• Title/Summary/Keyword: Personal-usage

Search Result 473, Processing Time 0.03 seconds

A Method of Digital Signature Using FIDO2 CTAP (FIDO2 CTAP을 활용한 전자서명 방법)

  • Cho, Han-koo;Lee, Kyung-ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1049-1062
    • /
    • 2019
  • The national accredited certificate is a user certificate issued based on the user's personal information, which has been identified in advance, and has become a universal authentication method used for most electronic financial transactions and user authentication. And it contributed a lot to the use of e-government and domestic service. However, due to the lack of web standards on how to use, it was inconvenient to install a separate plug-in, and efforts to improve it have been continued. In this paper, we attempt to solve the problem of certificate usage environment by presenting the certificate digital signature method using the extension of the FIDO2 (Fast Identity Online v2) client to authentication protocol (CTAP) specification.

A Study on the Facilitating Usage of Online Simple Payment Service (온라인 간편결제 서비스 사용 활성화에 대한 연구)

  • Yon, Dine;Moon, Dong-Ji;Kim, Hee-Woong
    • The Journal of Information Systems
    • /
    • v.27 no.4
    • /
    • pp.203-227
    • /
    • 2018
  • Purpose The purpose of this study is to investigate which decision factors continue to use the service based on the online simple payment service. In this study, we will examine how to activate the service from the continuing factors through the dual-model theory consisting of personal dedication and constraint dedication which are frequently used in relation marketing. Design/methodology/approach In this study, we investigated the activation of online simple settlement service using factors affecting the preference of the simple payment service based on the dual-model of dedication-based mechanism and constraint-based mechanism. Findings This study confirmed that customer satisfaction and convenience under the dedication -based mechanism were found to be linked to the preference of the simple payment service. Switching cost under the constraint - based mechanism showed that the customer had no binding ability to continue using the service of the current provider. Likewise, preference was found to have a direct effect on the actual frequency of use of the simple payment service, the number of uses compared to the total number of online payments, and willingness to use more.

A Study of Program Execution Control based on Whitelist (화이트리스트 기반 프로그램 실행 통제 방안 연구)

  • Kim, Chang-hong;Choi, Dae-young;Yi, Jeong-hyun;Kim, Jong-bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.346-349
    • /
    • 2014
  • Currently, the growing cyber threat continues, the damage caused by the evolution of malicious code incidents become more bigger. Such advanced attacks as APT using 'zero-day vulnerability' bring easy way to steal sensitive data or personal information. However it has a lot of limitation that the traditional ways of defense like 'access control' with blocking of application ports or signature base detection mechanism. This study is suggesting a way of controlling application activities focusing on keeping integrity of applications, authorization to running programs and changes of files of operating system by hardening of legitimate resources and programs based on 'white-listing' technology which analysis applications' behavior and its usage.

  • PDF

What Drives Consumers' Purchase Decisions? : User- and Marketer-generated Content

  • Kim, Yu-Jin
    • Science of Emotion and Sensibility
    • /
    • v.24 no.4
    • /
    • pp.79-90
    • /
    • 2021
  • Consumers have an increasingly active role in the marketing cycle, using social media channels to create, distribute, and consume digital content. In this context, this paper investigates the impact of user- and marketer-generated content on consumer purchase intentions and the approach to designing an effective social media marketing platform. Referencing a literature review of social media marketing and consumer purchase intentions, a case study of the social media-marketing platform, 0.8L, was undertaken using both qualitative and quantitative results through content analysis and a participatory survey. First, about 450 consumer reviews for ten sunscreen products posted on the 0.8L platform were compared with products' marketer-generated content. Next, 55 subjects participated in a survey regarding purchase intentions toward moisturizing creams on the 0.8L platform. The results indicated that user-generated content (i.e., texts and photos) provided more personal experiences of the product usage process, whereas marketers focused on distinctive product photos and features. Moreover, customer reviews (particularly high volume and narrative format) had more impact on purchase decisions than marketer information in the online cosmetics market. Real users' honest reviews (both positive and negative) were found to aid companies' prompt and straightforward assessment of newly released products. In addition to the importance of customer-driven marketing practices, distinctive user experience design features of a competitive social media-marketing platform are identified to facilitate the creation and sharing of sincere customer reviews that resonate with potential buyers.

A Study on the Processing Method of pseudonym information considering the scope of data usage

  • Min, Youn-A
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.5
    • /
    • pp.17-22
    • /
    • 2021
  • With the application of the Data 3 method, the scope of the use of pseudonym information has expanded. In the case of pseudonym information, a specific individual can be identified by linking and combining with various data, and personal information may be leaked due to incorrect use of the pseudonym information. In this paper, we propose the scope of use of data is subdivided and a differentiated pseudonym information processing method according to the scope. For the study, the formula was modified by using zero-knowledge proof among the pseudonym information processing methods, and when the proposed formula was applied, it was confirmed that the performance improved by an average of 10% in terms of verification time compared to the case of applying the formula of the existing zero-knowledge proof.

Design of Logging Infrastructure in Consideration of the Dynamically Changing Environment

  • MOKHIREV, Aleksandr;RUKOMOJNIKOV, Konstantin;GERASIMOVA, Marina;MEDVEDEV, Sergey
    • Journal of the Korean Wood Science and Technology
    • /
    • v.49 no.3
    • /
    • pp.254-266
    • /
    • 2021
  • Using forest resources involves solving complex and diverse tasks. At the same time, one of the key goals in the field is improving the quality of forest infrastructure. This direction requires adequate mathematical and economic justification. Moreover, creating an effective infrastructure will not only increase the accessibility and usage volumes of wood and other forest resources, but also contribute to the development of continuous and sustainable forest management. The existing practice of making decisions in terms of the organizational and technological aspects of logging, based on the personal experiences of managers or leading specialists in enterprises, hinders the achievement of constant optimal efficiency. The paper presents results that are a continuation of the research cycle of the authors' team in the fields of optimization and algorithmization of various logging processes. The focus of the study lies in the processing and movement of wood resources, the most valuable products of the investigated groups of enterprises. To this end, the paper presents a developed algorithm for determining an effective technological chain of transportation in logging operations, and for improving loading and unloading processing operations under dynamic natural and production conditions. This algorithm serves as the methodological basis for designing logging infrastructure in a dynamically changing environment.

Descriptive of Dietary Supplementation Practice and Purchase Process by Age and Gender in Judoists (엘리트 유도 선수의 성별과 연령에 따른 운동영양 보조물 섭취와 섭취경로 분석)

  • Kim, Jongkyu;Kang, Seoung-Ki;Chun, Yoon-Seouk
    • Korean Journal of Exercise Nutrition
    • /
    • v.13 no.3
    • /
    • pp.185-192
    • /
    • 2009
  • The aim of this study was to examine the use of such dietary supplementation practices, opinions, taking period for dietary supplement, and among elite Judoists varying in age and gender. Subjects were recruited from Korea National Team Judoists in elite athlete training centers (Taenuing in Seoul, Korea and surrounding area), a total of 223 elite Judoists (2003y n=34, 2005y n=41, 2006y n=101, 2007y n=30, 2008y n=17). Data were collected from personal interviews with Judoists who participated at the Olympic games, Asian game and World Championship game since 2003-2008. Elite Judoists representing mean age of 2003y (men: 23.5±2.7, women: 22.6±2.4), 2005y (men: 23.4±2.6, women: 22.5±2.3), 2006y (men: 20.3±3.2, women: 21.9±2.4), 2007y (men: 25.3±2.6, women: 22.5±2.8) and 2008y (men: 23.9±3.9) completed a validated questionnaire assessing dietary supplementation practices and opinions. Older Judoists were significantly more likely to report greater dietary supplementation usage; to be advised by oneself; health food store and pharmacy retailers; to decrease taking period days per week and past 6 month. Relative to gender, significant differences were observed for the types of dietary supplementation reported; supplementation practice trend; reasons for dietary supplementation use.

AStudy of Potential CustomerUsage Intentfor in-Vehicle Apps and App Markettype (차량용 앱 및 앱 마켓 유형에 대한 잠재고객의 사용의도 분석 연구: 스마트폰과의 상호 운용성의 중요성)

  • Hong, Joo Hey;Lee, Chang Hoon;Park, Kyu Hong
    • The Journal of Information Systems
    • /
    • v.32 no.3
    • /
    • pp.225-251
    • /
    • 2023
  • Purpose The purpose of this study is to examine the future direction of in-vehicle app development and service, the relationship between potential customers' intention to use and the factors that affect it was explored. It was also checked whether the two types of app development platform and the experience of the existing smartphone app platform had a moderating effect on these relationships. Design/methodology/approach Data was gathered through surveys, collecting responses from 904 potential consumers of vehicle app services in Korea. Structural equation modeling was utilized to analyze the data. Findings According to the empirical analysis result, it was found that potential customers considered enjoyment as the most important benefit factor in in-vehicle app service, and the most important external factor affecting enjoyment was functional compatibility with smartphone. The type of vehicle app development platform did not have a meaningful moderating effect on the factor relationship, whereas the smartphone app platform experience showed a meaningful moderating effect on the relationship between factors. It was analyzed that the risk of app performance, personal information privacy, and driving safety data did not have a negative effect on the intention to use the vehicle app service.

Is ChatGPT a "Fire of Prometheus" for Non-Native English-Speaking Researchers in Academic Writing?

  • Sung Il Hwang;Joon Seo Lim;Ro Woon Lee;Yusuke Matsui;Toshihiro Iguchi;Takao Hiraki;Hyungwoo Ahn
    • Korean Journal of Radiology
    • /
    • v.24 no.10
    • /
    • pp.952-959
    • /
    • 2023
  • Large language models (LLMs) such as ChatGPT have garnered considerable interest for their potential to aid non-native English-speaking researchers. These models can function as personal, round-the-clock English tutors, akin to how Prometheus in Greek mythology bestowed fire upon humans for their advancement. LLMs can be particularly helpful for non-native researchers in writing the Introduction and Discussion sections of manuscripts, where they often encounter challenges. However, using LLMs to generate text for research manuscripts entails concerns such as hallucination, plagiarism, and privacy issues; to mitigate these risks, authors should verify the accuracy of generated content, employ text similarity detectors, and avoid inputting sensitive information into their prompts. Consequently, it may be more prudent to utilize LLMs for editing and refining text rather than generating large portions of text. Journal policies concerning the use of LLMs vary, but transparency in disclosing artificial intelligence tool usage is emphasized. This paper aims to summarize how LLMs can lower the barrier to academic writing in English, enabling researchers to concentrate on domain-specific research, provided they are used responsibly and cautiously.

The Impact of Metaverse Presence on Immersion and Intention to Continuous Use (메타버스 이용자의 프레즌스 경험이 몰입과 지속이용의도에 미치는 영향)

  • Mideum Choi
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.4
    • /
    • pp.581-588
    • /
    • 2024
  • Metaverse technology, heralded as the fourth major innovation in computing following personal computers, the internet, and mobile devices, has realized a three-dimensional virtual world where communication with others as well as social, cultural, and economic activities of the real world can take place. While platforms like Zepeto, launched in 2018, and Animal Crossing: New Horizons, released in 2020, initially became popular among younger generations, concerns about declining investment and usage rates of the metaverse have become apparent since 2023. This study examines the impact of metaverse users' sense of presence on their immersion and intention to continue using these platforms.