• Title/Summary/Keyword: Mobile security

Search Result 1,977, Processing Time 0.028 seconds

A study on ACF Comparsion to Various Spreading Sequence for T-DMB Emergency Broadcasting (T-DMB 재난방송을 위한 다양한 확산 수열 자기상관특성 비교 연구)

  • Lee, Seung-Ho;Lee, Yong-Tae;Kim, Geon;Yang, Chung-Mo;Kim, Wan-Sik;Cho, Ju-Phil;Park, Yong-Woon;Cha, Jae-Sang
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.125-130
    • /
    • 2011
  • In this paper, there was compared to the performance of the Auto Correlation Feature of each code using Spreading code for improving the data transmission technology in T-DMB disaster broadcasting. Generally, wireless mobile communication environment such as DMB occur the Inter Code Interference and the Multi-Path Interference in the process of the identification of the transmitter from the receiver. To solve this problem, spreading code technology was able to improve the security property. Also, it will be able to use in many fields of signal processing, because to control a period of the code can be variable. Therefore, in this paper, we studied to compare the performance of excellent orthogonal Golay code, Kasami code and ZCD(Zero Correlation Duration) code.

Type Analysis and Countermeasures of Side Effects of using Smart Phone (스마트폰 이용의 부작용 유형 분석 및 대응 방안)

  • Kim, Tae-Hee;Kang, Moon-Seol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2984-2994
    • /
    • 2013
  • The emergence of smart phones has brought about a revolution in introducing a computer into the palm of a hand, and this revolution has lead to a smart society that offers comfort and joy in life; however, some side effects including a smart phone syndrome have been identified on a wider and more varied scale compared with any other IT devices of the past. This paper deduced side effect types and key issues according to type focusing on risk factors in accordance with the purpose of the use of smart phones, and diagnosed social effects based on them. In addition, based on the diagnosed results, the study proposed solutions to minimize side effects in order to produce social understanding and sympathy concerning the desirable utilization of smart phones. The proposed solutions should be able to cope with visible and potential side effects systematically by helping people to utilize smart phones, which are a platform of creativity, cooperation, communications, and entertainments, in a desirable way.

Sites and tools manufactured in accordance with the Web Accessibility Guidelines (웹접근성 지침에 따른 사이트와 도구 제작)

  • Kim, Woong-jae;Oh, Ji-hwan;Lee, Myung-hoon;Lee, Min-seung;Jung, Suji;Ji, Min-kyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.1054-1056
    • /
    • 2014
  • Means reducing the gap to prevent discomfort to use information from the perspective of Web accessibility is disabled. The current was strong sanctions that have been implemented from the year 2014 to the beginning Government, the public policy of the Web Accessibility Web accessibility compliance obligations. According to 2013 data of the Korea Information Security Agency is only half that of the general public by 28.8% to 100% of the domestic SNS public utilization. Began to cause a change in the web environment and the emergence of mobile SNS. And is a factor that interferes with utilization of the informational content to be neglected Prosumer the environment of their production is consumed too quickly, rapidly problem. Let's start from the idea that we provide a convenient tool for Web accessibility is not an issue on the web site accessibility standards of the project is to create these problems.

A Design of the Smart Control System for Industrial Automation Equipment (산업용 자동화 장비를 위한 스마트 제어 시스템 설계)

  • Kim, Bo-Hun;Kim, Hwang-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.677-684
    • /
    • 2017
  • Smart devices are used in a variety of industries, because applications for them are easy to develop and portable. However, industrial equipment can cause security problems for information and accidents when controlling the actuator of the equipment at a remote location. In this paper, we studied methods of solving these problems and the advantages of applying smart control systems to industrial equipment. We propose a manual manipulation method using queries and a smart control access procedure for controlling equipment using a smart device. In addition, we propose a data transmission method employing multiple encryption protocols and a user authentication method using unique information from the smart device and Q & A as the communication data protection and user authentication methods, respectively. In order to evaluate its performance, an operation test of the smart control system and user authentication comparison experiment were performed. In order to understand the advantages of applying the smart control system to the equipment, we conducted a comparative experiment with a teach pendant and evaluated its reaction time in case of error.

An Empirical Analysis on the Compromised Delivery Model of Traditional Market Using Delivery Application (배달앱을 활용한 전통시장 배송 모형에 관한 실증분석)

  • YOO, Chang-Kwon;KIM, Gi-Pyoung
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.10
    • /
    • pp.45-51
    • /
    • 2019
  • Purpose - The purpose of this study was to propose a win-win development plan for not only suppliers of delivery applications but also traditional market vendor companies and delivery riders by analyzing existing delivery models and presenting a new delivery model to enhance competitiveness of the traditional market using delivery apps. Research desgin, data, and methodology - Specifically, small retailers, such as traditional markets and supermarkets, presented a compromised delivery model that utilizes the platform of specialized delivery app service providers for order reception, and that the delivery is delivered by delivery systems jointly hired by Vendor companies, such as franchising companies. To validate the significance of the trade-off delivery model, a cost-benefit analysis was conducted by those involved in the delivery application. Results - From the perspective of suppliers of specialized delivery applications, it is analyzed that the use of specialized delivery applications in traditional markets will be a new market opportunity for service providers to achieve increased sales. It is expected that consumer choice and satisfaction will be increased as convenience and accessibility of traditional market businesses that were available only through direct visit from the user side of the delivery application will be expanded. From the standpoint of delivery application franchises, it is analyzed that they can seek to increase sales and increase customer service as well as ease labor cost burden due to joint employment of delivery riders. The delivery rider will be able to seek to improve customer service due to job security, wage stability, risk reduction and overheated competition due to direct employment. Conclusion - In conclusion, the compromised delivery model solved the problems raised in the preceding study conducted on delivery application suppliers, users, franchises, and riders to establish that it could be a strategic alternative to increasing sales and expanding detailed rights for the self-employed in the traditional market, which are experiencing difficulties in management. However, the adoption of a compromise delivery model requires social consensus from those involved in the delivery application and requires legal, institutional and policy support, which will require continued follow-up research on the delivery model in the future.

Effects of Trust and Cognitive Absorption on Smart Phone Use and User Satisfaction (신뢰와 인지적 몰입 매개변수가 스마트폰의 사용과 만족도에 미치는 영향 분석)

  • Lee, Bong-Gyou;Yeo, Yoon-Ki;Kim, Ki-Youn;Lee, Jong-Hoon
    • The KIPS Transactions:PartD
    • /
    • v.17D no.6
    • /
    • pp.471-480
    • /
    • 2010
  • The purpose of this study is to explore determinants which affect the significant increase in the user acceptance of smart phone. This study also analyzes the effect of each variable on the actual acceptance by empirical methods. In this study, first, the system quality and the service quality are defined as independent variables based on developed IS success model of DeLone & McLean(2003). Second, we proposed the research model by providing trust and perceptual immersion as intermediate variables, and user satisfaction and actual use as dependent variables by the proceeding research for accepting information technology and new service. Third, the statistical analysis is conducted by surveying to 200 smart phone users for verifying a validity of research models and hypotheses. As a result, almost hypotheses are accepted in confidence interval except for the hypothesis between security and trust variable.

Global Wireless LAN Roaming Status in Korea and Its Development Methods (국내 글로벌 무선랜 로밍 구축 현황 및 발전 방안)

  • Wang, Gicheol;Cho, Jinoh;Cho, Gihwan
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.7
    • /
    • pp.15-21
    • /
    • 2015
  • Due to the appearance of various mobile terminals like smartphone, smartpad, and smartwatch and tremendous development of WiFi technology, data utilization rate on WiFi network is significantly increasing. As a result, users are wanting to use WiFi network using only a simple identification at a visited place as if they are at their home institute. In this paper, we review the domestic status of eduroam service which supports global extension of wireless network access environment and present the future development perspective of the service in Korea. Besides, we shed light on the current status of WiFi sharing service between domestic universities and propose some methods to facilitate the join of domestic universities in eduroam service.

Intrusion Artifact Acquisition Method based on IoT Botnet Malware (IoT 봇넷 악성코드 기반 침해사고 흔적 수집 방법)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.7 no.3
    • /
    • pp.1-8
    • /
    • 2021
  • With the rapid increase in the use of IoT and mobile devices, cyber criminals targeting IoT devices are also on the rise. Among IoT devices, when using a wireless access point (AP), problems such as packets being exposed to the outside due to their own security vulnerabilities or easily infected with malicious codes such as bots, causing DDoS attack traffic, are being discovered. Therefore, in this study, in order to actively respond to cyber attacks targeting IoT devices that are rapidly increasing in recent years, we proposed a method to collect traces of intrusion incidents artifacts from IoT devices, and to improve the validity of intrusion analysis data. Specifically, we presented a method to acquire and analyze digital forensics artifacts in the compromised system after identifying the causes of vulnerabilities by reproducing the behavior of the sample IoT malware. Accordingly, it is expected that it will be possible to establish a system that can efficiently detect intrusion incidents on targeting large-scale IoT devices.

Economic Activities in Digital Platforms: Types, Natures, Risks, Policy Suggestions (플랫폼 경제활동에 대한 시론적 고찰: 유형, 특성, 예상위험, 정책대안을 중심으로)

  • Kim, Suyoung;Kang, Myungjoo;Ha, Eunsol
    • 한국사회정책
    • /
    • v.25 no.4
    • /
    • pp.199-231
    • /
    • 2018
  • The development of ICT has led to changes in the pattern and the meaning of work and requires restructuring of the existing social security system, which was established chiefly for the wage workers in the industrial economy. However, while economic activities within the digital platform markets are different from industrial labour, there is still a lack of discussion on what social problems platform workers can face and how to cope with them. As a comprehensive sketch of economic activities in platform economy, this study identifies the types of platform workers and analyses three characteristics of their economic activities - flexibility, virtuality, and connectivity. It then examines what social risks can be derived form the three characteristics. This research lastly suggests alternative social safety nets and policies to alleviates the social risks and problems that platform workers may face in the digital society.

Topic and Survey Methodological Trends in 'The Journal of Information Systems' ('정보시스템연구'의 연구주제와 서베이 방법론 동향분석)

  • Ryoo, Sung-Yul;Park, Sang-Cheol
    • The Journal of Information Systems
    • /
    • v.27 no.4
    • /
    • pp.1-33
    • /
    • 2018
  • Purpose The purpose of this study is to review topic and survey methodological trends in 'The Journal of Information Systems' in order to present the practical guidelines for the future IS research. By attempting to conduct a meta-analysis on both topic and survey methodological trends, this study could provide researchers wishing to pursue this line of work further with what can be done to improve IS disciplines. Design/methodology/approach In this study, we have reviewed 185 papers that were published in 'The Journal of Information Systems' from 2010 to 2018 and classified them based on topics studied and survey methodologies used. The classification guidelines, which was developed by Palvia et al.(2015), has been used to capture the topic trends. We have also employed Struab et al.(2004)s' guidelines for securing rigor of validation issues. By using two guidelines, this study could also present topic and rigor trends in 'The Journal of Information Systems' and compare them to those trends in International Journals. Findings Our findings have identified dominant research topics in 'The Journal of Information Systems'; 1) social media and social computing, 2) IS usage and adoption, 3) mobile computing, 4) electronic commerce/business, 5) security and privacy, 6) supply chain management, 7) innovation, 8) knowledge management, and 9) IS management and planning. This study also could offer researchers who pursue this line of work further practical guidelines on mandatory (convergent and discriminant validity, reliability, and statistical conclusion validity), highly recommended (common method bias testing), and optional validations (measurement invariance testing for subgroup analysis, bootstrapping methods for testing mediating effects).