• 제목/요약/키워드: Internet Public Services

검색결과 475건 처리시간 0.035초

구강관리에 대한 인터넷 상담 실태조사 (Research on Internet Counselling for Oral Health)

  • 김민자;양희정
    • 보건의료산업학회지
    • /
    • 제7권3호
    • /
    • pp.251-260
    • /
    • 2013
  • The purpose of this study was to make a comparative analysis of dental question and answer in portal sites. To achieve this, 4,212 questions were used for final analysis after connecting to Naver, Daum and Nate, which take first, second and third place in rank information of all sites at Rankey.com, to search dental information by keyword from January to late March. The results are as follows. Naver was the highest as a portal of Internet search engines. Questions on the use of dental clinics, the quality of dental services and the offer of dental services by types of dental clinics were very important. Dental clinics had to give dental patients customized services and information to please them through dental services and dental information services on the Internet, and questions and answers on this were increasing very explosively. Consequently, Dental clinics will have to give Internet users and health- and disease-related data searchers distinctive professional services by inquiring into factors affecting portal search and factors affecting health- and disease-related search, respectively.

Development of Security Service for Mobile Internet Banking Using Personal Digital Assistants

  • Choo, Young-Yeol;Kim, Jung-In
    • 한국멀티미디어학회논문지
    • /
    • 제7권12호
    • /
    • pp.1719-1728
    • /
    • 2004
  • The fusion of Internet technology and applications with wireless communication provides a new business model and promises to extend the possibilities of commerce to what is popularly called mobile commerce, or m-commerce. In mobile Internet banking service through wireless local area network, security is a most important factor to consider. We describe the development of security service for mobile Internet banking on Personal Digital Assistants (PDAs). Banking Server and Authentication Server were developed to simulate banking business and to support certificate management of authorized clients, respectively. To increase security, we took hybrid approach in implementation: symmetric block encryption and public-key encryption. Hash function and random number generation were exploited to generate a secret key. The data regarding banking service were encrypted with symmetric block encryption, RC4, and the random number sequence was done with public-key encryption. PDAs communicate through IEEE 802.IIb wireless LAN (Local Area Network) to access banking service. Several banking services and graphic user interfaces, which emulatedthe services of real bank, were developed to verity the working of each security service in PDA, the Banking Server, and the Authentication Server.

  • PDF

미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기 (Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law)

  • 김기창
    • 인터넷정보학회지
    • /
    • 제14권3호
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

PKI를 이용한 인스턴트 메신저에서의 인증 시스템 설계 (A Design of the Certification System in a Instantant Messenger Using PKI)

  • 박수영;최광미;정채영
    • 한국정보통신학회논문지
    • /
    • 제10권1호
    • /
    • pp.142-147
    • /
    • 2006
  • 컴퓨터와 네트워크의 보급이 일반화되면서 인터넷을 통한 정보 전달이 일상생활처럼 되고 있다. 기존에는 정보를 전달하기 위한 방법이 주로 전자메일에 한정되어 있던 것에 반해, 요즘은 좀 더 즉각적으로 메시지를 전달해주는 인스턴트 메신저를 많이 사용하고 있다. 인스턴트 메신저는 이러한 장점으로 인해 국내에서도 사용자가 많이 늘고 있다. 그러나 대부분의 인스턴트 메신저 서비스는 인터넷상에서 많은 부분이 노출되지만 클라이언트는 이를 느끼지 못한 채 사용하고 있다. 이는 마치 전화도청과 같다고 할 수 있다. PKI를 사용한 암호화 기술은 인테넷에서 접근 통제, 인증, 기밀성, 무결성, 부인거절 등의 서비스들을 제공할 수 있는 공개키 기반 구조를 발달시켜 왔다. 본 논문에서는 인스턴트 메신저의 안전한 통신을 위해 PKI(공개키 기반구조)를 이용한 인스턴트 메신저에서의 인증 프로토콜에 대해 설계하였다.

동적 IP Address를 사용하는 인터넷 서버 구축을 위한 게이트웨이 (The Gateway for Internet Server Implementation using Dynamic IP Address)

  • 김원중;양현택
    • 정보처리학회논문지D
    • /
    • 제9D권1호
    • /
    • pp.145-152
    • /
    • 2002
  • 현재 대부분의 가정이나 소규모 기업에서는 인터넷 서비스를 이용하기 위하여 ADSL(Asymmetric Digital Subscriber Line)나 케이블모뎀을 사용한다. 4바이트로 구성되는 현재의 인터넷 IP 주소체계(IPv4)에서는 할당 가능한 IP 주소가 부족하여, 동적으로 공인(Public) IP 주소를 할당하는 방식을 사용하고 있다. 이러한 동적인 IP 주소를 할당받는 시스템은 모든 인터넷 서비스를 이용하는 데에는 아무런 제약이 없지만, 자신이 각종 인터넷 서버 기능을 수행하는 데는 많은 문제점이 있다. 본 논문에서는 동적으로 변하는 IP 주소를 가진 시스템에서 인터넷 서버 서비스(Telnet, FTP, HTTP, Mail 등)가 가능하도록 하는 게이트웨이(Gate-D)를 설계하였으며, 실험적으로 Gate-D를 이용한 Telnet 서버의 구축을 통하여 유용성을 확인하였다.

전자정부 대국민 정보서비스 효율성 분석을 통한 벤치마킹 설계 (Design of the Benchmark through the Efficiency Analysis of Public Information Services of E-government)

  • 신승효;김승희;김우제
    • 한국IT서비스학회지
    • /
    • 제12권3호
    • /
    • pp.405-420
    • /
    • 2013
  • The purpose of this paper is to develop an evaluation model for e-government system in Korea which is one of world best practices of e-government systems. We have presented a method to perform an efficiency analysis of each e-government service which in a component of e-government system in Korea and to establish a benchmark target for each e-government service. To do this, the output-oriented DEA(Data Envelopment Analysis) CCR model was performed for the selected 12 e-government public services of Korean e-government system in this paper. As a result of DEA analysis, first the internet civil appeal support service, the employment comprehensive information service, and the company support information service were evaluated as the efficient solutions among the 12 e-government public services. Second the remaining 9 e-government public services were evaluated as the inefficient information services which should be improved in terms of their service levels. Finally the benchmark targets for the inefficient e-government services were suggested to improve those inefficient systems through DEA analysis.

공공도서관의 정보검색대행서비스를 위한 서비스모형화 및 기대효과에 관한 연구 (A Study on Service Modeling for IR Agency Service in a Public Library and Its Expectations)

  • 김용;김태경
    • 한국문헌정보학회지
    • /
    • 제40권1호
    • /
    • pp.195-215
    • /
    • 2006
  • 정보기술과 인터넷의 발전은 정보의 대량생산과 함께 정보검색의 대중화를 가져왔으며, 검색포털사이트의 성장은 정보이용자들에게 정보를 획득할 수 있는 유일한 정보원으로서의 도서관에 대한 인식의 변화를 가져 왔다. 이용자들은 검색포털사이트를 보다 편리하고 다양한 정보를 획득할 수 있는 효과적인 정보원으로 각인하고 선호하게 되었다. 이러한 사회환경의 변화 속에서 도서관과 사서는 이용자의 정보요구에 보다 적극적이고 현실성 있는 정보서비스를 제공함으로써 그 사회적 역할과 위상을 정립하고 진일보할 수 있는 도전과 기회로 삼아야 할 것이다. 이를 위하여 본 연구에서는 도서관, 특히 공공도서관의 적극적인 정보서비스 방안으로서 정보검색대행서비스를 제안하고, 이러한 서비스의 가능성과 기대효과를 정보이용자에 대한 직접 설문을 통하여 조사하였다. 특히 대부분의 이용자들이 친숙하고 편리하게 이용할 수 있는 전화와 PDA등을 활용한 정보서비스에 대한 가능성 및 방법론에 대하여 제안하고자 한다.

공공도서관의 소비자건강정보서비스에 대한 이용자인식 조사연구 (An Analysis of Users' Perception of Providing CHI Services in Public Libraries)

  • 노영희;오상희
    • 한국도서관정보학회지
    • /
    • 제42권3호
    • /
    • pp.45-77
    • /
    • 2011
  • 본 연구에서는 공공도서관 이용자들을 대상으로 설문조사를 수행함으로써 이용자들의 일반적인 건강정보 획득경로, 공공도서관에서 CHI 서비스를 제공하는 것에 대한 이용자의 인식, 이용자들의 인식에 영향을 미치는 요인 등을 분석하였으며 그 결과는 다음과 같다. 1) 국내 공공도서관 이용자들의 90% 정도가 CHI 정보원을 획득하는 경로로 공공도서관을 크게 고려하고 있지 않았다. 2) 공공도서관에서 CHI 서비스를 제공하는 것에 대해 60%의 이용자가 필요하다고 생각하고 있다. 3) 공공도서관에서 CHI 서비스를 제공하는 것의 필요성에 대해, 이용자들의 인식에 영향을 미치는 요인은 건강에 대한 관심도, 하루 인터넷 사용 시간 등이었다. 4) 공공도서관이 CHI 서비스를 제공하는 것에 대해 사서와 이용자 간에 인식차이가 있는지를 분석한 결과, 공공도서관에서 CHI 서비스를 제공하는 것에 대한 유의한 인식차이가 없이 두 집단 모두 공공도서관에서 CHI 서비스를 제공해야 한다는 필요성을 높게 느끼고 있었다.

The Establishment of Security Strategies for Introducing Cloud Computing

  • Yoon, Young Bae;Oh, Junseok;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권4호
    • /
    • pp.860-877
    • /
    • 2013
  • Cloud computing has become one of the most important technologies for reducing cost and increasing productivity by efficiently using IT resources in various companies. The cloud computing system has mainly been built for private enterprise, but public institutions, such as governments and national institutes, also plans to introduce the system in Korea. Various researches have pointed to security problems as a critical factor to impede the vitalization of cloud computing services, but they only focus on the security threats and their correspondents for addressing the problems. There are no studies that analyze major security issues with regard to introducing the cloud computing system. Accordingly, it is necessary to research the security factors in the cloud computing given to public institutions when adopting cloud computing. This research focuses on the priority of security solutions for the stepwise adoption of cloud computing services in enterprise environments. The cloud computing security area is classified into managerial, physical and technical area in the research, and then derives the detailed factors in each security area. The research derives the influence of security priorities in each area on the importance of security issues according to the identification of workers in private enterprise and public institutions. Ordered probit models are used to analyze the influences and marginal effects of awareness for security importance in each area on the scale of security priority. The results show workers in public institutions regard the technical security as the highest importance, while physical and managerial security are considered as the critical security factors in private enterprise. In addition, the results show workers in public institutions and private enterprise have remarkable differences of awareness for cloud computing security. This research compared the difference in recognition for the security priority in three areas between workers in private enterprise, which use cloud computing services, and workers in public institutions that have never used the services. It contributes to the establishment of strategies, with respect to security, by providing guidelines to enterprise or institutions that want to introduce cloud computing systems.

안전한 인터넷 경매시스템 설계 (Design of an Secure Internet Auction System)

  • 박진호;안성진
    • 융합보안논문지
    • /
    • 제2권1호
    • /
    • pp.69-76
    • /
    • 2002
  • 인터넷이 보다 대중화되면서 웹을 통한 다양한 서비스가 창출되고 있다. 경매분야도 예외는 아니어서 현재 국내외의 여러 사이트에서 인터넷 경매가 활발하게 진행중이다. 그러나, 대부분의 인터넷 경매시스템은 보안기능이 취약해서 사용자에게 큰 피해를 초래할 수 있다. 본 논문에서는 사용자에게 보다 안전하면서 편리한 인터넷 경매 환경을 제공하기 위한 안전한 인터넷 경매시스템을 설계하였다.

  • PDF