• Title/Summary/Keyword: personal communication services

Search Result 353, Processing Time 0.021 seconds

Exploring Working Group's Psychological Subjectivity on Public Smart Work Services in a Cloud-based Social Networking

  • Kim, Ki Youn;Song, In Kuk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.12
    • /
    • pp.4748-4762
    • /
    • 2020
  • Recently, the COVID 19 pandemic has affected on our daily lives and society in many ways. Specifically, it has brought rapid changes in the working environment from office working to smart telecommuting. In addition, cloud computing technology and services not only provided ubiquitous access, but also led to a sharing of information, internal-external communication channels, telework, and innovative smart work for the business process. As a result, smart work services based on social cloud networking have spread to the public sector. However, existing academic research examining smart work merely remains to focus on the theoretical conceptualization or to deal with merely several examples of private views. Best practices of smart work services based on cloud computing technology in the public field rarely exists. Moreover, many studies have been differently measured the values of smart work for private and public sectors depending on organizational singularities. Therefore, the study aims to define new theoretical implications and to explore future business strategies and policy directions based on a technical working group's personal psychological subjectivity. The research applied Q methodology, and selected five public organizations in Korea, that they have adopted or currently plan to adopt some part of smart work services.

A Study on Systemic Test Approach of Automated Control of the Personal Rapid Transit System (PRT 자동화 제어시스템의 체계적인 테스트 접근에 관한 연구)

  • Jeong Seung-Hwan;Kim Jong-Ki;Lee Kum-Seok
    • Proceedings of the KSR Conference
    • /
    • 2004.10a
    • /
    • pp.205-210
    • /
    • 2004
  • The PRT(Personal Rapid Transit) system has been being researched and examined to efficiently provide high quality services to passengers against the traffic congestion of the capital region. With concept that PRT differentiated from GRT(Group Rapid Transit), PRT generally is a tracked vehicle system operating with unmanned. The embedded software of PRT Automated Control system generally is comprised of the central software, stations software and vehicle software. The controllers of these software interface to each other using its RF communication antennas. In this paper, each embedded software of the PRT system should be applied to an incremental and systematic test approach technique in the design and implementation phase, because the reliability and safety of the PRT system should be assured

  • PDF

연결완전성 제고와 프라이버시 보호를 위한 유비쿼터스 상거래의 설계 방안

  • Lee, Gyeong-Jeon;Ju, Jeong-In
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2005.11a
    • /
    • pp.157-162
    • /
    • 2005
  • Seamlessness is the Keyword of U-Commerce Which may be defined as the commercial interaction among providers, consumers, products, and services, enabled and supported especially by the real-world seamless communication of each entity and object's digital information. However, the possibility of the seamless transactions increases the privacy risk of the entities involved. Therefore, the core issue of U-Commerce is how to promote seamless transactions while protecting the privacy. for the seamlessness, the role of incentive-emphasized business model is important since the seamlessness makes clear which economic entities contribute to a commercial transaction. Economic entities will reject the seamless transactions unless the sufficient incentives are given to them. In order to consider the privacy issue, we suggest an alternative U-Commerce architecture based on Hybrid P2P Model and Personal Information Base.

  • PDF

Analysis of the Facebook Profiles for Korean Users: Description and Determinants (페이스북 이용자의 개인정보 공개와 결정 요인)

  • Lee, Mina;Lee, Seungah;Choi, Inhye
    • Journal of Internet Computing and Services
    • /
    • v.15 no.2
    • /
    • pp.73-85
    • /
    • 2014
  • This study analyzed the profile of a Facebook account to examine how personal information is revealed and what kinds of factors influence personal information revelation. Categories of user's profile on Facebook were analyzed and two dimensions were developed; the degree that how much personal information is revealed and the network limits that personal information is accessed. Main variables to determine personal information revelation are Facebook privacy concern and uses for social relationships along with gender, the duration of Facebook use, and average time of use. Data were collected from college students. Factor analysis produced two factors of Facebook privacy concern, Facebook privacy concern with users and Facebook privacy concern with the Facebook system. Regression analyses were performed to identify significant determinants of the degree of information revelation and the network limits of personal information. The results found out that the degree of personal information revelation is explained by gender, the duration of use, and use for social relationships while the network limit is explained by the duration of use and Facebook privacy concern with users. Worthy of notice is that use for social relationships and Facebook privacy concern with the Facebook system offset each other. The implications of the results are discussed. Additionally and finally the categories of profiles are graphically re-grouped to show how personal information revelation is associated with social relationship generation and maintenance.

Analysis and Study on Invasion Threat and Security Measures for Smart Home Services in IoT Environment (사물인터넷 환경에서의 스마트홈 서비스 침해위협 분석 및 보안 대책 연구)

  • Lee, Myongyeal;Park, Jaepyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.27-32
    • /
    • 2016
  • In general, IoT(Internet of things) designate the intelligence technologies and services which interact all necessity information between human and things, things and thing and things and systems with all things connecting through the internet based. The smart home in present of IoT environment fuses the daily supplies/equipment which needs to use for the private life with the internet of things that is the fruit of the converged business through all most private consumption related in vastly. The concept of smart home has been built around early 2000s due to the spread of high speed internet and advanced of smart electronics and internet, furthermore influencing by the enhancement of wireless network and smart devices, it is advanced as a smart home within the internet of things environment. Smart home service inside the house which most closely implemented with personal life is being developed and advanced in various forms. These developments may exert a positive effect, but if it does not resolve the security issues for the smart home service, then it may cause a big plague of privacy and personal life.

Cloud Computing Virtualization: It's Security Issues and Vulnerability (클라우드 컴퓨팅 가상화 기술: 보안이슈 및 취약점)

  • Kang, Dea-Hoon;Kim, Sang-Gu;Kim, HyunHo;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.234-237
    • /
    • 2014
  • The increasing of Cloud Computing technology among several companies has been a key strategy for IT services to provide desirable IT solutions to consumers of cloud services. More attention is concentrated to these core technologies that enable cloud services and more particularly to the virtualization aspect. The accessibility to a larger number of users is possible because of the usage of the data-intensive, data management and data integrity. Unfortunately, those useful services are vulnerable to kind of attacks by hackers, thus the security of personal information is in critical situation. To solve this to leakage vulnerability, and with the proliferation of cloud services, the cloud service providers adopt a security system with firewall, antivirus software and a large number of virtualized servers and Host. In this paper, a variety of virtualization technologies, threats and vulnerabilities are described with a complement of different security solutions as countermeasures.

  • PDF

Implementation of CoAP/6LoWPAN over BLE Networks for IoT Services (BLE 네트워크 상에서 사물인터넷 서비스 제공을 위한 CoAP과 6LoWPAN 구현)

  • Kim, Cheol-Min;Kang, Hyung-Woo;Choi, Sang-Il;Koh, Seok-Joo
    • Journal of Broadcast Engineering
    • /
    • v.21 no.3
    • /
    • pp.298-306
    • /
    • 2016
  • With the advent of Internet of Things (IoT) technology that allows the communications between things and devices over the Internet, a lot of researches on the IoT services, such as smart home or healthcare, have been progressed. In the existing machine-to-machine (M2M) communications, however, since the underlying link-layer technologies, such as Bluetooth or ZigBee, do not use the Internet Protocol (IP) communication, those technologies are not suitable to provide the IoT services. Accordingly, this paper discusses how to provide the Internet services in the M2M communication, and propose an implementation of the Constrained Application Protocol (CoAP) over 6LoWPAN for providing IoT services in the BLE networks. Based on the implementation, we compared the performance between HTTP and CoAP for IoT communications. From the experimental results, we can see that the CoAP protocol gives better performance than the HTTP protocol with two times higher throughput, 21% faster transmission time, and 22% smaller amount of generated packets.

A Study on UMPC's Role in u-Learning (U-러닝에서 UMPC의 역할에 대한 연구)

  • Yi, Mun-Ho;Kim, Mi-Ryang
    • Journal of Internet Computing and Services
    • /
    • v.9 no.6
    • /
    • pp.127-139
    • /
    • 2008
  • The value of up-to-date Mobile PC such as UMPC (Ultra Mobile Personal Computer) is recognized greatly in learning environment that busywork such as characteristic of transfer easy and real time communication possibility etc. and conversation with a colleague student, free sending of studying data and public ownership etc. is required. Wish to recognize whether is acting relevant role in u - unfold learning that inflect UMPC in integration research model, and UMPC is u searching for relevant element at studying activity unfolding process u - integration Inquiry-Based Learning that present in Korean education & research information service (KERIS) at fifth-year student science time In primary school in this research. This research result could take charge role of UMPCs' studying-activity though there is persistent feedback with teacher among studying-activity although UMPC's role is utilized on constituent that can be related with studying-activity in learning process.

  • PDF

A Sensor Identification Scheme for Dynamic Interworking Between Personal Sensor Devices and a Smartphone (개인용 센서 기기와 스마트폰의 동적 연동을 위한 센서 식별 기법)

  • Min, Hong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.2
    • /
    • pp.27-32
    • /
    • 2016
  • Several sensor devices have been developed for monitoring individual's health and status information and services which visualize customized information by associating applications running on smartphones with sensor devices also have been emerged. Though these applications provide similar information to a user, each sensor device has its own application caused by non-standardized packet formats. In this paper, we propose a sensor device identification for dynamic interworking between a smartphone and personal sensor devices. In the proposed scheme, we can use the same application which plays role of a client on the smartphone as changing sensor devices because server stores packet information of sensor devices.

Development of a Simulation Tool to Evaluate GNSS Positioning Performance in Urban Area

  • Wu, Falin;Liu, Gang-Jun;Zhang, Kefei;Densley, Liam
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.2
    • /
    • pp.71-76
    • /
    • 2006
  • With the rapid development of spatial infrastructure in US, Europe, Japan, China and India, there is no doubt that the next generation Global Navigation Satellite System (GNSS) will improve the integrity, accuracy, reliability and availability of the position solution. GNSS is becoming an essential element of personal, commercial and public infrastructure and consequently part of our daily lives. However, the applicability of GPS in supporting a range of location-sensitive applications such as location based services in an urban environment is severely curtailed by the interference of the 3D urban settings. To characterize and gain in-depth understanding of such interferences and to be able to provide location-based optimization alternatives, a high-fidelity 3D urban model of Melbourne CBD built with ArcGIS and large scale high-resolution spatial data sets is used in this study to support a comprehensive simulation of current and future GNSS signal performance, in terms of signal continuity, availability, strength, geometry, positioning accuracy and reliability based on a number of scenarios. The design, structure and major components of the simulator are outlined. Useful time-stamped spatial patterns of the signal performance over the experimental urban area have been revealed which are valuable for supporting location based services applications, such as emergency responses, the optimization of wireless communication infrastructures and vehicle navigation services.

  • PDF