• Title/Summary/Keyword: contents access

Search Result 1,142, Processing Time 0.043 seconds

A Study of Vlog that Analyze Variables Affecting Perceived Enjoyment : Using Social Communication as a Control Variable

  • Yu, Giseob;Lim, Jeong Hun;Cho, Namjae
    • Journal of Information Technology Applications and Management
    • /
    • v.27 no.5
    • /
    • pp.23-33
    • /
    • 2020
  • As the 4G and 5G Internet technologies become more common and developed, an environment for uploading and watching videos is created and spread, in addition to simply uploading posts. Watching and sharing daily life among media contents called Vlog, are very common more than ever. This means that individual users could access Vlog easily and the situation could be new trend. Additionally, academic research about Volg is increasing. We analyzed three independent variables affecting a perceived enjoyment we set up the dependent variable. Information search, self-expression, and social need are set as independent variables and social interaction is set as the control variable. Information search and self-expression are significant effect to perceived enjoyment except social need. In particular, social interaction as a control variable has effect to all relationships.

Service Provision for Future Access Networks Using PPP Extensions

  • Lee, Jungjoon;Park, Jun-Kyun
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.695-698
    • /
    • 2000
  • The services such as real-time audio and video applications have become increasingly popular, especially over the Internet. Furthermore, as being commercialized those contents on the Internet require quality of service (QoS) support to ensure their performance. PPP is the best solution to of for those kinds of services. The reason why we want to employ PPP is this satisfies most of the requirements associated with remote connectivity to an NSP, such as IP address assignment, security, and AAA (authentication, authorization and accounting). In addition, since ISPs and corporations are familiar with PPP based connectivity, easy migration from existing ISP infrastructure is expected, if QoS is guaranteed. But so for PPP has had no field to ensure the quality of service. This article presents the solution by using some tunneling protocols and the draft [1] that proposed additional LCP option fields to negotiate QoS. To communicate each other, after negotiating those option fields, over various protocols such as ATM, Ethernet, and etc. tunneling protocol is used. Following sections will mention those briefly. And the service provision to offer the end-to-end communication with negotiated QoS will also be proposed.

  • PDF

The Study on Purchase Intention of the Mobile Environment (모바일 환경에서 구매의도에 영향을 미치는 요인)

  • Lim, Gyu-Hong;Lee, Jong-Ho
    • The Journal of Information Systems
    • /
    • v.15 no.4
    • /
    • pp.189-209
    • /
    • 2006
  • The progress of mobile internet technologies has changed user access to information. The mobile internet allows to obtain contents and services from wireless networks via mobile devices. The purpose of this study is th find out important factors that influence on the customer purchase intention by mobile internet environment. Base on TAM(Technology Acceptance Model) and the latest literature, a comprehensive set of constructs and hypotheses were compiled with a methodology for testing them. We suggested five factors that effect purchase intention in mobile internet environment: Enjoyment Ease of use, Usefulness, Mobility, Trust To validate the research model, we collected data from cellular phone user using an online survey. The results of this study are as follows. First enjoyment ease of un, usefulness, and mobility had positive effects on trust. Second, Usefulness, ease of use, and trust had positive effects on purchase intention to use mobile internet. Third, enjoyment and mobility did not have positive effects on purchase intention to use mobile internet. Based on these results, we suggest marketing strategies.

  • PDF

Immersion Experience of the Cyber World of Adolescents (청소년의 사이버세계 몰입경험)

  • 박남희;조영란;최원희;문남진;안혜경;신재신
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.1
    • /
    • pp.15-24
    • /
    • 2004
  • Purpose: The purpose of this research was to explore the cyber world immersion experience of adolescents. Method: Multiple strategies for data collecting were used: an in depth face-to-face interview; analysis of adolescent' writings; and analysis of examples of phenomenon in the realistic world. The sample group consisted of 10 adolescents. Results: Although the experience was different for all adolescent interviewed, the essential themes of experience emerged: "fill up", "homoeologous feeling", "the older generation has a conflicting negative opinion", "change in social character", "become habitually skeptic", "have bad health", "mean of superiority and getting everything solved", "ease of access", "monetary benefit", "addiction to the computer", "forget real life solved stress", "do harm to society", "take comfort", or "new job". Conclusion: Accordingly this paper suggests that contact with various software is necessary in adolescents, and good quality contents function to prepare and activate adolescents to apply the internet for good use.

Trusted Certificate Validation Scheme for Open LBS Application Based on XML Web Services

  • Moon, Ki-Young;Park, Nam-Je;Chung, Kyo-Il;Sohn, Sung-Won;Ryou, Jae-Cheol
    • Journal of Information Processing Systems
    • /
    • v.1 no.1 s.1
    • /
    • pp.86-95
    • /
    • 2005
  • Location-based services or LBS refer to value-added service by processing information utilizing mobile user location. With the rapidly increasing wireless Internet subscribers and world LBS market, the various location based applications are introduced such as buddy finder, proximity and security services. As the killer application of the wireless Internet, the LBS have reconsidered technology about location determination technology, LBS middleware server for various application, and diverse contents processing technology. However, there are fears that this new wealth of personal location information will lead to new security risks, to the invasion of the privacy of people and organizations. This paper describes a novel security approach on open LBS service to validate certificate based on current LBS platform environment using XKMS (XML Key Management Specification) and SAML (Security Assertion Markup Language), XACML (extensible Access Control Markup Language) in XML security mechanism.

Extraction of User Preference for Hybrid Collaborative Filtering

  • Qing Li;Kim, Byeong-Man;Shin, Yoon-Sik;Lim, En-Ki
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.7-9
    • /
    • 2004
  • With the development of e-commerce and information access, recommender systems have become a popular technique to prune large information spaces so that users are directed toward those items that best meet their needs and preferences. In this paper, clustering technique is applied in the collaborative recommender framework to consider semantic contents available from the user profiles. We also suggest methods to construct user profiles from rating information and attributes of items to accommodate user preferences. Further, we show that the correct application of the semantic content information obtained from user profiles does enhance the effectiveness of collaborative recommendation.

  • PDF

MVC Implementation of Online Digital Contents Shopping Mall (온라인 디지털 컨텐츠 쇼핑몰의 MVC 기반 구현)

  • Seo, Juwan;Choi, Min
    • Annual Conference of KIPS
    • /
    • 2015.04a
    • /
    • pp.1008-1011
    • /
    • 2015
  • 본 연구는 디지털 컨텐츠를 판매하는 쇼핑몰에서 각 컨텐츠에 대해서 개별적으로 신용카드 기반으로 결제/판매할 수 있도록 하는 시스템이다. 이를 위해 본 연구에서는 PHP 기반 쇼핑몰 전반부(front-end)와 Spring MVC 기반 쇼핑몰 후반후(Back-end)를 분리하여 구현하였다. 전반부에서는 기본적으로 판매되는 각 디지털 컨텐츠를 분류별로 보여주는 기능을 구현하였고, 후반부에서는 각 디지털 컨텐츠에 대한 상세정보를 보여주며 신용카드 결제/IP 기반 접속제한/로깅(logging) 기능 등을 제공하도록 하였다. 특정 디지털 컨텐츠를 온라인으로 결제시에는 그로부터 24시간내에는 몇 번이고 다운로드 할 수 있도록 서비스 하기 위해서, E-rnail을 통한 인증코드(access code)를 제공하는 기능도 구현하였다. 또한, 이러한 구현을 Spring MVC 3.0 기반 구조에 의거하여 구현함으로써, 향후 시스템 유지보수성을 획기적으로 향상시켰다.

A Block-Based Adaptive Data Hiding Approach Using Pixel Value Difference and LSB Substitution to Secure E-Governance Documents

  • Halder, Tanmoy;Karforma, Sunil;Mandal, Rupali
    • Journal of Information Processing Systems
    • /
    • v.15 no.2
    • /
    • pp.261-270
    • /
    • 2019
  • In order to protect secret digital documents against vulnerabilities while communicating, steganography algorithms are applied. It protects a digital file from unauthorized access by hiding the entire content. Pixel-value-difference being a method from spatial domain steganography utilizes the difference gap between neighbor pixels to fulfill the same. The proposed approach is a block-wise embedding process where blocks of variable size are chosen from the cover image, therefore, a stream of secret digital contents is hidden. Least significant bit (LSB) substitution method is applied as an adaptive mechanism and optimal pixel adjustment process (OPAP) is used to minimize the error rate. The proposed application succeeds to maintain good hiding capacity and better signal-to-noise ratio when compared against other existing methods. Any means of digital communication specially e-Governance applications could be highly benefited from this approach.

A Synthetic Proposal of Technical Blocking Method Based on the Harmful Internet Contents Access (유해컨텐츠 접속 동기에 기초한 기술적 차단 방법의 종합적 제시)

  • Cho, Dong Uk
    • Annual Conference of KIPS
    • /
    • 2004.05a
    • /
    • pp.645-648
    • /
    • 2004
  • 본 논문은 유해콘텐츠를 접속하는 동기를 통하여 이를 효과적으로 차단하기 위한 전체적 방법에 대한 제시를 행하고자 한다. 이를 위해 첫째, 인터넷 유해 콘텐츠의 접속 동기를 분석한다. 또한 인터넷 유해 콘텐츠를 접속하는데 있어 가장 큰 요소인 스팸메일에 대해 실태 파악 및 분석을 행하고자 한다. 이를 위해 우선적으로 스팸메일이 증가하는 이유, 스팸메일 발송자가 전자우편을 수집하는 방법 그리고 각종 스팸메일 방지 방안 및 스팸 방지 기술에 대해 기술하고자 한다. 또한 수신측에서 행해지고 있는 스팸메일 차단에 대해 여과를 안 하는 이유 등에 대해 조사함으로써 스팸메일 차단에 대한 연구 방향을 잡기 위한 기초 자료로 삼고자 하며 이를 기초로 이메일을 수집 단계에서부터 차단이 이루어 지게 하기 위한 종합적 차단 방법에 대해 제안하고자 한다.

  • PDF

A Design and Implementation of Environmental Information System (환경 정보 시스템 설계 및 구현)

  • Lee, Kilhung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.17 no.2
    • /
    • pp.21-28
    • /
    • 2021
  • In this paper, a study on a method for designing and implementing an environmental information system to support environmental activities was done. First of all, research on the similar information system and necessary functions were derived. Necessary functions were largely classified into functions for cooperation such as policy consultation and publicity, and functions for environmental information data. Collaboration functions are classified in detail, and detailed contents of this function are summarized. In addition, a data model was designed for various environmental information, and an information server and client interface are designed as a cloud application. Cloud server configuration and design, and client web and app programs to access these information were implemented and tested each functions successfully.