• Title/Summary/Keyword: Mobile messages

Search Result 420, Processing Time 0.025 seconds

An Exploratory Study on the Effects of Psychological Distance and Message Type on Word-of-Mouth in Firm's Facebook (회사 페이스북 메시지의 심리적 거리와 메시지 유형이 구전에 미치는 영향에 대한 탐색적 연구)

  • Lee, Seongwon
    • The Journal of Information Systems
    • /
    • v.29 no.2
    • /
    • pp.71-94
    • /
    • 2020
  • Purpose With the development of Social Network Service(SNS) and mobile devices, many companies have been using the Facebook as a Word-of-Mouth(WOM) channel. This study examines the effects of psychological distance and message type on WOM using the Facebook's real messages. And the moderating effect of the message type on the relationship between psychological distance and WOM was also analyzed. Design/methodology/approach A content analysis was used as a research method. A total 7,483 messages were collected from 50 companies' Facebook Fanpage (based on the ranking of socialbakers.com) and content analysis was conducted using human coding. As the influencing variables, the message type and psychological distance and the number of 'Likes', 'Share', and 'Comment' were used as the dependent variable. The R3.4.4 was used to perform descriptive statistics, cross-tab analysis, and analysis of variance(ANOVA). Findings First, a larger proportion of Facebook messages have close psychological distance for all message types(information, advertisement, event, and customer relationship). Second, 'Like' and 'Comment' number were significantly higher in messages of close psychological distance. Third, the effects of psychological distance on 'Like', 'Share', and 'Comment' number were different according to message type. However, 'advertisement' message type had significantly more numbers for all WOMs('Like', 'Share', and 'Comment') in messages with close psychological distance.

Multi-party Password-Authenticated Key Exchange Scheme with Privacy Preservation for Mobile Environment

  • Lu, Chung-Fu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5135-5149
    • /
    • 2015
  • Communications among multi-party must be fast, cost effective and secure. Today's computing environments such as internet conference, multi-user games and many more applications involve multi-party. All participants together establish a common session key to enable multi-party and secure exchange of messages. Multi-party password-based authenticated key exchange scheme allows users to communicate securely over an insecure network by using easy-to-remember password. Kwon et al. proposed a practical three-party password-based authenticated key exchange (3-PAKE) scheme to allow two users to establish a session key through a server without pre-sharing a password between users. However, Kwon et al.'s scheme cannot meet the security requirements of key authentication, key confirmation and anonymity. In this paper, we present a novel, simple and efficient multi-party password-based authenticated key exchange (M-PAKE) scheme based on the elliptic curve cryptography for mobile environment. Our proposed scheme only requires two round-messages. Furthermore, the proposed scheme not only satisfies security requirements for PAKE scheme but also achieves efficient computation and communication.

Secure Naming Prefix Allocation Scheme for Mobile Content Centric Networking (이동 콘텐츠 중심 네트워크에서의 안전한 네이밍 할당 방안)

  • Lee, Jihoon;Lee, Juyong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.8
    • /
    • pp.1466-1470
    • /
    • 2016
  • As individuals create many contents anytime and anywhere together with the widespread dissemination of smart devices as well as various social networking services (SNS), content centric networking (CCN) has regarded as a new networking technology. However, CCN is exposed to malicious attacks on the mobility management of mobile content sources during handover and high volume of control messages. Therefore, this paper presents a secure duplicate name detection (SecureDND) mechanism without additional control messages by signed information and secure token. It is shown from the performance evaluation that the proposed scheme can provide low control overhead, which results in the network scalability.

Design and Implementation of Real-time Remote Control System (실시간 무선 원격제어 시스템의 설계 및 구현)

  • 이문구;박성원
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1589-1592
    • /
    • 2003
  • Existing system management software solutions show limitations in time and space, as well as problems such as uncertain error messages, and also difficulty providing swift assistance or real time emergency support. Therefore, a wireless remote control system has been designed and implemented in this thesis, which is capable of managing and monitoring remote systems using mobile communication devices (Mobile Phone, PDA, Smart Phone, Webpad) for instantaneous control. The implemented real time wireless remote control system provides remote server management functions, error or event message (unctions, log record functions, authentication function via mobile devices.

  • PDF

Vulnerability Analysis on the Mobile Core Network using OpenAirInterface (OpenAirInterface를 통한 모바일 코어네트워크 보안위협 분석)

  • Oh, In Su;Park, Jun Young;Jung, Eun Seon;Yim, Kang Bin
    • Smart Media Journal
    • /
    • v.9 no.3
    • /
    • pp.71-79
    • /
    • 2020
  • Mobile network is used by many users worldwide for diverse services, including phone-call, messaging and data transfer over the Internet. However, this network may experience massive damage if it is exposed to cyber-attacks or denial-of-service attacks via wireless communication interference. Because the mobile network is also used as an emergency network in cases of disaster, evaluation or verification for security and safety is necessary as an important nation-wide asset. However, it is not easy to analyze the mobile core network because it's built and serviced by private service providers, exclusively operated, and there is even no separate network for testing. Thus, in this paper, a virtual mobile network is built using OpenAirInterface, which is implemented based on 3GPP standards and provided as an open source software, and the structure and protocols of the core network are analyzed. In particular, the S1AP protocol messages captured on S1-MME, the interface between the base station eNodeB and the mobility manager MME, are analyzed to identify potential security threats by evaluating the effect of the messages sent from the user terminal UE to the mobile core network.

Advertisement Dissemination Scheme Using User Preferences in Mobile P2P Environments (모바일 P2P 환경에서 사용자 선호도를 이용한 광고 전송 기법)

  • Jeong, Jiwon;Lee, Suji;Yun, Jinkyoung;Lim, Jongtae;Shin, Jaeryong;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.12
    • /
    • pp.35-49
    • /
    • 2015
  • Recently, with the development of wireless communication technologies and mobile equipments, various studies on mobile P2P networks have been conducted. In this paper, we propose an advertisement dissemination method considering peer's mobilities and preferences in mobile P2P networks. The proposed scheme generates a peer's preference through the analysis of users' activities to disseminate advertisements with user preferences. To reduce duplicated advertising messages and improve reception ratio, the priority of advertisement re-dissemination is determined according to peer's preferences, mobilities, and advertisement reception ratio. We improve the participation rate of the advertisement dissemination of mobile peers using the incentive mechanism in mobile P2P networks. To show the superiority of the proposed scheme, we compare it with the existing scheme in terms of the number of messages and accuracy.

Mutual Authentication Protocol using One Time Password for Mobile RFID System (OTP를 이용한 모바일 RFID 상호인증 프로토콜)

  • Sung, Jong-Yeop;Lee, Sang-Duck;Ryu, Chang-Ju;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.7
    • /
    • pp.1634-1642
    • /
    • 2014
  • Mobile RFID system, that consists of the existing RFID reader mounted on the mobile devices such as smartphones, is able to provide the users a variety of services and convenience. But security of mobile RFID system is too weak like the existing RFID system. In this paper, the mobile RFID mutual authentication protocol with high level of security is proposed to overcome the troubles such as cryptographic protocols in the existing RFID system responding with the same value in every authentication procedure and the exposure in the exchange of messages. The proposed protocol exchanges messages unexposed by using the random numbers generated in the mutual authentication between the tag and the reader and making numbers coded with the symmetric key. Besides, the protocol uses the mutual authentication utilizing OTP by considering the characteristics of the reader embedded in mobile devices in the mutual authentication process between the reader and the server. Because changed message in every authentication, which produces safe from spoofing attacks and replay attacks, etc.

A Study of Consumer's Advertising Attitude Related to Mobile Fashion Advertising and Involvement (모바일 의류광고유형 및 소비자 관여에 따른 광고태도에 관한 연구)

  • Park, Jae-Ok;Lee, Kyung-Hoon;Lee, An-Nie
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.31 no.1 s.160
    • /
    • pp.131-140
    • /
    • 2007
  • The purpose of this study was to clarify differences in consumer's advertising attitude related to type of mobile fashion advertising and level of apparel and advertising involvement groups. This study surveyed consumers who have an experience of receiving mobile fashion advertising. The subjects of this study were men and women aged 10-20 years of age, living in the metropolitan area and judgments sampling was employed. The data were obtained from 480 questionnaires. The measurement instruments were modified and made up by researcher on the basis of previous studies in the same field. Data were statistically analyzed using SPSS 11. Major statistical methods were Cronbach's ${\alpha}$, t-test, regression analysis, and descriptive statistics. The results were as follows: First, differences in effectiveness of fashion ads in both images ad and text messages ad were shown in this study. Respondents preferred images ad to left messages ad only. Also purchase intentions were more preferred by images ad. Second, the differences of consumer's advertising attitude were shown according to level of apparel and advertising involvement groups. The high apparel and ad involvement group was more likely to have a preferable attitude to the ads than the low apparel and ad involvement group. Third, consumer's purchase intentions were influenced by consumer's advertising attitude on two type's ad. The conclusion is that images ad will have great potential for fashion ads by mobile phones in the future. Also consumer attitude between other mobile advertising types must be studied in order to gain further insight into fashion advertising by mobile phone.

MobPrice: Dynamic Data Pricing for Mobile Communication

  • Padhariya, Nilesh;Raichura, Kshama
    • Journal of information and communication convergence engineering
    • /
    • v.13 no.2
    • /
    • pp.86-96
    • /
    • 2015
  • In mobile communication, mobile services [MSs] (e.g., phone calls, short/multimedia messages, and Internet data) incur a cost to both mobile users (MUs) and mobile service providers (MSPs). The proposed model MobPrice consists of dynamic data pricing schemes for mobile communication in order to achieve optimal usage of MSs at minimal prices. MobPrice inspires MUs to subscribe MSs with flexibility of data sharing and intra-peer exchanges, thereby reducing overall cost. The main contributions of MobPrice are three-fold. First, it proposes a novel k-level data-pricing (kDP) scheme for MSs. Second, it extends the kDP scheme with the notion of service-sharing-based pricing schemes to a collaborative peer-to-peer data-pricing (pDP) scheme and a cluster-based data-pricing (cDP) scheme to incorporate the notion of 'cluster' (made up of two or more MUs) in mobile communication. Third, our performance study shows that the proposed schemes are indeed effective in maximizing MS subscriptions and minimizing MS's price/user.

Performance Improvement of Base Station Controller using Separation Control Method of Input Messages for Mobile Communication Systems (이동통신 시스템에서 입력 메시지 분리제어 방식을 통한 제어국의 성능 개선)

  • Won, Jong-Gwon;Park, U-Gu;Lee, Sang-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.4
    • /
    • pp.1058-1070
    • /
    • 1999
  • In this paper, we propose a control model which can control the burst input messages of the BSC(Base Station controller) in mobile communication systems more efficiently and reliably, by dividing the input messages characteristically and using multiprocessor system. Using M/M/c/K queueing model, we briefly analyze proposed model to get characteristic parameters which are required to performance improvement. On the base of the results, we compare our proposed model with the conventional one by using SLAM II with regard to the following factors : the call blocking rate of the input message, the distribution of average queue length, the utilization of process controller(server), and the distribution of average waiting time in queue. In addition, we modified our model which has overload control function for burst input messages, and analyzed its performance.

  • PDF