• Title/Summary/Keyword: Internet Penetration

Search Result 83, Processing Time 0.03 seconds

A Study on the Imporvement of Wireless Internet Service Tariff Scheme. (무선인터넷 데이터 서비스 과금 체계 개선 연구)

  • Min, Gyeong-Ju;Kim, Jeong-Ho;Park, Jin-Yang
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.9
    • /
    • pp.1101-1110
    • /
    • 2004
  • In the first quarter of 2004, there were about 1 billion 348 million mobile phone users worldwide with a penetration rate of only 29%. Korea ranks among the highest in the use of mobile communication, having over 36 million mobile phone subscribers with a mobile phone penetration rate of 75% as of May 2004. Since the introduction of wireless Internet service in May 1999, the number of subscribers rose to 34.5 million with 95.3% of the total mobile phone subscribers using wireless Internet services in May 2004, largely due to continued investments by telecommunication service providers, improvement of mobile handsets (color and digital camera phones) and implementation of policies on mobile number portability. In the Korean wireless Internet market, there are many user complaints since the service providers are competing with each other through TV commercial sales and phone discounts rather than improving their call quality, services and billing systems. therefore there is a growing need to improve the billing systems through means such as the implementation of reasonable payment plans according to consumer use, development of a wireless Internet billing system that can predict the number of users and establishment of pricing standards for controlled data (head, tail, etc...) as well as menu information by testing the texts. multimedia, video and other types of content provided by the three major mobile communication companies. The purpose of this study is to promote wireless Internet services and protect user rights by proposing a reasonable way to improve the billing systems for wireless Internet services after conducting a comparative analysis of file size and billing data of each of the service providers through a verification test on a packet billing system for wireless Internet services.

  • PDF

The use of Internet video lectures Study and Improvement Plan (인터넷 동영상 강의의 활용과 개선방안 연구)

  • Hwang, Hae-Youn;Kang, Hyo-Soon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.426-428
    • /
    • 2012
  • Korea is the best of the world, as a global IT power house, IT infra and internet penetration. Because, many changes were made in the educational market Learners can become repetitive learning regardless of the time and place in online As a result, many students are used video lecture So we carry out utilization and improvements about internet video lectures.

  • PDF

국가단위 인트라넷 구축방안에 관한 연구

  • Yoon, Seok-Min;Kim, Yu-Sin;Kang, Sung-Ho;Choi, Sung
    • Proceedings of the Technology Innovation Conference
    • /
    • 1997.07a
    • /
    • pp.307-329
    • /
    • 1997
  • Nowadays the whole World is overwhelmed by the wave of Information Technology. In particular, in this Information & Communication Era such advanced countries as United States, Germany, and France are now launching and preparing Government levels Information Technology Policy and Strategies in order to keep their information initiative and superiority. Ever since 1993 when the US government have been advocating m as well as NPR, the US is concentrating their all energies and efforts on the redeem of their former national competitiveness which was snatched up to Japan, meanwhile also Japanese government, who has announced NEW SOCIETY CAPITAL CONSTRUCTION PROGRAM in 1994 to be completed by 2010, is trying to do their whole national endeavors to enter into the highly enhanced information society. Recently also our Government enacted the LAW of INFORMATION TECHNOLOGY PROMOTE & EXPEDITE in 1995 then sequently in the next year announced its detailed enforcement regulations, targeting at one of the leading countries with highly advanced Information Technology. The concept of Internet which takes the concept of Internet into the inner side of the industries has been, since implemented in 1995, showing really the rapid growth and at the same time it is highlighted onto the next generations Information-network. The merits of Internet, representing as the affordable cost, continuous standardization, various functionalities of multimedia excellent expansibilities, easy interface is the most adequate choice as a newest method for our country that announce to be one of leading countries in the realization of Information Technology and expects immediate effect on the construction of Internet in the level of whole country. In an effort to construct the nations level of Internet by firstly the build-up and connection of each central and each local government level of internet, a few methods for nation levels internet build-up are here studied and described, while in the beginnings stage through both e-mails and internet home pages the nation level of internet can be established in stages. The construction of Internet in the level of the nation is not an issue of simple option but an essential and inevitable choice for the survival in 2000s and as well the jump-up and penetration onto the real advanced country in the New Era.

  • PDF

A Study of Industrial and Firm's Strategic Factors Affecting Diffusion of Convergent Media - The Case of Global IPTV Services (융합미디어 확산에 영향을 주는 산업, 기업전략 요소에 관한 연구 - 해외 IPTV 실증분석)

  • Park, Seong-Won;Lee, Chi-Hyung
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.21-28
    • /
    • 2012
  • The study aims to explore industrial and firms' strategic factors affecting diffusion of digital convergence by studying major global IPTV markets. Market and firm variables are selected using the Industrial Organization's SCP approach. Data for the variables are collected from global 31 IPTV operators representing 20 countries. The analysis indicates that the penetration of broadband Internet and the market share of a dominant player in the Pay TV positively affect the penetration of the IPTV service, whereas the penetration of Pay TV, ARPU, firms' strategy and resource do not have influence on its penetration. The study is the cross-country analysis and contributes to the media study by exploring the relationship between market variables and the development of convergent media. Consequently, the study is expected to help policy makers tailor their digital policy for local environment.

Threat Analysis based Software Security Testing for preventing the Attacks to Incapacitate Security Features of Information Security Systems (보안기능의 무력화 공격을 예방하기 위한 위협분석 기반 소프트웨어 보안 테스팅)

  • Kim, Dongjin;Jeong, Youn-Sik;Yun, Gwangyeul;Yoo, Haeyoung;Cho, Seong-Je;Kim, Giyoun;Lee, Jinyoung;Kim, Hong-Geun;Lee, Taeseung;Lim, Jae-Myung;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.5
    • /
    • pp.1191-1204
    • /
    • 2012
  • As attackers try to paralyze information security systems, many researchers have investigated security testing to analyze vulnerabilities of information security products. Penetration testing, a critical step in the development of any secure product, is the practice of testing a computer systems to find vulnerabilities that an attacker could exploit. Security testing like penetration testing includes gathering information about the target before the test, identifying possible entry points, attempting to break in and reporting back the findings. Therefore, to obtain maximum generality, re-usability and efficiency is very useful for efficient security testing and vulnerability hunting activities. In this paper, we propose a threat analysis based software security testing technique for evaluating that the security functionality of target products provides the properties of self-protection and non-bypassability in order to respond to attacks to incapacitate or bypass the security features of the target products. We conduct a security threat analysis to identify vulnerabilities and establish a testing strategy according to software modules and security features/functions of the target products after threat analysis to improve re-usability and efficiency of software security testing. The proposed technique consists of threat analysis and classification, selection of right strategy for security testing, and security testing. We demonstrate our technique can systematically evaluate the strength of security systems by analyzing case studies and performing security tests.

Relationship Brand Orientation and Internal Brand Equity at Internet Service Providers: An Organization Change Readiness Effect

  • TOBING, Rudy P.;SUROSO, SUROSO;HALIM, Rizal Edy;ALIF, Gunawan
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.7 no.2
    • /
    • pp.181-193
    • /
    • 2020
  • The midst competition makes a brand all together with its offering products and services is becoming a crucial element for company existence. This requires direct involvement from internal organizational to develop effective strategic branding. According to Asosiasi Penyelenggara Internet Indonesia (APJII), Indonesia's internet penetration is among the highest in Asia. The purpose of this research is to improve the strategic role of brand orientation within Internet Service Provider (ISP) for maximizing return on the company's financial and non-financial benefits by proposing organization change readiness variable. The data collection is taken using an online survey with a non-parametric sampling method and collected 68 qualified respondents for data analysis using SEM-PLS (Structural Equation Modeling with Partial Least Square). The result indicates partial hypotheses on the constructed model between variables brand orientation, brand commitment, and internal brand equity is acceptable. Another finding is stated hypotheses on organization change readiness as moderation is not accepted and means there is no significance to the constructed model. The main conclusion resumes associative human memory can shape up organization change readiness inside internal toward then brand. Relevant cues generate information received in the human brain then will create common associative and becoming social identity on internal brand equity.

Evaluation of Compaction Quality Control applied the Dynamic Cone Penetrometer Test based on IoT (다짐품질관리를 위한 IoT 기반 DCPT 적용 평가)

  • Jisun, Kim;Jinyoung, Kim;Namgyu, Kim;Sungha, Baek;Jinwoo, Cho
    • Journal of the Korean Geosynthetics Society
    • /
    • v.21 no.4
    • /
    • pp.1-12
    • /
    • 2022
  • Generally, the plate load test and the field density test are conducted for compaction quality control in earthwork, and then additional analysis. Recently developed that the DCPT (Dynamic Cone Penetration Test) equipment for smart compaction quality control its the system are able to get location and real-time information about worker history management. The IoT-based the DCPT system improved the time-cost in the field compared traditional test, and the functions recording and storage of the DPI (Dynamic Cone Penetration Index) were automated. This paper describes using these DCPT equipment on in-situ and compared to the standards of the DCPT, and the compaction trend had be confirmed with DPI as the field test data. As a result, the DPI of the final compaction decreased by 1.4 times compared to the initial compaction, confirming the increase in the compaction strength of the subgrade compaction layer 10 to 14 cm deep from the surface. A trend of increasing compaction strength was observed. This showed a tendency to increase the compaction strength of the target DPI proposed by MnDOT and the results of the existing plate load test, but there was a difference in the increase rate. Therefore, additional studies are needed on domestic compaction materials and laboratory conditions for target DPI and correlation studies with the plate load tests. If this is reflected, it is suggested that DCPT will be widely used as smart construction equipment in earthworks.

Network Attack and Defense Game Theory Based on Bayes-Nash Equilibrium

  • Liu, Liang;Huang, Cheng;Fang, Yong;Wang, Zhenxue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.10
    • /
    • pp.5260-5275
    • /
    • 2019
  • In the process of constructing the traditional offensive and defensive game theory model, these are some shortages for considering the dynamic change of security risk problem. By analysing the critical indicators of the incomplete information game theory model, incomplete information attack and defense game theory model and the mathematical engineering method for solving Bayes-Nash equilibrium, the risk-averse income function for information assets is summarized as the problem of maximising the return of the equilibrium point. To obtain the functional relationship between the optimal strategy combination of the offense and defense and the information asset security probability and risk probability. At the same time, the offensive and defensive examples are used to visually analyse and demonstrate the incomplete information game and the Harsanyi conversion method. First, the incomplete information game and the Harsanyi conversion problem is discussed through the attack and defense examples and using the game tree. Then the strategy expression of incomplete information static game and the engineering mathematics method of Bayes-Nash equilibrium are given. After that, it focuses on the offensive and defensive game problem of unsafe information network based on risk aversion. The problem of attack and defense is obtained by the issue of maximizing utility, and then the Bayes-Nash equilibrium of offense and defense game is carried out around the security risk of assets. Finally, the application model in network security penetration and defense is analyzed by designing a simulation example of attack and defense penetration. The analysis results show that the constructed income function model is feasible and practical.

Analysis and Study of Safety Technical Standards in Domestic Photovoltaic Field (국내 태양광분야 안전성 기술기준 분석 및 연구)

  • Yoon, Yongho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.207-212
    • /
    • 2018
  • The increase in the size and the uptake of PV systems is leading to significant increase in the penetration of PV into local electricity grids. The increased penetration of PV is impacting on grid operation and in particular the voltage within the local grid can be significantly influenced by the various PV systems. The current global situation of environmental pollution, climate change and energy demand urgently requires dramatic political, economic and technical decisions in order to avoid a potential collapse of environmental and social systems. Around the world, electricity remains the vital component of national and international development. The implementation of renewable energy resources can provide solutions to these challenges by stimulating the early implementation of economically viable sustainable energy technologies.

The Current Telecommunications Infrastructure in Ecuador is Ready to Start with the Implementation of IoT Applications?

  • Yepez, Johanna Fernandez;Kim, Yun Seon
    • Asia Pacific Journal of Business Review
    • /
    • v.3 no.1
    • /
    • pp.57-76
    • /
    • 2018
  • The "Internet of things" (IoT) is becoming an increasingly growing topic of conversation, it is a new emergent technology that can be present in almost every field and application. It's a concept that not only has the potential to impact how people live but also how people work. Broadband Internet and Mobile Internet are becoming more widely available, the cost of the service is decreasing, more devices are being created with Wi-Fi capabilities and sensors built into them, technology costs are going down, and smartphone penetration is growing so fast. All of these facts are creating the best environment for the IoT applications. In a country like Ecuador, is important to have a previous analysis about the feasibility of the implementation of this new technology in order to know what are the challenges the country has to face, and also to not stay behind as the other countries in the region are advancing. Currently, this kind of analysis does not exist. The Internet of Things is an innovation where business and technology models in Ecuador are relatively unexplored. The current infrastructure deployed in Ecuador and the available devices in the market are the central facts to initiate with the research, which is a starting point to show if Ecuador is ready to this technology, and if is not ready what is missing. This study shows the current telecommunications status in Ecuador, and its strengths and weaknesses to start the deployment of Internet of Things. Besides, it also will show the most likely applications that can be easily adopted for the Ecuadorian market with its respective availability, affordability, and adaptability.