• Title, Summary, Keyword: Internet Penetration

Search Result 68, Processing Time 0.026 seconds

The Impact of Internet Access Charges on Economic Activities : A Cross-country Analysis (인터넷 사용료 수준이 경제활동 수준에 미치는 영향에 대한 다국가 분석)

  • Yoo, Seoung-Hoon;Yang, Chang-Young
    • Journal of Digital Convergence
    • /
    • v.2 no.2
    • /
    • pp.63-76
    • /
    • 2004
  • There is a considerable gap in the level of the Internet access charges among countries because of the history of the Internet use, current status of the Internet infrastructure, the Internet penetration rate, and so on. Low Internet access charge increases the number of the Internet users and the Internet penetration rate, which boosts economic activities. This paper empirically explores the impacts of the internet access charges on economic activities using a cross-country analysis based on data from 76 countries for the year 1998-2001. To this end, several versions of the neoclassical growth models, explicitly including the internet access charges, are estimated with the GDP used for a proxy for economic activities and the level of Internet access charges considered as an input to production. Subject to the appropriate caveats, the results show that the level of the Internet access charges make a significantly negative effect on economic activities. In other words, it is concluded that low Internet access charges of a county increase economic activities and the increased economic activities in turn raise the real income of the county.

  • PDF

A Study on The Internet Connectivity in The Philippines

  • Salac, Romeo Agan;Kim, Yun Seon
    • Asia Pacific Journal of Business Review
    • /
    • v.1 no.1
    • /
    • pp.67-88
    • /
    • 2016
  • This study aims to help address concerns about the growing demand of wider bandwidth Internet connection in the Philippines. Using articles and research of international organizations and content from official websites of the Philippine government, this paper has carefully examined the slow Internet connectivity and the high cost that the end-users pay for it. This paper suggests that this inefficiency hampers the motivation of users to innovate in a way that could contribute to inclusive growth and the development of an inclusive information society. Through a comparison of the current global ICT situation with the current situation in the Philippines, this paper shows that the country's Internet infrastructure lags behind among those of contemporary developing countries in Asia, particularly in terms of Internet connectivity. In 2015, Thailand had an average Internet speed of 7.4 Mbps, Sri Lanka 7.4, and Malaysia 4.3. Meanwhile, the Philippines had a meager average Internet speed of 2.8 Mbps, placing the country at 104 among 160 countries, with developed countries in Asia such as South Korea (23.6 Mbps) and Singapore (12.9 Mbps) ranking 1 and 12, respectively. Findings show that the lack of competition in the Internet connectivity market, among other reasons, is at the root of the dilemma of slow and costly Internet connection. Assessing the accomplishments of the Republic of Korea and other broadband-leading countries has provided practical insights and recommendations that can promote competitiveness. Furthermore, related literature argues how ISP practices may affect Internet speed and cost. This study offers an approach in improving Internet connectivity in the Philippines by bridging the gap between the Internet infrastructure market and government policies.

Attack and Defense Plan, Attack Scenarios on Voice of Internet Protocol (인터넷전화의 공격 시나리오 및 공격과 방어 방안)

  • Chun, Woo-Sung;Park, Dea-Woo;Chang, Young-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.245-248
    • /
    • 2011
  • Voice over Internet protocol(VoIP) is call's contents using the existing internet. Thus, in common with the Internet service has the same vulnerability. In addition, unlike traditional PSTN remotely without physical access to hack through the eavesdropping is possible. Cyber terrorism by anti-state groups take place when the agency's computer network and telephone system at the same time work is likely to get upset. In this paper is penetration testing for security threats(Call interception, eavesdropping, misuse of services) set out in the NIS in the VoIP. In addition, scenario writing and penetration testing, hacking through the Voice over Internet protocol at the examination center will study discovered vulnerabilities. Vulnerability discovered in Voice over Internet protocol presents an attack and defense plan.

  • PDF

Penetration Testing and Network Auditing: Linux

  • Stiawan, Deris;Idris, Mohd. Yazid;Abdullah, Abdul Hanan
    • Journal of Information Processing Systems
    • /
    • v.11 no.1
    • /
    • pp.104-115
    • /
    • 2015
  • Along with the evolution of Internet and its new emerging services, the quantity and impact of attacks have been continuously increasing. Currently, the technical capability to attack has tended to decrease. On the contrary, performances of hacking tools are evolving, growing, simple, comprehensive, and accessible to the public. In this work, network penetration testing and auditing of the Redhat operating system (OS) are highlighted as one of the most popular OS for Internet applications. Some types of attacks are from a different side and new attack method have been attempted, such as: scanning for reconnaissance, guessing the password, gaining privileged access, and flooding the victim machine to decrease availability. Some analyses in network auditing and forensic from victim server are also presented in this paper. Our proposed system aims confirmed as hackable or not and we expect for it to be used as a reference for practitioners to protect their systems from cyber-attacks.

Internet Information Orientation: The Link to National Competitiveness on Internet

  • Song, In Kuk;Kang, Mingoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.8
    • /
    • pp.3028-3039
    • /
    • 2015
  • Recently, the web index of Korea peaked at the top 10 among the eighty six countries, and Korea became the only Asian country ranked at the top level. Korea also has been on the top in the field of Internet penetration rate, in terms of both high-speed broadband and wireless Internet. However, such achievements did not guarantee the national level for the effective use of information utilizing Internet. According to OECD, the national informatization index of Korea has not been free from the middle of the OECD countries. Despite of the heightened pressure in practically enhancing effective information use utilizing Internet, the previous research interests and efforts to develop the Internet-related framework or to identify Internet capabilities rarely existed. The study aims to propose the framework, named "Internet Information Orientation" that illustrates the relationship between Internet capabilities and national competitiveness on Internet. The research identified the specific Internet capabilities, reclassified the capabilities based on the research issues provided at the 6th international conference on Internet held in December 2014, and finally described the rigorous research endeavors on the issues. As a result, 16 papers presented and selected as the outstanding papers at the conference handle issues to be brought together, which include: Wireless Network, Internet of Things, Green Computing, Multimedia Processing, Big Data and Text Mining, Database in Cloud Environment, Business Intelligence, Software Engineering, IT Strategy & Policy, and Social Network Services.

Vulnerability Analysis on a VPN for a Remote Monitoring System

  • Kim Jung Soo;Kim Jong Soo;Park Il Jin;Min Kyung Sik;Choi Young Myung
    • Nuclear Engineering and Technology
    • /
    • v.36 no.4
    • /
    • pp.346-356
    • /
    • 2004
  • 14 Pressurized Water Reactors (PWR) in Korea use a remote monitoring system (RMS), which have been used in Korea since 1998. A Memorandum of Understanding on Remote Monitoring, based on Enhanced Cooperation on PWRs, was signed at the 10th Safeguards Review Meeting in October 2001 between the International Atomic Energy Agency (IAEA) and Ministry Of Science and Technology (MOST). Thereafter, all PWR power plants applied for remote monitoring systems. However, the existing method is high cost (involving expensive telephone costs). So, it was eventually applied to an Internet system for Remote Monitoring. According to the Internet-based Virtual Private Network (VPN) applied to Remote Monitoring, the Korea Atomic Energy Research Institute (KAERI) came to an agreement with the IAEA, using a Member State Support Program (MSSP). Phase I is a Lab test. Phase II is to apply it to a target power plant. Phase III is to apply it to all the power plants. This paper reports on the penetration testing of Phase I. Phase I involved both domestic testing and international testing. The target of the testing consisted of a Surveillance Digital Integrated System (SDIS) Server, IAEA Server and TCNC (Technology Center for Nuclear Control) Server. In each system, Virtual Private Network (VPN) system hardware was installed. The penetration of the three systems and the three VPNs was tested. The domestic test involved two hacking scenarios: hacking from the outside and hacking from the inside. The international test involved one scenario from the outside. The results of tests demonstrated that the VPN hardware provided a good defense against hacking. We verified that there was no invasion of the system (SDIS Server and VPN; TCNC Server and VPN; and IAEA Server and VPN) via penetration testing.

Influence of User's Behavior about Delay on Media Server

  • Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.8B
    • /
    • pp.1150-1158
    • /
    • 2010
  • At present multimedia service composed of voice, data, and video service is prevalent in the Internet. As such, wide-scale penetration of Internet service imposes tremendous pressure to the network infrastructure such as the media servers and links as well as the nodes. In addition, users from a large-scale population require broad bandwidth and high level of QoS. This requires a network with reliable and scalable services to customers, which also necessitates a realistic method for the design of the a media server. In this work, we explore the influence of user's behavior about delay on the performance of media server that takes into account the system and user attributes in a realistic manner. By incorporating user's behavior about the delay-sensitivity, we present an analytic framework for the evaluation of the performance of the media server, via which we illustrate a meaningful intuition in the provision of Internet multimedia service.

Analyzing the Relationship between Market Concentration and Performance in Global Pay TV Markets for the Media Industry Regulation and Policy (해외유료방송의 시장집중과 시장성과 간의 관계분석을 통한 미디어산업 규제 및 정책 방향)

  • Lee, Chi-Hyung;Lee, Bong-Gyou
    • Journal of Internet Computing and Services
    • /
    • v.12 no.4
    • /
    • pp.51-59
    • /
    • 2011
  • The purpose of this study is to provide relevant directions of media industry regulation and policy by analyzing the relationship between market concentration and performance in global pay TV markets. The market concentration has long been regulated in the media industry under the belief that it harms market efficiency and cultural diversity. As the global media market is undergoing significant chance accelerated by the advance of technology, it is necessary to examine the feasibility of this long myth. The data are collected from global 17 pay TV markets and analyzed to see whether the highly concentrated markets by a single player result in higher price and slower service penetration. The result indicates that the price is not escalated and the penetration is not limited even in the markets where a dominant player takes high market share. It implies that more diverse factors other than the market concentration affect the market performance and that maintaining strict regulation of the market concentration is likely to have negative effect on technology innovation.

A Study on the Imporvement of Wireless Internet Service Tariff Scheme. (무선인터넷 데이터 서비스 과금 체계 개선 연구)

  • Min, Gyeong-Ju;Kim, Jeong-Ho;Park, Jin-Yang
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.9
    • /
    • pp.1101-1110
    • /
    • 2004
  • In the first quarter of 2004, there were about 1 billion 348 million mobile phone users worldwide with a penetration rate of only 29%. Korea ranks among the highest in the use of mobile communication, having over 36 million mobile phone subscribers with a mobile phone penetration rate of 75% as of May 2004. Since the introduction of wireless Internet service in May 1999, the number of subscribers rose to 34.5 million with 95.3% of the total mobile phone subscribers using wireless Internet services in May 2004, largely due to continued investments by telecommunication service providers, improvement of mobile handsets (color and digital camera phones) and implementation of policies on mobile number portability. In the Korean wireless Internet market, there are many user complaints since the service providers are competing with each other through TV commercial sales and phone discounts rather than improving their call quality, services and billing systems. therefore there is a growing need to improve the billing systems through means such as the implementation of reasonable payment plans according to consumer use, development of a wireless Internet billing system that can predict the number of users and establishment of pricing standards for controlled data (head, tail, etc...) as well as menu information by testing the texts. multimedia, video and other types of content provided by the three major mobile communication companies. The purpose of this study is to promote wireless Internet services and protect user rights by proposing a reasonable way to improve the billing systems for wireless Internet services after conducting a comparative analysis of file size and billing data of each of the service providers through a verification test on a packet billing system for wireless Internet services.

  • PDF

The use of Internet video lectures Study and Improvement Plan (인터넷 동영상 강의의 활용과 개선방안 연구)

  • Hwang, Hae-Youn;Kang, Hyo-Soon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • /
    • pp.426-428
    • /
    • 2012
  • Korea is the best of the world, as a global IT power house, IT infra and internet penetration. Because, many changes were made in the educational market Learners can become repetitive learning regardless of the time and place in online As a result, many students are used video lecture So we carry out utilization and improvements about internet video lectures.

  • PDF