• Title/Summary/Keyword: mobile internet use

Search Result 878, Processing Time 0.024 seconds

A Study on ways to secure personal information stability according to the implementation of the mobile phone use system for milityary personnel (군장병 휴대전화 사용제도 시행에 따른 개인정보 안정성 확보 방안 연구)

  • Hwangbo, Wongyu;Shin, Dong-Kyoo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.6
    • /
    • pp.49-58
    • /
    • 2022
  • As military service members are fully permitted to use mobile phones for sickness after work, it is time to minimize the direct collection of personal information from telecommunication companies when opening mobile phones to secure the safety of military service personnel's personal information. Prior to introducing the use of mobile phones by soldiers after work, the Ministry of National Defense established a security control system such as blocking the mobile phone shooting function to prevent security accidents and concerns about some adverse functions such as illegal cyber gambling, game addiction, and viewing pornography. come. Mobile telecommunications companies entrust personal information processing tasks, such as opening mobile phones, to telecommunications agencies and carry out management and supervision, such as checking the status of personal information protection measures. When a military service member opens a mobile phone, a personal information management agency is newly established using the right to portability of personal information, and a system for requesting the transmission of personal information from the military service member is proposed.

A Study on Mobile IPv4 Authentication Mechanisms

  • Lim, Jung-Muk;Lim, Hyung-Jin;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.277-280
    • /
    • 2005
  • With the proliferation of mobile terminals, use of the Internet in mobile environments is becoming more common. To support mobility in these terminals, Mobile IPv4 is proposed and represents the standard in IPv4 environments. Authentication should be mandatory, because mobile terminals can utilize Internet services in any foreign domain. Mobile IPv4 provides symmetric key based authentication using the default HMAC-MD5. However, symmetric key based authentication creates a key distribution problem. To solve this problem, public key based authentication mechanisms have been proposed. In this paper, the performance of each of these mechanisms is evaluated. The results present that, among these mechanisms, partial certificate based authentication has superior performance, and certificate based authentication has the worst performance. Although current public key based authentication mechanisms have lower performance than symmetric key based authentication, this paper presents the possibility that public key based authentication mechanisms may be used for future mobile terminal authentication.

  • PDF

Effect of Movile Communication during Non-Worktime: Increasing Worker's Stress in the IT Industry

  • Hahm, SangWoo
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.95-105
    • /
    • 2018
  • As the IT industry has developed, the frequency of mobile communication usage has increased sharply. Mobile communication has many advantages such as improving work performance, communication beyond time and local constraints, and rapid and vast amounts of information exchange. However, mobile communication also allows supervisors to give their subordinates work at any time. Thus, mobile communication may also have a negative impact on workers' stress levels during non-work time. This study examined required time, urgent business, personal engagement, and trivial matters as sub-dimensions of mobile communication messages that workers could receive during non-work time. Further, the nature of the relationship between team leaders and members explains how these messages may increase the stress levels of workers. Supervisors should prohibit the use of such mobile communication, and efforts should be made at the enterprise level. Through this research, we aim to explain the dual nature of mobile communication, and understand how to optimize the usage of this innovative technology

A Novel Architecture for Mobile Crowd and Cloud computing for Health care

  • kumar, Rethina;Ganapathy, Gopinath;Kang, Jeong-Jin
    • International Journal of Advanced Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.226-232
    • /
    • 2018
  • The rapid pace of growth in internet usage and rich mobile applications and with the advantage of incredible usage of internet enabled mobile devices the Green Mobile Crowd Computing will be the suitable area to research combining with cloud services architecture. Our proposed Framework will deploy the eHealth among various health care sectors and pave a way to create a Green Mobile Application to provide a better and secured way to access the Products/ Information/ Knowledge, eHealth services, experts / doctors globally. This green mobile crowd computing and cloud architecture for healthcare information systems are expected to lower costs, improve efficiency and reduce error by also providing better consumer care and service with great transparency to the patient universally in the field of medical health information technology. Here we introduced novel architecture to use of cloud services with crowd sourcing.

The Effect of Fare-To-Fare Communication Situation on New Media Uses (면대면 커뮤니케이션 환경이 새로운 대인커뮤니케이션 매체 이용에 미치는 영향: 인터넷, 이동전화를 중심으로)

  • Bae, Jin-Han
    • Korean journal of communication and information
    • /
    • v.23
    • /
    • pp.47-77
    • /
    • 2003
  • Despite the near ubiquity of mobile phone and internet, the 'meta research' that deals with face-to-face(FTF), mobile phone and internet together as interpersonal media is very rare in Korea. This study begin with the purpose of fair repositioning of mobile phone and internet in Korean's interpersonal communication horizon. To accomplish this purpose, We examined the effect of face-to-face communication situation on uses of mobile phone and internet as interpersonal communication media. The related raw data were collected from on-line survey process, and statistically analyzed. The result showed that persons who are more troublesome in FTF communication because of their timidness or personality problem are more restricted in human communication network via mobile phone and internet than the others who are not. And more 'addicted' in internet use and more active in trying another personality(Persona) in cyber space. And more shrunk in meeting and conversation with family members and friends after internet adoption.

  • PDF

A Proposal for Certificate Status Validation Using the Call Processing of PCS (PCS의 호처리를 이용한 인증서 상태검증 모델 제안)

  • Lee Young-Sook;Won Dong-Ho;Lee Young-Gyo
    • The Journal of the Korea Contents Association
    • /
    • v.5 no.1
    • /
    • pp.45-53
    • /
    • 2005
  • With the rapid progress of research to offer a convenience of mobile communication, the mobile users can use not only the services of voice call but also the variety services of data communication using Internet. These include Internet Searching, Internet Shopping and Internet banking and Internet stock exchange and electronic payment and so on, based on PKI. Also, the need of data communication between the mobile users has been increased. As it is possible for mobile users to do user authentication, key distribution, encryption, decryption and so on, it is needed the certificate status validation between the mobile users. However due to the PCS(Personal Communication System) had been only designed and implemented for voice call between the mobile users, it is not easy to apply data communication between the mobile users on PKI. Therefore the study of for the data communication between the mobile users in PCS is a few. It is for the data transfer between the mobile users to communicate using call processing of PCS. So, we propose how to process the certificate status validation during call processing for data communication between the mobile users in the PCS.

  • PDF

Volume Rendering Architecture of Mobile Medical Image using Cloud Computing (클라우드 컴퓨팅을 활용한 모바일 의료영상 볼륨렌더링 아키텍처)

  • Lee, Woongkyu;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.101-106
    • /
    • 2014
  • The era came that by having fastest internet and smart phone makes cloud computing really a big merit. This paper proposes architecture for medical image volume rendering in mobile environment using cloud computing. This architecture to replace expensive workstation server and storage it use one of the service of cloud computing IaaS(Infrastructure as a Service). And this paper propose to use webGL to get rid of restriction of mobile hardware. By this research, it is expected that medical image volume rendering service in mobile environment is more effective and can be a foundation work.

Development of remote monitoring system based on wire and wireless internet Environment (유.무선 인터넷 환경에 연동한 원격 감시시스템 개발)

  • 박상국
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.557-560
    • /
    • 2004
  • In this paper, wireless internet services are combined with conventional wire internet service system. These system support that instrument manager can be access his instrument by use personal mobile devices and instrument manager can be take emergency action by use mobile devices. for this, error signal of local instruments are transmitted to the serial port of local server through Rf wireless communication channel. Also, The image of local instruments are transmitted to the web monitoring screen of main server. Network Camera System Supports remote monitoring functions. The interfacing of nam server with external user are possible through the mobile devices.

  • PDF

An Empirical Study on the Critical Factors for Successful m-Learning Implementation (성공적인 m-Learning 구현을 위한 핵심 요인에 대한 연구)

  • Whang, Jae-Hoon;Kim, Dong-Hyun
    • Journal of Information Technology Applications and Management
    • /
    • v.12 no.3
    • /
    • pp.57-80
    • /
    • 2005
  • This study defined the notion of general idea on m-learning as based upon e-Learning and mobile internet related literature review and identified the m-Learning distinctive features. Also, this study has searched for factors that are expected to influence the use intended for m-Learning from self-regulated learning, which is acknowledged to be a useful method for learning accomplishment in education field, in order to measure the relationship between learners' motivation and use intention. Then it has empirically validated the conceptual model based on Davis' TAM (Technology Acceptance Model) As a result, self-efficacy, self-determination, interest, contents quality, time management, help seeking, and Peer study are factors affecting Perceived usefulness. Also self-efficacy, self-determination, interest, contents qualify, time management, and peer study are factors affecting perceived ease of use. Finally both perceived usefulness and perceived ease of use are significant factors affecting use intention.

  • PDF

Investigation of Factors Influencing Consumer Initial Trust and Intention to Use Mobile Banking Services (모바일 뱅킹 서비스에 대한 사용자 초기신뢰와 사용의도에 영향을 미치는 요인들에 관한 실증적 연구)

  • Kim Gimun;Kim Won-Woo;Lee Ho Geun
    • Korean Management Science Review
    • /
    • v.22 no.2
    • /
    • pp.13-34
    • /
    • 2005
  • Mobile banking service has emerged as an important profit source for both banks and mobile phone service companies. However, the growth of the mobile banking service is behind the expectation of banks and mobile phone companies. One plausible explanation for this laggard diffusion of mobile banking may be the lack of consumers' initial trust on the service. Therefore, this study investigates the critical factors in building trust and intention to use mobile banking services. Our research results show that propensity-to-trust, structural assurance, and relative advantages of services have significant impacts on consumers' initial trust in mobile banking service Furthermore, initial trust in mobile banking service is a critical factor for adopting mobile banking services Contrary to our expectation, however, reputation of banks and mobile phone companies are not significant in attracting consumers to mobile banking services.