• Title/Summary/Keyword: information management and services

Search Result 5,283, Processing Time 0.042 seconds

Analysis of the Usage patterns of Social Network Service Users (소셜 네트워크 서비스 사용 시기에 따른 사용자 이용패턴 연구: 페이스북을 중심으로)

  • Park, Sang Hyeok;Oh, Seung Hee;Sung, Haeng Nam
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.4
    • /
    • pp.251-265
    • /
    • 2013
  • The emergence of social network services, is changing the foundation of human relationship formation and method of communication of individuals through sharing of free information. Social network service is a service to support or facilitate an on-line extension of off-line network among people by helping them to share personal profile. History of social network services very short. But users of the various layers is increasing rapidly and ripple effect social as a result is very large. The focus of existing research was mainly devoted to motivation of use and acceptance of social network services. Currently the use of SNS was maturing. Thus, in-depth research on the use pattern of SNS users is needed. The purpose of this study is that, for Facebook in social network services, to analyze the changes in the initial stage of use, medium-term, usage patterns at the current time. Results of the study by analyzing the characteristics of the change in the pattern of usage of user of Facebook, it can be used as basic materials for SNS researchers and service provider.

What makes University Students to continuously use Cloud Services? - Enjoyment and Social Influence

  • Lee, Jong Man;Lee, Sang Jong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.1
    • /
    • pp.123-129
    • /
    • 2018
  • The purpose of this paper is to investigate the influence of utilitarian, hedonic and social motivations on continuance intention to use cloud services. To do this, this study built a research model and examined how ease of use, usefulness, enjoyment, social influence affect the continuance usage intention of cloud services. The survey method was used for this paper, and data from a total of 82 university students were used for the analysis. And structural equation model was used to analyze the data. The results of this empirical study is summarized as followings. First, enjoyment has a direct effect on the continuance usage intention of cloud services. Second, social influence has a direct effect on the continuance usage intention. Further, it will provide meaning suggestion point of the importance of not only utilitarian motivation but also hedonic and social motivations in establishing the use policy of cloud services.

A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service (안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계)

  • Song, Jun Ho;Choi, Do Hyun;Park, Jung Oh
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.3
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.

Frequency Forecasting Model for Next Wireless Multimedia Services (멀티미디어 이동통신서비스를 위한 주파수 수요예측 모형)

  • Jang, Hee-Seon;Han, Sung-Su;Yeo, Jae-Hyun;Choi, Sung-Ho
    • IE interfaces
    • /
    • v.18 no.3
    • /
    • pp.333-342
    • /
    • 2005
  • In this paper, we propose an efficient forecasting methodology of the mid and long-term frequency demand in Korea. The methodology consists of the following three steps: classification of basic service group, calculation of effective traffic, and frequency forecasting. Based on the previous studies, we classify the services into wide area mobile, short range radio, fixed wireless access and digital video broadcasting in the step of the classification of basic service group. For the calculation of effective traffic, we use the measures of erlang and bps. The step of the calculation of effective traffic classifies the user and basic application, and evaluates the effective traffic. Finally, in the step of frequency forecasting, different methodology will be proposed for each service group and its applications are presented.

A Enhanced Security Model for Cloud Computing in SSO Environment

  • Jang, Eun-Gyeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.8
    • /
    • pp.55-61
    • /
    • 2017
  • Cloud computing is cost-effective in terms of system configuration and maintenance and does not require special IT skills for management. Also, cloud computing provides an access control setting where SSO is adopted to secure user convenience and availability. As the SSO user authentication structure of cloud computing is exposed to quite a few external security threats in wire/wireless network integrated service environment, researchers explore technologies drawing on distributed SSO agents. Yet, although the cloud computing access control using the distributed SSO agents enhances security, it impacts on the availability of services. That is, if any single agent responsible for providing the authentication information fails to offer normal services, the cloud computing services become unavailable. To rectify the environment compromising the availability of cloud computing services, and to protect resources, the current paper proposes a security policy that controls the authority to access the resources for cloud computing services by applying the authentication policy of user authentication agents. The proposed system with its policy of the authority to access the resources ensures seamless and secure cloud computing services for users.

Vulnerability and Security Management System from the Perspective of the Cloud Service Users (클라우드 서비스 사용자 관점에서의 취약점과 보안관리체계)

  • Choi, Young-Jin;Ra, Jong-Hei;Ky, Hong Pil;Lee, Sang-Hak
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.4
    • /
    • pp.401-411
    • /
    • 2012
  • There has been increased interest for cloud computing services that can promote cost savings while increasing investment in information resources. Cloud computing, however, has a disadvantage physically located in the external information resources to take advantage of the economic benefits, the advantages and increase the vulnerability of information protection and control of information assets. In this study, due to the unique properties of the new services, including vulnerability, the vulnerability of cloud computing derive the vulnerability of cloud computing and control items were derived through the mapping between vulnerability and control items, that are not being managed to identify vulnerabilities Cloud computing risk factors are presented.

A Study on Strategies of Developing a Model for a National Information Services System in the Science, Technology and Industry Sectors in Korea (국가 과학기술산업정보서비스를 위한 시스템 개발 전략)

  • Kwack, Dong-Chul
    • Journal of Information Management
    • /
    • v.32 no.3_4
    • /
    • pp.1-30
    • /
    • 2001
  • The purpose of this study is to develope a model for an integrated national management system of information services in the science, technology and industry sectors by assigning major roles and purposes to KISTI which was set up by the merge of KINITI and KORDIC. In order to develope the model, this study investigates and analyzes the problems of KINITI and KORDIC. On the base of these analytical results, this study presents a desirable model of KISTI for a national information services in the science, technology and industry sectors.

  • PDF

Bibliometric Services Types and Cases in Foreign Countries (해외 계량서지 서비스 유형 및 사례 분석 연구)

  • Lee, Jae Yun;Lee, Ji-Won;Kim, Soojung
    • Journal of the Korean Society for information Management
    • /
    • v.37 no.4
    • /
    • pp.225-253
    • /
    • 2020
  • This study aims to investigate bibliometric services practices of foreign libraries by service types and suggest practical considerations for Korean libraries wishing to implement bibliometric services. Through the examination of previous research and library websites, nine types of bibliometric services were identified under two broad categories - education & consulting services and research evaluation & research trend services. According to the service types, a wide range of bibliometric services activities were analyzed and described. Recommendations from the study for service development include: building an institutional repository for scholarly output; developing subject guides and education programs at the initial phase of service and providing more advanced services such as consulting and analysis services at the later phase; identifying the potential service needs of researcher groups.

A Methodology of Identifying Ubiquitous Space Services for U-City Requirement Analysis (U-City 요구분석을 위한 유비쿼터스 공간 서비스 인식 방법론 개발)

  • Kwon, Oh-Byung;Kim, Ji-Hoon;Choi, Keun-Ho
    • Information Systems Review
    • /
    • v.8 no.1
    • /
    • pp.141-158
    • /
    • 2006
  • Recently, developing U-City as an integrated set of ubiquitous space services has been regarded as a promising field in realizing ubiquitous computing technology. However, well organized requirement analyses of U-City to declare what kinds of ubiquitous space services are needed and which ubiquitous computing technology should be incorporated to come up with the needs are still insufficient. Hence, the aims of this paper are to propose a set of unique U-City construction philosophies and to analyze which services should be offered in the ubiquitous space services in U-Cities. A field survey to the citizens who are potential end users of the ubiquitous space services was conducted to analyze the success factors of U-City using CSF methodology. Focused group interview with professionals in the field of ubiquitous computing technology in Korea was then performed to identify the relationship of the ubiquitous space services and the critical success factors.

Internet-based Information System for Agricultural Weather and Disease and Insect fast management for rice growers in Gyeonggi-do, Korea

  • S.D. Hong;W.S. Kang;S.I. Cho;Kim, J.Y.;Park, K.Y;Y.K. Han;Park, E.W.
    • Proceedings of the Korean Society of Plant Pathology Conference
    • /
    • 2003.10a
    • /
    • pp.108.2-109
    • /
    • 2003
  • The Gyeonggi-do Agricultural Research and Extension Services has developed a web-site (www.epilove.com) in collaboration with EPINET to provide information on agricultural weather and rice disease and insect pest management in Gyeonggi-do. Weather information includes near real-time weather data monitored by automated weather stations (AWS) installed at rice paddy fields of 11 Agricultural Technology Centers (ATC) in Gyeonggi-do, and weekly weather forecast by Korea Meteorological Administration (KMA). Map images of hourly air temperature and rainfall are also generated at 309m x 309m resolution using hourly data obtained from AWS installed at 191 locations by KMA. Based on near real-time weather data from 11 ATC, hourly infection risks of rice blast, sheath blight, and bacterial grain rot for individual districts are estimated by disease forecasting models, BLAST, SHBLIGHT, and GRAINROT. Users can diagnose various diseases and insects of rice and find their information in detail by browsing thumbnail images of them. A database on agrochemicals is linked to the system for disease and insect diagnosis to help users search for appropriate agrochemicals to control diseases and insect pests.

  • PDF