• Title/Summary/Keyword: User Life

Search Result 1,407, Processing Time 0.033 seconds

The Role of Wearable Devices for the Success of the Healthcare Business: Verification from PRISMA Approach

  • KIM, Ji-Hye;KANG, Eungoo
    • The Journal of Economics, Marketing and Management
    • /
    • v.10 no.4
    • /
    • pp.13-24
    • /
    • 2022
  • Purpose: Although numerous research has covered content on trends in the adoption and use of wearable devices, their uses across several sectors such as healthcare, gaming, and fashion, there seems to be a considerable paucity with regard to empirical research focusing on the solutions for factors that undermine the effectiveness of wearable devices in healthcare. The present research aims to highlight what has been covered on wearable devices in healthcare while highlighting the limitations for future research. Research design, data, and methodology -The present authors conducted one of the most famous qualitative literature approach which has been called as PRISMA (Preferred Reporting Items for Systematic Reviews and Meta-Analysis) statement. The selecting criteria for eligible prior studies was estimated by whether studies are suitable for the current research, identifying they are peer-reviewed and issued by notable publishers between 2017 and 2022. Result - Our results indicated that (1) Increasing the Affordability and User Education on Wearable Devices in Healthcare (2) Tackling the Technological Issues in Wearable Devices to Promote Healthcare Delivery (3) Solving Security and Privacy Issues Associated with Wearable Devices (4) Promoting Standards and Appropriate Regulations for Wearable Devices. Conclusion - To add, resolving the technological issues associated with wearable devices in healthcare will ensure that the new devices in the market will have longer battery life, multiple functions, and enhanced accuracy, thus ensuring that patients receive better care. Necessary interventions are taken on time to avoid any deleterious consequences such as proliferating mortality rates among the different patient groups.

Vulnerability Analysis Model for IoT Smart Home Camera

  • Aljahdali, Asia Othman;Alsaidi, Nawal;Alsafri, Maram
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.229-239
    • /
    • 2022
  • Today's Internet of Things (IoT) has had a dramatic increase in the use of various daily aspects. As a consequence, many homes adopt IoT technology to move towards the smart home. So, the home can be called smart when it has a range of smart devices that are united into one network, such as cameras, sensors, etc. While IoT smart home devices bring numerous benefits to human life, there are many security concerns associated with these devices. These security concerns, such as user privacy, can result in an insecure application. In this research, we focused on analyzing the vulnerabilities of IoT smart home cameras. This will be done by designing a new model that follows the STRIDE approach to identify these threats in order to afford an efficient and secure IoT device. Then, apply a number of test cases on a smart home camera in order to verify the usage of the proposed model. Lastly, we present a scheme for mitigation techniques to prevent any vulnerabilities that might occur in IoT devices.

A Case Study of Video See-Through HMD in Military Counseling Service

  • Lee, Yoon Soo;Lee, Joong Ho
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.101-107
    • /
    • 2022
  • In Korea, the military has been conducting counseling forthe preemptive detection of psychologically unstable soldiers to prevent unexpected accidents and to help them adapt to military life. However, several soldiers feel anxious about face-to-face counseling with military officers and they have difficulty expressing themselves. Video See-Through HMD is a state-of-the-art mixed reality device that converts the user's real view into a digital view, which leads users to feel the actual situation as the virtual. To validate its usefulness as a new psychological counseling aid, we investigated 11 army soldiers who are under the counseling program in barracks. During the counseling conversation, participants were asked to wear or take off the Video See-Through HMD repeatedly. All conversations were recorded for behavioral observation. As a result, 80% of the soldiers showed a relatively stable state of mind when wearing the Video See-Through HMD, which leads them to be innocent and frank about their concerns. This method could improve the effectiveness of counseling to prevent unexpected accidents caused by unnoticeable psychological instabilities of the clients.

Quality of Service using Min-Max Data Size Scheduling in Wireless Sensor Networks

  • Revathi, A.;Santhi, S.G.
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.327-333
    • /
    • 2022
  • Wireless Sensor Networks (WSNs) plays an important role in our everyday life. WSN is distributed in all the places. Nowadays WSN devices are developing our world as smart and easy to access and user-friendly. The sensor is connected to all the resources based on the uses of devices and the environment [1]. In WSN, Quality of Service is based on time synchronization and scheduling. Scheduling is important in WSN. The schedule is based on time synchronization. Min-Max data size scheduling is used in this proposed work. It is used to reduce the Delay & Energy. In this proposed work, Two-hop neighboring node is used to reduce energy consumption. Data Scheduling is used to identify the shortest path and transmit the data based on weightage. The data size is identified by three size of measurement Min, Max and Medium. The data transmission is based on time, energy, delivery, etc., the data are sent through the first level shortest path, then the data size medium, the second level shortest path is used to send the data, then the data size is small, it should be sent through the third level shortest path.

Information Seeking Behaviour of Distance Learners: What has Changed During the Covid-19?

  • Alturki, Ryan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.5
    • /
    • pp.182-192
    • /
    • 2022
  • All the aspects of human life have been affected by the novel coronavirus (Covid-19). It has rapidly spread in most countries including the Kingdom of Saudi Arabia. As a result, early precautionary actions aiming to minimise the virus effect are taken by the Saudi government. One of these actions is the sudden shift to online classes and suspending the attendees to all educational institutes. Such immediate change can have a significant effect on the educational process, especially for students. One can argue that students' information-seeking behaviour within the current situation can affect their learning quality and outcomes. Therefore, this paper examines the Saudi students' information-seeking behaviour by taking a sample of students from Umm Al-Qura University. A descriptive analysis is conducted with 193 students and two approaches are used to collect data, questionnaire and semi-structured interview. The results showed that the majority of students face difficulties when searching and retrieving e-resources from the university library website. The problems range from mainly poor User Experience (UX), network connection, multiple errors and lack of subscription with academic publishers.

Protecting Privacy of User Data in Intelligent Transportation Systems

  • Yazed Alsaawy;Ahmad Alkhodre;Adnan Abi Sen
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.5
    • /
    • pp.163-171
    • /
    • 2023
  • The intelligent transportation system has made a huge leap in the level of human services, which has had a positive impact on the quality of life of users. On the other hand, these services are becoming a new source of risk due to the use of data collected from vehicles, on which intelligent systems rely to create automatic contextual adaptation. Most of the popular privacy protection methods, such as Dummy and obfuscation, cannot be used with many services because of their impact on the accuracy of the service provided itself, they depend on changing the number of vehicles or their physical locations. This research presents a new approach based on the shuffling Nicknames of vehicles. It fully maintains the quality of the service and prevents tracking users permanently, penetrating their privacy, revealing their whereabouts, or discovering additional details about the nature of their behavior and movements. Our approach is based on creating a central Nicknames Pool in the cloud as well as distributed subpools in fog nodes to avoid intelligent delays and overloading of the central architecture. Finally, we will prove by simulation and discussion by examples the superiority of the proposed approach and its ability to adapt to new services and provide an effective level of protection. In the comparison, we will rely on the wellknown privacy criteria: Entropy, Ubiquity, and Performance.

Study on 2D Sprite *3.Generation Using the Impersonator Network

  • Yongjun Choi;Beomjoo Seo;Shinjin Kang;Jongin Choi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.7
    • /
    • pp.1794-1806
    • /
    • 2023
  • This study presents a method for capturing photographs of users as input and converting them into 2D character animation sprites using a generative adversarial network-based artificial intelligence network. Traditionally, 2D character animations have been created by manually creating an entire sequence of sprite images, which incurs high development costs. To address this issue, this study proposes a technique that combines motion videos and sample 2D images. In the 2D sprite generation process that uses the proposed technique, a sequence of images is extracted from real-life images captured by the user, and these are combined with character images from within the game. Our research aims to leverage cutting-edge deep learning-based image manipulation techniques, such as the GAN-based motion transfer network (impersonator) and background noise removal (U2 -Net), to generate a sequence of animation sprites from a single image. The proposed technique enables the creation of diverse animations and motions just one image. By utilizing these advancements, we focus on enhancing productivity in the game and animation industry through improved efficiency and streamlined production processes. By employing state-of-the-art techniques, our research enables the generation of 2D sprite images with various motions, offering significant potential for boosting productivity and creativity in the industry.

Efficient and Secure Sound-Based Hybrid Authentication Factor with High Usability

  • Mohinder Singh B;Jaisankar N.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2844-2861
    • /
    • 2023
  • Internet is the most prevailing word being used nowadays. Over the years, people are becoming more dependent on the internet as it makes their job easier. This became a part of everyone's life as a means of communication in almost every area like financial transactions, education, and personal-health operations. A lot of data is being converted to digital and made online. Many researchers have proposed different authentication factors - biometric and/or non-biometric authentication factors - as the first line of defense to secure online data. Among all those factors, passwords and passphrases are being used by many users around the world. However, the usability of these factors is low. Also, the passwords are easily susceptible to brute force and dictionary attacks. This paper proposes the generation of a novel passcode from the hybrid authentication factor - sound. The proposed passcode is evaluated for its strength to resist brute-force and dictionary attacks using the Shannon entropy and Passcode (or password) entropy formulae. Also, the passcode is evaluated for its usability. The entropy value of the proposed is 658.2. This is higher than that of other authentication factors. Like, for a 6-digit pin - the entropy value was 13.2, 101.4 for Password with Passphrase combined with Keystroke dynamics and 193 for fingerprint, and 30 for voice biometrics. The proposed novel passcode is far much better than other authentication factors when compared with their corresponding strength and usability values.

Determine the Critical Factors of Information Systems Success (ISS) to Enhance Customer Satisfaction on SME Performance in Saudi Arabia

  • Saad A. Almohammadi;Adel A. Bahaddad
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.10
    • /
    • pp.30-36
    • /
    • 2023
  • In today's worldwide environment, information systems (IS) usage is growing swiftly. As a result, it now affects every aspect of life and serves as a general growth tool for individuals, groups, and governments. information system success (ISS) is affected by customer satisfaction and their acceptance of using these services. In addition, this issue will be a critical thing for SMEs, especially in Saudi Arabia. SMEs have a shortage and lack IT experience and resources. The research's question is What are the ISS that will improve customer satisfaction and SME performance in Saudi Arabia. Through an online survey, The data on how Saudi SMEs succeed in IS was acquired. Citizens and residents users in Saudi Arabia, representing a range of ages and educational backgrounds. In the IS success factors evaluation, which assessed the degree of agreeability and disagreeability of specific statements related to the six dimensions based on the empirical data, it was found that the users agreed with the majority of the claims. For users, usability is the most important feature. This study discovered that enhancing the system's overall user experience might lead to higher overall satisfaction.

Analyzing Information Disclosure in the Construction CALS System: A Study on Improvement Strategies (건설CALS시스템 정보공개 현황분석을 통한 개선 방안 연구)

  • Xiu-Mei Zheng;Tae-Hak Kim
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.26 no.6_3
    • /
    • pp.1243-1249
    • /
    • 2023
  • The Public Data Act mandates that every public institution must make efforts to facilitate convenient access to public data for all and take necessary measures to universally expand the right to use such data. Furthermore, it specifies that the head of a public institution must provide the data held and managed by that institution to the citizens. The Construction Project Information Disclosure Service aims to increase the utilization of data within the Construction CALS System, creating new added value by disclosing information and fostering communication. This service seeks to enhance public interest and transparency, support the creation of new businesses based on construction project data, and stimulate related industries. Since 2019, a total of 26 types of information have been disclosed through this service. As the volume of disclosed information continues to increase, there has been a consistent demand for reducing burden on data providers and enhancing user functionality. This study analyzes the current status of the Construction CALS Information Disclosure System to identify its existing challenges. Subsequently, it establishes a systematic approach to the data opening process and proposes enhancements to information disclosure and search functionalities for addressing these challenges.