• Title/Summary/Keyword: Service System Model

Search Result 3,544, Processing Time 0.033 seconds

A Security Reference Model for the Construction of Mobile Banking Services based on Smart Phones

  • Shin, Yong-Nyuo;Shin, Woo-Chang
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.11 no.4
    • /
    • pp.229-237
    • /
    • 2011
  • As smart phones have become widely adopted, they have brought about changes in individual lifestyles, as well as significant changes in the industry. As the mobile technology of smart phones has become associated with all areas of industry, it is not only accelerating innovation in other industries such as shopping, healthcare service, education, and finance, but is also creating new markets and business opportunities. The preparation of thorough security measures for smart phones is increasing in demand. While offering excellent mobility and convenience, smart phones can be exposed to a range of violation threats. In particular, it is necessary to make efforts to develop a security system that can preemptively cope with potential security threats in the banking service area, which requires a high level of reliability. This paper suggests a security reference model that is considered for the smart phone-based joint mobile banking development project being undertaken by the Bank of Korea in 2010. The purpose of this study is to make a security reference model for a reliable smart phone-based mobile financial service, by recognizing the specific security threats directed toward smart phones, and providing countermeasures to these security threats. The proposed mobile banking security reference model is useful in improving system security by systematically analyzing information security threats to the mobile financial service, and by presenting the guideline for the preparation of countermeasures.

A Study on the Use Activation of the Cloud Office with Focus on DeLone and McLean IS Success Model (클라우드 오피스 이용 활성화 : DeLone and McLean 정보시스템 성공모형의 적용)

  • Yoon, Seong-Jeong;Kim, Min-Yong
    • Journal of Information Technology Services
    • /
    • v.14 no.2
    • /
    • pp.289-314
    • /
    • 2015
  • Recently, Most of the companies and government offices are under consideration about the adoption of cloud office service to actualize the smart work policies. Comparing with traditional office software, a cloud office service have the advantage of the method of payment and coming over the physical limitations. Many cloud office service users tend to adopt an official evaluated the service without doubt. However after deciding to adopt cloud office service, many users are faced with a variety of problems and difficulties practically. In this study, researchers carried out interview about those problems and difficulties after adopting a cloud office service. Consequently, there are several problems and difficulties such as compatibility, document security, document lost and maladjusted to the new graphic user interface between traditional office software and a cloud office service. A cloud office service have still several advantages not only a competitive price but also ubiquitous attributes. Thus, researchers need to study about what kinds of reason variables can solve those problems and difficulties. In existing research, DeLone & McLean have suggested information system success model. They use three independent variables which are system quality, information quality, service quality. Parameters are user satisfaction, intention to use and use. Lastly, dependent variables are net benefits. However in this study, we need to change the scope of measurement. In other words, we have to replace parameters with dependent variables. Simply, user satisfaction, intention to use and use is going to be dependent variables. There are several reasons why we need changing variables. First, we aim at giving a some suggestions to a cloud service providers which independent variables do not work to satisfy for the users. Second, we need to find out how to maximize cloud office service user's satisfaction and intention to use. Third, we should firstly know that relationship between independent variables and dependent variables. Finally, those research results give for the cloud office service provider to solve the cloud office service adopting problems and difficulties.

A Model of Dynamic Workload Balancer for VoD Systems (VoD 시스템을 위한 동적 작업부하조정기 모델)

  • Park, Jeong-Yun;Kim, Joong-Hwan;Kim, Sang-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.7
    • /
    • pp.904-913
    • /
    • 2006
  • The QoS(Quality of Service) of VoD(Video on Demand) systems can be improved by reducing the faults that the stream service request from clients is rejected by the VoD server or lost during the service. This paper proposes a model of Dynamic Workload Balancer that can adjust the workload dynamically through the periodical monitoring of the VoD system, and so increase the throughput. The proposed model runs independently from the VoD system by adopting the agent concept. The model comprises the agency part interfacing the VoD system and the intelligence part reasoning or teaming the facts required for the adjustment of workload. An experiment of implementing a simulator was conducted to see whether or not application of the proposed model to VoD system is effective. As a result of the experiment, it was found that the throughput was relatively increased when the proposed model was applied compared to existing means.

  • PDF

A Study on the Development of an Automatic Classification System for Life Safety Prevention Service Reporting Images through the Development of AI Learning Model and AI Model Serving Server (AI 학습모델 및 AI모델 서빙 서버 개발을 통한 생활안전 예방 서비스 신고 이미지 자동분류 시스템 개발에 대한 연구)

  • Young Sic Jeong;Yong-Woon Kim;Jeongil Yim
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.432-438
    • /
    • 2023
  • Purpose: The purpose of this study is to enable users to conveniently report risks by automatically classifying risk categories in real time using AI for images reported in the life safety prevention service app. Method: Through a system consisting of a life safety prevention service platform, life safety prevention service app, AI model serving server and sftp server interconnected through the Internet, the reported life safety images are automatically classified in real time, and the AI model used at this time An AI learning algorithm for generation was also developed. Result: Images can be automatically classified by AI processing in real time, making it easier for reporters to report matters related to life safety.Conclusion: The AI image automatic classification system presented in this paper automatically classifies reported images in real time with a classification accuracy of over 90%, enabling reporters to easily report images related to life safety. It is necessary to develop faster and more accurate AI models and improve system processing capacity.

Exploring the Feasibility of Differentiating IEEE 802.15.4 Networks to Support Health-Care Systems

  • Shin, Youn-Soon;Lee, Kang-Woo;Ahn, Jong-Suk
    • Journal of Communications and Networks
    • /
    • v.13 no.2
    • /
    • pp.132-141
    • /
    • 2011
  • IEEE 802.15.4 networks are a feasible platform candidate for connecting all health-care-related equipment dispersed across a hospital room to collect critical time-sensitive data about patient health state, such as the heart rate and blood pressure. To meet the quality of service requirements of health-care systems, this paper proposes a multi-priority queue system that differentiates between various types of frames. The effect of the proposed system on the average delay and throughput is explored herein. By employing different contention window parameters, as in IEEE 802.11e, this multi-queue system prioritizes frames on the basis of priority classes. Performance under both saturated and unsaturated traffic conditions was evaluated using a novel analytical model that comprehensively integrates two legacy models for 802.15.4 and 802.11e. To improve the accuracy, our model also accommodates the transmission retries and deferment algorithms that significantly affect the performance of IEEE 802.15.4. The multi-queue scheme is predicted to separate the average delay and throughput of two different classes by up to 48.4% and 46%, respectively, without wasting bandwidth. These outcomes imply that the multi-queue system should be employed in health-care systems for prompt allocation of synchronous channels and faster delivery of urgent information. The simulation results validate these model's predictions with a maximum deviation of 7.6%.

A Study on Construction Site of Virtual Desktop Infrastructure (VDI) System Model for Cloud Computing BIM Service

  • Lee, K.H.;Kwon, S.W.;Shin, J.H.;Choi, G.S.;Moon, D.Y.
    • International conference on construction engineering and project management
    • /
    • 2015.10a
    • /
    • pp.665-666
    • /
    • 2015
  • Recently BIM technology has been expanded for using in construction project. However its spread has been delayed than the initial expectations, due to the high-cost of BIM infrastructure development, the lack of regulations, the lack of process and so forth. In construction site phase, especially the analysis of current research trend about IT technologies, virtualization and BIM service, data exchange such as drawing, 3D model, object data, properties using cloud computing and virtual server system is defined as a most successful solution. The purpose of this study is enable the cloud computing BIM server to provide several main function such as edit a model, 3D model viewer and checker, mark-up, snapshot in high-performance quality by proper design of VDI system. Concurrent client connection performance is a main technical index of VDI. Through test-bed server client, developed VDI system's multi-connect control will be evaluated. The performance-test result of BIM server VDI will effect to development direction of cloud computing BIM service for commercialization.

  • PDF

Intention to use of Mobile Payment Service in Financial MVNO Environment (금융 MVNO 환경에서의 소비자의 모바일지급결제서비스 이용의도)

  • Park, Jin Sung;Kang, In Yang;Han, Pil Koo;Jun, Byoung Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.2
    • /
    • pp.213-227
    • /
    • 2012
  • Recently MVNO has been adopted to reform the monopoly structure of mobile telecommunication industry in Korea. MVNO is expected to not only enable mobile telecommunication industry more free, but also provide various welfare service with customers, in particular mobile payment system service. Based on TAM, this paper is to investigate the affecting factors of intention to use of mobile payment system service in MVNO environment. The results indicate that all system quality factors are significantly related to both perceived usefulness and perceived easy of use, but only stability of service quality factor is significantly related to the perceived usefulness. Perceived easy of use was found to be siginificantly related to the intention to use of mobile payment system in MVNO environment, but percevied usefulness was not.

A Study on Selection of Core Services for Deciding ISMS Scope

  • Kang, Hyunsik;Kim, Jungduk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.51-57
    • /
    • 2017
  • The first thing to be prioritized is to set the scope of the management system when establishing an information security management system for systematic and effective information security management. It is important to set the scope for an organization's information security goals due to the scope affects the organization's overall information security activities. If the scope is set incorrectly, it might become impossible to protect important services and therefore, the scope of the management system should be determined in consideration of the core business services of the organization. We propose a core service selection model based on the organization's mission-critical service and high risk service in order to determine the effective information security management system scope in this paper. Core service selection criteria include the type of service, contribution to sales, socio-economic impact, and linkage with other services.

An Analysis on Enterprise Competitive Advantage Determination Factors to Effect Enterprise Results for Each SaaS Business Model: focusing on Group-Wares, POS-System, CRM and ERP (SaaS 비즈니스 모델별 서비스 기업 경쟁력 결정 요인분석: 그룹웨어, POS 시스템, CRM 및 ERP를 중심으로)

  • Kim, Shin-Pyo;Lee, Choon-Yeul
    • Journal of Digital Convergence
    • /
    • v.6 no.2
    • /
    • pp.65-76
    • /
    • 2008
  • Recently, software distribution method, along with advent of era of Web 2.0, is rapidly evolving from ASP(Application Service Provider) method into SaaS(Soft as a Service) method due to development in concepts and technologies including SOA(Service Oriented Architecture) Web Service, On Demand and Component. Determining factor in market competitiveness of newly emerging SaaS business model will be analyzed by focusing on Group-Wares, POS(Point of Sale) System, CRM(Customer Relationship Management) and ERP(Enterprise Resource Planning), which are the most representative SaaS business models in Korea. It is anticipated that the outcome of analysis of determining factors for market competitiveness for each of the main SaaS Business Models acquired through questionnaire survey can be utilized as important benchmarking material in setting the direction of cultivating SaaS market by the government as well as new entries into SaaS market.

  • PDF

An Empirical Approach to the Influence of IT Assets Security and Information Security Service on Information Security Qualify and Satisfaction (IT자산 안전성과 정보보호 서비스가 정보보호 품질 및 만족도에 미치는 영향에 관한 실증연구)

  • Kwon, Soon-Jae;Lee, Kun-Chang;Kim, Chang-Hyun
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.32 no.2
    • /
    • pp.149-162
    • /
    • 2007
  • In the era of the internet and ubiquitous computing, IS users are still facing a variety of threats. Therefore, a need of more tightened information security service increases unprecedentedly. In this sense, this study is aimed at proposing a new research model in which IT assets (i.e., network, system, and information influence) Security and Information Security Service (i.e., confidentiality, integrity, nonrepudiation, authentication) affect information security quality positively, leading to users' satisfaction eventually. To prove the validity of the proposed research model, PLS analysis is applied with valid 177 questionnaires. Results reveal that both IT assets Security and Information Security Service influence informations security qualify positively, and user satisfaction as well. From the results, it can be concluded that Korean government's recent orchestrated efforts to boost the IT assets Security and Information Security Service helped great improve the information security quality and user satisfaction.