• Title/Summary/Keyword: Internet service use

Search Result 1,480, Processing Time 0.035 seconds

User Authentication by using SMART CARD and PAM (스마트 카드와 PAM을 이용한 사용자 인증)

  • 강민정;강민수;박연식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.05a
    • /
    • pp.637-640
    • /
    • 2003
  • Authentication between Server and Client is necessary in most of Internet Service because of increasing of using of Internet. Unix-based Server upgraded security of user authentication using "Shadow Password" instead of "crypt" function. But "Shadow Password" most use same authentication method about all services. But we individually can set user authentication method using PAM(Pluggable Authentication Module). This paper will propose user authentication system using Linux-PAM that use SMART CARD as authentication token.

  • PDF

A Study on the Factors Influencing Customers in Mobile Commerce(MC): mainly in UK, Japan and Korea (이동상거래(Mobile Commerce) 기업의 성공을 위한 소비자 의사결정 요인에 관한 연구: 영국, 일본, 한국을 중심으로)

  • Ha, Tai-Hyun
    • Journal of Digital Convergence
    • /
    • v.3 no.2
    • /
    • pp.59-71
    • /
    • 2005
  • Nowadays, it is not unusual to buy and sell goods, service and information through the internet. As a result of rapid development of Information Technology(IT), business through the internet can be done without time Limitations, place restrictions and product limitations. However, internet shopping has been restricted a lot due to the need for physical connections to the internet in order to search for information and order what we want, and this is one of the biggest problems to the busy people of the 21st century. Therefore it is very natural to use mobile phones to do shopping through wireless internet easily and conveniently whilst on the move. The purpose of this research is to find out characteristics of mobile phone users in UK, Japan and Korea and 1) main aims of the mobile phone use, 2) reasons for ease of use of mobile phones, 3) favourite types of a mobile phone, 4) psychological stability of mobile phone users, 5) problems of mobile phone use, 6) purchase goods/services via mobile phone in the future. The research method used is questionnaire survey The research results will suggest how to take actions to promote mobile commerce in the future.

  • PDF

Web-based Information Systems and Service Quality of IS Department

  • Lee Woongkyu
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2003.05a
    • /
    • pp.169-181
    • /
    • 2003
  • As growth of the web-based applications, the requirements of the users who have been very familiar to the web-based user interfaces and customer-oriented services on the Internet would become more knowledge-intensive and higher technology involved in a more convenient and polite way of service delivery. Therefore, the service quality of information system department should be considered as a very important factor influencing success of information systems. The objective of this study is to provide the relationship between service quality of IS department and its impacts such as use, user satisfaction and job performance. For this purpose, we provide a research model for it and test it empirically for the users of the corporate portal in one of main telecommunication service providers in Korea. In result, our model with satisfiable validity and reliability shows not only importance of IS departments' service quality but also two-faced characteristics of service quality. That is, while technical competence which means with knowledge and expertise of IS department staffs is more related with user satisfaction on information systems, personal service which means the way and manner of service delivery is more related with use of it.

  • PDF

Design and Implementation of A Dynamic API Platform for Interworking Across Heterogeneous Platforms (이기종 플랫폼간 상호연동을 위한 동적 API 플랫폼의 설계 및 구현)

  • Ryu, Minwoo;Cha, Si-Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.2
    • /
    • pp.29-35
    • /
    • 2021
  • Recently, with the widespread use of the Internet of Things (IoT), the service structure has been studied to interact with various service domains. A common way to interact with other service domains is to develop the APIs needed to interact on the platform. However, to use a common method, we consider many costs and resources as APIs can increase while adding connections from other service domains. To address this issue, we propose the design and implementation of a dynamic API platform. The proposed platform can dynamically create APIs when requesting service applications, depending on the target service domain. To demonstrate the feasibility of the proposed platform, we develop a COVID-19 weekly infection status, regional infection status, and vaccination status service using dynamic APIs from the Public Data Portal using the proposed dynamic API platform and Node-RED.

A SECURITY ARCHITECTURE FOR THE INTERNET OF THINGS

  • Behrens, Reinhard;Ahmed, Ali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.12
    • /
    • pp.6092-6115
    • /
    • 2017
  • This paper demonstrates a case for an end-to-end pure Application Security Layer for reliable and confidential communications within an Internet of Things (IoT) constrained environment. To provide a secure key exchange and to setup a secure data connection, Transport Layer Security (TLS) is used, which provides native protection against replay attacks. TLS along with digital signature can be used to achieve non-repudiation within app-to-app communications. This paper studies the use of TLS over the JavaScript Object Notation (JSON) via a The Constrained Application Protocol (CoAP) RESTful service to verify the hypothesis that in this way one can provide end-to-end communication flexibility and potentially retain identity information for repudiation. As a proof of concept, a prototype has been developed to simulate an IoT software client with the capability of hosting a CoAP RESTful service. The prototype studies data requests via a network client establishing a TLS over JSON session using a hosted CoAP RESTful service. To prove reputability and integrity of TLS JSON messages, JSON messages was intercepted and verified against simulated MITM attacks. The experimental results confirm that TLS over JSON works as hypothesised.

A Study on the Imporvement of Wireless Internet Service Tariff Scheme. (무선인터넷 데이터 서비스 과금 체계 개선 연구)

  • Min, Gyeong-Ju;Kim, Jeong-Ho;Park, Jin-Yang
    • Journal of the Korea Computer Industry Society
    • /
    • v.5 no.9
    • /
    • pp.1101-1110
    • /
    • 2004
  • In the first quarter of 2004, there were about 1 billion 348 million mobile phone users worldwide with a penetration rate of only 29%. Korea ranks among the highest in the use of mobile communication, having over 36 million mobile phone subscribers with a mobile phone penetration rate of 75% as of May 2004. Since the introduction of wireless Internet service in May 1999, the number of subscribers rose to 34.5 million with 95.3% of the total mobile phone subscribers using wireless Internet services in May 2004, largely due to continued investments by telecommunication service providers, improvement of mobile handsets (color and digital camera phones) and implementation of policies on mobile number portability. In the Korean wireless Internet market, there are many user complaints since the service providers are competing with each other through TV commercial sales and phone discounts rather than improving their call quality, services and billing systems. therefore there is a growing need to improve the billing systems through means such as the implementation of reasonable payment plans according to consumer use, development of a wireless Internet billing system that can predict the number of users and establishment of pricing standards for controlled data (head, tail, etc...) as well as menu information by testing the texts. multimedia, video and other types of content provided by the three major mobile communication companies. The purpose of this study is to promote wireless Internet services and protect user rights by proposing a reasonable way to improve the billing systems for wireless Internet services after conducting a comparative analysis of file size and billing data of each of the service providers through a verification test on a packet billing system for wireless Internet services.

  • PDF

An Empirical Study on the Flow Experience Affected by Characteristics of Mobile Internet (모바일 인터넷 특성이 플로우 경험에 미치는 영향에 관한 연구)

  • Yoo, Sang-Jin;Choi, Eun-Bin;Kim, Hyo-Jung
    • Information Systems Review
    • /
    • v.8 no.1
    • /
    • pp.125-139
    • /
    • 2006
  • Recently, as mobile internet users grow rapidly, mobile internet companies are experiencing a fierce competition to capture new customers. Under this business environment, they try to identify factors that make people use mobile internet in order to satisfy customers by providing better and diversified services. There has been enormous effort to analyze customers' behavior in choose and use mobile internet services. However, there is no one best methodology to identify factors to attract customers yet. Thus, the study applied the flow construct proposed by Csikszentmihalyi(1977) and expanded by Hoffman and Novak(1996) to identify environmental factors of internet which has impact on users' mobile internet usage. To implement the study, the following activities have been done: literature reviews on service acceptance model and flow structure, questionnaire survey, suggestion of the flow model on mobile internet, and hypothesis test. For the study, 242 out of 307 samples collected were statistically analyzed using SPSS 10.0, AMOS 4.0 statistics package. The findings of this study are as follows: First, mobile internet environment factors influencing on challenge of flow antecedent were media characteristics(use of convenience, transmission quality), contents characteristics(uniqueness, timeliness, simplicity). Second, mobile internet environment factors influencing on skill of flow antecedent were contents(uniqueness, timeliness, simplicity), charge(definiteness and diversity of charge), usage(security, instant connectivity). Third, challenge of flow antecedent had a significant effect on flow of mobile internet usage. But it was not statistically significant that skill has an influence on flow. This study discovered the relationship between mobile internet environment factors(media characteristics, contents characteristics, charge characteristics, usage characteristics) and flow experience of mobile internet users which would be a valuable insight for marketing strategies. Results shows that challenge of flow antecedent have a significant impact on flow experience in mobile internet environment. Additional, media characteristics, contents characteristics of mobile internet environment factors is positively correlated with challenge of flow antecedent. In other words, mobile internet companies should provide customers with diverse service and take a challenging attitude to get customers show aggressive attitude in mobile internet usage.

Impact of Concerns on Service, Platform, Network, Device, and Privacy in the Use of Fintech in the Internet of Things Environment (사물인터넷 환경에서 핀테크 이용자의 서비스, 플랫폼, 네트워크, 디바이스, 프라이버시 우려의 영향)

  • Se-Hun Lim
    • Asia-Pacific Journal of Business
    • /
    • v.15 no.2
    • /
    • pp.107-123
    • /
    • 2024
  • Purpose - This study aims to analyze the relationship between perceived risk, privacy concerns, continual intention to use of Fintech services. Design/methodology/approach - This research developed a conceptual framework using attitude theory and analyzed the relationship between risk perception to Fintech services, Fintech concerns(service concern, platform concern, network concern, device concern, and privacy concern), and continual use in the context of Fintech services. In this study, Data analyzed using the PLS(partial least squares) structural equation model approach. Findings - As a result of empirical analysis, Fintech risk perception affected service concern, platform concern, network concern, device concern, and privacy concern. In addition, it was found that privacy risk did not affect continual use of Fintech services. In addition, among Fintech service concerns, platform concern, network concern, and privacy concern did not affect continual use of Fintech services. However, only device concern affected the intention to continual use of Fintech services. Research implications or Originality - The results will help to understand the psychology of Fintech service users and develop more stable Fintech services continual use strategies.

Smart Adapted Service in Ubiquitous (유비쿼터스 환경에서 사용자의 일정에 따른 지능 정보 제공 시스템)

  • Ahn, Ho-Seok;Sa, In-Kyu;Baek, Young-Min;Ahn, Youn-Seok;Choi, Jin-Young
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.57 no.3
    • /
    • pp.480-487
    • /
    • 2008
  • In this paper, we propose a Smart Adapted Service which can manage a schedule automatically. Smart Adapted Service gives a notice beforehand regarding information associated with the schedule, by searching the Internet. If the user has written down the name of goods or food which he wants to buy, Smart Adapted Service finds the most suitable store nearby him using the user's favorite list. The user's favorite list is created by Outlook Web Access System by analysing the schedule and habits of the user. User can access Smart Document System remotely through the Internet using Outlook Web Access System. We developed an Auto AP Roaming System for seamless communication and Smart Document System for arranging the information. We evaluated the system and verified that it is convenient to use and working well.

Analysis of Authentication Methods for Smartphone Banking Service using ANP

  • Park, Keon Chul;Shin, Jae Woo;Lee, Bong Gyou
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2087-2103
    • /
    • 2014
  • What is an ideal authentication method for smartphone banking services? And what are the critical elements to be considered when designing it? To provide valuable insight for these questions, this study investigates various authentication requirements to be considered in smartphone banking service with the aspect of security, convenience and cost. By applying Analytic Network Process (ANP), this study first analyzes priorities among the requirements and then draws an ideal authentication method for smartphone banking service. Moreover, a sensitivity analysis has been conducted by varying the relative importance of several requirements. The results from the judgment of 72 experts revealed that, although Korean government has obliged the use of Public Key certificate, OPT and biometric alternatives may prove to be more appropriate for the smartphone banking service. These results will contribute to the provision of more secured and convenient smartphone banking services.