• Title/Summary/Keyword: User's Need

Search Result 1,047, Processing Time 0.037 seconds

A New Design and Implementation of Digital Evidence Container for Triage and Effective Investigation (디지털 증거 선별 조사의 효율성을 위한 Digital Evidence Container 설계 및 구현)

  • Lim, Kyung-Soo;Lee, Chang-Hoon;Lee, Sang-In
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.4
    • /
    • pp.31-41
    • /
    • 2012
  • The law enforcement agencies in the worldwide are confiscating or retaining computer systems involved in a crime/civil case, if there are any, at the preliminary investigation stage, even though the case does not involve a cyber-crime. They are collecting digital evidences from the suspects's systems and using them in the essential investigation procedure. It requires much time, though, to collect, duplicate and analyze disk images in general crime cases, especially in cases in which rapid response must be taken such as kidnapping and murder cases. The enterprise forensics, moreover, it is impossible to acquire and duplicate hard disk drives in mass storage server, database server and cloud environments. Therefore, it is efficient and effective to selectively collect only traces of the behavior of the user activities on operating systems or particular files in focus of triage investigation. On the other hand, if we acquire essential digital evidences from target computer, it is not forensically sound to collect just files. We need to use standard digital evidence container from various sources to prove integrity and probative of evidence. In this article, we describe a new digital evidence container, we called Xebeg, which is easily able to preserve collected digital evidences selectively for using general technology such as XML and PKZIP compression technology, which is satisfied with generality, integrity, unification, scalability and security.

A study on shopping site design ; How a shopping site design affect a customer′s purchase decision (인터넷마케팅 전략으로써 쇼핑몰 디자인이 구매결정에 미치는 영향에 관한 연구)

  • 차영주;이태경
    • Archives of design research
    • /
    • v.14 no.1
    • /
    • pp.17-26
    • /
    • 2001
  • A shopping mall sie is the area which males use of the Internee activity as a medium in business transactions, But their growth rate of revenues does not keep up with the growth rate in the number of internet users. One of the reasons why they fall behind of the expected earning proportionate to the growing number of internet user is that the shopping sites do not satisfy various need of customers on the web. This comes from that there has been not enough efforts on a shopping site design satisfying their needs. This paper is to find the elements of the shopping site design to affect the my customers purchase goods on the internet on the premise that a design being closely related with a marketing strategy makes a good design. This paper consists of three parts. The first chapter is about related works inducing e-commerce, marketing as wet as design theory. In the second chapter, data are analyzed to find the elements of a good design. The data are categorized by criteria of general properties, elements in design theory, demographic characteristics and hypothesis tests are done. The third chapter is the conclusion.

  • PDF

A Study on the enforceability of Shrink-wrap License under the Contract Law of USA (미국(美國) 계약법(契約法)하에서 소위 "쉬링크랩라이센스" 계약(契約)에 관한 일고찰(一考察))

  • Hur, Hai-Kwan
    • THE INTERNATIONAL COMMERCE & LAW REVIEW
    • /
    • v.20
    • /
    • pp.129-150
    • /
    • 2003
  • Software license agreements, to be useful in the mass market, could not be individually negotiated, and had to be standardized and concise. The software license agreement needs to be presented to the licensee-users in a fashion that would allow for mass distribution of software, also for it to enforceable, that would draw the users' attention to the terms and conditions under which the publisher allowed the use of the software. These needs have been accomplished, with or without fail, through so called the "shrink-wrap licenses" Shrink-wrap licenses purpose to transfer computer softwares to their users by defining the terms and conditions of use of the software without implicating the "first sale doctrine" of the Copyright Act. These shrink-wrap licenses have become essential to the software industry. However, in USA, the law applicable to these licenses has been unclear and unsettled. Courts have struggled to develop a coherent framework governing their enforceability. Meanwhile, the National Conference of Commissioners on Uniform State Laws ("NCCUSL") in USA promulgated the Uniform Computer Information Transaction Act ("UCITA") governing contracts for computer information transaction on July 29, 1999. One clear objective of UCITA was to settle the law governing the enforceability of shrink-wrap licenses. In these respects, this paper first introduces the various forms that shrink-wrap licenses take(at Part II. Section 1.), and explains the main advantages of them(at Part II. Section 2.) Here it shows how shrink-wrap licenses value themselves for both software publishers and users, including that shrink-wrap licenses are a valuable contracting tool because they provide vital information and rights to software users and because they permit the contracting flexibility that is essential for today's software products. Next, this paper describes the current legal framework applicable to shrink-wrap licenses in USA(at Part III). Here it shows that in USA the development of case law governing shrink-wrap licenses occurred in two distinct stages. At first stage, judicial hostility toward shrink-wrap licenses marked such that they were not enforced pursuant to Article 2 of the Uniform Commercial Code. At second stage, courts began to recognize the pervasiveness of shrink-wrap licenses, their indispensability to the rapidly expanding information technology industry, and the urgent need to enforce such licenses in order to maintain low prices for consumers of computer hardware or software, resulting in the recognition of shrink-wrap licenses. Finally, in view of the importance of UCITA, this paper examines how it will affect the enforceability of shrink-wrap licenses(at Part IV). The drafters of UCITA, as well as the scholars and practitioners who have criticized it, agree that it validates shrink-wrap licenses, provided certain procedural protections are afforded to purchasers. These procedural protections include the licensee end-user must (i) manifest his assent to the shrink-wrap license, (ii) have an opportunity to review the shrink-wrap license, (iii) have a right to return the product without costs.

  • PDF

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

A Survey on the Recognition of Korean Farmers for the Safety of Environment-friendly Organic Materials (친환경유기농자재 안전성 확보를 위한 농업인의 인식도 조사)

  • Paik, Min-Kyoung;Lee, Je-Bong;Oh, Jin-A;Kim, Min-Ju;Kim, Sang-Su;Choi, Chil-Gu;Kim, Do-Hoo
    • Korean Journal of Organic Agriculture
    • /
    • v.21 no.2
    • /
    • pp.233-246
    • /
    • 2013
  • This study was performed to investigate the recognition of Korean farmers for the safety of environment-friendly organic materials (EFOMs). The main purchase line of environment-friendly organic materials was the sustainable agriculture organizations, and decisive basis for the materials purchase was because they thought that agricultural produce cultivated with EFOMs were safe. Currently farmers obtained the most information about EFOMs through farmer's education operated by agricultural technology center. Sixty nine percent of respondents hoped that they would get the information on the website and through official education opened by of the government or relative institutions. Whereas, only a few respondents hoped that they would get the information from the sellers. Therefore we thought that government and related institutions should operate the education program to give the sellers the scientific and accurate information about EFOMs. In addition, farmers are highly recognized the necessity of safety-related information provided by government and related institutions. Most Farmers thought that safety education for farmers using EFOMs was very important. Also, it was confirmed that farmer respondents thought to need to establish the shelf-life and user guideline and to label about toxic category of EFOMs. The Cronbach' alpha coefficient calculated in order to verify the reliability of survey questions was 0.699. That value indicates that responses of the respondents in this study might be reliable.

A Study on the Optimization of Edutainment Website design For Juvenile Users (에듀테인먼트 기반의 어린이 웹사이트 디자인에 관한 연구)

  • 손은미;임은정;이현주
    • Archives of design research
    • /
    • v.15 no.1
    • /
    • pp.143-152
    • /
    • 2002
  • As the Internet has been a daily instrument of our lives, the numbers of Internet users are increasing rapidly. Especially, we have to pay special attention to about rapid increasing of juvenile users. In the 1990's, Kids are growing up literally surrounded by new technologies and mu1timedia experiences. For these kids, most of the techno1ologies that we adults find surprising or even incredible are a part of their everyday landscape, a fact of life. Currently, only few of research and discussion has gone into understanding this field. And most of these web sites, set importance on furnishing information only. So educational characters of web are not manifested fully as well as children soon get board with learning with Internet so that feel difficulties in searching and accepting information. At this point, we must try to develop educational sites Not only to show information but also to offer a rich and entertaining time for kids while providing playful teaming and increased technological fluency. Fer this purpose, Web site should be all about combining play with learning. Site navigation should be easy and the pages load quickly. The page download time is also being considerable, which could send kids withy mouse-fingers looking for entertainment elsewhere. Everything about the site must have a familiar feel, uses adequate colors to be satisfied with the juveniles. Multimedia can help the communications in the websites. To maximize the educational effect, technological research and continues invest are need, in addition to usability test.

  • PDF

Satisfaction Factors and Determinants of Visitors in Taeanhaean National Park, Korea (태안해안국립공원 탐방객 만족요인 및 예측모형)

  • Baek, Jae-Bong;Kim, Dong-Pil
    • Korean Journal of Environment and Ecology
    • /
    • v.24 no.2
    • /
    • pp.101-107
    • /
    • 2010
  • This study was carried out to provide basic data for efficient park management by analysing visitors' satisfaction factors and estimated regression model through questionnaire survey method at Taeanhaean National Park in Korea. Performance(satisfaction) variables as 'touting', 'illegal merchant', 'noise', 'indiscreet use' and 'collection of natural plants or animals', and Importance variables as 'littering problem', 'water pollution act', 'careless cooking' and 'exorbitant pay' were relatively high score. It was clarified that the 'souvenir & special product', 'lack of use program' 'lack of public facility', 'lack of information facility', and 'lack of commercial facility' were 'concentrate here' ones by the Importance-Performance analysis. 'Facility management', 'Use management' and 'Resource management' factors were found out by Factor Analysis and the 'Facility management' was the biggest factor accounting for 32.6% of all. In the estimated model by Multiple Regression Analysis, 'lack of employee's guidance or kindness', 'lack of convenience facility', 'noise', 'lack of facilities to stay' and 'charge of user fee, parking fee' were the variables to impact visitors' satisfaction and to need concentrated management. These results were unique characteristics of marine national park and then the different management strategy and policy from mountain national park were necessary.

A Study on the Expected Effect of Mobile Prepaid Payment for the Activation of Food Waste Volume-Rate System (음식물 종량제 활성화를 위한 모바일 선불결제 적용에 따른 기대효과 연구)

  • Kim, YongIl;Kim, SeungCheon
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.47-54
    • /
    • 2020
  • This study proposes an NFC-based payment system that considers user convenience while expanding the existing payment method for RFID-based individual food and logistics waste equipment. In line with this trend, I proposed to apply NFC to the existing RFID-based food meter to release the food in the meantime and to address the problem of re-carrying due to card loss, card not possessed, and non-filling, and the question that could not be identified by various cumbersome procedures. NFC's function alone has been certified for its convenience, which led to its introduction and research in the period of time. Of course, we need to negotiate fees with the transportation card company, but if we see a market share related to transportation card soon, we think smooth negotiations will take place. NFC method will be expanded to all phones with iPhone NFC opening. Therefore, in the next study, we intend to apply the payment system in NFC by linking with local currency, mobile vouchers, and card companies, which are being paid as respective payment means according to the recent emergency support system for COVID-19.

Developmental disability Diagnosis Assessment Systems Implementation using Multimedia Authorizing Tool (멀티미디어 저작도구를 이용한 발달장애 진단.평가 시스템 구현연구)

  • Byun, Sang-Hea;Lee, Jae-Hyun
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.3 no.1
    • /
    • pp.57-72
    • /
    • 2008
  • Serve and do so that graft together specialists' view application field of computer and developmental disability diagnosis estimation data to construct developmental disability diagnosis estimation system in this Paper and constructed developmental disability diagnosis estimation system. Developmental disability diagnosis estimation must supply information of specification area that specialists are having continuously. Developmental disability diagnosis estimation specialist system need multimedia data processing that is specialized little more for developmental disability classification diagnosis and decision-making and is atomized for this. Characteristic of developmental disability diagnosis estimation system that study in this paper can supply quick feedback about result, and can reduce mistake on recording and calculation as well as can shorten examination's enforcement time, and background of training is efficient system fairly in terms of nonprofessional who is not many can use easily. But, as well as when multimedia information that is essential data of system construction for developmental disability diagnosis estimation is having various kinds attribute and a person must achieve description about all developmental disability diagnosis estimation informations, great amount of work done is accompanied, technology about equal data can become different according to management. Because of these problems, applied search technology of contents base (Content-based) that search connection information by contents of edit target data for developmental disability diagnosis estimation data processing multimedia data processing technical development. In the meantime, typical access way for conversation style data processing to support fast image search, after draw special quality of data by N-dimension vector, store to database regarding this as value of N dimension and used data structure of Tree techniques to use index structure that search relevant data based on this costs. But, these are not coincided correctly in purpose of developmental disability diagnosis estimation because is developed focusing in application field that use data of low dimension such as original space DataBase or geography information system. Therefore, studied save structure and index mechanism of new way that support fast search to search bulky good physician data.

  • PDF

A Rule-driven Automatic Learner Grouping System Supporting Various Class Types (다양한 수업 유형을 지원하는 규칙 기반 학습자 자동 그룹핑 시스템)

  • Kim, Eun-Hee;Park, Jong-Hyun;Kang, Ji-Hoon
    • Journal of The Korean Association of Information Education
    • /
    • v.14 no.3
    • /
    • pp.291-300
    • /
    • 2010
  • Group-based learning is known to be an effective means to improve scholastic achievement in online learning. Therefore, there are some previous researches for the group-based learning. A lot of previous researches define factors for grouping from the characteristics of classes, teacher's decision and students' preferences and then generate a group based on the defined factors. However, many algorithms proposed by previous researches depend on a specific class and is not a general approach since there exist several differences in terms of the need of courses, learners, and teachers. Moreover it is hard to find a automatic system for group generation. This paper proposes a grouping system which automatically generate a learner group according to characteristics of various classes. the proposed system automatically generates a learner group by using basic information for a class or additional factors inputted from a user. The proposed system defines a set of rules for learner grouping which enables automatic selection of a learner grouping algorithm tailored to the characteristics of a given class. This rule based approach allows the proposed system to accommodate various learner grouping algorithms for a later use. Also we show the usability of our system by serviceability evaluation.

  • PDF