• Title/Summary/Keyword: Internet access

Search Result 2,642, Processing Time 0.028 seconds

A Geographical Study on Characteristics of Political Activities in Cyberspace and Interrelationship between Online and Offline: A case of South Korea's Presidential Election in 2012 (가상공간에서의 정치 활동의 특징과 오프라인 환경과의 연계성에 대한 지리적 고찰: 2012년 대통령 선거를 사례로)

  • Park, Sookyung
    • Journal of the Korean Geographical Society
    • /
    • v.48 no.5
    • /
    • pp.686-708
    • /
    • 2013
  • The goal of this investigation is to examine the matter as to how various cyberpolitical activities such as on-line civic participation, cyber parties, development and movement of civil society networks are appeared in cyberspace; and how political activities in cyberspace are associated with offline environment. This research was based on in-depth and open-ended interviews centering around 20s (32 interviewees) and the major results are as in the following. First, in terms of on-line civic participation, searching political issues occur in places, where internet users can access information easily relatively, and creating or reconstructing political information is identified in places giving stability or affinity to the public society. Second, even though each party's homepage for the channel of cyber parties has enough capacity as bridgespace, which takes charge of supporting f lows of people, goods, capital, and ideas, most of them don't play a role to establish virtual or real networks. Exceptively, cyber parties contribute to make temporalized places, where nobody takes the responsibility, somewhat. Third, the development and movement of civil society networks is divided into several segments according to political interests and tendency in online; furthermore, such a cyberpolitical activity influences human networks and the decision of major places for political activities in offline.

  • PDF

Factors Associated with Dependence among Smartphone-Dependent Adults in Their 20s (스마트폰에 의존하는 20대 성인의 의존 관련 요인)

  • Park, Jeong-Hye
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.6
    • /
    • pp.366-373
    • /
    • 2020
  • This study explored the factors associated with dependence among smartphone-dependent adults in their 20s. The data was derived from the 2017 survey on smartphone over-dependence conducted by the Ministry of Science and ICT and the National Information Society Agency. The participants were 879 adults in their 20s. The data was analyzed by frequencies, percentages, means, standard deviations, independent t-tests, Pearson's correlation coefficients, and multiple regression analysis. The results revealed instant messengers as the most used application by participants. Participants in the high risk category of dependence also used SNS (Social Networking Services), music, and games more than those in the potential risk category. The more serious the dependence, the greater the frequency of smartphone use (β=.16, p=.000), and use of games (β=.10, p=.028), webtoons (β=.14, p=.004), SNS (β=.09, p=.047), and financial transactions (β=.17, p=.000). They did not recognize their smartphone dependence when it was relatively low. However, when this became serious, they then realized that they depended on the smartphone more than others. That means that it is not easy for adults to recognize their smartphone dependence on their own. However, recognition of the problem is the first step for adults to solve their problems. A program that evaluates their problematic smartphone use should be installed and used on all smartphones.

A self-portrait of the information society: An Arguments on the SNS users' Responsibilities

  • Seo, Ran-Sug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.159-172
    • /
    • 2020
  • Social networking services (SNS) are developing significantly with the Internet and smartphones. It's a friendly social media, but if you think deeply about it, you'll find that it has a variety of faces. It is a communication tool between users, a medium for delivering information, an infrastructure for providing applications, and a community where people with common interests gather. In recent years, business tools, shopping and payment methods are also being swallowed. The influence of the spread of SNS on the real world is also expanding, and the work being dealt with from a sociological perspective is also increasing. Also, if you pay attention to the technical aspects of SNS, it is composed of various technical elements, such as infrastructure that handles large-scale access, user interface that supports comfortable use, and big data analysis to understand people's behavior more deeply. However, I usually use it as usual. However, if you look through SNS, you can see that the situation is surprisingly profound and multifaceted. This study began by looking at the history and current status of SNS and attempted to find its status through comparison with other media. From the point of view of relationship with society, it can be a risk and legal issue when using SNS, such as crimes using bad social media or social media. It is also necessary to comment on the activities on SNS or the guidelines established by the operators. Therefore, various legal issues on SNS will be discussed. Also, as an example of using SNS, I will introduce an example of using SNS in disaster response. From a more technical point of view, you will receive commentary on SNS's network-based technology and SNS's information use, and these articles will help you understand and use SNS safely and help you further utilize or develop SNS.

Research on WINC expansion numbers to improve the accessibility of mobile web service (모바일 웹 서비스 접근성 향상을 위한 WINC 확장 번호에 대한 연구)

  • Sim, Keun-Ho;Ko, He-Eae;Kim, Jong-Keun;Zhao, Meihua;Lim, Young-Hwan
    • Journal of Digital Contents Society
    • /
    • v.12 no.1
    • /
    • pp.23-32
    • /
    • 2011
  • For the past few years, unlike wireless widespread United States and Japan, expensive cost and platform of the mobile web carrier underground and self-centered made achievement of domestic mobile web market sluggish. Nowadays, more and more people pay attention to the mobile web service because of the increased quality of wireless internet, development of mobile device and variety of the flat-rate payment system. However, another big problem is that mobile web is too hard to use. Also, the poor content of mobile web service is an extremely serious problem. In this paper, we put forward a new method for easy to access mobile web service which is use WINC expansion numbers and users can use these numbers to shit their own website. Along with the benefits of purchase WINC number general users are able to make website and control their website at less time and energy.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

Internet Service Paradigm Shift Driven by Emergence of Open Social Networking Service: Focusing on Facebook (개방형 소셜 네트워킹 서비스 플랫폼 출현에 따른 인터넷 서비스 시장의 패러다임 변화 : Facebook을 중심으로)

  • Yoon, Young-Seog;Choi, Mun-Kee;Kim, Sang-Kwon;Lee, Hyun-Jin;Cho, Kee-Sung
    • Journal of Service Research and Studies
    • /
    • v.1 no.1
    • /
    • pp.29-48
    • /
    • 2011
  • Recently not only industry but also academy have shown an intense interest in social networking service. However, reckless imitation will not guarantee the successful eco-system of social networking service without rich understanding of growth driver and business model. Hence, this study aims at analyzing open platform strategy and business model conducted by a representative social networking service provider in order to provide platform operator, network operator, and portal provider with meaningful implications. Advertisers may pay great attention to social networking service because it has strong ability to provide users with spontaneous motivation to manage and update their profile, and these valuable information can be utilized for providing personalized advertisement on social networking service. As a result, one side of consumers in two side market, advertisers, tend to pay more expenditure to place advertisements. In addition, the open platform adopted by social networking service providers causes pro-sumers to participate in the eco-system, and thereby the explosive quantitative growth is realized. The fact of that this open social networking service can invade other web service area via an unified platform indicates that it may expand its service scope into a wide variety of web service areas. Hence, domestic portal services providers and network providers should consider social networking service not as one of new web services but as an disruptive service platform. Corresponding to the emergence of social networking service, especially if their business area is related to display advertising market, they should seek a way to provide social networking service access users's newly updated information and develop innovative media technologies to enter context awareness ads market.

  • PDF

The Reinterpretation of Comic-Animation by Content Users - The Reproductions in Korean Cosplay Culture (콘텐츠 유저에 의한 만화-애니메이션의 재해석에 관한 연구 - 한국 코스프레 문화에서의 재생산)

  • Yoon, Wn-Ho
    • Cartoon and Animation Studies
    • /
    • s.41
    • /
    • pp.487-510
    • /
    • 2015
  • In recently, thanks to the development of computer and internet, and reinforcement of digital media literacy of ordinary people, many users of comics and animations recombine contents into various ways, including UCCs. In a glance, it seems these outputs violates the copyrights of contents. But in reality, they helps the growth of the ecosystem of contents market, with increase of contents users. The reason of these reproductions inclines the characteristics of animation media. Animation, which are constituted by plastic symbols, auditory symbols, and narrative symbols, and Comic, which supports stories of Animations, affects as 'Imaginary signifier'. These signifiers helps users of contents to dismantle and reassemble stories. These aspects are seen in doujin culture, animation soundtrack fandom, and voice actor fandom. But In this article, we will concentrate into cosplay culture. Cosplay culture shows more active appearances than another fandoms. In especially, cosplay stage and daily cafe show more active reproductions of characters and communications. However, they are done by youth fans, which has not enough financial abilities: therefore, events are not sustainable and discontinued. And they have another limits, like lack of opportunity of performance. In the reality of Korean society, which needs of community making by community member, and hybrid culture, comics and animation productions in Korea are in need of access positively and encourage reproductions of active receivers of animations.

Effect of IT Education on On-Line Social Relationship of Older Adults (정보화 교육이 노인의 온라인 사회관계에 미치는 영향)

  • Yoon, Hyunsook;Lee, Othelia;Beum, Kyoungah;Gim, Yeongja
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.5
    • /
    • pp.283-294
    • /
    • 2015
  • The study examines the effect of IT education on on-line social relationship of older adults. The study group composed of 114 older adults who received IT education (computer class, internet class, and smart-phone class) at two community welfare centers in Seoul. In order to compare the effect of IT education of the study group, the control group who did not receive any IT education was recruited (N = 30). Social Capital Scale was used to measure on-line social relationship. The on-line social relationship was composed of social bonding type and social bridging type. Results showed that the study group significantly higher scores than did the control group on three subscales (emotional support, access to scare or limited resources, and out-group antagonism) of social bonding type except one subscale (ability to mobilize solidarity). With regard to social bridging type of social relationship, the study group significantly higher scores that did the control group on all four subscales (outward looking, contact with a broad rage of people, a view of oneself as part of a broader group, and diffuse reciprocity with a broader community). The findings highlight the importance of IT education for older adults to expand and increase social bonding and social bridging of social relationship.

A Study on the Web-based Map Algebraic Processor (웹 기반 지도대수 처리기에 관한 연구)

  • 박기호
    • Spatial Information Research
    • /
    • v.5 no.2
    • /
    • pp.147-160
    • /
    • 1997
  • "The "Map Algebra", beeing recognized as a viable theoretical framework for GIS (Geographica Infonnation System), models map layers as "operands" which are the basic unit of geo-processing, and a variety of GIS commands as "operators." In this paper, we attempt at lifting some limitations of map algebras proposed in GIS literature. First, we model map layer as "function" such that we may employ the notion of meta operator (or, higher-order funtion) available in the functional programming paradigm. This approach provides map algebraic language with "programmability" needed in GIS user language. Second, we extend the semantics of, and improve on the sytactic structure of map algebraic language. Mer the data model and language associated with map algebra are formalized, we proceed to design and implement a prototype of map algebraic processor. The parser of the language in our prototype plays the role of transforming the native and heterogeneous user language of current GISs into a canonical map algebraic language. The prototype, named "MapSee" is a proof-of-concept system for the ideas we propsed in this paper. We believe that the uniform interface based on the map algebraic language will make promising infrastructure to support "Internet GIS." This is because the uniform but powerful interface through the Web clients allow access to both geo-data and geo-processing resources distributed over the network.to both geo-data and geo-processing resources distributed over the network.

  • PDF

QoS-Guaranteed IP Mobility Management For Fast Moving Vehicles Using Multiple Tunnels (멀티 터널링을 이용한 고속 차량에서 QoS 보장 IP 이동성 관리 방법)

  • Chun, Seung-Man;Nah, Jae-Wook;Park, Jong-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.48 no.11
    • /
    • pp.44-52
    • /
    • 2011
  • In this article, we present a QoS-guaranteed IP mobility management scheme of Internet service for fast moving vehicles with multiple wireless network interfaces. The idea of the proposed mechanism consists of two things. One is that new wireless connections are established to available wireless channels whenever the measured data rate at the vehicle equipped with mobile gateway drops below to the required data rate of the user requirement. The other is that parallel distribution packet tunnels between an access router and the mobile gateway are dynamically constructed using multiple wireless network interfaces in order to guarantee the required data rate during the mobile gateway's movement. By doing these methods, the required data rate of the mobile gateway can be preserved while eliminating the possible delay and packet loss during handover operation, thus resulting in the guaranteed QoS. The architecture of the IETF standard HMIPv6 has been extended to realize the proposed scheme, and detailed algorithms for the extension of HMIPv6 has been designed. Finally, simulation has been done for performance evaluation, and the simulation results show that the proposed mechanism demonstrates guaranteed QoS during the handover with regard to the handover delay, packet loss and throughput.