• Title/Summary/Keyword: Internet service attributes

Search Result 115, Processing Time 0.034 seconds

The Study on the Evaluation Factor for Security of Age Verification Information (연령 검증정보의 안정성을 위한 평가인자에 대한 연구)

  • Kim, Tae Kyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.127-132
    • /
    • 2014
  • Some laws and regulations may require internet service providers to provide services based on the age of users. Age verification in the online environment should be used as a tool to provide service that is appropriate to child based on age. Using the minimum attribute information, processes on age verification provides the proper guidance to the internet services. However, there is a lack of a globally accepted trust framework for age verification process including evaluation factors for age verification information. In this paper the federation model of user attributes were described and evaluation factors for the age verification information were suggested. Also using the suggested evaluation factors, performance evaluation of federation model of user evaluation was performed. To meet the requirements of evaluation factors, framework of federation model should consider the unlinkability pseudonym support, eavesdropping protection and cloning protection.

The Moderating Role of Site Usage Experience in Internet Users' Decision on Personal Information Disclosure (개인정보제공 의사결정에 있어서 사이트 이용경험의 조절효과에 대한 연구)

  • Lee, Dong-Joo
    • Informatization Policy
    • /
    • v.19 no.2
    • /
    • pp.21-38
    • /
    • 2012
  • The proliferation of the Internet and the advent of e-commerce have amplified public concerns about privacy. Accordingly, much research effort has been made on the issue. While existing research on online information privacy has usually focused on the examination of antecedents of personal information disclosure, the literature has not paid attention to the potential changes of the antecedents' effects depending on the user's experience of the service. The current study aims to investigate the moderating role of site usage experience in Internet users' decision on personal information disclosure. Specifically, this study considers two types of antecedents of personal information disclosure on a site - the attributes of personal information requested (sensitivity and relevance of information) and the value of the service provided by the site; and examines how the effects of the antecedents on the disclosure intention are affected by the users'experience of the site. Our analysis of the data gathered through a web-based experiment reveals that site usage experience moderates the relationship between the attributes of personal information and disclosure intention. While usage experience attenuates the negative effect of information sensitivity on disclosure intention, it intensifies the positive impact that relevance of information has on disclosure intention. Based on the analysis results, we provide implications for the mitigation of the Internet users' privacy concerns as well as theoretical implications.

  • PDF

A novel classification approach based on Naïve Bayes for Twitter sentiment analysis

  • Song, Junseok;Kim, Kyung Tae;Lee, Byungjun;Kim, Sangyoung;Youn, Hee Yong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.2996-3011
    • /
    • 2017
  • With rapid growth of web technology and dissemination of smart devices, social networking service(SNS) is widely used. As a result, huge amount of data are generated from SNS such as Twitter, and sentiment analysis of SNS data is very important for various applications and services. In the existing sentiment analysis based on the $Na{\ddot{i}}ve$ Bayes algorithm, a same number of attributes is usually employed to estimate the weight of each class. Moreover, uncountable and meaningless attributes are included. This results in decreased accuracy of sentiment analysis. In this paper two methods are proposed to resolve these issues, which reflect the difference of the number of positive words and negative words in calculating the weights, and eliminate insignificant words in the feature selection step using Multinomial $Na{\ddot{i}}ve$ Bayes(MNB) algorithm. Performance comparison demonstrates that the proposed scheme significantly increases the accuracy compared to the existing Multivariate Bernoulli $Na{\ddot{i}}ve$ Bayes(BNB) algorithm and MNB scheme.

Exception based Dynamic Service Coordination Framework for Web Services (웹 서비스를 위한 예외 상황 기반 동적 서비스 연결 프레임워크)

  • Han Dong-Soo;Lee Sung-Doke;Jung Jong-Ha
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.8
    • /
    • pp.668-680
    • /
    • 2006
  • Web services on the Internet are not always reliable in terms of service availability and performance. Dynamic service coordination capability of a system or an application invoking Web services is essential to cope with such unreliable situations. In dynamic service coordination, if a Web service does not respond within a specific time constraint, it is replaced with another Web service at run time for reliable invocation of Web services. In this paper, we develop an exception based dynamic service coordination framework for Web services. In the framework, all necessary information for dynamic service coordination is explicitly specified and summarized as a set of attributes. Then classes and workflows, supporting dynamic service coordination and invoking Web services, are automatically created based on these attributes. Developers of Web services client programs can make the invocations of Web services reliable by calling the methods of the classes. Some performance loss has been observed in the indirect invocation of a Web service. However, when we consider the flexibility and reliability gained from the method, the performance loss would be acceptable in many cases.

The Future of the New Mobile Telecommunication Terminal in the View of the Consumers' Preferences (소비자 선호 관점에서 본 차세대 무선 이동통신 단말기의 미래)

  • 김연배;이정동;고대영;김태유
    • Journal of Technology Innovation
    • /
    • v.12 no.1
    • /
    • pp.189-218
    • /
    • 2004
  • In this paper, we estimate consumers' preferences for the key attributes of the future mobile telecommunication terminal using conjoint analysis. For statistical model, we estimate the mixed legit model which can reflect the heterogeneity of consumers' preferences, using the Bayesian approach with Gibbs sampling. The results show that there are large variations in consumers' preferences for the attributes of the future mobile telecommunication terminal, which justifies our using of mixed logit model. Also, the results show that most consumers prefer the medium size display and keyboard as input equipment. Additionally, far from general prediction, the results show that many consumers are indifferent to whether the future mobile telecommunication terminal is able to provide high quality internet service or not, and to operate many application programs and programs originally designed for PC. From those results, we can obtain some important implications for the R&D strategies. Additionally, the results on the heterogeneity of consumers' preferences reveal that it is possible that the complete device convergence may not happen.

  • PDF

Attribute based User Authentication for Contents Distribution Environments

  • Yoo, Hye-Joung
    • International Journal of Contents
    • /
    • v.8 no.3
    • /
    • pp.79-82
    • /
    • 2012
  • In digital contents distribution environments, a user authentication is an important security primitive to allow only authenticated user to use right services by checking the validity of membership. For example, in Internet Protocol Television (IPTV) environments, it is required to provide an access control according to the policy of content provider. Remote user authentication and key agreement scheme is used to validate the contents accessibility of a user. We propose a novel user authentication scheme using smart cards providing a secure access to multimedia contents service. Each user is authenticated using a subset of attributes which are issued in the registration phase without revealing individual's identity. Our scheme provides the anonymous authentication and the various permissions according to the combination of attributes which are assigned to each user. In spite of more functionality, the result of performance analysis shows that the computation and communication cost is very low. Using this scheme, the security of contents distribution environments in the client-server model can be significantly improved.

An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service (개인용 클라우드 서비스에 대한 중국 사용자의 지속적 사용의도에 관한 실증 연구)

  • Yu, Hexin;Sura, Suaini;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.79-93
    • /
    • 2015
  • With the rapid development of information technology, the ways of usage have changed drastically. The ways and efficiency of traditional service application to data processing already could not satisfy the requirements of modern users. Nowadays, users have already understood the importance of data. Therefore, the processing and saving of big data have become the main research of the Internet service company. In China, with the rise and explosion of 115 Cloud leads to other technology companies have began to join the battle of cloud services market. Although currently Chinese cloud services are still mainly dominated by cloud storage service, the series of service contents based on cloud storage service have been affirmed by users, and users willing to try these new ways of services. Thus, how to let users to keep using cloud services has become a topic that worth for exploring and researching. The academia often uses the TAM model with statistical analysis to analyze and check the attitude of users in using the system. However, the basic TAM model obviously already could not satisfy the increasing scale of system. Therefore, the appropriate expansion and adjustment to the TAM model (i. e. TAM2 or TAM3) are very necessary. This study has used the status of Chinese internet users and the related researches in other areas in order to expand and improve the TAM model by adding the brand influence, hardware environment and external environments to fulfill the purpose of this study. Based on the research model, the questionnaires were developed and online survey was conducted targeting the cloud services users of four Chinese main cities. Data were obtained from 210 respondents were used for analysis to validate the research model. The analysis results show that the external factors which are service contents, and brand influence have a positive influence to perceived usefulness and perceived ease of use. However, the external factor hardware environment only has a positive influence to the factor of perceived ease of use. Furthermore, the perceived security factor that is influenced by brand influence has a positive influence persistent intention to use. Persistent intention to use also was influenced by the perceived usefulness and persistent intention to use was influenced by the perceived ease of use. Finally, this research analyzed external variables' attributes using other perspective and tried to explain the attributes. It presents Chinese cloud service users are more interested in fundamental cloud services than extended services. In private cloud services, both of increased user size and cooperation among companies are important in the study. This study presents useful opinions for the purpose of strengthening attitude for private cloud service users can use this service persistently. Overall, it can be summarized by considering the all three external factors could make Chinese users keep using the personal could services. In addition, the results of this study can provide strong references to technology companies including cloud service provider, internet service provider, and smart phone service provider which are main clients are Chinese users.

Dominance-Based Service Selection Scheme with Concurrent Requests

  • Tang, Chaogang;Li, Qing;Xiong, Yan;Wen, Shiting;Liu, An;Zhong, Farong
    • Journal of Computing Science and Engineering
    • /
    • v.6 no.2
    • /
    • pp.89-104
    • /
    • 2012
  • In dynamic Web service environments, the performance of the Internet is unpredictable; the reliability and effectiveness of remote Web services are also unclear. Therefore, it can hardly be guaranteed that the quality of Web service (QoWS) attributes of Web services do not fluctuate with the dynamic Web service environments. When a composite service is planned in the context of dynamic service environments, there is another aspect which has not been taken into account by existing works, namely, concurrency - the fact that multiple requests to a composite service may arrive at the same time. Considering the dynamics of Web service environments and concurrency of requests, we propose in this paper a service selection scheme which adopts top-k dominating queries to generate a composition solution rather than only select the best composition solution for a given request. The experimental results have investigated the efficiency and effectiveness of our approach and shown that it outperforms baseline and traditional methods for service selection.

A Study on Calculating the Fee Range of Broadcasting Contents : Focus on IPTV

  • Shin, Minsoo;Kil, Jinho;Bae, Seonghoon
    • Journal of Information Technology Applications and Management
    • /
    • v.22 no.2
    • /
    • pp.43-70
    • /
    • 2015
  • Concerns have been growing about whether domestic internet protocol television (IPTV) can establish a solid foothold in the pay TV market, largely because of the lack of IPTV-only content and service differentiation. It has been difficult for IPTV providers to attract valuable PPs (program providers) to strengthen their positions, and IPTV providers have invested much money into procuring content. To survive this difficult situation, IPTV providers need to reappraise their profit sharing methods and content distribution structure to facilitate the expansion of their subscriber base. This can be done by attracting valuable PPs to IPTV providers and securing extra revenue by distributing more content for their PP partners. The IPTV industry has a different structure and value chain from the digital cable industry. Moreover, profit sharing schemes among participants in the IPTV industry are complicated. Thus it is essential to analyze the criteria for profit sharing, the selection of attributes in profit sharing, and their cause-effect relationship in developing fair pricing for broadcast content in the IPTV industry. This study introduces the attributes that need to be considered for the pricing of content and profit sharing among IPTV providers and PPs. In addition, this study uses system dynamics to analyze the relationship among those attributes along with additional associated factors for the pricing of content.

A Study on Smartwatch review data of SNS and sentiment analytical using opinion mining (스마트워치 SNS 리뷰 데이터와 오피니언 마이닝을 통한 감성 분석 처리에 대한 연구)

  • Shin, Donghyun;Choi, YongLak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.1047-1050
    • /
    • 2015
  • Wearable device, along with IoT(Internet of Things), is considered the core of upcoming generation's convergence technology. Companies are intensely competing one another for prior occupation in the smartwatch market. Consumers that use smartwatch express their preferences by sharing their opinions through SNS(Social Networking Service). Through this study, emotions dictionary is built, which consists of attributes and emotional words related to smartwatch. Based on the emotions dictionary, SNS data has been categorized according to the attributes through opinion data model. Afterwards, overall polarity and attribute polarity of collected data are distinguished through natural language parsing, followed by an analysis of smartwatch reviews. This study will contribute to determination of which attributes of smartwatch to be improved, to arise consumer's interest for individual smartwatch.

  • PDF