• Title/Summary/Keyword: Internet service use

Search Result 1,480, Processing Time 0.024 seconds

A Study on Generational Differences in the Internet Use and Privacy Paradox (인터넷 이용과 프라이버시 역설에 대한 세대별 차이 연구)

  • Koh, Heungseok;Kim, Changjung
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.9
    • /
    • pp.1046-1054
    • /
    • 2019
  • With regard to the diffusion of mobile Internet service and generational differences for Internet use, this study aims to explore the relationship between the Internet activities and privacy concern based on the media dependency theory. Using the Korea Media Panel data produced by KISDI in 2018, this study analysed 8,988 nation-wide samples to test the difference of Internet use in personal privacy concern among generations. The results of the study showed that there was statistically significant difference for privacy concern among generations. This study has an implication to reveal the phenomenon of 'privacy paradox' by showing that SNS use negatively influenced users' privacy concern.

Development of Indicators for Information Security Level Assessment of VoIP Service Providers

  • Yoon, Seokung;Park, Haeryong;Yoo, Hyeong Seon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.2
    • /
    • pp.634-645
    • /
    • 2014
  • VoIP (Voice over Internet Protocol) is a technology of transmitting and receiving voice and data over the Internet network. As the telecommunication industry is moving toward All-IP environment with growth of broadband Internet, the technology is becoming more important. Although the early VoIP services failed to gain popularity because of problems such as low QoS (Quality of Service) and inability to receive calls as the phone number could not be assigned, they are currently established as the alternative service to the conventional wired telephone due to low costs and active marketing by carriers. However, VoIP is vulnerable to eavesdropping and DDoS (Distributed Denial of Service) attack due to its nature of using the Internet. To counter the VoIP security threats efficiently, it is necessary to develop the criterion or the model for estimating the information security level of VoIP service providers. In this study, we developed reasonable security indicators through questionnaire study and statistical approach. To achieve this, we made use of 50 items from VoIP security checklists and verified the suitability and validity of the assessed items through Multiple Regression Analysis (MRA) using SPSS 18.0. As a result, we drew 23 indicators and calculate the weight of each indicators using Analytic Hierarchy Process (AHP). The proposed indicators in this study will provide feasible and reliable data to the individual and enterprise VoIP users as well as the reference data for VoIP service providers to establish the information security policy.

Surveys of Internet Use and Internet Users : Comparisons of Survey Results in Korea, United States, and United Kingdom (인터넷 이용현황 및 이용자 연구 : 한국.미국.영국의 조사 결과 비교 분석)

  • Rieh, Hae-Young
    • Journal of Information Management
    • /
    • v.30 no.2
    • /
    • pp.1-19
    • /
    • 1999
  • As the Internet use increases explosively, and the information provision and services via the Internet is getting active, understanding the status of the Internet use and the Internet users' characteristics becomes necessity for organizations, corporations, and in-formation providers. This paper reviews various surveys on the Internal users and the Internal one con-ducted in Korea, the United States and the United Kingdom. By the comparisons and analyses of these survey results, this paper intended to provide visions on the future direction In the Internet service provision and the Internet uses in general.

  • PDF

A study of network mobility for internet service in railway system (철도에서 네트워크 이동성 적용 방안)

  • Cho, B.K.
    • Proceedings of the KIEE Conference
    • /
    • 2004.11c
    • /
    • pp.255-257
    • /
    • 2004
  • The study for ubiquitous computing infra is proceeding actively, it make possible to use service and access network anywhere, anytime because of wire/wireless communication technology and progress of hardware. Domestically, study for the network mobility support technology which is the key technology for future ubiquitous computing realization have progressed, but that is insufficient. Especially, there is no study for independent mobility support study about railway wireless network. So, this study propose network mobility management technology for mobile network infra in railway and proper network model in train.

  • PDF

Factors Affecting Intentions to Use Internet-Only Bank in South Korea: Implications of Service Convenience and Social Influence (인터넷전문은행의 이용의도에 미치는 영향 요인: 편리성과 사회적 영향의 함의)

  • Joo, Jaehun
    • Journal of Service Research and Studies
    • /
    • v.8 no.2
    • /
    • pp.77-94
    • /
    • 2018
  • Internet-only bank is one of the promising areas of Fintech industry. Kbank and Kakaobank launched services since 2017 in Korea. Experts estimated the younger generation including undergraduate students as target customers in the initial stage of the Internet-only bank in Korea. Thus, it is necessary to investigate factors influencing intention to use the Internet-only bank. Data were collected from undergraduate students studying in Seoul, Pusan, and Gyeongbuk province. The empirical study showed the evidence that four factors such as convenience, social influence, perceived privacy, and unverified risk had a significant influence on intention to use the Internet-only bank. However, economic benefit has no significantly influence on the intention. The present study focused on the influence of convenience and social influence and discussed the issues regarding convenience and social influence in more detail.

A SURVEY OF QUALITY OF SERVICE IN MULTI-TIER WEB APPLICATIONS

  • Ghetas, Mohamed;Yong, Chan Huah;Sumari, Putra
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.238-256
    • /
    • 2016
  • Modern web services have been broadly deployed on the Internet. Most of these services use multi-tier architecture for flexible scaling and software reusability. However, managing the performance of multi-tier web services under dynamic and unpredictable workload, and different resource demands in each tier is a critical problem for a service provider. When offering quality of service assurance with least resource usage costs, web service providers should adopt self-adaptive resource provisioning in each tier. Recently, a number of rule- and model-based approaches have been designed for dynamic resource management in virtualized data centers. This survey investigates the challenges of resource provisioning and provides a competing assessment on the existing approaches. After the evaluation of their benefits and drawbacks, the new research direction to improve the efficiency of resource management and recommendations are introduced.

A New Online News Service Model, based on NewsML and UCI Systems (NewsML과 UCI를 적용한 뉴스 콘텐츠의 온라인 유통모델)

  • Park, Chang-Shin;Kil, Duke
    • 한국IT서비스학회:학술대회논문집
    • /
    • 2007.11a
    • /
    • pp.641-645
    • /
    • 2007
  • News contents, produced for paper readers, are more and more being used online instead of offline. Internet sites, expecially portals(naver, daum, nate etc.) are dominant marketplaces, where news are exchanged and values are added. So, establishing a new online news service system, which can satisfy news provider(copyright owner) and internet service provider together, is a necessary task under current online-dominant news service environment. UCI(Universal & Ubiquitous Content Identifier) and IPTC NewsML(News Mark-up Language) are considered as useful standards to compromise protection of news-copyright and enhancement of online use of news contents. This study is based on a real case of 'NewsBank' in korea, We expect that this study can show an inspiration to obtain two contradictory goals of copyright protection and free online use of copyright.

  • PDF

An Efficient Cluster Based Service Discovery Model for Mobile Ad hoc Network

  • Buvana, M.;Suganthi, M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.680-699
    • /
    • 2015
  • The use of web service has been increased rapidly, with an increase in the number of available services, finding the exact service is the challenging task. Service discovery is the most significant job to complete the service discoverers needs. In order to achieve the efficient service discovery, we focus on designing a cluster based service discovery model for service registering and service provisioning among all mobile nodes in a mobile ad hoc network (MANETs). A dynamic backbone of nodes (i.e. cluster heads) that forms a service repository to which MANET nodes can publish their services and/or send their service queries. The designed model is based on storing services with their service description on cluster head nodes that are found in accordance with the proposed cluster head election model. In addition to identifying and analyzing the system parameters for finding the effectiveness of our model, this paper studies the stability analysis of the network, overhead of the cluster, and bandwidth utilization and network traffic is evaluated using analytic derivations and experimental evaluation has been done.

A Study of Security Measures and Vulnerability Analysis on the Application using WiBro Service (WiBro 서비스를 이용한 응용프로그램의 취약점 분석 및 보안 대책 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.479-482
    • /
    • 2012
  • WiBro(Wireless Broadband) service is the world standardized fourth-generation communications in Korea. The services through internet-based applications using WiBro communication-based is increasing. WiBro service in the Internet-based applications when using the service, the application may need to analyze the vulnerability. In this paper, we use the Internet when in WiBro service, to analyze the vulnerability. And, Internet-based applications for vulnerabilities that could lead to hacker attacks is analyzed. It will be studied that security measures through analysis of vulnerability of WiBro services and applications.

  • PDF

A Study of Security Measures and Vulnerability Analysis on the Application using WiBro Service (WiBro 서비스를 이용한 응용프로그램의 취약점 분석 및 보안 대책 연구)

  • Chun, Woo-Sung;Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1217-1222
    • /
    • 2012
  • WiBro(Wireless Broadband) service is the world standardized fourth-generation communications in Korea. The services through internet-based applications using WiBro communication-based is increasing. WiBro service in the Internet-based applications when using the service, the application may need to analyze the vulnerability. In this paper, we use the Internet when in WiBro service, to analyze the vulnerability. And, Internet-based applications for vulnerabilities that could lead to hacker attacks is analyzed. It will be studied that security measures through analysis of vulnerability of WiBro services and applications.