• Title/Summary/Keyword: Key sharing

Search Result 611, Processing Time 0.025 seconds

Analysis of User Reviews of Electric Kickboard Sharing Service Using Topic Modeling (토픽 모델링을 활용한 전동킥보드 공유 서비스의 사용자 리뷰 분석)

  • Jung Seung Lee
    • Journal of Information Technology Applications and Management
    • /
    • v.31 no.1
    • /
    • pp.163-175
    • /
    • 2024
  • This study conducts topic modeling analysis on four electric scooter sharing platforms: Alpaca, SingSing, Kickgoing, and Beam. Using user review data, the study aims to identify key topics and issues associated with each platform, as well as uncover common themes across platforms. The analysis reveals that users primarily express concerns and preferences related to application usability, service mobility, and parking/accessibility. Additionally, each platform exhibits unique characteristics and challenges. Alpaca users generally appreciate convenience and enjoyment but express concerns about safety and service areas. SingSing faces issues with application functionality, while Kickgoing users encounter connectivity problems and device usability issues. Beam receives overall positive feedback, but users express dissatisfaction with application usability and parking. Based on these findings, scooter sharing service providers should focus on enhancing application features, stability, and expanding service coverage to meet user expectations and improve customer satisfaction. Furthermore, highlighting platform-specific strengths and providing tailored services can enhance competitiveness and foster continuous service growth and development.

A Study on the Perception Among University Librarians towardes Resource Sharing (자원공유에 대한 대학도서관 사서들의 인식에 관한 연구)

  • Shim, Won-Sik
    • Journal of the Korean Society for information Management
    • /
    • v.25 no.2
    • /
    • pp.5-24
    • /
    • 2008
  • As resource sharing becomes more active and complicated in academic libraries, a better understanding of how librarians-a key stakeholder-view the current level of resource sharing is needed. Using survey method, this study collected data regarding the Perception of 78 librarians with regard to interlibrary loan, document delivery, union catalog construction, shared acquisition, and community building. Overall, the respondents evaluated well-established forms of resource sharing(interlibrary loan, document delivery, and union catalog construction) more positively than less-well developed ones(shared acquisition and community building). Correlation analysis between perception of library/individual characteristics was conducted. Barriers to each of the five areas of resource sharing are also identified in the study.

The Effect of Uncertain Information on Supply Chain Performance in a Beer Distribution Game-A Case of Meterological Forecast Information (불확실성 정보가 맥주배송게임 기반의 공급사슬 수행도에 미치는 영향 평가 : 기상정보 사례를 중심으로)

  • Lee, Ki-Kwang;Kim, In-Gyum;Ko, Kwang-Kun
    • Journal of Information Technology Applications and Management
    • /
    • v.14 no.4
    • /
    • pp.139-158
    • /
    • 2007
  • Information sharing is key to effective supply chain management. In reality, however, it is impossible to get perfect information. Accordingly, only uncertain information can be accessed in business environment, and thus it is important to deal with the uncertainties of information in managing supply chains. This study adopts meteorological forecast as a typical uncertain information. The meteorological events may affect the demands for various weather-sensitive goods, such as beer, ices, clothes, electricity etc. In this study, a beer distribution game is modified by introducing meterological forecast information provided in a probabilistic format. The behavior patterns of the modified beer supply chains are investigated. for two conditions using the weather forecast with or without an information sharing. A value score is introduced to generalize the well-known performance measures employed in the study of supply chains, i.e.. inventory, backlog, and deviation of orders. The simulation result showed that meterological forecast information used in an information sharing environment was more effective than without information sharing, which emphasizes the synergy of uncertain information added to the information sharing environment.

  • PDF

Influencing Knowledge Sharing on Social Media: A Gender Perspective

  • Jae Hoon Choi;Ronald Ramirez;Dawn G. Gregg;Judy E. Scott;Kuo-Hao Lee
    • Asia pacific journal of information systems
    • /
    • v.30 no.3
    • /
    • pp.513-531
    • /
    • 2020
  • Online Word-of-Mouth communication, or eWOM, has dramatically changed the way people network, interact, and share knowledge. Studies have examined why consumers choose to share knowledge online, especially online product reviews, as well as the motivations of individuals to share product ideas online. However, the role of gender in shaping the motivation and types of knowledge shared online has been given little consideration. Using concepts from Social Exchange Theory and the Theory of Reasoned Action, we address this research gap by developing and testing a model of gender's influence on knowledge sharing in a social media context. A PLS analysis of survey data from 257 students indicates that reputation, altruism, and subjective norms are key motivators for knowledge sharing intention in social media. More importantly, that gender plays a moderating role within the motivation-knowledge sharing relationship. We also find that subjective norms have a greater impact on knowledge sharing with women than with men. Collectively, our research results highlight individualized factors for improving customer participation in external facing social media for marketing and product innovation.

Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preservation for Mobile Environment

  • Lu, Chung-Fu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5135-5149
    • /
    • 2015
  • Communications among multi-party must be fast, cost effective and secure. Today's computing environments such as internet conference, multi-user games and many more applications involve multi-party. All participants together establish a common session key to enable multi-party and secure exchange of messages. Multi-party password-based authenticated key exchange scheme allows users to communicate securely over an insecure network by using easy-to-remember password. Kwon et al. proposed a practical three-party password-based authenticated key exchange (3-PAKE) scheme to allow two users to establish a session key through a server without pre-sharing a password between users. However, Kwon et al.'s scheme cannot meet the security requirements of key authentication, key confirmation and anonymity. In this paper, we present a novel, simple and efficient multi-party password-based authenticated key exchange (M-PAKE) scheme based on the elliptic curve cryptography for mobile environment. Our proposed scheme only requires two round-messages. Furthermore, the proposed scheme not only satisfies security requirements for PAKE scheme but also achieves efficient computation and communication.

A Communicationless PCC Voltage Compensation Using an Improved Droop Control Scheme in Islanding Microgrids

  • Ding, Guangqian;Gao, Feng;Li, Ruisheng;Wu, Bingxin
    • Journal of Power Electronics
    • /
    • v.17 no.1
    • /
    • pp.294-304
    • /
    • 2017
  • This paper proposes a point of common coupling (PCC) voltage compensation method for islanding microgrids using an improved power sharing control scheme among distributed generators (DGs) without communication. The PCC voltage compensation algorithm is implemented in the droop control scheme to reduce the PCC voltage deviation produced by the droop controller itself and the voltage drop on the line impedance. The control scheme of each individual DG unit is designed to use only locally measured feedback variables and an obtained line impedance to calculate the PCC voltage. Therefore, traditional voltage measurement devices installed at the PCC as well as communication between the PCC and the DGs are not required. The proposed control scheme can maintain the PCC voltage amplitude within an allowed range even to some extent assuming inaccurate line impedance parameters. In addition, it can achieve proper power sharing in islanding microgrids. Experimental results obtained under accurate and inaccurate line impedances are presented to show the performance of the proposed control scheme in islanding microgrids.

Authentication Technology of Public Key Infrastructure for Electronic Commerce (전자상거래를 위한 공개키 기반 하부구조의 인증 기술)

  • 유창열;임신영;송유진;함호상
    • Proceedings of the CALSEC Conference
    • /
    • 1997.11a
    • /
    • pp.167-184
    • /
    • 1997
  • 암호화 기술의 확장성과 비도 측면에서 우수한 공개키 기반 하부구조(Public Key Infrastructure)는 공개키를 보증하는 기반 기술과 인증서의 안전한 사용 기술로 구성되어있으며, 전자상거래의 기본 기술중 하나이다. 이러한 기본 기술 중에는 키 복구(Key Recovery) 및 비밀 분산(Secret Sharing) 기술등이 포함되며, 인증기관(Certificate Authority: CA)을 통한 키 관리 효율성 및 인중 기관과 사용자 간 안전한 정보 교환 기술이 요구된다. 본 논문에서는 인터넷 기반의 전자 상거래 시 사용되는 공개키 기반 하부구조에 대하여 검토 분석한다.

  • PDF

Public Key-based Authentication Technology for Electronic Commerce (전자 상거래를 위한 공개키 기반 인증 기술)

  • 임신영;유창열;송유진;함호상;박상봉
    • Review of KIISC
    • /
    • v.7 no.3
    • /
    • pp.77-98
    • /
    • 1997
  • 암호화 기술의 확장성 측면에서 우수한 공개키 기반 하부구조(Public Key Infrastructure)는 전자 상거래 서비스에서 필요한 제반 인증 기술을 제공하고 있다. 공개키를 보증하는 기반 기술과 인증서의 안전한 사용 기술은 공개키 기반 전자 상거래의 기본 기술이다. 이러한 기본 기술 중에는 키 복구(Key Recovery) 및 비밀 분산(Secret Sharing) 기술이 포함되며 인증기관(Certificate Authority : CA)을 통한 키 관리 효율성 및 인증기관과 서비스 사용자간의 안전한 정보 교환 기술이 또한 요구된다. 본 논문에서는 인터넷 기반의 전자 상거래 시 사용되는 공개키 기반의 인증구조에 대하여 검토 분석한다.

  • PDF

The Search of the Value of the Humanistic Spirit through (<인생나눔교실>의 인문정신 가치 탐색)

  • Lee, Sang-Min
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.8
    • /
    • pp.255-261
    • /
    • 2018
  • The purpose of this research is to discover the value of experiencing the humanistic spirit of sharing, consideration, sympathy, and communication through the mentoring program between different generations through the . The provides collective mentoring to menti to involuntarily participating mentees, prioritizing traits such as truthfulness, flexibility, and consideration for others. The sharing within the is the sharing of human traits, and displays the characteristics of volunteering. For better mutual connection and interdependence between the mentor and mentee, concentration, sympathy, understanding, and assurance is also needed. Also, sympathy is key trait that both mentors and mentees should possess, along with communication, the lacking of which causes the contradictions within our society and amplification of generational conflicts. Thus, the show the potential to become a unique mentoring program that uses culture and art to experience the humanistic spirit. Also, this program is valuable in that it provides the opportunity for the matured generation to contribute to the local community.

PCA-CIA Ensemble-based Feature Extraction for Bio-Key Generation

  • Kim, Aeyoung;Wang, Changda;Seo, Seung-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.7
    • /
    • pp.2919-2937
    • /
    • 2020
  • Post-Quantum Cryptography (PQC) is rapidly developing as a stable and reliable quantum-resistant form of cryptography, throughout the industry. Similarly to existing cryptography, however, it does not prevent a third-party from using the secret key when third party obtains the secret key by deception, unauthorized sharing, or unauthorized proxying. The most effective alternative to preventing such illegal use is the utilization of biometrics during the generation of the secret key. In this paper, we propose a biometric-based secret key generation scheme for multivariate quadratic signature schemes, such as Rainbow. This prevents the secret key from being used by an unauthorized third party through biometric recognition. It also generates a shorter secret key by applying Principal Component Analysis (PCA)-based Confidence Interval Analysis (CIA) as a feature extraction method. This scheme's optimized implementation performed well at high speeds.