• Title/Summary/Keyword: Login

Search Result 154, Processing Time 0.038 seconds

Web Site Evaluation with Community Criteria (커뮤니티 요소를 고려하는 웹사이트 평가)

  • 이재관
    • Korean Management Science Review
    • /
    • v.17 no.3
    • /
    • pp.119-129
    • /
    • 2000
  • Design of web site must include community considerations alongside technical design aspects. The main purposes of this study are to identify the community criteria for evaluating web site and to examine how business web sites include the community factors. To identify the evaluation criteria, the author reviewed recent literatures and made a table showing a summary result(see Table 1). appendix shows a sample form NASDAQ(n=82) and KOSDAQ(n=59) which were evaluated. Using the evaluation from with 189 items(Table 3), all sites were visited and review between August 28, 2000 and September 6, 2000. The auther’s evaluations were done from the perspective of community building in business sector. Table 4, summary data on the results of the study, shows that the level of application of the community concept is very low. Among the listed 18 items, only a few items are utilized at more than 50% level. Less than 10% items are Member Profile, Group Segmentation, Backstory, Forum, Chat, Fact-to-face Meeting, and Collaborative Design. the unbalanced utilization due to the lack of community concept in businesses are found. Korea firms are superior to NASDAQ firms in terms of Bulletin Board and FAQ; But Korean firms are inferior and remain at very low level in terms of Member Login, Education Materials, Backstory, Forum, and Integrating Off-line Activities which are core factors of community building.

  • PDF

Development and Performance Evaluation of a Web-based Management System for Greenhouse Teleoperation (시설재배를 위한 웹 기반의 원격 관리 시스템의 개발 및 성능평가)

  • 심주현;백운재;박주현;이석규
    • Journal of Biosystems Engineering
    • /
    • v.29 no.2
    • /
    • pp.159-166
    • /
    • 2004
  • In this study, we have developed a web-based management system for greenhouse teleoperation. The remote control system consisted of a database, a web-server, a controller in greenhouse, and clients. The database in the server stored user's information and greenhouse conditions was used to manage user's login and conditioning data. The management system developed by using Java applet, which was a client program for effective and easy management of greenhouse, monitored the greenhouse in real time. Master and driver boards were installed in the greenhouse control unit. Database on flowering to collect and analyze data exchanged data with the server. The master board could be managed effectively by timer routine, repeat control within setting time, and algorithm of setting points. Also, the greenhouse conditions could be controlled by manual or remote controller(PC) through a web browser in internet. Furthermore, all of the control devices of the greenhouse were managed by remote control of using PC and checked via camera installed in greenhouse. Finally, we showed the experimental results of the system which was installed in Pusan Horticultural Experiment Station.

Software Platform Design and Implementation for Interworking between Smart TV, PC and Smart Phone (스마트 TV, PC, 스마트 폰 간의 상호 연동을 위한 소프트웨어 플랫폼 설계 및 구현)

  • Kim, Min-Jae;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.9
    • /
    • pp.831-836
    • /
    • 2012
  • To provide convenient life, we consider the situation of using the smart phone to control smart TV and PC in home and office. In this paper, we design the interworking platform between smart TV, smart phone and PC, and implement their applications. Our smart phone application controls the smart TV and PC, where our smart TV application communicates with the smart phone and PC can be booted by the login and password information given form our smart phone application. We hope that our platform design and application implementation will be contributed to be a foundation of interworking between various smart devices in the near-future real smart life.

Design and Implementation of Web Based Education Tool for Level Learning (수준별 학습을 위한 웹 기반 교육도구의 설계 및 구현)

  • 김옥남;임인택
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.05a
    • /
    • pp.252-256
    • /
    • 2000
  • In this paper, WBI tool is designed and implemented to meet the level teaming requirements. The system is composed of management part for teacher and user part for students. The management part supports the teacher to upload the lecture notes and the testing sheets, and to evaluate the testing results. The students can study the lecture notes and examine the online tests based on their teaming level. The students can evaluate their achievement by themselves after test and can study deep learning or supplementary learning. By applying the level teaming concept, the implemented can provide the interest to the students and enhance the degree of achievement.

  • PDF

Design of the Specific IP Access Deny for the Database (데이터베이스에서 지정된 IP 주소 접근 금지를 위한 기능 설계)

  • Jang, Seung-Ju;Kim, Sung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.8
    • /
    • pp.716-721
    • /
    • 2014
  • This paper proposes how to prevent of vulnerability from IP address attack of Oracle DB by C program environments. An attacker may try to login DB by connectng remote IP address. Recently an attacker use foreign IP address and try to connect to DB using known DB account. Therefore, DB data is frequently disclosed. I propose a new idea that develops specific IP address blocking module in C program in the Oracle DB. By this module, we can use the Oracle DB safely.

Understanding Seniors' Acceptance and Usage for Online Education Program: Based on Grounded Theory (온라인 교육 수용 환경에서 시니어들의 디지털 행동 이해: 근거이론 적용)

  • Jang, Hyun Yong;Park, Sang Cheol;Koh, Joon
    • Knowledge Management Research
    • /
    • v.21 no.2
    • /
    • pp.77-100
    • /
    • 2020
  • This study conducted a qualitative study on 23 seniors over 55 years old to understand the digital behavior of seniors in the online education acceptance environment. Grounded Theory methodology was applied to the initial enrollment behavior, login behavior, and utilization behavior of online education program. Through the process of open coding, axis coding, and selective coding, the framework in the online education environment of the senior generation was finally derived. As a causal conditions for the senior generation to participate in the online education environment, goal orientation, relationship orientation, leisure orientation and external compulsory were derived, and shadow work appeared as the central phenomenon. Also, contextual conditions resulted in social change, physical and cognitive aging, and psychological atrophy. The intervening conditions included digital device acceptance, educational attitudes, environmental factors, and self-efficacy. Based on this, the action/interactions strategy formed a positive and negative attitude toward shadow work. As a result, positive response behavior, compromising behavior, and shadow work avoidance behavior were shown. It is hoped that this study will be reflected in future researches for the use of digital devices of the elderly and the expansion of online education participation and government policy.

Performance Improvement of Infusion Detection System based on Hidden Markov Model through Privilege Flows Modeling (권한이동 모델링을 통한 은닉 마르코프 모델 기반 침입탐지 시스템의 성능 향상)

  • 박혁장;조성배
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.6
    • /
    • pp.674-684
    • /
    • 2002
  • Anomaly detection techniques have teen devised to address the limitations of misuse detection approach for intrusion detection. An HMM is a useful tool to model sequence information whose generation mechanism is not observable and is an optimal modeling technique to minimize false-positive error and to maximize detection rate, However, HMM has the short-coming of login training time. This paper proposes an effective HMM-based IDS that improves the modeling time and performance by only considering the events of privilege flows based on the domain knowledge of attacks. Experimental results show that training with the proposed method is significantly faster than the conventional method trained with all data, as well as no loss of recognition performance.

Security Analysis of a Biometric-Based User Authentication Scheme (Biometric 정보를 기반으로 하는 사용자 인증 스킴의 안전성 분석)

  • Lee, Young Sook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.1
    • /
    • pp.81-87
    • /
    • 2014
  • Password-based authentication using smart card provides two factor authentications, namely a successful login requires the client to have a valid smart card and a correct password. While it provides stronger security guarantees than only password authentication, it could also fail if both authentication factors are compromised ((1) the user's smart card was stolen and (2) the user's password was exposed). In this case, there is no way to prevent the adversary from impersonating the user. Now, the new technology of biometrics is becoming a popular method for designing a more secure authentication scheme. In terms of physiological and behavior human characteristics, biometric information is used as a form of authentication factor. Biometric information, such as fingerprints, faces, voice, irises, hand geometry, and palmprints can be used to verify their identities. In this article, we review the biometric-based authentication scheme by Cheng et al. and provide a security analysis on the scheme. Our analysis shows that Cheng et al.'s scheme does not guarantee any kind of authentication, either server-to-user authentication or user-to-server authentication. The contribution of the current work is to demonstrate these by mounting two attacks, a server impersonation attack and a user impersonation attack, on Cheng et al.'s scheme. In addition, we propose the enhanced authentication scheme that eliminates the security vulnerabilities of Cheng et al.'s scheme.

USB security solution using 2 fator authentication (2차 인증방식을 이용한 USB보안 솔루션 (USS Solution))

  • Ko, Sang-Hyun;Han, Seok-Jin;Choi, Yoon-SU;Bae, Jong-Su;Lee, Hyun
    • Annual Conference of KIPS
    • /
    • 2017.11a
    • /
    • pp.267-270
    • /
    • 2017
  • As IT technology developed, storage media also developed. Among them, USB, which is a removable storage medium, is used not only to have several per person but also to work in various companies. Users store valuable and confidential data within USB. As time went on, the need for security increased. In order to solve this security problem, USB has been introduced to allow users to access internal files by inputting ID and password by embedding a security program in USB. However, the method of storing ID and Password inside is low confidentiality and high risk of information leakage. To solve these problems, we propose a 2 factor authentication system using Radius server in addition to login authentication. The proposed system not only improves the authenticity of the device, but also reduces the risk of infringement of personal information when lost. It also encrypts internal files to increase the confidentiality of internal information.

Study about remote-access by using TTSSH to OpenSSH Server (TTSSH를 이용한 OpenSSH 서버로의 원격접속에 관한 연구)

  • 강민정;강민수;박연식
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.490-493
    • /
    • 2002
  • Many servers that is operated in present earth are UNIX base, is trend that server of LINUX base is increasing steadily recently. When users who have account to this server wish to do remote access, instruction that use most easily is‘telnet’, security does not consist entirely about ID and password that this uses at communication substance as well as login. The interest about latest SSH is rising by the alternative, but SSH has various kinds problem in following telnet's fame. Therefore, We studied about problems and the solution that can happen when window users attempted remote access laying stress on OpenSSH.

  • PDF