• 제목/요약/키워드: Ubiquity

검색결과 133건 처리시간 0.027초

User Experience and the Multi-Stage Adoption of Mobile Apps

  • Kim, Ambrose;Kim, Kyoung-jae
    • Journal of Information Technology Applications and Management
    • /
    • 제21권2호
    • /
    • pp.49-79
    • /
    • 2014
  • The adoption of technology has always been of interest to academicians and practitioners of the field of Management Information System. This is so because without proper and adequate adoption, technology-no matter how beneficial or advanced it may be-will be of little value to users. Numerous researches, such as the researches of the Technology Acceptance Model (TAM) or the Unified Theory of Acceptance and Use of Technology (UTAUT), had been conducted to understand the human nature in association with the adoption or rejection of technologies that have bombarded the users. The coming of smart technologies (i.e., smart phones and devices), however, seems to have fundamentally changed the environment for adoption. The ubiquity combined with mobility of technology, especially when it comes to mobile apps, seem to make the old PC era of two-stage-pre and post-adoption models obsolete. A new model of adoption that identifies the determinants of technology acceptance and continuance is needed for the smart age. To this end, this paper undertakes an empirical study, by analyzing 229 users of Social Networking Service (SNS) mobile apps, to identify the role of user experience on the multi-stage adoption of technology, and provides results that User Experience (UX) plays the crucial role of bridging the separate stages of pre and post adoption of technologies. The paper concludes by providing practical implications of the new model as it relates to mobile apps and technologies, and recommendations for further studies to get a better understanding of technology adoption in the smart age.

인터넷 쇼핑몰의 고객충성도에 대한 통합적 연구 - 옥션과 인터파크 고객을 중심으로 (An Integrated Study for Customer Loyalty in Internet Shopping Mall)

  • 권영국;이선로;박현지
    • 한국정보시스템학회지:정보시스템연구
    • /
    • 제15권4호
    • /
    • pp.23-53
    • /
    • 2006
  • The main purpose of this paper is to setup a integrated model and verify the integrated model for a customer loyalty in the internet shopping environments. The results of a structural equation model (SEM) using AMOS and LISREL include: First, hypothesis that Internet environment characteristics in outside factors has a positive effect on satisfaction, trust and commitment is partially supported. However, mutual communication to satisfaction, community to commitment and open-ubiquity to trust did not reveal a positive effect. Second, hypothesis that Internet showing mall environment has a positive effect on satisfaction is partially supported. However, transaction to commitment and transaction to trust did not reveal a positive effect. Third, hypothesis that relational benefits has a positive effect on both satisfaction and commitment is partially supported. However, confident honest to commitment and economic honest to trust did not reveal a positive effect. Forth, satisfaction trust and commitment have a strong effect upon loyalty. Fifth, satisfaction has a positive effect on trust and commitment. However, trust did not show a positive effect on commitment. Outside factors(Internet environment characteristics, showing mall characteristics, and relational benefit) partially revealed a positive effect on satisfaction trust, and commitment. Mediating variables such as satisfaction, trust, and commitment again have positive effect on loyalty. But, the relationship for trust to commitment did not reveal the significant effect in this study while other studies revealed significant effect.

  • PDF

안전한 모바일 클라우드 컴퓨팅을 위한 ID 관리 시스템 (A Secure Identity Management System for Secure Mobile Cloud Computing)

  • ;이경현
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2014년도 추계학술발표대회
    • /
    • pp.516-519
    • /
    • 2014
  • Cloud computing is an up-and-coming paradigm shift transforming computing models from a technology to a utility. However, security concerns related to privacy, confidentiality and trust are among the issues that threaten the wide deployment of cloud computing. With the advancement of ubiquitous mobile-based clients, the ubiquity of the model suggests a higher integration in our day to day life and this leads to a rise in security issues. To strengthen the access control of cloud resources, most organizations are acquiring Identity Management Systems (IDM). This paper presents one of the most popular IDM systems, specifically OAuth, working in the scope of Mobile Cloud Computing which has many weaknesses in its protocol flow. OAuth is a Delegated Authorization protocol, and not an Authentication protocol and this is where the problem lies. This could lead to very poor security decisions around authentication when the basic OAuth flow is adhered to. OAuth provides an access token to a client, so that it can access a protected resource, based on the permission of the resource owner. Many researchers have opted to implement OpenlD alongside OAuth so as to solve this problem. But OpenlD similarly has several security flows. This paper presents scenarios of how insecure implementations of OAuth can be abused maliciously. We incorporate an authentication protocol to verify the identities before authorization is carried out.

Adsorption of microcystin onto activated carbon: A review

  • Ampiaw, Rita E.;Yaqub, Muhammad;Lee, Wontae
    • Membrane and Water Treatment
    • /
    • 제10권6호
    • /
    • pp.405-415
    • /
    • 2019
  • Microcystins (MCs) are toxins produced by cyanobacteria causing a major environmental threat to water resources worldwide. Although several MCs have been reported in previous studies, microcystin-LR (m-LR) has been extensively studied as it is highly toxic. Among the several techniques employed for the removal of this toxin, adsorption with AC has been extensively studied. AC has gained wide attention as an effective adsorbent of m-LR due to its ubiquity, high sorption capacity, cost effectiveness and renewability. In this review, the adsorption of m-LR onto AC was evaluated using the information available in existing scientific literature. The effects of the pore volume and surface chemistry of AC on the adsorption of m-LR considering the structural and chemical properties of ACs were also discussed. Furthermore, we identified the parameters that influence adsorption, including natural organic matter (NOM), pH, and ionic strength during the m-LR adsorption process. The effect of these parameters on MCs adsorption onto AC from previous studied is compiled and highlighted. This review may provide new insights into future activated carbon-m-LR adsorption research, and broaden its application prospects.

『정화』에서 『갈망』으로 -사라 케인의 '잔혹'과 사랑의 역설 (From Cleansed to Crave: The Paradox of 'Cruelty' and Love in Sarah Kane)

  • 임이연
    • 영어영문학
    • /
    • 제57권1호
    • /
    • pp.129-146
    • /
    • 2011
  • Despite the ubiquity of love in the work of Sarah Kane, the theme has been overshadowed by the violence that characterizes her early plays. This essay differentiates Kane from her contemporary "in-yer-face" playwrights, arguing that violence in Kane operates as a means of securing love. Antonin Artaud's concept of cruelty, often (mis)understood in a physical sense alone, provides a clue to the nature of Kane's violence and its relation to love. The essay focuses on Cleansed and Crave, both written in 1998, one about love's redemptive possibility, the other about its pure impossibility. What makes Cleansed hopeful is its violence that works as love's obstacle, creating the illusion that once it is removed love would be possible. The absence of violence in Crave on the contrary lays the illusion of love bare, making it Kane's most despairing play. Kane's oeuvre draws a trajectory of love from hope to despair; as a whole it stages the impossibility of love. To love the other requires the relinquishing of the self, making love logically impossible by depriving the verb of its subject. Love, if possible, would offer the bliss of unity, tearing out the constraint of the Symbolic Order. Kane's only alternative is death, as is expressed in Crave and 4.48 Psychosis.

Design and Analysis of Fabrication Threat Management in Peer-to-Peer Collaborative Location Privacy

  • Jagdale, Balaso;Sugave, Shounak;Kolhe, Kishor
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.399-408
    • /
    • 2021
  • Information security reports four types of basic attacks on information. One of the attacks is named as fabrication. Even though mobile devices and applications are showing its maturity in terms of performance, security and ubiquity, location-based applications still faces challenges of quality of service, privacy, integrity, authentication among mobile devices and hence mobile users associated with the devices. There is always a continued fear as how location information of users or IoT appliances is used by third party LB Service providers. Even adversary or malicious attackers get hold of location information in transit or fraudulently hold this information. In this paper, location information fabrication scenarios are presented after knowing basic model of information attacks. Peer-to-Peer broadcast model of location privacy is proposed. This document contains introduction to fabrication, solutions to such threats, management of fabrication mitigation in collaborative or peer to peer location privacy and its cost analysis. There are various infrastructure components in Location Based Services such as Governance Server, Point of interest POI repository, POI service, End users, Intruders etc. Various algorithms are presented and analyzed for fabrication management, integrity, and authentication. Moreover, anti-fabrication mechanism is devised in the presence of trust. Over cost analysis is done for anti-fabrication management due to nature of various cryptographic combinations.

Debugging of Parallel Programs using Distributed Cooperating Components

  • Mrayyan, Reema Mohammad;Al Rababah, Ahmad AbdulQadir
    • International Journal of Computer Science & Network Security
    • /
    • 제21권12spc호
    • /
    • pp.570-578
    • /
    • 2021
  • Recently, in the field of engineering and scientific and technical calculations, problems of mathematical modeling, real-time problems, there has been a tendency towards rejection of sequential solutions for single-processor computers. Almost all modern application packages created in the above areas are focused on a parallel or distributed computing environment. This is primarily due to the ever-increasing requirements for the reliability of the results obtained and the accuracy of calculations, and hence the multiply increasing volumes of processed data [2,17,41]. In addition, new methods and algorithms for solving problems appear, the implementation of which on single-processor systems would be simply impossible due to increased requirements for the performance of the computing system. The ubiquity of various types of parallel systems also plays a positive role in this process. Simultaneously with the growing demand for parallel programs and the proliferation of multiprocessor, multicore and cluster technologies, the development of parallel programs is becoming more and more urgent, since program users want to make the most of the capabilities of their modern computing equipment[14,39]. The high complexity of the development of parallel programs, which often does not allow the efficient use of the capabilities of high-performance computers, is a generally accepted fact[23,31].

태양광 발전의 분포 변화: 시군구 단위에서의 분석 (Change in Spatial Distribution of Photovoltaic Power Generation )

  • 이정섭;이강원;지상현
    • 한국경제지리학회지
    • /
    • 제25권4호
    • /
    • pp.484-498
    • /
    • 2022
  • 이 연구의 목적은 전국 229개 시군구를 공간 단위로 설정하여 태양광 발전의 입지, 분포 그리고 변화를 분석하는 것이다. 이를 위해서 첫째, 2020년 시군구별 발전량과 발전설비 용량을 통해서 태양광 발전의 분포를 분석했고, 둘째 2017년부터 2021년까지 시군구별 발전설비 증가량을 확인하여 시계열적 변화를 추적했다. 분석 결과, 발전량, 발전설비 용량 및 증가량 모두 몇몇 시군구에 집중되었는데, 그 정도는 상위 5개 시군구가 차지하는 비중이 12% 이상, 상위 10개 및 20개 시군구로는 각각 20%와 33% 이상이었고, 태양광 발전에 대한 지니 계수는 약 0.6이었다. 따라서 시군구 단위에서 태양광 발전의 불균등한 분포가 확인되었다.

Protecting Privacy of User Data in Intelligent Transportation Systems

  • Yazed Alsaawy;Ahmad Alkhodre;Adnan Abi Sen
    • International Journal of Computer Science & Network Security
    • /
    • 제23권5호
    • /
    • pp.163-171
    • /
    • 2023
  • The intelligent transportation system has made a huge leap in the level of human services, which has had a positive impact on the quality of life of users. On the other hand, these services are becoming a new source of risk due to the use of data collected from vehicles, on which intelligent systems rely to create automatic contextual adaptation. Most of the popular privacy protection methods, such as Dummy and obfuscation, cannot be used with many services because of their impact on the accuracy of the service provided itself, they depend on changing the number of vehicles or their physical locations. This research presents a new approach based on the shuffling Nicknames of vehicles. It fully maintains the quality of the service and prevents tracking users permanently, penetrating their privacy, revealing their whereabouts, or discovering additional details about the nature of their behavior and movements. Our approach is based on creating a central Nicknames Pool in the cloud as well as distributed subpools in fog nodes to avoid intelligent delays and overloading of the central architecture. Finally, we will prove by simulation and discussion by examples the superiority of the proposed approach and its ability to adapt to new services and provide an effective level of protection. In the comparison, we will rely on the wellknown privacy criteria: Entropy, Ubiquity, and Performance.

Resistome Study in Aquatic Environments

  • Hanseob Shin;Yongjin Kim;Seunggyun Han;Hor-Gil Hur
    • Journal of Microbiology and Biotechnology
    • /
    • 제33권3호
    • /
    • pp.277-287
    • /
    • 2023
  • Since the first discovery of antibiotics, introduction of new antibiotics has been coupled with the occurrence of antibiotic resistant bacteria (ARB) and antibiotic resistance genes (ARGs). Rapid dissemination of ARB and ARGs in the aquatic environments has become a global concern. ARB and ARGs have been already disseminated in the aquatic environments via various routes. Main hosts of most of ARGs were found to belong to Gammaproteobacteria class, including clinically important potential pathogens. Transmission of ARGs also occurs by horizontal gene transfer (HGT) mechanisms between bacterial strains in the aquatic environments, resulting in ubiquity of ARGs. Thus, a few of ARGs and MGEs (e.g., strA, sul1, int1) have been suggested as indicators for global comparability of contamination level in the aquatic environments. With ARB and ARGs contamination, the occurrence of critical pathogens has been globally issued due to their widespread in the aquatic environments. Thus, active surveillance systems have been launched worldwide. In this review, we described advancement of methodologies for ARGs detection, and occurrence of ARB and ARGs and their dissemination in the aquatic environments. Even though numerous studies have been conducted for ARB and ARGs, there is still no clear strategy to tackle antibiotic resistance (AR) in the aquatic environments. At least, for consistent surveillance, a strict framework should be established for further research in the aquatic environments.