• Title/Summary/Keyword: Using Smart-phone

Search Result 1,350, Processing Time 0.024 seconds

Analysis of Security Threats from Increased Usage of Mobile App Services (모바일 앱 서비스 이용 증가로 인한 보안 위협 분석)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.45-55
    • /
    • 2018
  • Recently, because the arrival of the fourth industrial revolution era, many information and telecommunication services have grown rapidly in the mobile business market. So, companies are based Mobile Apps on user customized services and expanding their services. From the standpoint of the business, to generate revenue, the company needs to maintain the existing current computer environment and develop Mobile Apps to offer convenience in various areas such as finance, admiration, e-commerce and sales support. However, as the number of users increase due to expansion of various Mobile services, security threats that are related to Mobile Apps are increasing and its damage is also increasing. Due to the rapid technological transformation of Mobile devices using the Internet, the level of security threats to Smartphones are rising and getting more advance, so this thesis is structured as follows. In Chapter 2, it will look at the overall trends of Mobile Apps as related research. In Chapter 3, it will discuss various security concerns that related to the latest Mobile Apps and learn about the threatening factors. In Chapter 4, it will compare and analyze the threatening factors. Then it will find and suggest the possible plan. In Chapter 5, it will end with conclusion. Finally, to protect mobile devices from security threats, the environment of operating system which manages the resources and data of Apps needs to be protected. Also, it is important that users to have awareness and check activation FinTech technology security in the process of simple payment with fingerprint or IC card.

Changes in Cervicocephalic Joint Position Sense in Sustained Forward Head Posture (지속적인 전방머리자세 시 머리-목 관절 위치 감각의 변화)

  • Jeong, Dawoon;Kim, Yongwook
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.5 no.2
    • /
    • pp.11-17
    • /
    • 2017
  • Purpose : The aim of this study was to verify differences in cervicocephalic joint position sense error after different sustained sitting postures in healthy young adults. Methods : Twenty-five healthy adults(12 men, 13 women) participated in this study. Repositioning errors of neck movement were observed in participants during joint repositioning tasks. During 2 test days with a 1-week interval, the participants performed forward head posture and upright sitting posture in random order. Both head-to-neutral(HTN) and head-to-target(HTT) tasks were performed on each day. On the first day, the participants sat slouched or upright for 10 minutes. Then, they sat upright and moved their heads at a self-selected speed with their eyes-closed to pre-determined neutral and target positions as accurately as possible. The participants noticed that when they reached a pre-determined position, the errors between pre-determined neutral and target positions and current position was recorded. The tasks consisted of flexion, extension and lateral bending. On the second day, the same test was performed after another sitting posture for 10 minutes. Repositioning error values were collected by using a smart phone-based inclinometer. The mean value for three trials was used for data analysis. A paired t-test was used for statistical analysis. Results : Significant differences in joint repositioning errors were found between the repositioning error after different sitting postures on the sagittal plane for both the HTN and HTT tasks (P<.05). No significant differences in errors on the coronal plane were found (P>.05). Conclusion : Cervicocephalic joint position sense can be affected by sitting postures, especially on the sagittal plane.

Maritime Navigation to Aid Costal Sailing of Small-Size Ship (소형선의 연안항해를 지원하는 해상내비게이션)

  • Yun, Jae-jun;Mun, Jung-hwan;Chong, Jong-teak;Kim, Geun-ung;Choi, Jo-cheon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.3
    • /
    • pp.371-378
    • /
    • 2016
  • We have studied on the maritime navigation with functions of navigation route search and maritime safety information for small-size fishery ships, fishing boats, yachts, and boats in coastal seas. We have designed a smart phone application which is more exact information on marine obstacles of islands, aquafarms, and rocks by using land navigation techniques. Our navigation system is relatively easy to be used for costal navigation and may be a substitute for expensive ECDIS(Electronic Chart Display and Information System). Our system consists of maritime navigation databases to manage necessary maritime data and a mobile application to support maritime navigation for operators. We believe that our research findings can improve safety navigation in coastal seas by supporting lower cost, no time-consuming installation and maintenance, and easy-to-use operations.

Comparison of Movie Ticketing system by smartphone applications -Focused on CGV, Megabox, Lotte cinema- (스마트폰 애플리케이션을 통한 영화 예매 시스템 비교 -CGV, 메가박스, 롯데시네마를 중심으로-)

  • Ko, Jin;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.453-460
    • /
    • 2016
  • This study aimed to compare the systems of ticketing application programs of three major movie theaters, CGV, Megabox, Lotte Cinema, with each other and evaluate the usability, and find problems to figure out user experiences for more convenient mobile ticketing. Experimental subjects with experiences of using apps of the movie theaters were recruited; First, as a primary task, they reserved movie tickets with each of the movie theater apps; Second, they had in-depth interviews with questions based on the model of Creating Pleasurable Interfaces by Stephen Anderson. As a result, users preferred the composition with information in order in overall, in which ticketing process went smoothly. In particular, users were more satisfied with convenient payment applications. Therefore, as an improving way, it is required to design an interface for users to recognize at a glance and a payment system within an app, not to design separate payment system out of the app. I hope this study will help actively conduct researches to maximize the usability in a way to reserve movie tickets through smartphone apps.

Photography as a research tool for studying human psychology: Photos of friendship as an example (인간 심리에 대한 연구도구로서의 사진: 우정 사진을 예로)

  • Moon, Kyoung-Suk
    • Journal of Digital Convergence
    • /
    • v.14 no.3
    • /
    • pp.337-344
    • /
    • 2016
  • For the past half century, researches on human psychology have witnessed the flourish of various research tools in this area. Many psychological measures were developed to get objectified data and this trend has lead to the abundance of quantified results. However, considering subjectiveness and refinements of human experience, the research focused on individual's unique perspectives and explanations is needed also. In this vein, this study proposed the usefulness of photography as a research tool for human psychology. With the wide spread of smart phone, taking photo became the everyday activity for modern people and also a part of a public art. If photo could play an efficient and unique role to study human psychology, the depth and width of human understanding might change dramatically in positive way. Two friendship photos were presented to suggest the possibility of photo as a research tool and final considerations of using photo were suggested briefly.

Bayesian network based Music Recommendation System considering Multi-Criteria Decision Making (다기준 의사결정 방법을 고려한 베이지안 네트워크 기반 음악 추천 시스템)

  • Kim, Nam-Kuk;Lee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.11 no.3
    • /
    • pp.345-352
    • /
    • 2013
  • The demand and production for mobile music increases as the number of smart phone users increase. Thus, the standard of selection of a user's preferred music has gotten more diverse and complicated as the range of popular music has gotten wider. Research to find intelligent techniques to ingeniously recommend music on user preferences under mobile environment is actively being conducted. However, existing music recommendation systems do not consider and reflect users' preferences due to recommendations simply employing users' listening log. This paper suggests a personalized music-recommending system that well reflects users' preferences. Using AHP, it is possible to identify the musical preferences of every user. The user feedback based on the Bayesian network was applied to reflect continuous user's preference. The experiment was carried out among 12 participants (four groups with three persons for each group), resulting in a 87.5% satisfaction level.

The Study of Recovering trust and Rebuilding Loyalty on Applications services in SmartPhone: Focusing on Service Type (스마트폰 앱에서 서비스 유형에 따른 신뢰 회복 및 로열티 재구축에 대한 연구)

  • Choi, Hun;Choi, Yoo-Jung
    • Management & Information Systems Review
    • /
    • v.33 no.1
    • /
    • pp.65-81
    • /
    • 2014
  • Although the study of IT services has increased in recent years, few study have focused on trust based recovery process. Additionally, users of IT services have different use purpose depending on service type. Therefore, the purposes of this research is to propose trust recovery model of smartphone applications and to examine the moderating effect of service type on the use of smartphone applications. To achieve research purposes, we suggested service failure type using the scenario technique and empirically verified by conducting survey. The results showed that the procedural justice and interpersonal justice have influence on trust and trust had an effect on the all quality factors (system, information, service quality). Also, information quality and service quality had an effect on the customer loyalty. Finally, service type had significant moderating effects on the relationship between perceived justice and quality.

  • PDF

Study on Fun factor in Smartphone Convergence Game - Focusing on the Defense and Plunder (스마트폰 융복합 게임의 재미요인 분석 - 수성과 약탈을 중심으로)

  • Kim, In-Su;Jung, Hyung-Won;Kim, Tae-Gyu
    • Journal of Digital Convergence
    • /
    • v.13 no.7
    • /
    • pp.367-372
    • /
    • 2015
  • Smartphone game market, smart phone appeared on the market and soon developed rapidly, generation change is happening. Generally, Smartphone games are only short-lived super cell's Clash of Clans is gaining popularity for over two years. So Clash of Clans this game with hold most characteristic elements of the defense and plunder on the subject analyzed the fun factor. In order to analyze the defense and plunder elements were prepared Clash of Clans and Kings of Thieves in cases. Two of the cases, depending on the fun theory Preparation, A sense of space, A solid core machanic, A range of challenge, A range of abilities required to solve the encounter and Skill required in using the abilities were evaluated in the fun factor analysis of defense and plunder elements.

Real-time Responses Scheme to Protect a Computer from Offline Surrogate Users and Hackers (오프라인 대리사용자 및 해커로부터 특정 컴퓨터 보호를 위한 실시간 대응방안)

  • Song, Tae-Gi;Jo, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.12
    • /
    • pp.313-320
    • /
    • 2019
  • One of the causes of many damage cases that occur today by hacking attack is social engineering attack. The attacker is usually a malicious traitor or an ignorant insider. As a solution, we are strengthening security training for all employees in the organization. Nevertheless, there are frequent situations in which computers are shared. In this case, the person in charge of the computer has difficulty in tracking and responding when a specific representative accessed and what a specific representative did. In this paper, we propose the method that the person in charge of the computer tracks in real time through the smartphone when a representative access the computer, when a representative access offline using hacked or shared authentication. Also, we propose a method to prevent the leakage of important information by encrypting and backing up important files of the PC through the smartphone in case of abnormal access.

A Study of Call Admission Scheme using Power Strength Threshold value between APs in Wireless LAN Environments (무선랜 환경에서 AP간 전력임계치값을 통한 호 처리 연구)

  • Lim, Seung-Cheol
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.107-112
    • /
    • 2015
  • A smart phone and the number of wireless terminals are mobile-to the nature of the AP mobility are many call transfer between wireless terminals and AP (Access Point). Each wireless terminal that is the call processing process for each is relatively large to cause the wireless traffic, and a factor that inhibits the efficient use of the radio band on the AP. In this paper, we use the power intensity threshold and threshold timer of the AP received by the mobile station to reduce the amount of switching traffic between the AP's cause and traffic generation factors between the wireless device and the AP that can effectively utilize the radio traffic from the AP the measures proposed. The proposed method and the conventional method is improved by simulation to handle the amount of radio traffic from the AP it was confirmed that it is possible to effectively utilize the whole of the radio band.