• Title/Summary/Keyword: internet

Search Result 29,985, Processing Time 0.061 seconds

A Comparative Analysis between High and Low Groups on Concerns About Privacy Infringement in Consumer Innovation Patterns According to Internet Media Activities (인터넷 미디어 활동에 따른 소비자 혁신성 유형이 프라이버시 침해 우려성에 대한 고(High)집단과 저(Low)집단 간의 비교 분석)

  • Lee, Ji-Hun;Kang, Jun-Mo;Lee, Jeong-Suk
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.7
    • /
    • pp.193-202
    • /
    • 2020
  • This study was intended to present the magnitude of privacy infringement concerns and their relationship to consumer innovation (functional innovation, hedonistic innovation, social innovation, cognitive innovation), to identify differences among groups and to suggest implications for marketing strategies for the spread of new products. The implications of this study are as follows. First, functional innovation has shown that differences exist between groups. Analysts say that sensitive groups are buying products that can simplify their work immediately after release despite concerns over privacy violations. Second, hedonistic innovation has shown that differences exist between groups. These findings suggest that sensitive groups prefer novel products, products that give excitement and excitement about products, and products that give new enjoyment and fun that they have never known before. Third, social innovation has been shown that there is no difference between groups. These analyses show that the self-esteem of using products that others have never experienced before, and the curiosity that anyone envies, are purchased or used first. Finally, cognitive innovation showed that differences existed between groups. These analyses show that new products are purchased when they meet the functions, design, and innovation that consumers want.

Factors Affecting the Viewing Intention for Untact Performance Using Value-Based Acceptance Model (가치기반수용모델을 활용한 언택트 공연 관람의도 영향요인 연구 : COVID-19 팬데믹 시기 온라인 스트리밍 공연을 중심으로)

  • Kwon, Sunjung;Son, Jaeyoung
    • 지역과문화
    • /
    • v.8 no.2
    • /
    • pp.49-68
    • /
    • 2021
  • The pandemic of COVID-19 also affected performing arts business and stimulated 'Untact' performances, which means online streaming of the shows including real-time streaming. This study sought to examine factors to the consumers' acceptance. The research framework was based on the VAM, a revised model of TAM for the ICT products and services. For the research, consumer survey was conducted, where ndependent variables are perceived usefulness, pleasure, technicalty and innovation resistance, and dependent variables are percieved value and acceptance. Smart PLS was used to test the hypothesis. The result shows that the significant factors were percieved usefulness(+), pleasure(+) and innovation resistance(-). The percieved technicalty was not significant, the major reason would be that the digital devices and the internet technology are percieved a commodity these days in Korea. Percieved value was significant factor to acceptance. This study is meaningful because it is about the new phenomenon of 'untact' performance through the VAM methodology and it examined the significant factors to the attitude from the perspective of benefits and costs. There is limit that this study didn't consider old peoples' attitude. It is the reason that the continuous researches are necessary.

A Sanitizer for Detecting Vulnerable Code Patterns in uC/OS-II Operating System-based Firmware for Programmable Logic Controllers (PLC용 uC/OS-II 운영체제 기반 펌웨어에서 발생 가능한 취약점 패턴 탐지 새니타이저)

  • Han, Seungjae;Lee, Keonyong;You, Guenha;Cho, Seong-je
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.65-79
    • /
    • 2020
  • As Programmable Logic Controllers (PLCs), popular components in industrial control systems (ICS), are incorporated with the technologies such as micro-controllers, real-time operating systems, and communication capabilities. As the latest PLCs have been connected to the Internet, they are becoming a main target of cyber threats. This paper proposes two sanitizers that improve the security of uC/OS-II based firmware for a PLC. That is, we devise BU sanitizer for detecting out-of-bounds accesses to buffers and UaF sanitizer for fixing use-after-free bugs in the firmware. They can sanitize the binary firmware image generated in a desktop PC before downloading it to the PLC. The BU sanitizer can also detect the violation of control flow integrity using both call graph and symbols of functions in the firmware image. We have implemented the proposed two sanitizers as a prototype system on a PLC running uC/OS-II and demonstrated the effectiveness of them by performing experiments as well as comparing them with the existing sanitizers. These findings can be used to detect and mitigate unintended vulnerabilities during the firmware development phase.

Line Tracer Modeling for Educational Virtual Experiment (교육용 가상실험 라인 트레이서 모델링)

  • Ki, Jang-Geun;Kwon, Kee-Young
    • Journal of Software Assessment and Valuation
    • /
    • v.17 no.2
    • /
    • pp.109-116
    • /
    • 2021
  • Traditionally, the engineering field has been dominated by face-to-face education focused on experimental practice, but demand for online learning has soared due to the rapid development of IT technology and Internet communication networks and recent changes in the social environment such as COVID-19. In order for efficient online education to be conducted in the engineering field, where the proportion of experimental practice is relatively high compared to other fields, virtual laboratory practice content that can replace actual experimental practice is very necessary. In this study, we developed a line tracer model and a virtual experimental software to simulate it for efficient online learning of microprocessor applications that are essential not only in the electric and electronic field but also in the overall engineering field where IT convergence takes place. In the developed line tracer model, the user can set various hardware parameter values in the desired form and write the software in assembly language or C language to test the operation on the computer. The developed line tracer virtual experimental software has been used in actual classes to verify its operation, and is expected to be an efficient virtual experimental practice tool in online non-face-to-face classes.

React-based Web System Providing Residual Material Information (잔류물질정보 제공을 위한 React 기반 웹 서비스)

  • Kim, Boseon;Lee, Min-Seong;Gang, MinGyu;Park, Jee-Tae
    • KNOM Review
    • /
    • v.24 no.1
    • /
    • pp.29-37
    • /
    • 2021
  • With the spread of the Internet, users can easily receive various services and exchange information through the web. There are several requirements for building a web system, and it must be developed using a programming language or platform for user purposes. Residual material information refers to information on medicines and pesticides added to food, and residual material standards are used to measure the level of residues in food produced by companies and farmers to determine whether those levels meet domestic or international standards. Currently, the Ministry of Food and Drug Safety provides residual acceptance standards for food additives, including food, pesticides and animal medicines, in the form of documents, which must be serviced smoothly and conveniently by users through the establishment of a web system. It must also meet a variety of requirements, including user accessibility, such as scalability and compatibility. This paper proposes react-based residual material information web system that allows users to access more conveniently and receive residual material information smoothly. We measured the speed for the three inportant functions of information provision and compared them with existing residual material information web systems and qualitatively evaluated the seven essential requirements: scalability, compatibility, and accessibility.

Efficient Privacy-Preserving Duplicate Elimination in Edge Computing Environment Based on Trusted Execution Environment (신뢰실행환경기반 엣지컴퓨팅 환경에서의 암호문에 대한 효율적 프라이버시 보존 데이터 중복제거)

  • Koo, Dongyoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.305-316
    • /
    • 2022
  • With the flood of digital data owing to the Internet of Things and big data, cloud service providers that process and store vast amount of data from multiple users can apply duplicate data elimination technique for efficient data management. The user experience can be improved as the notion of edge computing paradigm is introduced as an extension of the cloud computing to improve problems such as network congestion to a central cloud server and reduced computational efficiency. However, the addition of a new edge device that is not entirely reliable in the edge computing may cause increase in the computational complexity for additional cryptographic operations to preserve data privacy in duplicate identification and elimination process. In this paper, we propose an efficiency-improved duplicate data elimination protocol while preserving data privacy with an optimized user-edge-cloud communication framework by utilizing a trusted execution environment. Direct sharing of secret information between the user and the central cloud server can minimize the computational complexity in edge devices and enables the use of efficient encryption algorithms at the side of cloud service providers. Users also improve the user experience by offloading data to edge devices, enabling duplicate elimination and independent activity. Through experiments, efficiency of the proposed scheme has been analyzed such as up to 78x improvements in computation during data outsourcing process compared to the previous study which does not exploit trusted execution environment in edge computing architecture.

Use of Digital Educational Resources in the Training of Future Specialists in the EU Countries

  • Plakhotnik, Olga;Zlatnikov, Valentyn;Matviienko, Olena;Bezliudnyi, Oleksandr;Havrylenko, Anna;Yashchuk, Olena;Andrusyk, Pavlo
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.10
    • /
    • pp.17-24
    • /
    • 2022
  • The article proves that the main goal of informatization of higher education institutions in the EU countries is to improve the quality of education of future specialists by introducing digital educational resources into the education process. The main tasks of informatization of education are defined. Digital educational resources are interpreted as a set of data in digital form that is applicable for use in the learning process; it is an information source containing graphic, text, digital, speech, music, video, photo and other information aimed at implementing the goals and objectives of modern education; educational resources on the Internet, electronic textbooks, educational programs, electronic libraries, etc. The creation of digital educational resources is defined as one of the main directions of informatization of all forms and levels of Education. Types of digital educational resources by educational functions are considered. The factors that determine the effectiveness of using digital educational resources in the educational process are identified. The use of digital educational resources in the training of future specialists in the EU countries is considered in detail. European countries note that digital educational resources in professional use allow you to implement a fundamentally new approach to teaching and education, which is based on broad communication, free exchange of opinions, ideas, information of participants in a joint project, on a completely natural desire to learn new things, expand their horizons; is based on real research methods (scientific or creative laboratories), allowing you to learn the laws of nature, the basics of techniques, technology, social phenomena in their dynamics, in the process of solving vital problems, features of various types of creativity in the process of joint activities of a group of participants; promotes the acquisition by teachers of various related skills that can be very useful in their professional activities, including the skills of using computer equipment and various digital technologies.

A Study on the Media Recommendation System with Time Period Considering the Consumer Contextual Information Using Public Data (공공 데이터 기반 소비자 상황을 고려한 시간대별 미디어 추천 시스템 연구)

  • Kim, Eunbi;Li, Qinglong;Chang, Pilsik;Kim, Jaekyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.95-117
    • /
    • 2022
  • With the emergence of various media types due to the development of Internet technology, advertisers have difficulty choosing media suitable for corporate advertising strategies. There are challenging to effectively reflect consumer contextual information when advertising media is selected based on traditional marketing strategies. Thus, a recommender system is needed to analyze consumers' past data and provide advertisers with personalized media based on the information consumers needs. Since the traditional recommender system provides recommendation services based on quantitative preference information, there is difficult to reflect various contextual information. This study proposes a methodology that uses deep learning to recommend personalized media to advertisers using consumer contextual information such as consumers' media viewing time, residence area, age, and gender. This study builds a recommender system using media & consumer research data provided by the Korea Broadcasting Advertising Promotion Corporation. Additionally, we evaluate the recommendation performance compared with several benchmark models. As a result of the experiment, we confirmed that the recommendation model reflecting the consumer's contextual information showed higher accuracy than the benchmark model. We expect to contribute to helping advertisers make effective decisions when selecting customized media based on various contextual information of consumers.

Development of an Intelligent Illegal Gambling Site Detection Model Based on Tag2Vec (Tag2vec 기반의 지능형 불법 도박 사이트 탐지 모형 개발)

  • Song, ChanWoo;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.211-227
    • /
    • 2022
  • Illegal gambling through online gambling sites has become a significant social problem. The development of Internet technology and the spread of smartphones have led to the proliferation of illegal gambling sites, so now illegal online gambling has become accessible to anyone. In order to mitigate its negative effect, the Korean government is trying to detect illegal gambling sites by using self-monitoring agents or reporting systems such as 'Nuricops.' However, it is difficult to detect all illegal sites due to limitations such as a lack of staffing. Accordingly, several scholars have proposed intelligent illegal gambling site detection techniques. Xu et al. (2019) found that fake or illegal websites generally have unique features in the HTML tag structure. It implies that the HTML tag structure can be important for detecting illegal sites. However, prior studies to improve the model's performance by utilizing the HTML tag structure in the illegal site detection model are rare. Against this background, our study aimed to improve the model's performance by utilizing the HTML tag structure and proposes Tag2Vec, a modified version of Doc2Vec, as a methodology to vectorize the HTML tag structure properly. To validate the proposed model, we perform the empirical analysis using a data set consisting of the list of harmful sites from 'The Cheat' and normal sites through Google search. As a result, it was confirmed that the Tag2Vec-based detection model proposed in this study showed better classification accuracy, recall, and F1_Score than the URL-based detection model-a comparative model. The proposed model of this study is expected to be effectively utilized to improve the health of our society through intelligent technology.

A Web-based Monitoring of Electrical Energy Consumption and Data Analysis of Smart Farm Facilities (스마트팜 전기 사용에 대한 웹기반 실시간 모니터링 시스템 운영 및 전력사용량 분석)

  • Lee, Mu Yeol;Sim, Sojeong;Kim, Eun-jeong;Han, Young-Soo
    • Journal of Bio-Environment Control
    • /
    • v.31 no.4
    • /
    • pp.366-375
    • /
    • 2022
  • The monitoring of electricity consumption using Internet of Things (IoT) technology is attracting attention as a technology to reduce operation costs of smart farms. In this study, we propose a method to apply a real-time electrical consumption monitoring system (the e-Gauge system) and utilization of the collected data real-time while a melon-producing smart farm is in operation. For this purpose, the electrical consumption data for the individual smart-farm facilities such as boilers, nutrient distribution systems, automatic controllers, circulation fans, boiler controllers, and other IoT-related utilities were collected during three months of melon cultivation period. By using the monitoring results, the electrical energy consumption pattern was analyzed as an example, and necessary considerations needed to optimally utilize the measurement data were suggested. This paper will be useful in lowering the technological implementation barriers for new researchers to build a electrical consumption monitoring system and reducing trial and errors in the usage of the generated data.