• Title/Summary/Keyword: Internet Policy

Search Result 1,628, Processing Time 0.025 seconds

A Study on IT Network Policy Directions : Focusing on Network Neutrality versus Network Efficiency (IT Network 정책방향에 대한 연구 : 망(網) 중립성과 효율성을 중심으로)

  • Chung, Suk-Kyun
    • Journal of Digital Convergence
    • /
    • v.10 no.1
    • /
    • pp.49-57
    • /
    • 2012
  • The Internet succeeded because of the end-to-end principle which allowed anyone to add functionality to the network. However, as the internet is increasingly becoming the platform for smart IT applications such as VoIP, IPTV, Cloud Computing and Smart Phone, networks are now under increasing strain of traffic congestion and the absence of quality of service insurances. To date, the debate over internet rules has focused on network neutrality rather than network efficiency. This article emphasizes the well-functioning role of market mechanism for the efficient use and further development of the network. To maximize the value of the network, this article proposes a differential treatment to packets based on customer types, and a two-part tariff pricing rule to secure funding to expand and upgrade networks.

Impact of Internet Addiction on School Life Adaptation (인터넷 중독이 학교생활 적응에 미치는 영향)

  • Yoo, Byeoung-Hyeouk;Kim, Su-Min;Baek, Hyeon-Gi;Kang, Jung-Hwa
    • Journal of Digital Convergence
    • /
    • v.7 no.2
    • /
    • pp.71-81
    • /
    • 2009
  • This paper studied the impact of Internet addiction on school life adaptation of high school students. We searched the literature on Internet addiction for such research and analyzed the impact that Internet addiction has on school life fitness. The SPSS statistics program was used for Internet addiction factor analysis and the analysis was carried out through the structure equation model. The family relation, individual relation, school relation and friend relation factor were deduced to Internet addiction as a result. It was revealed that the individual relation factor among Internet addiction factors had an influence on school life fitness. It is expected that this research will prove helpful in providing preventative education for Internet addiction

  • PDF

The Effect of Internet Use on the Changes in Family Systems

  • Lee Hyunah;Lee Kiyoung
    • International Journal of Human Ecology
    • /
    • v.5 no.2
    • /
    • pp.61-80
    • /
    • 2004
  • The introduction of the Internet in homes had an effect on family systems. The purpose of this study is to investigate the changes in family systems due to Internet use in South Korea. This study classified the types of changes in the family systems and analyzes the characteristics of each type. Systems approach provides the theoretical framework for this study. First, the cluster analysis demonstrated the three types of the changes in the family subsystems due to housewives' Internet use: 'positive changes', 'negative changes', and 'no changes'. Second, there are different characteristics among the types of changes according to demographic, Internet-related, and intra-system dynamic factors. These results suggest several implications for public policy. To utilize the Internet as a useful tool to improve the quality of family life, housewives must have the ability to control the Internet use and to manage their resources. In order to enhance their abilities of using the Internet, it may be necessary for the government to provide public educational programs for housewives.

An Analysis on the Needs for the Mobile Internet Service (휴대인터넷 서비스에 대한 니즈[Needs]분석)

  • Joo, Young-Jin;Lee, Kwang-Hee
    • Journal of Digital Convergence
    • /
    • v.1 no.1
    • /
    • pp.235-253
    • /
    • 2003
  • In this research, we have developed a model that can explain the potential customer's needs for the potable Internet service, a concept with 'QoS guaranteed lower-price high speed mobile Internet service. Based on the developed model, we have also derived some empirical implications for the business firms interest in the potable Internet market. The developed model is incorporating a survey result, answering of potential customer's attitude for the portable Internet service, from the subscribers to the Internet service, wireless LAN service, and mobile Internet service. As a result, we have found that a very innovative group, such as wireless LAN users and 20's age group using mobile Internet service, could be the most attractive market segment. Moreover, the aspects of the service coverage and the price competitiveness at the service launching stage could be the most critical success factors for the portable Internet service.

  • PDF

A Scalable Cache Group Configuration Policy using Role-Partitioned Cache (캐쉬의 역할 구분을 이용한 확장성이 있는 캐쉬 그룹 구성 정책)

  • 현진일;민준식
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.3
    • /
    • pp.63-73
    • /
    • 2003
  • Today, in exponential growth of internet, the importance of file caching which could reduce the sun load, the volume of network traffic, and the latency of response has emerged. Actually, in one network, the traffic has reduced by using the cache and this means that file caching can improve the internet environment by cost a fraction of link upgrades. In this paper, we address a dynamic cache group configuration policy, to solve the scalable problem. The simulation result shows that the cache group using our proposal policy reduces the latency of response time and it means that out cache group configuration is more scalable than the static cache configuration.

  • PDF

Key Recovery Technology for Enterprise Information Infrastructure(EII) (기업 정보체계의 키 복구 기술)

  • 임신영;강상승;하영국;함호상;박상봉
    • The Journal of Society for e-Business Studies
    • /
    • v.4 no.3
    • /
    • pp.159-178
    • /
    • 1999
  • As Electronic Commerce is getting larger, the volume of Internet-based commerce by enterprise is also getting larger. This phenomenon applies to Internet EDI, Global Internet Business, and CALS information services. In this paper, a new type of cryptographic key recovery mechanism satisfying requirements of business environment is proposed. It is also applied to enterprise information infrastructure for managing employees' task related to handling official properties of electronic enterprise documents exchange. This technology needs to be complied to information management policy of a certain enterprise environment because behavior of cryptographic key recovery can cause interruption of the employees' privacy. However, the cryptographic key recovery mechanism is able to applied to any kind of information service, the application areas of key recovery technology must be seriously considered as not disturbing user's privacy It will depend on the policy of enterprise information management of a specific company.

  • PDF

Critical Success Factors of the Web-based Tax Invoice System in Korea

  • Shim, Tae Sup;Song, In Kuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4487-4507
    • /
    • 2016
  • Recently tax authorities in the world have been adopting advanced information technology over the Internet into their processes. Websites that enable filing tax returns and paying tax electronically have been implemented in many countries. However, the tax authorities have difficulties in forcing the mandatory system because taxpayers do not feel comfortable with readily capturing their incomes by the system. This study aims to provide a guideline for successful implementation of the mandatory e-tax invoice system. First, the study foucsed on investigating whether the Korean e-tax invoice system was implemented successfully. Secondly, the study assessed actions that might contribute to its successful implementation. The analyses identify that establishing a free website for small-sized taxpayers and providing various issuing systems for diverse taxpayers are critical for its success. The results also enable the tax administrations aspiring to introduce a mandatory system to emphasize some specific actions, which have significant effects on its desired purposes. Finally, this study presents the various policy implications that previous studies have not provided.

A Proposal on the Service Usage Context information based Extended Security Policy Framework in BYOD, Telework Environment (BYOD, 스마트워크 환경에서 확장된 이용 상황정보 기반 보안 정책 구조 제안)

  • Park, Hyun-Seung;Kang, Dong-Wan;Im, Chae-Tae
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.07a
    • /
    • pp.375-378
    • /
    • 2014
  • 예전 기업 그룹웨어 환경은 기업 소유의 기기을 활용하는 사내에 출근한 직원들 대상으로만 서비스 하였다. 그러나, 스마트폰 보급이 확대되면서 사외에서 기업내부로 접근하여 그룹웨어 등을 활용할 수 있는 스마트워크 서비스가 발전하였다. 또한 사내로 반입된 개인 소유 단말 기기가 그룹웨어 서비스를 접속할 수 있는 BYOD 도입 기업들이 증가하고 있다. BYOD, 스마트워크 환경에서 기기 접속 위치, 시간 등 다양한 접속 상황을 활용한 보안정책 관리 구조를 연구하였다. 본 논문에서는 서비스 접속 이후 보안에 취약한 서비스 접근 상황정보 중심 보안정책의 한계를 개선하기 위하여 서비스 웹/DB 서비스 이용 상황정보 기반 보안정책 구조를 제안한다.

  • PDF

A Policy-driven RFID Device Management Model (정책기반 RFID 장치 관리 모델)

  • Lee, Woo-Sik;Kim, Nam-Gi
    • Journal of Internet Computing and Services
    • /
    • v.13 no.1
    • /
    • pp.75-81
    • /
    • 2012
  • Previous RFID systems exclusively manage the tags and readers for each company in individual manner. Thus, RFID system manager should understand and design specifications such as tag events, data format, and etc, based on individual companies. But it is very difficult to know all statements. To resolve theses problems, there has been conceptual research about policy-based RFID service management model that is not restrained from standards of typical RFID systems, including EPCglobal standard, and ISO/IEC standard. However, previous proposed service management model only aimed event management without including device management. Therefore, in this paper, we propose extended device management policy model for giving shape to the proposed policy-based RFID service management model. If the proposing device management policy model is used for device management, we can integrate control management for heterogeneous middleware, diverse RFID devices, and applications for each company. Moreover, we show that the RFID device management policy is translated and processed as an example using the proposing policy model in real-time RFID system.

Policy Management for BGP Routing Convergence Using Inter-AS Relationship

  • Jeong, Sang-Jin;Youn, Chan-Hyun;Park, Tae-Sang;Jeong, Tae-Soo;Lee, Daniel;Min, Kyoung-Seon
    • Journal of Communications and Networks
    • /
    • v.3 no.4
    • /
    • pp.342-350
    • /
    • 2001
  • The Internet routing instability, or the rapid fluctuation of network reachability information, is an important problem currently facing the Internet engineering community. High levels of network instability can lead to packet loss, increased network latency, and delayed routing convergence. At the extreme, high levels of routing instability can lead to the loss of internal connectivity in wide-area networks. In this paper, we investigate the variation of domain degree and domain count of the inter-domain network over time by using linear regression model in order to analyze the topology variation of inter-domain network. We Also propose an efficient policy management model to reduce the instability in the inter-domain routing system. The proposed model can be used to identify whether a routing policy is adequate to reduce convergence time that is required to return to a normal state when BGP routing instability happens. Experimental analysis shows that the proposed model can be used to set up routing policy in domains for the purpose of minimizing the effects and the propagation of BGP routing instability.

  • PDF