• Title/Summary/Keyword: mobile phone use

Search Result 645, Processing Time 0.034 seconds

Study on implementation of Secure HTML5 Local Storage (안전한 HTML5 로컬스토리지 구현에 대한 연구)

  • Myeong, Hee-Won;Paik, Jung-Ha;Lee, Dong-Hoon
    • Journal of Internet Computing and Services
    • /
    • v.13 no.4
    • /
    • pp.83-93
    • /
    • 2012
  • HTML5 has developed not to have browser dependancy considering interoperability as same as maintaining compatability with lower versions of HTML. HTML5, the newest web standardization is on going of being structured. Along with the smart phone boom, HTML5 is spotlighted because it can be applied to cross platforms in mobile web environments. Specially the local Storage that has been listed in new features in HTML5 supports offline function for web application that enables web application to be run even when the mobile is not connected to 3G or wifi. With Local storage, development of server-independent web application can be possible. However Local storage stores plaintext data in it without applying any security measure and this makes the plaintext data dangerous to security threats that are already exist in other client side storages like Cookie. In the paper we propose secure Local storage methods to offer a safe way to store and retrieve data in Local storage guaranteeing its performance. Suggested functions in this paper follow localStorage standard API and use a module that provide cryptographic function. We also prove the efficiency of suggested secure Local storage based on its performance evaluation with implementation.

Development of Android Smart Phone App for Analysis of Remote Sensing Images (위성영상정보 분석을 위한 안드로이드 스마트폰 앱 개발)

  • Kang, Sang-Goo;Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.26 no.5
    • /
    • pp.561-570
    • /
    • 2010
  • The purpose of this study is to develop an Android smartphone app providing analysis capabilities of remote sensing images, by using mobile browsing open sources of gvSIG, open source remote sensing software of OTB and open source DBMS of PostgreSQL. In this app, five kinds of remote sensing algorithms for filtering, segmentation, or classification are implemented, and the processed results are also stored and managed in image database to retrieve. Smartphone users can easily use their functions through graphical user interfaces of app which are internally linked to application server for image analysis processing and external DBMS. As well, a practical tiling method for smartphone environments is implemented to reduce delay time between user's requests and its processing server responses. Till now, most apps for remotely sensed image data sets are mainly concerned to image visualization, distinguished from this approach providing analysis capabilities. As the smartphone apps with remote sensing analysis functions for general users and experts are widely utilizing, remote sensing images are regarded as information resources being capable of producing actual mobile contents, not potential resources. It is expected that this study could trigger off the technological progresses and other unique attempts to develop the variety of smartphone apps for remote sensing images.

Proposal of Promotion Strategy of Mobile Easy Payment Service Using Topic Modeling and PEST-SWOT Analysis (모바일 간편 결제 서비스 활성화 전략 : 토픽 모델링과 PEST - SWOT 분석 방법론을 기반으로)

  • Park, Seongwoo;Kim, Sehyoung;Kang, Juyoung
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.4
    • /
    • pp.365-385
    • /
    • 2022
  • The easy payment service is a payment and remittance service that uses a simple authentication method. As online transactions have increased due to COVID-19, the use of an easy payment service is increasing. At the same time, electronic financial industries such as Naver Pay, Kakao Pay, and Toss are diversifying the competition structure of the easy payment market; meanwhile overseas fintech companies PayPal and Alibaba have a unique market share in their own countries, while competition is intensifying in the domestic easy payment market, as there is no unique market share. In this study, the participants in the easy payment market were classified as electronic financial companies, mobile phone manufacturers, and financial companies, and a SWOT analysis was conducted on the representative services in each industry. The analysis examined the user reviews of Google Play Store via a topic modeling analysis, and it employed positive topics as strengths and negative topics as weaknesses. In addition, topic modeling was conducted by dividing news articles into political, economic, social, and technology (PEST) articles to derive the opportunities and threats to easy payment services. Through this research, we intend to confirm the service capabilities of easy payment companies and propose a service activation strategy that allows gaining the upper hand in the market.

Seamless and Secure Service Framework using Multiple Network Interlaces Terminal in Heterogeneous Environment (이종 네트워크 환경에서 다중 인터페이스 단말을 활용한 끊김 없이 안전한 서비스 프레임워크)

  • Yoon, Sung-Hun;Lee, Soon-Seok;Kim, Sang-Ha
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.16 no.4
    • /
    • pp.53-65
    • /
    • 2011
  • As the Information and Communication Technologies continue to advance, some sensitive services (e.g. e-commerce, on-line financial service, and etc.) have spread rapidly. Accordingly, ensuring the safety of the sensitive service itself using personal Information as well as the protection of personal Information Is becoming very important. In addition, with the popularization of smart phone and the universalized use of wireless Internet, many services that have been provided on the basis of the conventional wired network are increasingly propagating to wired and wireless converged network environment. These changes in the network environment requires new paradigm for the pursuit of safe and stable communication. In this paper, we propose seamless and secure service framework that can facilitate a sustainable secure connection between the user terminal and the sensitive service system by using both the personal and network Information. The proposed service framework is capable of isolating the source of authorized use by a third party of the personal Information as far as the user terminal is not lost, although some personal Information is disclosed. Besides, it can provide a seamless and safe service environment even if the access network is changed by relocation of terminals in the heterogeneous mobile network environment.

A Study on Digital Divide from Socio-Technical Convergence: With Focus on Korean Women's Travel Activities (사회기술융합적 관점에서 살펴본 디지털기기 이용한계에 대한 연구: 한국 여성의 관광유형을 중심으로)

  • Lee, Seung-Jae
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.177-185
    • /
    • 2015
  • The gender difference in social roles affects digital devices' utilization differences in man and woman even in the 21st Century. Prior studies analyze the digital divide (genders, ages, etc.) from the assessment perspectives of digital equipment, such as PCs. In the area of high speed internet, most functions of PCs have been replaced with smartphones, and around 80% of the mobile phone users adopt smartphones. Subsequently the inequality of physical access to the digital devices is no longer a criterion for digital divide. The focus on digital divide should be shifted from the physical access to other factors, such as socio-technical or socio-cultural ones. This paper examines utilization of women's digital equipment, in particular, preparing for tourism activities, which is popular but sensitive to the technology. A survey was conducted with participants of [Suncheon Garden Expo] 2013. The results of this study capture the inactive use of digital devices particularly women over 50s. This phenomenon (high utilization of the digital devices for social or informative purposes, but low utilization of the digital payment) implies other aspects of Korean women (economic independence, low self-assertion, technical difficulties, etc.), which is considered from the socio-technological convergence perspective. This study also has a practical implication on the side of the digital device developers as well as marketing, where the qualitative communication is likely to be incorporated for the women over 50s.

Effects of Self Message Type and Incidental Pride Type on Product Purchase Intention (제품의 구매의도에 대한 자아 메시지의 유형과 환경적 프라이드의 유형의 효과)

  • CHOI, Nak-Hwan
    • The Journal of Industrial Distribution & Business
    • /
    • v.10 no.10
    • /
    • pp.53-65
    • /
    • 2019
  • Purpose - Current study aimed at investigating the effects of the choice easiness as a thought triggered at the time of making decision and the goal achievement emotion as a prediction of how consumers feel in the state of achieving consumption goal on brand purchase intention. And It also explored moderation role of incidental pride type such as ambient hubris pride and ambient authentic pride felt before the event in the effects of message type such as self-verifying message and self-enhancing message on the choice easiness and the goal achievement emotion. Research design, data, and methodology - Message type was divided into self-verifying message and self-enhancing message. Incidental pride type was divided into hubris and authentic pride. Smart mobile phone was selected for empirical study. And the experiment was performed with 2(pride type: hubristic versus authentic) × 2(message type: self-verifying message versus self-enhancing message) between-subjects design. Questionnaires from 215 undergraduate students were used to test hypotheses by Macro process model 7. The hypotheses were tested at each of self-verifying message group and self-enhancing message group. Results - First, both choice easiness and goal achievement emotion positively influenced on the purchase intention at both self-verifying message group and self-enhancing message group. Second, at self-verifying message group, the positive effects of self verification on both choice easiness and goal achievement emotion were higher to the customers under incidental hubris pride than to those under incidental authentic pride customers. Third, at self-enhancing message group, the positive effects of self enhancement on goal achievement emotion were higher to the customers under incidental authentic pride than to those under incidental hubris pride. However, at self-enhancing message group, the positive effects of self enhancement on choice easiness (goal achievement emotion) were not higher (higher) to the customers under incidental authentic pride than to those under incidental hubris pride. Conclusions - Focusing on the results of this study, to promote their brand purchase intention, brand managers should use self-enhancing message to induce goal achievement emotion from incidental authentic pride customers. And the brand managers should develop and use self-verifying message to induce choice easiness as well as goal achievement emotion from hubris pride customers, which in turn, promote their brand purchase intention.

A Study on Evaluation and Improvement Plan for Applications for Smart-phone Overdependence Prevention (스마트폰 과의존 방지 애플리케이션 평가 및 서비스 주체별 개선방안 연구)

  • Gyoo Gun Lim;Hai Yan Jin;Hye min Hwang;Hye won Cho;Jae Ik Ahn
    • Journal of Service Research and Studies
    • /
    • v.12 no.1
    • /
    • pp.36-48
    • /
    • 2022
  • As the use of smartphones has rapidly increased due to the development of digital technology, the expansion of smartphones, and the COVID-19 incident, dependence on smartphones and the Internet is emerging as a serious social problem. As one of the solutions to the smartphone overdependence problem, the government and companies are releasing smartphone overdependence prevention applications. However, research on the effectiveness of smartphone overdependence prevention applications is insufficient. Therefore, this study selects 25 applications serviced in Korea as analysis targets and evaluates smartphone overdependence prevention applications in terms of function and service using the FGI survey method to identify problems and propose improvements. In the function evaluation, the functions of blocking illegal/harmful apps/websites, limiting smartphone usage time, and monitoring smartphone usage status are provided in most applications, so satisfaction scores are also highly evaluated. However, functions such as location check, smombie prevention, and body camphishing prevention served by some applications are evaluated low due to poor performance and poor accuracy. Classified by service provider, government-providing applications need to accurately perform functions and improve convenience of use. Mobile-Carrier-providing applications need to improve connectivity with other carriers and compatibility with other smart devices like smartphone, tablet, etc. Other private enterprise-providing applications need to open AS channels such as customer service centre and chatbot to improve service.

A Study on the Effect of Location-based Service Users' Perceived Value and Risk on their Intention for Security Enhancement and Continuous Use: With an Emphasis on Perceived Benefits and Risks (위치기반서비스 사용자의 지각된 가치와 위험이 보안강화의도와 지속이용의도에 미치는 영향에 관한 연구: 지각된 혜택과 위험을 중심으로)

  • Park, Kyung Ah;Lee, Dae Yong;Koo, Chulmo
    • Asia pacific journal of information systems
    • /
    • v.24 no.3
    • /
    • pp.299-323
    • /
    • 2014
  • The reason location based service is drawing attention recently is because smart phones are being supplied increasingly. Smart phone, basically equipped with GPS that can identify location information, has the advantage that it can provide contents and services suitable for the user by identifying user location accurately. Offering such diverse advantages, location based services are increasingly used. In addition, for use of location based services, release of user's personal information and location data is essentially required. Regarding personal information and location data, in addition to IT companies, general companies also are conducting various profitable businesses and sales activities based on personal information, and in particular, personal location data, comprehending high value of use among personal information, are drawing high attentions. Increase in demand of personal information is raising the risk of personal information infringement, and infringements of personal location data also are increasing in frequency and degree. Therefore, infringements of personal information should be minimized through user's action and efforts to reinforce security along with Act on the Protection of Personal Information and Act on the Protection of Location Information. This study aimed to improve the importance of personal information privacy by empirically analyzing the effect of perceived values on the intention to strengthen location information security and continuously use location information for users who received location-based services (LBS) in mobile environments with the privacy calculation model of benefits and risks as a theoretical background. This study regarded situation-based provision, the benefit which users perceived while using location-based services, and the risk related to personal location information, a risk which occurs while using services, as independent variables and investigated the perceived values of the two variables. It also examined whether there were efforts to reduce risks related to personal location information according to the values of location- based services, which consumers perceived through the intention to strengthen security. Furthermore, it presented a study model which intended to investigate the effect of perceived values and intention of strengthening security on the continuous use of location-based services. A survey was conducted for three hundred ten users who had received location-based services via their smartphones to verify study hypotheses. Three hundred four questionnaires except problematic ones were collected. The hypotheses were verified, using a statistical method and a logical basis was presented. An empirical analysis was made on the data collected through the survey with SPSS 12.0 and SmartPLS 2.0 to verify respondents' demographic characteristics, an exploratory factor analysis and the appropriateness of the study model. As a result, it was shown that the users who had received location-based services were significantly influenced by the perceived value of their benefits, but risk related to location information did not have an effect on consumers' perceived values. Even though users perceived the risk related to personal location information while using services, it was viewed that users' perceived value had nothing to do with the use of location-based services. However, it was shown that users significantly responded to the intention of strengthening security in relation to location information risks and tended to use services continuously, strengthening positive efforts for security when their perceived values were high.

Development of Education Materials for Healthy Consumption of Milk in a Card News Format for Korean Adults (성인의 바른 우유 섭취를 위한 카드뉴스 형식의 교육자료 개발)

  • Kim, Sun Hyo
    • Journal of Korean Home Economics Education Association
    • /
    • v.32 no.3
    • /
    • pp.97-110
    • /
    • 2020
  • The purpose of this study is to develop milk education materials for adults based on the scientific basis of right milk consumption in the format of card news that can be easily accessed on a mobile phone or the internet and has high impact. The topics to be included in the card news were selected based on the findings from literature analysis and focus group interviews with 10 adults(32.0±6.4 years). For the eight selected topics, effective communication was made by suggesting some information that users want to know while reflecting adult eating habits, lifestyle habits, and nutrition and health interests. The card news draft was reviewed by researcher and consulting experts, and then questionnaire survey was conducted using Likert 5-point scales by 50 adults(42.7±10.2 years). Based on the results of the review, consultation and questionnaire survey, a final draft of the card news consisting of 11 cuts was completed. Card news proposal is expected to produce educational effects, since the respondents showed high satisfaction with the card news (higher than 4 on the 5-point scales) according to the questionnaire survey. Adults can easily access and use the card news developed in this study, and thus this card news is expected to increase milk consumption in adulthood and improve nutrition and health through friendly and systematic milk education.

Performance Analysis of TCAM-based Jumping Window Algorithm for Snort 2.9.0 (Snort 2.9.0 환경을 위한 TCAM 기반 점핑 윈도우 알고리즘의 성능 분석)

  • Lee, Sung-Yun;Ryu, Ki-Yeol
    • Journal of Internet Computing and Services
    • /
    • v.13 no.2
    • /
    • pp.41-49
    • /
    • 2012
  • Wireless network support and extended mobile network environment with exponential growth of smart phone users allow us to utilize the network anytime or anywhere. Malicious attacks such as distributed DOS, internet worm, e-mail virus and so on through high-speed networks increase and the number of patterns is dramatically increasing accordingly by increasing network traffic due to this internet technology development. To detect the patterns in intrusion detection systems, an existing research proposed an efficient algorithm called the jumping window algorithm and analyzed approximately 2,000 patterns in Snort 2.1.0, the most famous intrusion detection system. using the algorithm. However, it is inappropriate from the number of TCAM lookups and TCAM memory efficiency to use the result proposed in the research in current environment (Snort 2.9.0) that has longer patterns and a lot of patterns because the jumping window algorithm is affected by the number of patterns and pattern length. In this paper, we simulate the number of TCAM lookups and the required TCAM size in the jumping window with approximately 8,100 patterns from Snort-2.9.0 rules, and then analyse the simulation result. While Snort 2.1.0 requires 16-byte window and 9Mb TCAM size to show the most effective performance as proposed in the previous research, in this paper we suggest 16-byte window and 4 18Mb-TCAMs which are cascaded in Snort 2.9.0 environment.