• Title/Summary/Keyword: Internet.

Search Result 29,787, Processing Time 0.048 seconds

The Effects of an Internet Addiction Prevention Program on Middle School Students (인터넷 중독 예방 프로그램이 중학생의 스트레스와 인터넷 중독에 미치는 효과)

  • Joo, Ae-Ran
    • Research in Community and Public Health Nursing
    • /
    • v.20 no.2
    • /
    • pp.207-214
    • /
    • 2009
  • Purpose: The purpose of this study was to determine the effect of an Internet addiction prevention program on middle school students' stress and Internet addiction, Methods: This research adopted the non-equivalent control group pretest-posttest design, and was conducted with 40 middle school students who were selected through convenient sampling and assigned to an experimental group or a control group, Data were collected from September 5, 2007 to September 27, 2007, and analyzed using the SPSS/WIN program by frequency, $x^2$-test, Fisher's exact test, and t-test. Results: The results of the experiment supported the hypothesis that the experimental group would have lower stress scores and Internet addiction scores than the control group, Conclusion: After 8 sessions of the Internet addiction prevention program, it was found the program was effective to reduce stress and Internet addiction.

  • PDF

Consumer Problems in the Information Society -Focus on Internet Commerce- (정보화사회에서의 소비자 문제에 관한 연구 -인터넷 상거래를 중심으로-)

  • 이승신
    • Journal of the Korean Home Economics Association
    • /
    • v.39 no.5
    • /
    • pp.15-26
    • /
    • 2001
  • The purpose of this study is to examine specific consumer problems in internet commerce and analyze them in the age of information. The way of sorting consumer problems in internet commerce from this study. For this empirical analysis, the data was collected 319 consumers by internet on-line survey from Feb. 13 to Feb. 20, 2000. The methods for study was frequency, percentage, mean, correlation, multiple regression using SAS PC program. The major findings of this study were as follows: 1. The level of consumer problem experiences in internet commerce was examined. The problems of privacy was the most problem and the problem of price was the second. Then delivery, advertisement, information was next, and the problem of quality, and A/S, change, cancel was the next consumer problem. 2. Among factors influence on experience consumer problem in internet commerce, the amount of usable money, information search were significant.

  • PDF

Emergency Management on Internet Spread of Social Events

  • Dai, Weihui;Wang, Chunshi;Zhang, Yuan
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.1
    • /
    • pp.41-53
    • /
    • 2011
  • The rapid development and widespread application of Internet has provided a platform for people to participate and discuss social hotspot events. In the meantime, social events may be spread throughout the Internet more quickly and widely than they did ever before, and possibly lead to serious social problems due to opinion violence or seditious rumour. This paper analyzed the Internet spread of social events, and presented a five-stage model to describe the evolution process of that spread. Furthermore, the improved IBF algorithm was applied to extract a pruned connected graph aiming to find the key nodes and the shortest spread path for the control of that spread. After analyzing the different factors that may cause the netizens' attention, this paper concluded BBS type, the visit quantity and the opinion leader are key factors which affect the Internet spread. Based on those researches, a life-cycle emergency management methodology and the related strategies were proposed for the achievement of healthy spreading environment on Internet.

A Countermeasures on the Hacking for the Internet Shopping Mall (인터넷 쇼핑몰의 해킹 사고에 대한 대응방법)

  • Lee, Young Gyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.33-43
    • /
    • 2008
  • As internet is spreaded widely, the number of cyber terror using hacking and virus is increased. Also the hacking to the internet shopping mall go on increasing. If the large shopping mall is attacked by the hacker, a number of user's information are exposed to the hacker. The private information as like a resident registration number, user's real name, the date of user's birth, the mobile phone number, the office phone number / address, the home phone number / address and so on include the information. These information are used in the phishing e-mails / call and spam. And them are selling and buying maliciously. The large internet shopping mall 'auction' was hacked in April, 2008. After the incident, this paper suggested a countermeasures on the hacking for the internet shopping mall. The technical item and political item are included among the countermeasures. The countermeasures can protect the hacking not only the internet shopping mall but also the web sites basically.

A Design of X-internet Development Framework by Using Flash Component and Service API (플래시 컴포넌트와 서비스 API를 이용한 X-인터넷 개발 프레임워크 설계)

  • Ko, Dae-Sik
    • Journal of Information Technology Services
    • /
    • v.5 no.3
    • /
    • pp.165-172
    • /
    • 2006
  • In this paper, we designed a new type of X-internet framework by using Flash component and server service API and analyzed its performance. Proposed X-internet framework uses Flash MX Professional 2004, Java, and software which opened middleware and database. Since proposed framework use the server service API that we developed in this paper and Flash player, this framework does not need server module. Proposed framework enables to obtain design with dynamic user interface compare to Web application and enables to reduce development time. In analytical results, it has been shown that proposed x-internet framework have efficient characteristics such as network traffic, low development cost and dynamic user interface implementation. Since proposed X-internet framework can operate in environment of current developer friendly, it is useful for development of various new application programs and we confirm it through Flash web mail implementation by using proposed x-internet framework.

Evolution of Internet Interconnections and System Architecture Design for Telecom Bandwidth Trading (인터넷 상호접속 진화에 따른 대역폭 거래(Bandwidth Trading)의 필요성 및 거래시스템 아키텍처 설계)

  • Kim, Do-Hoon
    • Journal of Information Technology Services
    • /
    • v.7 no.1
    • /
    • pp.131-149
    • /
    • 2008
  • Bandwidth Trading(BT) represents a potential market with over 1 trillion USD across the world and high growth potential. BT is also likely to accelerate globalization of the telecommunications industry and massive restructuring driven by unbundling rush. However, systematic researches on BT remain at an infant stage. This study starts with structure analysis of the Internet industry, and discusses significance of Internet interconnection with respect to BT Issues. We also describe the bandwidth commoditization trends and review technical requirements for effective Internet interconnection with BT capability. Taking a step further, this study explores the possibility of improving efficiency of network providers and increasing user convenience by developing an architectural prototype of Hub-&-Spoke interconnection model required to facilitate BT. The BT market provides an Innovative base to ease rigidity of two-party contract and Increase service efficiency. However, as fair, efficient operation by third party is required, this research finally proposes an exchanging hub named NIBX(New Internet Business eXchange).

Service Identification of Internet-Connected Devices Based on Common Platform Enumeration

  • Na, Sarang;Kim, Taeeun;Kim, Hwankuk
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.740-750
    • /
    • 2018
  • There are a great number of Internet-connected devices and their information can be acquired through an Internet-wide scanning tool. By associating device information with publicly known security vulnerabilities, security experts are able to determine whether a particular device is vulnerable. Currently, the identification of the device information and its related vulnerabilities is manually carried out. It is necessary to automate the process to identify a huge number of Internet-connected devices in order to analyze more than one hundred thousand security vulnerabilities. In this paper, we propose a method of automatically generating device information in the Common Platform Enumeration (CPE) format from banner text to discover potentially weak devices having the Common Vulnerabilities Exposures (CVE) vulnerability. We demonstrated that our proposed method can distinguish as much adequate CPE information as possible in the service banner.

An Empirical Study on the Factors Affecting the Acceptance of Wireless Internet Services (무선 인터넷 서비스 수용의 영향요인에 관한 연구)

  • Kim, In-Jai;Lee, Jung-Woo
    • Information Systems Review
    • /
    • v.3 no.1
    • /
    • pp.83-101
    • /
    • 2001
  • Studies about wireless internet have been focused on technology issues and few studies were shown in the adoption of wireless internet services. This study uses Technology Acceptance Model in order to understand influencing factors in acceptance of wireless internet services. Reviewing by TAM related studies, this study regards the influencing factors as personal and social environmental dimensions in the case of wireless internet services, and these two factors are used. Two dependent variables-intention and current usage-are adopted for analyzing the effects of the two factors on two dependent variables via mediating variables. The results of this study show that age, frequency of mobile phone usage, occupation, and the recognition level of wireless internet services affected the intention and current usage of these services.

  • PDF

A Study on the Usefulness of Wireless Internet for Effective Library Information Service (도서관정보의 무선인터넷 서비스에 관한 연구)

  • Sung, Kee-Joo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.34 no.3
    • /
    • pp.25-36
    • /
    • 2000
  • This paper starts by describing the wireless internet service as a new function in the internet age. It then discusses the usefulness of wireless internet for improveing library information service. Recently the use of wireless internet service, as a major internet service in the future, has been rapidly increased because it can be provided various type of information using individual's cellulasphone without the time and space restrictions. Therefore, wireless internet service will be of great use for decentralization and rapidness of library function as well as improvement of user service by providing various interface of information retrieval.

  • PDF

A study of Internet Topology Modeling Reflecting Evolution (변화성을 고려한 인터넷 위상 모델링에 관한 연구)

  • 조인숙;손주항;김병기
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2003.11a
    • /
    • pp.113-117
    • /
    • 2003
  • Studies of Internet algorithms or policies require experiments on the real large-scalenetworks. But practical problems with large real networks make them difficult Instead many researchers use simulations on the Internet topology models. Some tried to find out abstract topological properties of Internet. And several models are proposed to reflect Internet's topological characteristics better. But few studies have been performed on how to model the evolution of Internet. We propose algorithms for modeling addition and removal of nodes and accompanied change of topologies. We analyze the topologies generated by our algorithms to observe that they obey power-laws better than those generated by existing ones. These algorithms are also expected to be helpful in predicting future topologies of Internet.

  • PDF