• Title/Summary/Keyword: internet use

Search Result 5,983, Processing Time 0.03 seconds

Design of Internet Phon(VoIP) System for Voice Security based on VPN (VPN 기반의 음성 보안을 위한 인터넷 텔레포니(VoIP) 시스템 설계)

  • Kim Suk-Hun;Kim Eun-Soo;Song Jung-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.942-949
    • /
    • 2006
  • The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eavesdrop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.

The influence of internet-use Anatomy class on critical thinking disposition - Flipped learning method applying-

  • Kim, Jung-ae;Kim, Su-min;Yang, Dong-hwi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.60-67
    • /
    • 2018
  • The purpose of this study was to examine the effects of internet-use Anatomy class, as one of the Flipped learning method, on critical thinking disposition. The class for this study was conducted from March 1 to April 10, 2018. The study involved a total of 180 people in the first year of a University located in C province. Data collection was carried out before and after the Flipped learning method application. Frequency analysis, Paired t-test, Pearson correlation, and Regression analysis were used for the analysis. According to the analysis, 28.3% of men and 71.1% of women and before applying the program analysis of correlation between Flipped learning perception and critical thinking disposition showed a significant correlation between confidence(sub-component of critical thinking) only (p<.005). Comparing the scores of critical thinking before and after the program, it was found that Truth seeking (p<.001), Open-mindness (p<.005), Confidence (p<.001), Systematicity (p<.005), Analyticity (p<.001), and Inquisitiveness (p<.001) scores had increased significantly except Maturity (p>.005). And the regression analysis of Flipped learning method applying influence on critical thinking disposition were significantly affected (p<.001). Based on the results of this study, it was possible to determine that Flipped learning method had a positive effect on critical thinking disposition.

An Empirical Study about Internet and Social Network Security Behavior of End User (최종사용자의 인터넷과 소셜 네트워크 보안 행동에 대한 실증 연구)

  • Park, Kyung-Ah;Lee, Dae-Yong;Koo, Chul-Mo
    • The Journal of Information Systems
    • /
    • v.21 no.4
    • /
    • pp.1-29
    • /
    • 2012
  • The purpose of this study was to find about personal information security of internet and social networks by focusing on end users. User competence and subjective criterion, which are the antecedents, are affecting security behaviors For these security behaviors, the study examined the relationship between security behavior intention on internet use and security behavior intention about social network that is actively achieved in many fields. Behaviors of internet and social network were classified into an action of executing security and an action of using a security technology. In addition, this study investigated a theory about motivational factors of personal intention on a certain behavior based on theory of reasoned action in order to achieve the purpose of this study. A survey was conducted on 224 general individual users through online and offline, and the collected data was analyzed with SPSS 12.0 and SmartPLS 2.0 to verify demographic characteristics of respondents, exploratory factor analysis, and suitability of a study model. Interesting results were shown that security behavior intention of social network is not significant in all security behavior execution, which is security performance behavior, and security technology use. Internet security behavior is significant to security technology use but it does not have an effect on behavior execution.

Study on Design of Internet Phon(VoIP) using the VPN (VPN을 적용한 인터넷 전화 단말기의 설계에 관한 연구)

  • Yoo, Seung-Sun;Kim, Sam-Tek;Lee, Seung-Gi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.2A
    • /
    • pp.12-19
    • /
    • 2005
  • The VoIP(Voice over IP) has been worldwide used and already put to practical use in many fields. However, it is needed to ensure secret of VoIP call in a special situation. It is relatively difficult to eavesdrop the commonly used PSTN in that it is connected with 1:1 circuit. However, it is difficult to ensure the secret of call on Internet because many users can connect to the Internet at the same time. Therefore, this paper suggests a new model of Internet telephone for eavesdrop prevention enabling VoIP(using SIP protocol) to use the VPN protocol and establish the probability of practical use comparing it with Internet telephone.

The Effect of the Motive Factors Towards the Intended Use of the Website: Perspectives of Internet Shopping Mall (웹사이트 이용의도에 대한 동기적 요인의 영향 : 인터넷 쇼핑몰을 중심으로)

  • 손달호
    • Korean Management Science Review
    • /
    • v.21 no.1
    • /
    • pp.1-17
    • /
    • 2004
  • A separate and distinct interaction with both the actual e-vendor and with its IT web site interface is at the heart of online shopping. Previous research has established, accordingly, that online purchase intention is the product of customer assessments of IT itself, specifically its perceived usefulness and ease-of-use(TAM). Since perceived usefulness and perceived ease of use are such a fundamental driver of usage intentions, it is important to understand the determinants of this construct and how their influence changes over the voluntariness towards the usage intention. The reason for voluntariness as a moderating variable is that it had the serious effect to the motivating in the making willingness of the internet shopping-mall usage. A better understanding of the determinants of perceived usefulness and perceived ease of use to the usage intention would enable us to design web site interventions that would increase user acceptance and usage of internet shopping-mall. Therefore, the goal of the present research is to extend TAM to include additional key determinants of TAM and to understand how the effects of these determinants change with the voluntariness of the usage intention of the internet shopping-mall.

The Attitude Characteristics of Consumers using Internet & e-Biz - A Comparative Analysis on Korea & Japan's auction websites - (소비자의 Internet 및 e-Biz 이용에 대한 태도적 특성 -한국과 일본의 옥션 사이트 비교분석-)

  • So, Youn-Koung;Park, Sun-Young;Kim, Eu-Gene
    • Journal of Family Resource Management and Policy Review
    • /
    • v.9 no.4
    • /
    • pp.145-159
    • /
    • 2005
  • The main purpose of this study is to statistically analyze the difference between Korea and Japan's consumer attitudes towards e-commerce through the use of auction websites. Here are the results. First, there was a significant difference between the Korean user's attitude and the Japanese user's attitude towards Internet usage; especially, the Japanese user's attitude towards convenience showed a much higher degree than that of the Korean user. Second, Korean users preferred brand image to price, while Japanese users preferred price to brand image. Third, both the Korean users and the Japanese showed a positive relationship between Internet usage and the use of e-commerce. In contrast to the Korean user's frequent use of the bulletin board, Japanese users tended to use the bulletin board less frequently.

  • PDF

A Study of Packet Analysis in Smart Phone Internet Access (Smart Phone 인터넷 접속시 패킷 분석 연구)

  • Song, Jin-Young;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.10a
    • /
    • pp.229-232
    • /
    • 2010
  • Smart Phone is the increasing use. Smart Phone can be run on that New or videos you want to connect to the Internet for downloading and viewing applications. But the wireless Internet have been found that Due to the vulnerability of the Internet, Smart Phone security vulnerabilities. This paper analyzes the vulnerability. Smart Phone droid that occur when connecting to the Internet. For information on Smart Phone to use to analyze network packet analysis and packet capture tools. Analysis is based on information from the Internet when you use Smart Phone Hack will demonstrate the process. Messenger, ID, to confirm the password, the actual internet ID, password access to the personal information that can be seized. In this study, hacking and security of the Smart Phone will contribute to the research process that Internet information and communication powers to strengthen the security of Korea.

  • PDF

Internet Addiction and Attention-Deficit/Hyperactivity Disorder Traits among Female College Students in Japan

  • Tateno, Masaru;Tateno, Yukie;Kamikobe, Chikara;Monden, Ryunosuke;Sakaoka, Oji;Kanazawa, Junichiro;Kato, Takahiro A.;Saito, Takuya
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.29 no.3
    • /
    • pp.144-148
    • /
    • 2018
  • Objectives: Previous studies have reported that internet addiction (IA) is associated with attention-deficit/hyperactivity disorder (ADHD) consistently. However, in terms of gender, there are controversial findings. We aimed to investigate the relation between IA and self-acknowledged ADHD traits among female college students in Japan. Methods: The study questionnaire consisted of questions about demographics, Adult ADHD Self-Report Scale-V1.1 Part A (ADHD screener) and Young's Internet Addiction Test (IAT). When four or more items are more frequent than the cut-off on ADHD screener, the subject was categorized into students with a positive ADHD screen. We defined students with total IAT score of 70 and higher as IA. Results: A total number of respondents was 369 (mean age: $19.0{\pm}0.7years$). Seventy-seven subjects were screened positive on ADHD screener (20.9%). Students with a positive ADHD screen scored significantly higher on the IAT ($54.2{\pm}14.2$ vs. $42.5{\pm}11.3$). The rates of IA in students with and without a positive ADHD screen were 18.2% and 1.0%, respectively. Conclusion: Results of this study demonstrated the relation between IA and self-evaluated ADHD traits among female college students in Japan. Appropriate education for students on how to use the internet properly will be necessary to prevent IA.

Testing for Use and Acceptance of Internet Banking Based on UTAUT Model (UTAUT모형을 이용한 사용자 수용연구)

  • Park, Young-Bae;Park, Hyun-Jee
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.22 no.1
    • /
    • pp.11-21
    • /
    • 2017
  • Internet Banking Offers Major Advantages for Both Banks and Customers. However, Not All People have equal Access or Skills to use such Services. The Main Objective of this Study is to Understand the Fctors Influencing Internet Banking Usage we Developed a Research Model Drawing from the UTAUT and Digital Divide Research. The Model was Tested and find more than 90% of Variance of Internet Banking Usage was Explained by the Model. Results Demonstrate that the Strongest Factor Influencing the Intention to adopt Internet Banking Services is the Degree to which an Individual Believes that it is Safe to use such Services. In the Paper, all the Hypotheses Except for the Hypothesis on the Effort Expectation are Accepted with Statistical Significance.