• 제목/요약/키워드: Key sharing

검색결과 611건 처리시간 0.026초

토픽 모델링을 활용한 전동킥보드 공유 서비스의 사용자 리뷰 분석 (Analysis of User Reviews of Electric Kickboard Sharing Service Using Topic Modeling )

  • 이정승
    • Journal of Information Technology Applications and Management
    • /
    • 제31권1호
    • /
    • pp.163-175
    • /
    • 2024
  • This study conducts topic modeling analysis on four electric scooter sharing platforms: Alpaca, SingSing, Kickgoing, and Beam. Using user review data, the study aims to identify key topics and issues associated with each platform, as well as uncover common themes across platforms. The analysis reveals that users primarily express concerns and preferences related to application usability, service mobility, and parking/accessibility. Additionally, each platform exhibits unique characteristics and challenges. Alpaca users generally appreciate convenience and enjoyment but express concerns about safety and service areas. SingSing faces issues with application functionality, while Kickgoing users encounter connectivity problems and device usability issues. Beam receives overall positive feedback, but users express dissatisfaction with application usability and parking. Based on these findings, scooter sharing service providers should focus on enhancing application features, stability, and expanding service coverage to meet user expectations and improve customer satisfaction. Furthermore, highlighting platform-specific strengths and providing tailored services can enhance competitiveness and foster continuous service growth and development.

자원공유에 대한 대학도서관 사서들의 인식에 관한 연구 (A Study on the Perception Among University Librarians towardes Resource Sharing)

  • 심원식
    • 정보관리학회지
    • /
    • 제25권2호
    • /
    • pp.5-24
    • /
    • 2008
  • 대학도서관에서의 자원공유가 활발해지고 고도화됨에 따라 이 업무를 담당하는 사서들이 자원공유에 대한 인식을 이해할 필요가 있다. 본 연구는 설문지에 기반한 연구방법을 사용하여 78명의 대학도서관 사서들로부터 상호대차, 원문복사, 종합목록구축, 분담수서, 그리고 인적교류와 관련된 인식과 평가에 관한 자료를 수집하였다. 설문결과는 사서들이 이미 잘 구축된 자원공유(상호대차, 원문복사, 종합목록구축)에 대해 그렇지 않은 형태의 자원공유 (분담수서, 인적교류) 보다 더 긍정적으로 평가하는 것으로 나타났다. 서서들의 자원공유에 대한 인식과 도서관/개인 특성과의 상관분석이 수행되었고, 다섯 개 영역의 자원공유 각각에 대한 장애요인 또한 도출되었다.

불확실성 정보가 맥주배송게임 기반의 공급사슬 수행도에 미치는 영향 평가 : 기상정보 사례를 중심으로 (The Effect of Uncertain Information on Supply Chain Performance in a Beer Distribution Game-A Case of Meterological Forecast Information)

  • 이기광;김인겸;고광근
    • Journal of Information Technology Applications and Management
    • /
    • 제14권4호
    • /
    • pp.139-158
    • /
    • 2007
  • Information sharing is key to effective supply chain management. In reality, however, it is impossible to get perfect information. Accordingly, only uncertain information can be accessed in business environment, and thus it is important to deal with the uncertainties of information in managing supply chains. This study adopts meteorological forecast as a typical uncertain information. The meteorological events may affect the demands for various weather-sensitive goods, such as beer, ices, clothes, electricity etc. In this study, a beer distribution game is modified by introducing meterological forecast information provided in a probabilistic format. The behavior patterns of the modified beer supply chains are investigated. for two conditions using the weather forecast with or without an information sharing. A value score is introduced to generalize the well-known performance measures employed in the study of supply chains, i.e.. inventory, backlog, and deviation of orders. The simulation result showed that meterological forecast information used in an information sharing environment was more effective than without information sharing, which emphasizes the synergy of uncertain information added to the information sharing environment.

  • PDF

Influencing Knowledge Sharing on Social Media: A Gender Perspective

  • Jae Hoon Choi;Ronald Ramirez;Dawn G. Gregg;Judy E. Scott;Kuo-Hao Lee
    • Asia pacific journal of information systems
    • /
    • 제30권3호
    • /
    • pp.513-531
    • /
    • 2020
  • Online Word-of-Mouth communication, or eWOM, has dramatically changed the way people network, interact, and share knowledge. Studies have examined why consumers choose to share knowledge online, especially online product reviews, as well as the motivations of individuals to share product ideas online. However, the role of gender in shaping the motivation and types of knowledge shared online has been given little consideration. Using concepts from Social Exchange Theory and the Theory of Reasoned Action, we address this research gap by developing and testing a model of gender's influence on knowledge sharing in a social media context. A PLS analysis of survey data from 257 students indicates that reputation, altruism, and subjective norms are key motivators for knowledge sharing intention in social media. More importantly, that gender plays a moderating role within the motivation-knowledge sharing relationship. We also find that subjective norms have a greater impact on knowledge sharing with women than with men. Collectively, our research results highlight individualized factors for improving customer participation in external facing social media for marketing and product innovation.

Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preservation for Mobile Environment

  • Lu, Chung-Fu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권12호
    • /
    • pp.5135-5149
    • /
    • 2015
  • Communications among multi-party must be fast, cost effective and secure. Today's computing environments such as internet conference, multi-user games and many more applications involve multi-party. All participants together establish a common session key to enable multi-party and secure exchange of messages. Multi-party password-based authenticated key exchange scheme allows users to communicate securely over an insecure network by using easy-to-remember password. Kwon et al. proposed a practical three-party password-based authenticated key exchange (3-PAKE) scheme to allow two users to establish a session key through a server without pre-sharing a password between users. However, Kwon et al.'s scheme cannot meet the security requirements of key authentication, key confirmation and anonymity. In this paper, we present a novel, simple and efficient multi-party password-based authenticated key exchange (M-PAKE) scheme based on the elliptic curve cryptography for mobile environment. Our proposed scheme only requires two round-messages. Furthermore, the proposed scheme not only satisfies security requirements for PAKE scheme but also achieves efficient computation and communication.

A Communicationless PCC Voltage Compensation Using an Improved Droop Control Scheme in Islanding Microgrids

  • Ding, Guangqian;Gao, Feng;Li, Ruisheng;Wu, Bingxin
    • Journal of Power Electronics
    • /
    • 제17권1호
    • /
    • pp.294-304
    • /
    • 2017
  • This paper proposes a point of common coupling (PCC) voltage compensation method for islanding microgrids using an improved power sharing control scheme among distributed generators (DGs) without communication. The PCC voltage compensation algorithm is implemented in the droop control scheme to reduce the PCC voltage deviation produced by the droop controller itself and the voltage drop on the line impedance. The control scheme of each individual DG unit is designed to use only locally measured feedback variables and an obtained line impedance to calculate the PCC voltage. Therefore, traditional voltage measurement devices installed at the PCC as well as communication between the PCC and the DGs are not required. The proposed control scheme can maintain the PCC voltage amplitude within an allowed range even to some extent assuming inaccurate line impedance parameters. In addition, it can achieve proper power sharing in islanding microgrids. Experimental results obtained under accurate and inaccurate line impedances are presented to show the performance of the proposed control scheme in islanding microgrids.

전자상거래를 위한 공개키 기반 하부구조의 인증 기술 (Authentication Technology of Public Key Infrastructure for Electronic Commerce)

  • 유창열;임신영;송유진;함호상
    • 한국전자거래학회:학술대회논문집
    • /
    • 한국전자거래학회 1997년도 한국전자거래학회 종합학술대회지
    • /
    • pp.167-184
    • /
    • 1997
  • 암호화 기술의 확장성과 비도 측면에서 우수한 공개키 기반 하부구조(Public Key Infrastructure)는 공개키를 보증하는 기반 기술과 인증서의 안전한 사용 기술로 구성되어있으며, 전자상거래의 기본 기술중 하나이다. 이러한 기본 기술 중에는 키 복구(Key Recovery) 및 비밀 분산(Secret Sharing) 기술등이 포함되며, 인증기관(Certificate Authority: CA)을 통한 키 관리 효율성 및 인중 기관과 사용자 간 안전한 정보 교환 기술이 요구된다. 본 논문에서는 인터넷 기반의 전자 상거래 시 사용되는 공개키 기반 하부구조에 대하여 검토 분석한다.

  • PDF

전자 상거래를 위한 공개키 기반 인증 기술 (Public Key-based Authentication Technology for Electronic Commerce)

  • 임신영;유창열;송유진;함호상;박상봉
    • 정보보호학회지
    • /
    • 제7권3호
    • /
    • pp.77-98
    • /
    • 1997
  • 암호화 기술의 확장성 측면에서 우수한 공개키 기반 하부구조(Public Key Infrastructure)는 전자 상거래 서비스에서 필요한 제반 인증 기술을 제공하고 있다. 공개키를 보증하는 기반 기술과 인증서의 안전한 사용 기술은 공개키 기반 전자 상거래의 기본 기술이다. 이러한 기본 기술 중에는 키 복구(Key Recovery) 및 비밀 분산(Secret Sharing) 기술이 포함되며 인증기관(Certificate Authority : CA)을 통한 키 관리 효율성 및 인증기관과 서비스 사용자간의 안전한 정보 교환 기술이 또한 요구된다. 본 논문에서는 인터넷 기반의 전자 상거래 시 사용되는 공개키 기반의 인증구조에 대하여 검토 분석한다.

  • PDF

<인생나눔교실>의 인문정신 가치 탐색 (The Search of the Value of the Humanistic Spirit through )

  • 이상민
    • 한국콘텐츠학회논문지
    • /
    • 제18권8호
    • /
    • pp.255-261
    • /
    • 2018
  • 본 연구의 목적은 인생의 선배 세대와 후배 세대가 멘토링을 통해 나눔, 배려, 공감, 소통의 인문정신 가치를 체화하는 <인생나눔교실>의 가치를 탐색하고자 하는 데 있다. 비자발적으로 참여하는 멘티들에게 집단적인 멘토링이 이루어지는 <인생나눔교실>에서 멘토에게는 진실성, 유동성, 배려 등의 역량이 보다 중시되었다. <인생나눔교실>에서 나눔은 인적나눔이며, 자원봉사의 의미를 갖고 있었고, 배려는 멘토와 멘티 간의 상호의존성과 관계성을 형성할 수 있도록 몰입, 공감, 수용, 확언의 측면이 강조될 필요가 있었다. 또한 공감은 멘토들이 멘티들에게 가져야 할 바람직한 태도와 자질을 의미하였고, 소통은 현대 사회가 안고 있는 소통의 모순성 측면에서 세대 간 갈등의 증폭현상을 해결하려는 모습을 보여주고 있었다. 이를 통해 <인생나눔교실>은 인문정신 가치의 체화라는 목표를 가진 문화예술을 매개로 하는 멘토링 프로그램으로 특화될 가능성을 엿볼 수 있었다. 또한 삶의 성숙기에 들어선 세대가 지역공동체에 봉사할 수 있는 기회를 줄 수 있다는 점에서 그 가치를 찾을 수 있었다.

PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation

  • Kim, Aeyoung;Wang, Changda;Seo, Seung-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권7호
    • /
    • pp.2919-2937
    • /
    • 2020
  • Post-Quantum Cryptography (PQC) is rapidly developing as a stable and reliable quantum-resistant form of cryptography, throughout the industry. Similarly to existing cryptography, however, it does not prevent a third-party from using the secret key when third party obtains the secret key by deception, unauthorized sharing, or unauthorized proxying. The most effective alternative to preventing such illegal use is the utilization of biometrics during the generation of the secret key. In this paper, we propose a biometric-based secret key generation scheme for multivariate quadratic signature schemes, such as Rainbow. This prevents the secret key from being used by an unauthorized third party through biometric recognition. It also generates a shorter secret key by applying Principal Component Analysis (PCA)-based Confidence Interval Analysis (CIA) as a feature extraction method. This scheme's optimized implementation performed well at high speeds.