• Title/Summary/Keyword: Internet Information Technology

Search Result 6,868, Processing Time 0.043 seconds

A Study on the Classification Schemes of Internet Resources in the Fields of the Information & Telecommunications Technology (정보통신기술 분야 인터넷자원의 분류체계에 관한 연구)

  • 이창수
    • Journal of Korean Library and Information Science Society
    • /
    • v.31 no.4
    • /
    • pp.111-138
    • /
    • 2000
  • The lxnpose of this study is to pmvide the basic data for developing rational classification scheme of intemet resources in the fields of the information & telecommunications technology. The coverage of this study is, kt, to dehe the concept of informtion & telecommunications, and also to investigate the division of information & telecommunications technology through the literature, seumd, to analyze the using library classification schemes for internet resources, and thud, to review classi6cation system of the directory search engines. In this study, I w new

  • PDF

A Study on Correlation Analysis of Smart Phone Addiction and Age Groups in Korea

  • Jun, Woochun
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.106-114
    • /
    • 2020
  • As information and communication technology develops, it brings various benefits to our lives. However, information and communication technology has had various side effects in our lives. Representative side effects include internet addiction, smartphone addiction, copyright violation, personal information infringement, cyber bullying and hacking. Recently, smart phone addiction rate is increasing with the spread of smart devices in Korea. In this study, we analyze the correlation between age group and smartphone addiction. In order to obtain fair and objective results, statistical analysis was performed based on the national statistical data of the National Information Society Agency. The results showed that the infant group and the adult group were correlated with the smartphone addiction rate. In this study, we analyzed the causes of smartphone addiction for different age groups. We also discuss dangers of smartphone addiction for different age groups. In additions, we proposed various ways to prevent and cure smartphone addiction for infants, adults, and senior citizen group. The results of this study are expected to be widely used as a remedy for smartphone addiction and future smartphone addiction research works.

A Study of the Cross Certification in Internet Banking (인터넷뱅킹에서의 상호인증에 관한 연구)

  • Lee, Young Gyo;Ahn, Jeong Hee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.87-97
    • /
    • 2014
  • Pharming attack is a confidence trick that the hacker catch away customers financial information on Internet banking. At first, a hacker installs malicious execution code on customers PC in secret. As a customer tries to connect a Internet banking Web site, the malicious code changes it to phishing site in Internet explorer. The hacker catch away customers financial information in process of internet banking. The hacker steals money from customer's bank account using stolen information. PKI is a widespread and strong technology for providing the security using public key techniques. The main idea of PKI is the digital certificate that is a digitally signed statement binding an user's identity information and his public key. The Internet banking service stands on the basis of PKI. However, the bank is trusted in natural, the only customer is certified in the present Internet banking. In this paper, we propose a method of cross certification in Internet banking. The customer certify a bank and the bank certify the customer in proposed method. The method can service to customer the secure Internet banking about pharming attack. We compare the proposed method with other methods.

Modern Study on Internet of Medical Things (IOMT) Security

  • Aljumaie, Ghada Sultan;Alzeer, Ghada Hisham;Alghamdi, Reham Khaild;Alsuwat, Hatim;Alsuwat, Emad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.254-266
    • /
    • 2021
  • The Internet of Medical Things (IoMTs) are to be considered an investment and an improvement to respond effectively and efficiently to patient needs, as it reduces healthcare costs, provides the timely attendance of medical responses, and increases the quality of medical treatment. However, IoMT devices face exposure from several security threats that defer in function and thus can pose a significant risk to how private and safe a patient's data is. This document works as a comprehensive review of modern approaches to achieving security within the Internet of Things. Most of the papers cited here are used been carefully selected based on how recently it has been published. The paper highlights some common attacks on IoMTs. Also, highlighting the process by which secure authentication mechanisms can be achieved on IoMTs, we present several means to detect different attacks in IoMTs

Internet of Things Fundamentals, Architectures, Challenges and Solutions: A Survey

  • Abdelhaq, Maha
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.189-198
    • /
    • 2022
  • As the number of people using the Internet increases, a new application known as the Internet of Things (IoT) has been emerged. Internet of Things makes it easier for machines and objects to exchange, compute, and coordinate information autonomously without human interference. It is a tool for attaching intelligence to a variety of contemporary objects in houses, hospitals, buildings, vehicles, and even cities. As a new emerging technology, the focus in current IoT surveys does not shed the light on deep understanding for IoT fundamentals, architectures, challenges, and solutions. For this reason, the objective of this paper is to introduce specifications for IoT definitions, characteristics, functional blocks, and different architectures as a cement for better understanding. Additionally, we present current documented IoT challenges, with the existing available solution for each challenge.

A Classification-Based Virtual Machine Placement Algorithm in Mobile Cloud Computing

  • Tang, Yuli;Hu, Yao;Zhang, Lianming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.5
    • /
    • pp.1998-2014
    • /
    • 2016
  • In recent years, cloud computing services based on smart phones and other mobile terminals have been a rapid development. Cloud computing has the advantages of mass storage capacity and high-speed computing power, and it can meet the needs of different types of users, and under the background, mobile cloud computing (MCC) is now booming. In this paper, we have put forward a new classification-based virtual machine placement (CBVMP) algorithm for MCC, and it aims at improving the efficiency of virtual machine (VM) allocation and the disequilibrium utilization of underlying physical resources in large cloud data center. By simulation experiments based on CloudSim cloud platform, the experimental results show that the new algorithm can improve the efficiency of the VM placement and the utilization rate of underlying physical resources.

A Study on Smart Factory Construction Method for Efficient Production Management in Sewing Industry

  • Kim, Jung-Cheol;Moon, Il-Young
    • Journal of information and communication convergence engineering
    • /
    • v.18 no.1
    • /
    • pp.61-68
    • /
    • 2020
  • In the era of the fourth industrial revolution, many production plants are gradually evolving into smart factories that apply information and communication technology to manufacturing, distribution, production, and quality management. The conversion from conventional factories to smart factories has resulted in the automation of production sites using the internet and the internet of things (IoT) technology. Thus, labor-intensive production can easily collect necessary information. However, implementing a smart factory required a significant amount of time, effort, and money. In particular, labor-intensive production industries are not automated, and productivity is determined by human skill. A representative industry of such industries is sewing the industry. In the sewing industry, wherein productivity is determined by the operator's skills. This study suggests that production performance, inventory management and product delivery of the sewing industries can be managed efficiently with existing production method by using smart buttons incorporating IoT functions, without using automated machinery.

A Review of Library Information Service Utilizing Mobile Technology (모바일 기술을 활용한 도서관 정보서비스에 대한 고찰)

  • Kim, Hye-Sun
    • Journal of Information Management
    • /
    • v.33 no.3
    • /
    • pp.105-119
    • /
    • 2002
  • Since mobile internet technology emerging from late 1990's provides anytime and anywhere accessibility to information, mobile is adapted in the various field to increase efficiency of work. After looking into the trend of mobile contents services, case studies of information services using mobile were investigated in this paper. Library information services are providing retrieval of library OPAC and verifications of circulation and return date using mobile internet technology. In addition, various notice services using short message service(SMS) of mobile are available. Considering growing mobile users and advancement of related technology, more information services utilizing mobile should be developed in near future.

Privacy Information Protection Model in e-Healthcare Environment (e-Healthcare 환경 내 개인정보 보호 모델)

  • Kim, Kyong-Jin;Hong, Seng-Phil
    • Journal of Internet Computing and Services
    • /
    • v.10 no.2
    • /
    • pp.29-40
    • /
    • 2009
  • The development of information technology such as the internet has brought about rapidly changes the old medical technology, e-Healthcare has been to raise social issue. The e-Healthcare which new turning point of paradigm in the medical information develops the medical policy in Korea and the technology, the prospective of reverse engineering in internet environment is incurring problems such as distribution of critical information and invasion and infringement of privacy, etc. In this research, we suggest the Role Based Access Control System, HPIP-e-Healthcare Privacy Information Protection, for solving above problem. The HPIP is composed 4 mechanisms such as Consolidate User Identity, Hospital Authorization, Medical Record Access Control, Patient Diagnosis and we are also prototyping the HPIP for feasible approach in the real computing environment.

  • PDF

Adaptive Algorithm in Image Reconstruction Based on Information Geometry

  • Wang, Meng;Ning, Zhen Hu;Yu, Jing;Xiao, Chuang Bai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.2
    • /
    • pp.461-484
    • /
    • 2021
  • Compressed sensing in image reconstruction has attracted attention and many studies are proposed. As we know, adding prior knowledge about the distribution of the support on the original signal to CS can improve the quality of reconstruction. However, it is still difficult for a recovery framework adjusts its strategy for exploiting the prior knowledge efficiently according to the current estimated signals in serial iterations. With the theory of information geometry, we propose an adaptive strategy based on the current estimated signal in each iteration of the recovery. We also improve the performance of existing algorithms through the adaptive strategy for exploiting the prior knowledge according to the current estimated signal. Simulations are presented to validate the results. In the end, we also show the application of the model in the image.