• Title/Summary/Keyword: internet service provider

Search Result 361, Processing Time 0.032 seconds

Operation Strategy for Electronic Commerce Promotion Base on Common Mechanic Industry (ASP기반으로 한 기계산업체간의 성공적 전자상거래 구축을 위한 전략연구)

  • Jeong, Sei-Hyun
    • Journal of Information Technology Services
    • /
    • v.1 no.1
    • /
    • pp.81-117
    • /
    • 2002
  • The generalization of Internet use has been spreaded all over the world and impacted company to introduce intranet and extranet for their operation which dealt with electronic commerce. For these reason, endeavor of implementation of web site system is promotioned and enhanced the possibility of adaptation range for the view of company. Dramatic competition which company faced with the use of internet and request from all over the world made company brought company to various and different type of level. It is necessary to develop website system with experty knowledge to satisfy customer needs. To deal with this situation, works from the level of government should proposed to spread whole country business which propelled through kyungnam mechanic industry information promotion center. With strategic proposal concerning district characteristics to adapt electronic commerce successfully, information promotion should performed. Support of government is needed continuously to realize infra of ASP composed of 4,877 mechanic industry company. It might be possible to deal with international rapid change with cooperation of company and government related department.

The Effects of Perceived Equity on Satisfaction and Continuance Intention in Openmarket (인지된 공정성이 오픈마켓의 만족과 지속적 이용의도에 미치는 영향)

  • Hong, Moon-Kyung;Kwahk, Kee-Young
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.35 no.3
    • /
    • pp.1-24
    • /
    • 2010
  • As the Internet is explosively growing and the market is rapidly globalized, many entrepreneurs have been given an impetus to take on the function of the intermediation between providers and customers. Organizations performing the mediating roles in the cyberspace are termed 'cybermediary' and often called 'Openmarket' as a kind of transactional cybermediary in Korea. Despite sustainable growth of Openmarket, customer complaints and damages are increasing because of absence of recovery standards after a service failure. Therefore, it is important that a service provider converts dissatisfied customers to advocates for the growth of the Openmarket. This study aims to examine the role of recovery of the service failures for the Openmarket by proposing a relationship between complaint handling and continuance based on the equity theory. From the empirical results, we found that interactional equity had significant effects on both overall service satisfaction and recovery satisfaction, while procedural equity significantly influenced only recovery satisfaction. Recovery satisfaction also had an impact on overall service satisfaction and each satisfaction factor was positively related to continuance intention.

A Study on Differentiated Personal Proofing Service Based on Analysis of Personal Identification Requirements in Online Services (온라인 서비스의 본인확인 요구사항 분석 기반의 차등화된 본인확인서비스 적용 방안)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.201-208
    • /
    • 2020
  • Recently, the application of personal proofing service based on social security number(SSN) replacement means for verifying identity in non-face-to-face transactions is increasing. In this paper, we propose a method of applying differentiated personal proofing service on whether identity verification is necessary in the online service provided by ISP and if it is appropriate to apply a certain level of assurance. By analyzing the requirements related to personal proofing required by current ISPs, we analyze the risks for each of the requirements and propose a method of applying differentiated personal proofing service according to the level of identity assurance guarantee to minimize the risks. In applying the proposed method to online service provision, it is possible to reduce user's unnecessary authentication cost by minimizing the application of personal proofing service based on alternative means, and to help protect user personal information by minimizing excessively collected personal information.

Problems Judicial Liability of On-Line Service Providers under the Infringement of Copyright in Internet (인터넷 상에서 저작권침해에 따른 온라인서비스 제공자의 책임문제)

  • 박종삼
    • Journal of Arbitration Studies
    • /
    • v.12 no.1
    • /
    • pp.123-169
    • /
    • 2002
  • The Advent of the global information structure and the do-called digital revolution raise countless new issues and questions. There are no limitations regulating the expressions on the cyberspace due to internet's of quality anonymity\ulcorner diversity\ulcorner spontaneity. Therefore, the freedom of speech is expanded in both areas of time and space, which was impossible with the old communicating system. The rapid development of the internet may not have occurred without techniques of linking and framing, which provide users flexible and easy access to other website. These techniques have enabled internet users to navigate the internet efficiently and sort through the products, services and information available on the internet. Although online technology raises many new legal issues, the law available to help us resolve them, at least today, is largely based on the world as it existed before online commerce became a reality. Thus the challenge is to predict how these new legal issues may be resolved using the current law. Especially, the damage from the above side effects on the cyberspace can be much more serious than in the real world because of promptness, wideness and anonymity. Therefore, regulating and controling the freedom of speech on the cyberspace became needed, and there are two kinds of opinion; one is that the laws in the real world should be applied for the cyberspace and the other is that regulating and controling the freedom of speech on the cyberspace should be performed by the users of cyberspace not by laws because the cyberspace is a free space and must not be interfered. In this study, the current judicial regulation of cyberspace, the side effects of cyberspace and the limitations of the freedom of speech are studied to solve the above problems with speech and the liabilities of on-line service providers are discussed around defamation the distribution of obscene pictures and information, and infringement of copyright.

  • PDF

Dept. of Computer Science, Information and communication Research Center, Kyungsang national University (대화형 지능시스템을 위한 WWW 인터페이스의 구현)

  • Kim, Chang-Min;Kim, Yong-Gi
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1563-1574
    • /
    • 1998
  • WWW(World Wide Web)의 비약적인 성장과 더불어 각종 인터넷 서비스 공급자(ISP, Internet Service Provider)의 기능과 역학이 크게 부각되고 있다. WWW을 인터페이스로 사용하는 대화형 지능시스템은 사용자와 대화를 통하여 보다 정확히 사용자의 요구를 인식할 수 있으며, 특히 전문가시스템은 사용자에게 일선의 전문기와 같은 양질의 정보를 공급할 수 있다. 본 연구는 WWW를 사용자 인터페이스로 사용하는 기존의 지능시스템이 가지고 있는 문제점을 해결하기 위하여 개발 환경에 독립되고, 클라이언트의 부담을 최소로 하며, 텍스트 기반의 통신을 지원하는 대화형 지능시스템 사용자 인터페이스를 제안한다.

  • PDF

An improved Multi-server Authentication Scheme for Distributed Mobile Cloud Computing Services

  • Irshad, Azeem;Sher, Muhammad;Ahmad, Hafiz Farooq;Alzahrani, Bander A.;Chaudhry, Shehzad Ashraf;Kumar, Rahul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.12
    • /
    • pp.5529-5552
    • /
    • 2016
  • Mobile cloud computing (MCC) has revolutionized the way in which the services can be obtained from the cloud service providers. Manifold increase in the number of mobile devices and subscribers in MCC has further enhanced the need of an efficient and robust authentication solution. Earlier, the subscribers could get cloud-computing services from the cloud service providers only after having consulted the trusted third party. Recently, Tsai and Lo has proposed a multi-server authenticated key agreement solution for MCC based on bilinear pairing, to eliminate the trusted third party for mutual authentication. The scheme has been novel as far as the minimization of trusted party involvement in authenticating the user and service provider, is concerned. However, the Tsai and Lo scheme has been found vulnerable to server spoofing attack (misrepresentation attack), de-synchronization attack and denial-of-service attack, which renders the scheme unsuitable for practical deployment in different wireless mobile access networks. Therefore, we have proposed an improved model based on bilinear pairing, countering the identified threats posed to Tsai and Lo scheme. Besides, the proposed work also demonstrates performance evaluation and formal security analysis.

VoIP QoS Network Modeling using Network Simulator (네트워크 시뮬레이터를 이용한 PESQ 기반 VoIP QoS 보장 네트워크 조건 모델링)

  • Kim, Sun-mi;Kim, Jong-seong;An, Suk-hwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.5 no.3
    • /
    • pp.110-116
    • /
    • 2012
  • As rapid development of the Internet, there are increasing interests about quality of service of VoIP using the Internet network and established PSTN. There was some study going on to improve the quality of service from the point of view of supplier's mainly. However recently, the demand for setting up the objective standards that service provider can offer to customers is needed as the interests from customers has been going up. In this study, we analysed the results from the test using PESQ which is a parameter of quality of service. we offer the conditions of network which guarantees the minimum quality of phone call using VoIP.

An Effective Multivariate Control Framework for Monitoring Cloud Systems Performance

  • Hababeh, Ismail;Thabain, Anton;Alouneh, Sahel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.1
    • /
    • pp.86-109
    • /
    • 2019
  • Cloud computing systems' performance is still a central focus of research for determining optimal resource utilization. Running several existing benchmarks simultaneously serves to acquire performance information from specific cloud system resources. However, the complexity of monitoring the existing performance of computing systems is a challenge requiring an efficient and interactive user directing performance-monitoring system. In this paper, we propose an effective multivariate control framework for monitoring cloud systems performance. The proposed framework utilizes the hardware cloud systems performance metrics, collects and displays the performance measurements in terms of meaningful graphics, stores the graphical information in a database, and provides the data on-demand without requiring a third party software. We present performance metrics in terms of CPU usage, RAM availability, number of cloud active machines, and number of running processes on the selected machines that can be monitored at a high control level by either using a cloud service customer or a cloud service provider. The experimental results show that the proposed framework is reliable, scalable, precise, and thus outperforming its counterparts in the field of monitoring cloud performance.

Long-Term Container Allocation via Optimized Task Scheduling Through Deep Learning (OTS-DL) And High-Level Security

  • Muthakshi S;Mahesh K
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.4
    • /
    • pp.1258-1275
    • /
    • 2023
  • Cloud computing is a new technology that has adapted to the traditional way of service providing. Service providers are responsible for managing the allocation of resources. Selecting suitable containers and bandwidth for job scheduling has been a challenging task for the service providers. There are several existing systems that have introduced many algorithms for resource allocation. To overcome these challenges, the proposed system introduces an Optimized Task Scheduling Algorithm with Deep Learning (OTS-DL). When a job is assigned to a Cloud Service Provider (CSP), the containers are allocated automatically. The article segregates the containers as' Long-Term Container (LTC)' and 'Short-Term Container (STC)' for resource allocation. The system leverages an 'Optimized Task Scheduling Algorithm' to maximize the resource utilisation that initially inquires for micro-task and macro-task dependencies. The bottleneck task is chosen and acted upon accordingly. Further, the system initializes a 'Deep Learning' (DL) for implementing all the progressive steps of job scheduling in the cloud. Further, to overcome container attacks and errors, the system formulates a Container Convergence (Fault Tolerance) theory with high-level security. The results demonstrate that the used optimization algorithm is more effective for implementing a complete resource allocation and solving the large-scale optimization problem of resource allocation and security issues.

A Study on the Internet Defamation Policy and Law - Focusing on the Communications Decency Act of 1996 and the Brodie Case (인터넷 명예훼손 방지를 위한 정책과 법안에 관한 연구 - 미국의 통신품위법과 Brodie 사건을 중심으로)

  • Bae, Sung-Ho
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.29-37
    • /
    • 2012
  • Defamation is one of the most frequently occurring daily legal violation because it can easily be done by words. In the internet generation with flooding internet forum websites and social network services, internet defamation is becoming one of the most serious problems in many leading IT countries including Korea and the United States. Being such a critical issue that can lead to a suicide, Korean policy makers has undertaken efforts to prevent the internet defamation by defining the liabilities of internet users and internet service providers. Many of the policies and laws including "the Telecommunication Information Usage Promotion and Security Protection Act of 2007" are modeled after that of the United States. Thus, the study aims to explore American defamation law and internet defamation law analyzing "the Communications Decency Act of 1996" and a recently decided precedent, "Brodie" case, in Maryland state court.