• Title/Summary/Keyword: Networking behavior

Search Result 147, Processing Time 0.033 seconds

An ID-based Blind Signature Scheme using the Gap Diffie-Hellman Group in Wireless Environments (무선환경에 적합한 GaP Diffie-Hellman 그룹을 사용한 ID 기반 은닉서명 방식)

  • 김현주;김수진;원동호
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.6
    • /
    • pp.720-728
    • /
    • 2003
  • Blind signature is such a signature scheme that conceals the contents of signature itself and who is the user of the signature make user's anonymity possible. For this reason, they are used in security services such as electronic cashes and electronic votes in which the behavior of actor should not be exposed. In this paper we propose an ID-based blind signature scheme from Gap Diffie-Hellman group. Its security is based on the hardness of Computational Diffie-Hellman Problem. Proposed scheme efficiently improve against existing blind signature scheme by using two-pass protocol between two users and by reducing computation process. Therefore it can be used efficiently in wireless PKI environment.

The Relationships among Drinking Behaviors, Sober Motivation, and Drinking Problems of Citizens living in an Urban Area (일부 도시지역 주민의 음주행태와 절주동기, 문제음주와의 관계)

  • Lee, Hyo Young;Im, Hyuk;Kim, Hye Sook;Kim, Min Jung
    • The Korean Journal of Health Service Management
    • /
    • v.14 no.2
    • /
    • pp.79-91
    • /
    • 2020
  • Objectives: The purpose of this study was to identify a regional difference among drinking behaviors, sober motivation, and drinking problems. Methods: The subjects included 600 citizens living in two regions, Busan. Descriptive analysis, t-test, correlation, and path analysis were used to confirm the regional difference. Results: The path of drinking method on sober motivation was statistically significant in both regions and drinking attitude was found to be a common factor that weakens an individual's sober motivation. Besides, the path of social networking on sober motivation had a difference in statistical significance between the two regions. Finally, the influence of social networks of District N (comparison region) on sober motivation was statistically significant and stronger than that of District D. Conclusions: A social environment-centered intervention to address drinking problems is essential in District N because of its people's tendency to drink together. On the other hand, an individual-focused intervention is preferred in District D where sober motivation is mainly affected by drinking method and attitude.

Analysis of the change of the characters according to the change of the media -A Study on Composite Representation of Game Character in Sandboxed Indy Game (매체의 변화에 따른 캐릭터의 시대적 변화분석 -샌드박스형 인디 게임에 있어 게임 캐릭터 융복합적 표현법에 대한 고찰)

  • Lee, Dong-Lyeor
    • Journal of Digital Convergence
    • /
    • v.17 no.6
    • /
    • pp.335-340
    • /
    • 2019
  • With the development of the media, pirate platforms and technologies are critical to the design of video content. Games based on online platforms and networking can help you develop games and expand your game as games are developed. Better yet. This paper is a major feature of the growth of the sandbox game that leads the game of InGame. Phenotypical 3D Dress Graphics You can study the usefulness of graphics based on doubles, the advantages of game characters, and space game graphics.

Effect of the Scarcity Message Type and Sender Type on Purchase Intention in Instagram as a Distribution Channel

  • Inyup LEE;Dong-Kyu KIM;Chulhwan CHOI
    • Journal of Distribution Science
    • /
    • v.21 no.7
    • /
    • pp.73-82
    • /
    • 2023
  • Purpose: Social networking services have been recognized as an attractive distribution channel at a time when efforts to deliver effective messages to consumers are essential amid a flood of advertisements in the multi-media era. In that sense, this study investigated the effect of the scarcity message type (limited-time vs. limited-quantity) and sender type (corporate vs. consumer) on the intention to purchase golf equipment by Instagram distribution channel. Research design, data and methodology: Data from 108 college students in their 20s and 30s with experience using Instagram were collected online through convenience sampling. A frequency analysis, exploratory factor analysis, reliability analysis, independent sample t-test, and two-way analysis of variance were performed using SPSS 23.0. Results: The results showed that limited-quantity messages induce a higher purchase intention than limited-time messages. Similarly, consumer-sent advertisements induce a higher purchase intention than corporate-sent advertisements. Further, there is no statistically significant interaction effect of the scarcity message type and sender type on the intention to purchase golf equipment. Conclusions: This study is meaningful in verifying consumers' purchase intention depending on the type of scarcity message and the type of sender in Instagram advertisements. The results yield significant implications for marketers and several directions for future research.

A Comparative Study of the Accelerator and Venture Capital through Investment Behavior (투자 행태를 통한 엑셀러레이터와 벤처캐피탈의 비교 연구)

  • Choi, Yunsoo;Kim, Dohyeon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.11 no.4
    • /
    • pp.27-36
    • /
    • 2016
  • Venture companies, which can commercialize various kinds of new ideas and creating added value, are amid of great attention. Since most of venture companies in initial development stages cannot finance its capital sufficiently all by their own, investments from outside investors are key factor to their survival. However, they have lots of difficulties in financing from outside investors because of their typical uncertain but favorable investment characteristics. Moreover, even though they had successfully financed from outsiders, problems related to their stakeholders, such as interrupting in management and types of investments, cause contrary results to firms. Therefore there are various kinds of systems for startups like angels, venture capitals and governmental supports. Even so, investments and supports for venture companies are still not sufficient. 'Accelerator', which is a brand-new investment type started from Silicon Valley in United States during the mid 2000, is growing attention these-days. It mainly supports startups financially in the initial development stages, however, it also supports the firms by providing mentoring, education and networking services. On the other hand, difference between existing investment types and performance of the investment is still in controversy. Therefore this study compared investment behavior between accelerator and venture capital. As a result, we found that the difference in investment behavior of accelerators and venture capital.

  • PDF

Factors Related to Smartphone Dependence among Adults in Their 20s (20대 성인의 스마트폰 의존 관련 요인)

  • Park, Jeong-Hye
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.8
    • /
    • pp.195-204
    • /
    • 2020
  • The purpose of this study was to explore factors associated with smartphone dependence among adults in their 20s. The data were derived from the 2017 Survey on Smartphone Over-dependence conducted by the Ministry of Science and ICT and the National Information Society Agency. There were 3,684 participants. The data were analyzed by frequency, percentage, mean, standard deviation, independent t-test, Pearson's correlation coefficient, and weighted hierarchical multiple regression analysis. For the results, factors related with higher smartphone dependence of participants were duration (β=.18, p=.000) and frequency (β=.04, p=.000) of usage, gaming (β=.15, p=.000), watching videos (β=.09, p=.000), mobile shopping (β=.05, p=.000), working (β=.05, p=.010), e-mailing (β=.13, p=.000), and sports betting (β=.07, p=.000). Music (β=-.07, p=.000) and adult content (β=-.07, p=.000) significantly reduced their smartphone dependence. SNS (Social Networking Services) (β=.01, p=.358) and instant messengers (β=-.02, p=.330) were not factors related to smartphone dependence. However, instant messengers were the most used by participants and had a strong correlation with working (r=.55, p=.000). This study shows that smartphone usage patterns related with smartphone dependence among adults in their 20s are different from those of children and adolescents. These results could be used to more deeply understand smartphone dependence among adults in their 20s and plan early detection and prevention and care of dependence.

A self-portrait of the information society: An Arguments on the SNS users' Responsibilities

  • Seo, Ran-Sug
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.8
    • /
    • pp.159-172
    • /
    • 2020
  • Social networking services (SNS) are developing significantly with the Internet and smartphones. It's a friendly social media, but if you think deeply about it, you'll find that it has a variety of faces. It is a communication tool between users, a medium for delivering information, an infrastructure for providing applications, and a community where people with common interests gather. In recent years, business tools, shopping and payment methods are also being swallowed. The influence of the spread of SNS on the real world is also expanding, and the work being dealt with from a sociological perspective is also increasing. Also, if you pay attention to the technical aspects of SNS, it is composed of various technical elements, such as infrastructure that handles large-scale access, user interface that supports comfortable use, and big data analysis to understand people's behavior more deeply. However, I usually use it as usual. However, if you look through SNS, you can see that the situation is surprisingly profound and multifaceted. This study began by looking at the history and current status of SNS and attempted to find its status through comparison with other media. From the point of view of relationship with society, it can be a risk and legal issue when using SNS, such as crimes using bad social media or social media. It is also necessary to comment on the activities on SNS or the guidelines established by the operators. Therefore, various legal issues on SNS will be discussed. Also, as an example of using SNS, I will introduce an example of using SNS in disaster response. From a more technical point of view, you will receive commentary on SNS's network-based technology and SNS's information use, and these articles will help you understand and use SNS safely and help you further utilize or develop SNS.

A Study of a Semantic Web Driven Architecture in Information Retrieval: Developing an Exploratory Discovery Model Using Ontology and Social Tagging (정보검색의 시맨틱웹 지향 설계에 관한 연구 - 온톨로지와 소셜태깅을 활용한 탐험적 발견행위 모델개발을 중심으로 -)

  • Cho, Myung-Dae
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.21 no.3
    • /
    • pp.151-163
    • /
    • 2010
  • It is necessary, due to changes in the information environment, to investigate problems in existing information retrieval systems. Ontologies and social tagging, which are a relatively new means of information organization, enable exploratory discovery of information. These two connect a thought of a user with the thoughts of numerous other people on the Internet. With these connection chains through the interactions, users are foraging information actively and exploratively. Thus, the purpose of this study is, through qualitative research methods, to identify numerous discovery facilitators provided by ontologies and social tagging, and to create an exploratory discovery model based on them. The results show that there are three uppermost categories in which 5, 4 and 4 subcategories are enumerated respectively. The first category, 'Browsing and Monitoring,' has 5 sub categories: Noticing the Needs, Being Aware, Perceiving, Stopping, and Examining a Resource. The second category, Actively Participating, has 4 categories: Constructing Meaning, Social Bookmarking and Tagging, Sharing on Social Networking, Specifying the Original Needs. The third category, Actively Extends Thinking, also has 4 categories: Social Learning, Emerging Fortuitous Discovery, Creative Thinking, Enhancing Problem Solving Abilities. This model could contribute to the design of information systems, which enhance the ability of exploratory discovery.

The Effect of Social Function and Telepresence on Intention to Offer Support Through Trust of Metaverse Participants (메타버스의 사회적 기능과 원격실재감이 메타버스 참여 주체의 신뢰를 통해 요청지원 의도에 미치는 영향)

  • Hwang, Inho
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.3
    • /
    • pp.29-46
    • /
    • 2022
  • COVID-19 has radically changed the behavior of members of society for exchange. In particular, the strong contagiousness of the virus is increasing networking on online platforms while reducing people's networking in the real world. Recently, the metaverse, which strengthened the presence based on 3D technology, is attracting attention from members of society such as individuals and companies. We present a method to improve metaverse utilization from the perspective of organizations and employees who have introduced metaverse for work. In other words, we check the effect of metaverse social function and telepresence on the employee's intention to offer support by improving the trust of the metaverse participants. We obtained samples through questionnaires targeting employees of organizations that introduced metaverse to their work, and verified the research hypothesis by applying the structural equation model. As a result, social interactivity, reciprocal favor, and telepresence of metaverse partially affected metaverse trust (platform, peer, organization), and metaverse trust increased the intention to offer support. Our study suggests a strategic direction to improve the metaverse utilization and exchange level of employees of organizations who want to use the metaverse for business.

Factors Affecting the Intention to Invade Privacy on Social Network Service (SNS에서 프라이버시 침해의도에 영향을 미치는 요인)

  • Ahn, Soomi;Jang, Jaeyoung;Kim, Jidong;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.16 no.2
    • /
    • pp.1-23
    • /
    • 2014
  • With side effects such as Phishing and Spam using personal information in Social Network Service, there is a growing need for studies related to harmful behaviors such as the reason for privacy violation. As such, this study assumed privacy violation to be ethical decision, making behavior and used the Theory of Planned Behavior and Motivation Theory, which are mostly used in social science to identify the factors affecting privacy violation. The results suggested that the Perceived Enjoyment and Punishment used in motivation studies affected privacy violation behaviors, and that the factors of the Theory of Planned Behavior such as Attitude toward Privacy Violation, Subjective Norms of Privacy Violation, and Perceived Behavioral Control with regard to Privacy Violation significantly influenced the Intention to Privacy Violation. On the other hand, Perceived Curiosity and Subjective Norms of Privacy Violation did not affect the Intention to Privacy Violation. Therefore, this study confirmed that the Theory of Planned Behavior was appropriate to explain the Intention to Privacy Violation, and that the variables of the Motivation Theory generally influenced the Attitude toward Privacy Violation. This study was significant since it extended the scope of theoretical privacy study from users and victims centered to inflictor and applied the Extended Theory of Planned Behavior using the variables of the Motivation Theory in the study of Intention to Privacy Violation. From the practical aspect, it provided the ground for privacy education based on the fact that the Attitude toward Privacy Violation can be curbed when education on the Privacy Concerns, Perceived Enjoyment, and Punishment with regard to privacy is strengthened. It also cited the need for the punishment of privacy violation and the practical ground to amend the terms and conditions of user license and Personal Information Protection Act to provide policy support.