it is possible to apply security solutions that are used in normal environments. However, it is impossible to have just completely blocking security threats that can occur in a smart factory network. Further, considering the economic damage that can occur during security breach accident, which cannot be not a serious problem. Therefore, in this paper, a look to know the security measures that can be applied to smart factory, to introduce the main fusion security technology necessary to smart factory dedicated security gateway.

A Study on the Product Planning Model based on Word2Vec using On-offline Comment Analysis (온·오프라인 댓글 분석이 활용된 Word2Vec 기반 상품기획 모델연구)

  • Ahn, Yeong-Hwi;Jung, Jin-Young;Park, Koo-Rack
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.79-80
    • /
    • 2021
  • 인터넷은 우리 경제를 디지털 경제로 변화시키며 전자상거래도 증가하고 있다. 따라서 구매자가 전자상거래에서 남기는 긍정적인, 부정적인 상품평은 상품기획의 주요 정보가 될 수 있다. 본 논문에서는 버티컬 무소음 마우스 10,000개에 대한 정형화된 데이터셋을 Word2Vec을 이용하여 유사도 분석, 온라인 상품평 빈도분석 상위 50개 단어를 제시하여 실제 상품을 사용한 후 설문조사 시행을 하였다. 온라인 상품평 유사도 분석결과 클릭 키워드에 대한 장점으로 통증(.986), 디자인(.982)가 분석되었으며 단점은 적응(.866), 불편(.854)이었다. 오프라인 상품평에서는 장점으로 디자인(17명), 단점으로 불편(11명)이었다. 또한 온라인과 오프라인의 상품평을 비교함으로써 구매자의 긍정, 부정의 의미를 교차 확인하여 유의미한 정보를 제시 하였다고 볼수 있다. 따라서 본 연구에서 제시하는 상품기획 프로세스를 신상품 개발 및 기존 상품의 개선 전략으로 적용할 수 있겠다.

  • PDF

A Design of Key Generation and Communication for Device Access Control based on Smart Health Care (스마트 헬스케어 기반의 디바이스 접근제어를 위한 키 생성 및 통신기법 설계)

  • Min, So-Yeon;Lee, Kwang-Hyong;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.746-754
    • /
    • 2016
  • Smart healthcare systems, a convergent industry based on information and communications technologies (ICT), has emerged from personal health management to remote medical treatment as a distinguished industry. The smart healthcare environment provides technology to deliver vital information, such as pulse rate, body temperature, health status, and so on, from wearable devices to the hospital network where the physician is located. However, since it deals with the patient's personal medical information, there is a security issue for personal information management, and the system may be vulnerable to cyber-attacks in wireless networks. Therefore, this study focuses on a key-development and device-management system to generate keys in the smart environment to safely manage devices. The protocol is designed to provide safe communications with the generated key and to manage the devices, as well as the generated key. The security level is analyzed against attack methods that may occur in a healthcare environment, and it was compared with existing key methods and coding capabilities. In the performance evaluation, we analyze the security against attacks occurring in a smart healthcare environment, and the security and efficiency of the existing key encryption method, and we confirmed an improvement of about 15%, compared to the existing cipher systems.

Proposal of Visual and Quantitative Method for Singer's Performance Evaluation of Singing (노래의 가창력 평가를 위한 시각적, 정량적 방법의 제안)

  • Lee, Bum Joo;Cho, Dong Uk;Jeong, Yeon Man
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.10
    • /
    • pp.1270-1275
    • /
    • 2016
  • Recently, the entertainment programs with vocal skills assessment through the broadcasting and cable broadcasting have become very popular. But, in spite of higher popularity, present performance evaluation methods including musical sympathy of the pop singers and plain performers in broadcastings are absolutely dependent on the subjective feelings of audience assessors who evaluate the musical sympathy in these programs. For solving this problem, quantitative methods instead of subjective methods in the entertainment industries for evaluating pop singer's performance and musical sympathy are taken as important issues and social demands. For this, in this paper, we propose a visual and quantitative evaluation method by applying ICT technologies that can be evaluated in all areas of musical sympathy as well as a singer's assessment.

A Comparative Analysis of Informatization Level for Agricultural Corporations and SMEs (농업법인과 중소기업의 정보화수준 비교 분석)

  • Bock, Gene;Kim, Bae-Bong;Lee, Jae-Keun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.5
    • /
    • pp.892-902
    • /
    • 2015
  • Agri-food ICT(Information and Communications Technologies) convergence has been raised as an important issue for agricultural industry competence. In this situation, this study is to enhance agricultural competitiveness and seek to development plan for agricultural corporation by diagnosing informatization level. For this purpose, this study conducted survey on informatization level of 3,019 agricultural corporations and calculated level score. And result is compared with SMEs(Small and Medium Enterprise) informatization survey, including manufacturing and service industries, conducted by Korea Technology & Information Promotion Agency for SMEs in recent agricultural corporations' growing with automation of agricultural production and improving service to customer satisfaction. Evaluation system is established to calculate informatization level score and AHP(Analytic Hierarchy Process) method was used by the experts to investigate weighting of assessment area, assessment indicators, assessment items. As a result, agricultural corporation informatization level score was 40.16 points which is lower than the benefitted organization of agri-food IT convergence modeling(43.44 points). By assessment area, the informatization level of promotional environment area was low and investment and training items were analyzed low especially so need to improve urgently. In the analysis result by organization type, agricultural company corporation's informatization level was higher than the agricultural association corporation and 'Processing and distribution' was higher than others by business type. Informatization level of agricultural corporation is 80 percent of 2013 SMEs' level(50.18 points) and 59.4 percent of a large corporation(67.64 points). In particular, big difference is occurred in investment feasibility analysis, informatization investment and education which will be need to improve.

Automatic Bee-Counting System with Dual Infrared Sensor based on ICT (ICT 기반 이중 적외선 센서를 이용한 꿀벌 출입 자동 모니터링 시스템)

  • Son, Jae Deok;Lim, Sooho;Kim, Dong-In;Han, Giyoun;Ilyasov, Rustem;Yunusbaev, Ural;Kwon, Hyung Wook
    • Journal of Apiculture
    • /
    • v.34 no.1
    • /
    • pp.47-55
    • /
    • 2019
  • Honey bees are a vital part of the food chain as the most important pollinators for a broad palette of crops and wild plants. The climate change and colony collapse disorder (CCD) phenomenon make it challenging to develop ICT solutions to predict changes in beehive and alert about potential threats. In this paper, we report the test results of the bee-counting system which stands out against the previous analogues due to its comprehensive components including an improved dual infrared sensor to detect honey bees entering and leaving the hive, environmental sensors that measure ambient and interior, a wireless network with the bluetooth low energy (BLE) to transmit the sensing data in real time to the gateway, and a cloud which accumulate and analyze data. To assess the system accuracy, 3 persons manually counted the outgoing and incoming honey bees using the video record of 360-minute length. The difference between automatic and manual measurements for outgoing and incoming scores were 3.98% and 4.43% respectively. These differences are relatively lower than previous analogues, which inspires a vision that the tested system is a good candidate to use in precise apicultural industry, scientific research and education.

Study on Basic Elements for Smart Content through the Market Status-quo (스마트콘텐츠 현황분석을 통한 기본요소 추출)

  • Kim, Gyoung Sun;Park, Joo Young;Kim, Yi Yeon
    • Korea Science and Art Forum
    • /
    • v.21
    • /
    • pp.31-43
    • /
    • 2015
  • Information and Communications Technology (ICT) is one of the technologies which represent the core value of the creative economy. It has served as a vehicle connecting the existing industry and corporate infrastructure, developing existing products and services and creating new products and services. In addition to the ICT, new devices including big data, mobile gadgets and wearable products are gaining a great attention sending an expectation for a new market-pioneering. Further, Internet of Things (IoT) is helping solidify the ICT-based social development connecting human-to-human, human-to-things and things-to-things. This means that the manufacturing-based hardware development needs to be achieved simultaneously with software development through convergence. The essential element the convergence between hardware and software is OS, for which world's leading companies such as Google and Apple have launched an intense development recognizing the importance of software. Against this backdrop, the status-quo of the software market has been examined for the study of the present report (Korea Evaluation Institute of Industrial Technology: Professional Design Technology Development Project). As a result, the software platform-based Google's android and Apple's iOS are dominant in the global market and late comers are trying to enter the market through various pathways by releasing web-based OS and similar OS to provide a new paradigm to the market. The present study is aimed at finding the way to utilize a smart content by which anyone can be a developer based on OS responding to such as social change, newly defining a smart content to be universally utilized and analyzing the market to deal with a rapid market change. The study method, scope and details are as follows: Literature investigation, Analysis on the app market according to a smart classification system, Trend analysis on the current content market, Identification of five common trends through comparison among the universal definition of smart content, the status-quo of application represented in the app market and content market situation. In conclusion, the smart content market is independent but is expected to develop in the form of a single organic body being connected each other. Therefore, the further classification system and development focus should be made in a way to see the area from multiple perspectives including a social point of view in terms of the existing technology, culture, business and consumers.