• Title/Summary/Keyword: internet service provider

Search Result 361, Processing Time 0.025 seconds

A Study on the Implementation of ERP System through ASP in the Small-to-Medium Enterprises (중소기업의 ASP를 기반으로 한 ERP 시스템 도입에 관한 연구)

  • Lim, Byung-Ha
    • International Commerce and Information Review
    • /
    • v.7 no.1
    • /
    • pp.95-117
    • /
    • 2005
  • The purpose of this study is to provide a conceptual understanding of ASP service for ERP implementation in small-to-medium enterprises under the current market situation in which the significance of information systems was standing out to respond to the rapid changes of managerial environment caused by the spread of Internet. In addition, it was to extract practical causes of introduction of ERP through ASP services by analyzing the causes and benefits considered by small-to-medium enterprises which use it. This study confirms that using ASP is better, faster and cheaper. Therefore, it is inevitable. The enterprises can reduce many risks of in-House ERP system such as excessive initial investment and operational expenses, lengthened constructional time, and the possibility of failure while achieving the benefit of ERP solution. However, there are many considerations which the enterprise carefully take into in order to implement the systems successfully such as selecting the system which is right for the enterprise's environment by setting the goal of implementing the system clearly, reducing the construction time by minimizing the customizing of the system, including the core people who knows the business process well, enough education before and after the implementation, and considering many aspect of ASP service provider. Also, the service provider should develop new way to provide customized service with cheap price while guaranteeing the reliability and supporting the customer's needs actively.

  • PDF

A Fully Distributed Secure Approach using Nondeterministic Encryption for Database Security in Cloud

  • Srinu Banothu;A. Govardhan;Karnam Madhavi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.1
    • /
    • pp.140-150
    • /
    • 2024
  • Database-as-a-Service is one of the prime services provided by Cloud Computing. It provides data storage and management services to individuals, enterprises and organizations on pay and uses basis. In which any enterprise or organization can outsource its databases to the Cloud Service Provider (CSP) and query the data whenever and wherever required through any devices connected to the internet. The advantage of this service is that enterprises or organizations can reduce the cost of establishing and maintaining infrastructure locally. However, there exist some database security, privacychallenges and query performance issues to access data, to overcome these issues, in our recent research, developed a database security model using a deterministic encryption scheme, which improved query execution performance and database security level.As this model is implemented using a deterministic encryption scheme, it may suffer from chosen plain text attack, to overcome this issue. In this paper, we proposed a new model for cloud database security using nondeterministic encryption, order preserving encryption, homomorphic encryptionand database distribution schemes, andour proposed model supports execution of queries with equality check, range condition and aggregate operations on encrypted cloud database without decryption. This model is more secure with optimal query execution performance.

Estimating Willingness to Switch to MVNO for Activation of Mobile Data Services (무선데이터서비스 활성화를 위한 MVNO 전환의사비용 추정)

  • Lee, Sang Woo;Ko, Chang Youl
    • Journal of Internet Computing and Services
    • /
    • v.16 no.4
    • /
    • pp.1-11
    • /
    • 2015
  • This study uses the contingent valuation method to estimate the switching cost for adopting the MVNO service. The findings are as follows.: First, Willingness To Switch(WTS) increases as users' using pattern and perceived degree of MVNO service, but satisfaction with current service provider does not play a significant role in predicting Switching Cost. This means that as amount of money users can save exceeds a certain level, users decide to willingly change their service provider to MVNO regardless of their level of satisfaction with current service provider. Second, there are differences in WTS among service subscribers in SKT, KT and LGU+. It means that there will be a difference in the tendency to switch to MVNO among subscribers of service providers. This study suggest the following mangerial perspective to effectively promote the MVNO and boost the MVNO market for activation of mobile data services.: First, MVNOs are better off applying differentiated pricing scheme at attractive rates than using a differentiation of service product and quality. Second, regulators should consider how to implement an MVNO regulatory policy when there is an asymmetric customer loyalty among MNOs. This research will be used to set the MVNO's pricing strategy and to build up a successful regulatory policies.

A Study On User-centric Identity Information Management Model In Internet Environment (인터넷 환경에서의 사용자 중심 ID정보 관리 모델에 관한 연구)

  • Rhy, Hae-Gyu;Shin, Hyeon-Shik
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.37-50
    • /
    • 2009
  • With the increase of number of internet services due to development of internet, it becomes a critical issue to appropriately manage the personal information about user's identity, that is ID information that service providers collect in terms of user's convenience improvement and privacy protection. But the existing ID information management models are service provider-centric or they insufficiently provide ID information management functions, so that they have not been satisfying user's requirement. In this paper, by establishing user-centric concept in we information management, we propose the new user-centric ID information management model in which user can make use of the internet service more conveniently and eventually enhance user's privacy.

Cloud Attack Detection with Intelligent Rules

  • Pradeepthi, K.V;Kannan, A
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.4204-4222
    • /
    • 2015
  • Cloud is the latest buzz word in the internet community among developers, consumers and security researchers. There have been many attacks on the cloud in the recent past where the services got interrupted and consumer privacy has been compromised. Denial of Service (DoS) attacks effect the service availability to the genuine user. Customers are paying to use the cloud, so enhancing the availability of services is a paramount task for the service provider. In the presence of DoS attacks, the availability is reduced drastically. Such attacks must be detected and prevented as early as possible and the power of computational approaches can be used to do so. In the literature, machine learning techniques have been used to detect the presence of attacks. In this paper, a novel approach is proposed, where intelligent rule based feature selection and classification are performed for DoS attack detection in the cloud. The performance of the proposed system has been evaluated on an experimental cloud set up with real time DoS tools. It was observed that the proposed system achieved an accuracy of 98.46% on the experimental data for 10,000 instances with 10 fold cross-validation. By using this methodology, the service providers will be able to provide a more secure cloud environment to the customers.

An Empirical Analysis on the Persistent Usage Intention of Chinese Personal Cloud Service (개인용 클라우드 서비스에 대한 중국 사용자의 지속적 사용의도에 관한 실증 연구)

  • Yu, Hexin;Sura, Suaini;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.16 no.3
    • /
    • pp.79-93
    • /
    • 2015
  • With the rapid development of information technology, the ways of usage have changed drastically. The ways and efficiency of traditional service application to data processing already could not satisfy the requirements of modern users. Nowadays, users have already understood the importance of data. Therefore, the processing and saving of big data have become the main research of the Internet service company. In China, with the rise and explosion of 115 Cloud leads to other technology companies have began to join the battle of cloud services market. Although currently Chinese cloud services are still mainly dominated by cloud storage service, the series of service contents based on cloud storage service have been affirmed by users, and users willing to try these new ways of services. Thus, how to let users to keep using cloud services has become a topic that worth for exploring and researching. The academia often uses the TAM model with statistical analysis to analyze and check the attitude of users in using the system. However, the basic TAM model obviously already could not satisfy the increasing scale of system. Therefore, the appropriate expansion and adjustment to the TAM model (i. e. TAM2 or TAM3) are very necessary. This study has used the status of Chinese internet users and the related researches in other areas in order to expand and improve the TAM model by adding the brand influence, hardware environment and external environments to fulfill the purpose of this study. Based on the research model, the questionnaires were developed and online survey was conducted targeting the cloud services users of four Chinese main cities. Data were obtained from 210 respondents were used for analysis to validate the research model. The analysis results show that the external factors which are service contents, and brand influence have a positive influence to perceived usefulness and perceived ease of use. However, the external factor hardware environment only has a positive influence to the factor of perceived ease of use. Furthermore, the perceived security factor that is influenced by brand influence has a positive influence persistent intention to use. Persistent intention to use also was influenced by the perceived usefulness and persistent intention to use was influenced by the perceived ease of use. Finally, this research analyzed external variables' attributes using other perspective and tried to explain the attributes. It presents Chinese cloud service users are more interested in fundamental cloud services than extended services. In private cloud services, both of increased user size and cooperation among companies are important in the study. This study presents useful opinions for the purpose of strengthening attitude for private cloud service users can use this service persistently. Overall, it can be summarized by considering the all three external factors could make Chinese users keep using the personal could services. In addition, the results of this study can provide strong references to technology companies including cloud service provider, internet service provider, and smart phone service provider which are main clients are Chinese users.

A Negotiation Framework for the Cloud Management System using Similarity and Gale Shapely Stable Matching approach

  • Rajavel, Rajkumar;Thangarathinam, Mala
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2050-2077
    • /
    • 2015
  • One of the major issues in emerging cloud management system needs the efficient service level agreement negotiation framework, with an optimal negotiation strategy. Most researchers focus mainly on the atomic service negotiation model, with the assistance of the Agent Controller in the broker part to reduce the total negotiation time, and communication overhead to some extent. This research focuses mainly on composite service negotiation, to further minimize both the total negotiation time and communication overhead through the pre-request optimization of broker strategy. The main objective of this research work is to introduce an Automated Dynamic Service Level Agreement Negotiation Framework (ADSLANF), which consists of an Intelligent Third-party Broker for composite service negotiation between the consumer and the service provider. A broker consists of an Intelligent Third-party Broker Agent, Agent Controller and Additional Agent Controller for managing and controlling its negotiation strategy. The Intelligent third-party broker agent manages the composite service by assigning its atomic services to multiple Agent Controllers. Using the Additional Agent Controllers, the Agent Controllers manage the concurrent negotiation with multiple service providers. In this process, the total negotiation time value is reduced partially. Further, the negotiation strategy is optimized in two stages, viz., Classified Similarity Matching (CSM) approach, and the Truncated Negotiation Group Gale Shapely Stable Matching (TNGGSSM) approach, to minimize the communication overhead.

Development of the Web-based Participation IoT Service Brokering Platform (웹 기반 참여형 IoT 서비스 브로커링 플랫폼 개발)

  • Lee, Jun-Young;Choi, Hoan-Suk;Rhee, Woo-Seop
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.40-57
    • /
    • 2015
  • IoT is the foundation technology that the things share the information through connected with Internet to provide service based on these information. It is applied to various fields such as personal, public and industry. Therefore, the service development is required to meet the requirement of the various service environments. The IoT service environment will be developed as the participation IoT service environment which increase the value and efficiency such as the Broadcasting and web services changed from the service provider environment to the user participation service. The user can directly reflect their requirements using the user participation IoT service environment. So, the types of IoT services will diverse and accelerate the spread of IoT service. In this paper, we derive the IoT service element through the analysis of various service scenarios, and propose the participation IoT service model and modeling mechanism. It provides the sequential service model and the relation based service model according to the service modeling proficiency of user. The proposed environment provides the web-based user interface that is implemented by the participation IoT service brokering platform.

A Study on the Quality Monitoring and Prediction of OTT Traffic in ISP (ISP의 OTT 트래픽 품질모니터링과 예측에 관한 연구)

  • Nam, Chang-Sup
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.2
    • /
    • pp.115-121
    • /
    • 2021
  • This paper used big data and artificial intelligence technology to predict the rapidly increasing internet traffic. There have been various studies on traffic prediction in the past, but they have not been able to reflect the increasing factors that induce huge Internet traffic such as smartphones and streaming in recent years. In addition, event-like factors such as the release of large-capacity popular games or the provision of new contents by OTT (Over the Top) operators are more difficult to predict in advance. Due to these characteristics, it was impossible for an ISP (Internet Service Provider) to reflect real-time service quality management or traffic forecasts in the network business environment with the existing method. Therefore, in this study, in order to solve this problem, an Internet traffic collection system was constructed that searches, discriminates and collects traffic data in real time, separate from the existing NMS. Through this, the flexibility and elasticity to automatically register the data of the collection target are secured, and real-time network quality monitoring is possible. In addition, a large amount of traffic data collected from the system was analyzed by machine learning (AI) to predict future traffic of OTT operators. Through this, more scientific and systematic prediction was possible, and in addition, it was possible to optimize the interworking between ISP operators and to secure the quality of large-scale OTT services.

A Bandwidth Allocation Method by Internet Service Types - Focus on Elementary and Middle Schools (인터넷 서비스 유형별 대역폭 할당 방안 - 초.중등학교 중심으로)

  • Park, Hyeong-Yong;Hwang, Jun;Kim, Jae-Hyoun
    • Journal of Internet Computing and Services
    • /
    • v.11 no.1
    • /
    • pp.49-57
    • /
    • 2010
  • Today, internet traffic is rapidly increasing by the appearance of a large number of website thru a numerous internet service provider and the introduction of advanced teaching methods like utilizing ICT(Information and Communication Technology) education. At these actualities, it is requested to increase internet bandwidth in the scene of school; however, it is difficult to resolve the request quickly because of the government's budget and technical problems. In this circumstance, this paper proposes a method to raise the efficiency of internet operations with the current bandwidth. In order to achieve the purpose of this paper, the analysis of internet traffic has been done by the traffic currently being used in school, and an internet bandwidth distribution model differ from the existing standpoint is developed with the analyzed result. It can be used to predict the increase in the bandwidth which may be requested at school in the future, and it can support the office of education for appropriate bandwidth allocation at schools and reduction of school budget in telecommunication. Also, it can be adopted as a future oriented reference model for network policy.