• Title/Summary/Keyword: Mobile Internet Services

Search Result 1,149, Processing Time 0.028 seconds

Study on the Standardizations Technology of Mobiloud (모빌라우드 표준화 연구)

  • Choi, Sung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2012.11a
    • /
    • pp.1344-1347
    • /
    • 2012
  • Mobile Cloud Computing services anywhere, anytime access to the Internet via a mobile terminal means to provide services, speakers are called Mobiloud. Computing processing power limitations of mobile devices, storage, due to space constraints, the tasks handled by mobile devices and data processing services to move to cloud environments. In recent years, smartphone, tablet PC and mobile device companies and individuals to spread and spread, and the content of the accelerating cloud painters, mobile cloud that can communicate with each other requires a standard service.

Investigation of Factors Influencing Consumer Initial Trust and Intention to Use Mobile Banking Services (모바일 뱅킹 서비스에 대한 사용자 초기신뢰와 사용의도에 영향을 미치는 요인들에 관한 실증적 연구)

  • Kim Gimun;Kim Won-Woo;Lee Ho Geun
    • Korean Management Science Review
    • /
    • v.22 no.2
    • /
    • pp.13-34
    • /
    • 2005
  • Mobile banking service has emerged as an important profit source for both banks and mobile phone service companies. However, the growth of the mobile banking service is behind the expectation of banks and mobile phone companies. One plausible explanation for this laggard diffusion of mobile banking may be the lack of consumers' initial trust on the service. Therefore, this study investigates the critical factors in building trust and intention to use mobile banking services. Our research results show that propensity-to-trust, structural assurance, and relative advantages of services have significant impacts on consumers' initial trust in mobile banking service Furthermore, initial trust in mobile banking service is a critical factor for adopting mobile banking services Contrary to our expectation, however, reputation of banks and mobile phone companies are not significant in attracting consumers to mobile banking services.

Design of Telematics Mobile System Based on WiBro (와이브로 기반의 텔레매틱스 시스템 설계)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.5
    • /
    • pp.259-264
    • /
    • 2010
  • In this paper, for supporting more variable services than typical DSRC, brand call service, truck and an official vehicle services, etc. using location information and mobile communication network could be adapted. emergence helping information providing, multimedia service that are wireless internet, movies and games, are increasingly needed for competible wireless car mobile terminal. Those needs would make a development a wireless telemetries system based on WiBro interface in ubiquitous vehicle environment. We analysis the proposed telematics mobile terminal using simulation which is concerned about fixed bandwidth and dynamic bandwidth.

Characteristics of Individuals Influencing Adoption Intentions for Portable Internet Service

  • Kim, Moon-Koo;Jee, Kyoung-Yong
    • ETRI Journal
    • /
    • v.28 no.1
    • /
    • pp.67-76
    • /
    • 2006
  • This study aims to identify the factors that influence adoption intentions towards portable Internet service, based on the individual characteristics that assist in creating markets and developing strategies. Two types of factors are defined: individual characteristics including demographics, existing services usages, prior knowledge, adoption attitudes, and service evaluations; and adoption intentions including the willingness to subscribe, subscription term, willingness to pay, usage type, and preferred terminal. The results indicate that the importance of demographic variables depends on adoption intentions, and that users of mobile Internet service and wireless LAN are probably targets for portable Internet service. Furthermore, the results demonstrate the need for an enhanced perception of the usefulness and ease of use of service, as well as an intensive marketing activity for potential users and a bearable innovation to stimulate the market for portable Internet service.

  • PDF

L-PRS: A Location-based Personalized Recommender System

  • Kim, Taek-hun;Song, Jin-woo;Yang, Sung-bong
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.113-117
    • /
    • 2003
  • As the wireless communication technology advances rapidly, a personalization technology can be incorporated with the mobile Internet environment, which is based on location-based services to support more accurate personalized services. A location-based personalized recommender system is one of the essential technologies of the location-based application services, and is also a crucial technology for the ubiquitous environment. In this paper we propose a framework of a location-based personalized recommender system for the mobile Internet environment. The proposed system consists of three modules the interface module, the neighbor selection module and the prediction and recommendation module. The proposed system incorporates the concept of the recommendation system in the Electronic Commerce along with that of the mobile devices for possible expansion of services on the mobile devices. Finally a service scenario for entertainment recommendation based on the proposed recommender system is described.

  • PDF

Proxy-Quorum Based Replication Control Schemes for Mobile Internet Systems (이동형 인터넷 기기를 위한 위임 정족수 기반의 복제데이터 제어 기법)

  • Byun Si-Woo
    • Journal of Internet Computing and Services
    • /
    • v.5 no.1
    • /
    • pp.51-57
    • /
    • 2004
  • Mobile Internet allows users to request critical information and receive swift responses at any places, but mobile users could suffer from unreliable and ill-timed services due to the characteristics of wireless media, One way that reduces possibility of the unsatisfactory services is data replication. Data Replica1ion, however, inevitably induces the overhead of maintaining replica consistency which requires more expensive synchronization mechanism. We propose a new replicated data management scheme in distributed mobile environment, In order to alleviate negative impact of synchronization message overhead in fault-prone mobile Internet environment, we devise a new replication control scheme called proxy quorum consensus (PQC), PQC minimizes the message overhead by coordinating quorum access activities by means of proxy mediated voting (PMV) which exploits reliable proxy hosts instead of unreliable mobile hosts in voting process, We also propose a simulation model to show the performance of PQC. Based on the results of the performance evaluation, we conclude that PQC scheme outperforms the traditional schemes.

  • PDF

Meeting Real Challenges in Eliciting Security Attributes for Mobile Application Development

  • Yusop, Noorrezam;Kamalrudin, Massila;Yusof, Mokhtar Mohd;Sidek, Safiah
    • Journal of Internet Computing and Services
    • /
    • v.17 no.5
    • /
    • pp.25-32
    • /
    • 2016
  • There has been a rapid growth in the development of mobile application resulting from its wide usage for online transaction, data storage and exchange of information. However, an important issue that has been overlooked is the lack of emphasis on the security issues at the early stage of the development. In fact, security issues have been kept until the later stage of the implementation of mobile apps. Requirements engineers frequently ignore and incorrectly elicit security related requirements at the early stage of mobile application development. This scenario has led to the failure of developing secure and safe mobile application based on the needs of the users. As such, this paper intends to provide further understanding of the real challenges in extracting security attributes for mobile application faced by novice requirements engineers. For this purpose, two experiments on eliciting security attributes requirements of textual requirements scenario were conducted. The performance related to the correctness and time taken to elicit the security attributes were measured and recorded. It was found that the process of eliciting correct security attributes for mobile application requires effort, knowledge and skills. The findings indicate that an automated tool for correct elicitation security attributes requirement could help to overcome the challenges in eliciting security attributes requirements, especially among novice requirements engineers.

Understanding Watching Patterns of Live TV Programs on Mobile Devices: A Content Centric Perspective

  • Li, Yuheng;Zhao, Qianchuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3635-3654
    • /
    • 2015
  • With the rapid development of smart devices and mobile Internet, the video application plays an increasingly important role on mobile devices. Understanding user behavior patterns is critical for optimized operation of mobile live streaming systems. On the other hand, volume based billing models on cloud services make it easier for video service providers to scale their services as well as to reduce the waste from oversized service capacities. In this paper, the watching behaviors of a commercial mobile live streaming system are studied in a content-centric manner. Our analysis captures the intrinsic correlation existing between popularity and watching intensity of programs due to the synchronized watching behaviors with program schedule. The watching pattern is further used to estimate traffic volume generated by the program, which is useful on data volume capacity reservation and billing strategy selection in cloud services. The traffic range of programs is estimated based on a naive popularity prediction. In cross validation, the traffic ranges of around 94% of programs are successfully estimated. In high popularity programs (>20000 viewers), the overestimated traffic is less than 15% of real happened traffic when using upper bound to estimate program traffic.

The Study on the Mobile internet proliferation in Korea (한국에서의 모바일인터넷활용에 관한 연구)

  • Kim, Kyung-Woo
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.01a
    • /
    • pp.147-148
    • /
    • 2016
  • The purpose of this paper is to investigate the diffusion process of mobile internet use in Korea and to explore the determinants driving MIU. A survey was conducted to collect data to empirically assess the research model. In total, 543 usable responses were collected using a questionnaire derived from previous research. Both the structural equation model and partial least squares were used to study the model concerning different user groups. Findings, The results indicate that there are significant differences in the users' perceptions of mobile internet usage during its different innovation diffusion stages. Of the determinants, perceived enjoyment is the most important predictor of mobile internet use. In addition to motivating users by making services more enjoyable, the findings suggest that practitioners should take the differences of adopter groups into account. Making the mobile internet easy to use and compatible with users' lifestyles would promote the use of technology as well.

  • PDF

Cross-Layer Design for Mobile Internet Services in Cellular Communications Systems

  • Jeong, Dong-Geun
    • Information and Communications Magazine
    • /
    • v.24 no.2
    • /
    • pp.64-73
    • /
    • 2007
  • Recently, cross-layer design approach has been greatly attracting researchers' attention as an alternative for improving the performance of wireless data networks. The main reason why cross-layer approaches are particularly well suited for wireless networks is that there exists direct coupling between physical layer and upper layers. Therefore, with cross-layer approach, the protocol designers try to exploit the interaction between layers and promote adaptability at all layers, based on information exchange between layers. In this article we focus on the cross-layer engineering for high data-rate mobile Internet services through cellular networks. First, the general considerations in cross-layer engineering are outlined. Then, we discuss the common approach in literatures, which mainly deals with adaptability in physical and medium access control layer. Finally, we show that the cross-layer engineering taking account of all layers is more adequate for the mobile Internet services cellular network.