• Title/Summary/Keyword: internet phone

Search Result 998, Processing Time 0.036 seconds

The Corelation Research between Cyberbullying and Information Media Use - With Focus on Internet and Mobile Phone Use (사이버불링 발생과 정보매체활용 간의 상관분석 - 인터넷과 휴대전화 사용을 중심으로)

  • Kim, Bongseob;Park, Jongsun;Gam, Dongun;Jin, Sangki
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.5
    • /
    • pp.17-29
    • /
    • 2013
  • Cyberbullying has a negative influence on teens. However, the academic approach and try is still an its early stages in spite of the issue of the seriousness and importance. Accordingly, this study conducted a survey of 1,112 elementary, middle and high school students. According to the survey, Internet bullying violence experience was from 20.3% to 39.0%, victim experience from 11.0% to 23.4%, mobile phone bullying violence experience was from 15.9% to 44.1%, victim experience from 5.5% to 21.8%. The factors affecting Internet bullying violence experience were gender, academic stress, internet accessibility, anonymity, use time of internet. The factors affecting mobile phone bullying violence experience were school table, academic stress, mobility, anonymity, use time of mobile phone. Finally, this study grasped the relation between Internet and mobile phone bullying. It was found that Internet bullying violence victim experience had something to do with mobile phone bullying violence victim experience. Especially, Internet bullying violence experience had a lot to do with mobile phone bullying violence experience, Internet bullying victim experience had a lot to do with mobile phone bullying victim experience.

  • PDF

Value of Number Portability on Internet Phones

  • Ku, Jung-Eun;Lee, Sang-Woo;Hyun, Tchang-Hee
    • ETRI Journal
    • /
    • v.32 no.1
    • /
    • pp.169-171
    • /
    • 2010
  • Even though Internet phone service (IPS) continues to evolve in terms of quality and competitive pricing compared with the public switched telephone network (PSTN), the number of Internet phone subscribers is still low in South Korea. The Korean government decided to apply number portability to the IPS market in 2008. This study expresses its value in monetary terms with a contingent valuation approach. With this methodology, this study investigates the willingness of 316 current PSTN subscribers to pay for IPS, using a specific survey method called double-bounded dichotomous choices, to obtain more accurate data. The results show that the calculated value of Internet phone number portability positively impacts consumer welfare.

The Effect of Fare-To-Fare Communication Situation on New Media Uses (면대면 커뮤니케이션 환경이 새로운 대인커뮤니케이션 매체 이용에 미치는 영향: 인터넷, 이동전화를 중심으로)

  • Bae, Jin-Han
    • Korean journal of communication and information
    • /
    • v.23
    • /
    • pp.47-77
    • /
    • 2003
  • Despite the near ubiquity of mobile phone and internet, the 'meta research' that deals with face-to-face(FTF), mobile phone and internet together as interpersonal media is very rare in Korea. This study begin with the purpose of fair repositioning of mobile phone and internet in Korean's interpersonal communication horizon. To accomplish this purpose, We examined the effect of face-to-face communication situation on uses of mobile phone and internet as interpersonal communication media. The related raw data were collected from on-line survey process, and statistically analyzed. The result showed that persons who are more troublesome in FTF communication because of their timidness or personality problem are more restricted in human communication network via mobile phone and internet than the others who are not. And more 'addicted' in internet use and more active in trying another personality(Persona) in cyber space. And more shrunk in meeting and conversation with family members and friends after internet adoption.

  • PDF

A Countermeasures on the Hacking for the Internet Shopping Mall (인터넷 쇼핑몰의 해킹 사고에 대한 대응방법)

  • Lee, Young Gyo
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.3
    • /
    • pp.33-43
    • /
    • 2008
  • As internet is spreaded widely, the number of cyber terror using hacking and virus is increased. Also the hacking to the internet shopping mall go on increasing. If the large shopping mall is attacked by the hacker, a number of user's information are exposed to the hacker. The private information as like a resident registration number, user's real name, the date of user's birth, the mobile phone number, the office phone number / address, the home phone number / address and so on include the information. These information are used in the phishing e-mails / call and spam. And them are selling and buying maliciously. The large internet shopping mall 'auction' was hacked in April, 2008. After the incident, this paper suggested a countermeasures on the hacking for the internet shopping mall. The technical item and political item are included among the countermeasures. The countermeasures can protect the hacking not only the internet shopping mall but also the web sites basically.

Implementation of Internet-based PA8X System for PC-to-PC Internet Phone services. (PC-to-PC 유형의 인터넷 폰 서비스를 위한 사설교환시스템 구현)

  • 곽정필;최재원;이종혁
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.302-306
    • /
    • 2000
  • 인터넷의 발전과 함께 많은 성장을 하고 있는 멀티미디어 응용서비스의 중의 하나인 인터넷폰은 PSTN이 아닌 인터넷의 U(Internet protocol)을 통해 전화와 관련된 기능을 구현하는 일련의 통신서비스 기술로서 인터넷을 이용하여 음성을 전달하기 위한 기술이 요구된다. 그리고 인터넷폰 시스템은 통화하고자 하는 착발신 단말의 종류에 따라 PC-to-PC, PC-to-Phone, Phone-to-PC 인터넷폰 시스템으로 구분되어 질 수 있다. 본 논문에서는 우선 사내 전화교환기인 사설교환기(PABX) 없이 동일한 UM 상의 임의의 두 PC간의 통신과 서로 다른 MU 상의 임의의 두 PC간에 통신이 가능하도록 PC-to-PC 인터넷폰 시스템의 호제어 메시지 처리, 상태전이도 등의 교환기 및 단말기 시스템의 설계 및 구현에 관해 연구하였다. 향후 PC-to-Phone과 Phone-to-PC 인터넷폰 시스템에 관한 연구를 지속적으로 수행할 것이다.

  • PDF

Implementation of Internet Telephone of Phone-to-PC Type (Phone-to-PC 방식의 인터넷 전화 구현)

  • 최용훈;박준석고대식
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.122-125
    • /
    • 1998
  • 본 논문에서는 인터넷텔레포니 인터페이스(Internet Telphone Interface)를 제작하고 자체 개발된 PC-to-PC 방식의 인터넷 전화 소프트웨어인 Realphone을 이용하여 Phone-to-PC 방식의 인터넷 전화를 구현하였다. 실험을 위하여 인터넷텔레포니 인터페이스를 제작하였으며, 펜티엄 PC 2대와 일반 상용화 되어있는 전화기를 사용하였다. 통화는 목원대학교 학내전화와 목원대학교내 LAN으로 연결된 PC사이에 로컬(Local)상황과 국내 교육망으로 연결된 목원대학교와 서울대학교 사이에 트래픽이 서로 다른 새벽(Unload), 오전(Mid-load), 오후(Load)에 이루어졌다. 실험을 통하여 대형 게이트웨이의 도움없이 간단한 인터페이스만으로 Phone-to-PC 방식 인터넷전화의 통화가 가능함을 확인하였다.

  • PDF

Context-Aware Security System for the Smart Phone-based M2M Service Environment

  • Lee, Hyun-Dong;Chung, Mok-Dong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.1
    • /
    • pp.64-83
    • /
    • 2012
  • The number of smart phone users is rapidly growing due to recent increase in wireless Internet usage, development of a wide variety of applications, and activation of M2M (Machine to machine) services. Although the smart phone offers benefits of mobility and convenience, it also has serious security problems. To utilize M2M services in the smart phone, a flexible integrated authentication and access control facility is an essential requirement. To solve these problems, we propose a context-aware single sign-on and access control system that uses context-awareness, integrated authentication, access control, and an OSGi service platform in the smart phone environment. In addition, we recommend Fuzzy Logic and MAUT (Multi-Attribute Utility Theory) in handling diverse contexts properly as well as in determining the appropriate security level. We also propose a security system whose properties are flexible and convenient through a typical scenario in the smart phone environment. The proposed context-aware security system can provide a flexible, secure and seamless security service by adopting diverse contexts in the smart phone environment.

Extraction of Forensic Evidence and Hacking Attacks about IP-PBX (IP-PBX에 대한 해킹공격과 포렌식 증거 추출)

  • Park, Dea-Woo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.6
    • /
    • pp.1360-1364
    • /
    • 2013
  • Internet phone, communication cost and easy-to-use low-cost compared to the PSTN is a mobile phone of a conventional, and use of the Internet phone is spreading. Construction as part of the broadband convergence network(BCN), Internet service provider(KT, SKT, LGU+) has converted to Internet phone telephone network to all government agencies. In addition, members of the public also have an Internet phone service that you are using. In this paper, we analyze the hacking attack on IP-PBX in the IETF SIP-based that are used in Internet telephony, to the study. The test bed is constructed in the same way as the Internet telephone system to perform studies carried hacking attacks on IP-PBX, analyze the results and to extract evidence forensics. When used in crime by hacking the Internet telephone, we propose a method which can be used as evidence in forensic having legal effect.

Extraction of Forensic Evidence and Hacking Attacks about IP-PBX (IP-PBX에 대한 해킹공격과 포렌식 증거 추출)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.197-200
    • /
    • 2013
  • Internet phone, communication cost and easy-to-use low-cost compared to the PSTN is a mobile phone of a conventional, and use of the Internet phone is spreading. Construction as part of the broadband convergence network(BCN), Internet service provider(KT, SKT, LG) has converted to Internet phone telephone network to all government agencies. In addition, members of the public also have an Internet phone service that you are using. In this paper, we analyze the hacking attack on IP-PBX in the IETF SIP-based that are used in Internet telephony, to the study. The test bed is constructed in the same way as the Internet telephone system to perform studies carried hacking attacks on IP-PBX, analyze the results and to extract evidence forensics. When used in crime by hacking the Internet telephone, we propose a method which can be used as evidence in forensic having legal effect.

  • PDF

FEAPT Algorithm to compensate Jitter in Internet Phone (인터넷전화에서 지터보상을 위한 Frame Extension for Adaptive Playout Time(FEAPT) 알고리즘)

  • 남재현
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.6
    • /
    • pp.1168-1176
    • /
    • 2003
  • Internet telephony service is very cheap and very easy to introduce the value-added service than the POTS, but is difficult to the QoS of telephone service. The existing internet typically offers "best effort" services only, which do not make any commitment about delay, packet loss and jitter. This paper compensates the low quality of the speech for packet loss or delay using FEAPT algorithm in Internet phone. In the FEAPT algorithm, the receiver expands the received packet under resonable threshold, and hence compensates the QoS of speech.of speech.