• Title/Summary/Keyword: personal communication services

Search Result 353, Processing Time 0.029 seconds

Secure Scheme Between Nodes in Cloud Robotics Platform (Cloud Robotics Platform 환경에서 Node간 안전한 통신 기법)

  • Kim, Hyungjoo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.12
    • /
    • pp.595-602
    • /
    • 2021
  • The robot is developing into a software-oriented shape that recognizes the surrounding situation and is given a task. Cloud Robotics Platform is a method to support Service Oriented Architecture shape for robots, and it is a cloud-based method to provide necessary tasks and motion controllers depending on the situation. As it evolves into a humanoid robot, the robot will be used to help humans in generalized daily life according to the three robot principles. Therefore, in addition to robots for specific individuals, robots as public goods that can help all humans depending on the situation will be universal. Therefore, the importance of information security in the Cloud Robotics Computing environment is analyzed to be composed of people, robots, service applications on the cloud that give intelligence to robots, and a cloud bridge that connects robots and clouds. It will become an indispensable element for In this paper, we propose a Security Scheme that can provide security for communication between people, robots, cloud bridges, and cloud systems in the Cloud Robotics Computing environment for intelligent robots, enabling robot services that are safe from hacking and protect personal information.

The Conceptual Model of the Smart City Platform for the Citizen Participation (시민참여를 위한 스마트 도시 플랫폼의 개념모델)

  • Seo, Dong-Jo;Kim, Mi-Yun
    • Journal of Digital Convergence
    • /
    • v.19 no.11
    • /
    • pp.63-73
    • /
    • 2021
  • In order to effectively promote a smart city, various urban information must be opened and linked, and the information system that each member can share is required. In addition, it is necessary to establish a cooperative system in which citizens and citizen's organizations can participate. In this study, the components and conceptual model of a smart city platform were proposed to create a smart city that enables citizen participation. Its components include sensors for collecting data from the real world, information storage and management, information sharing and standard system, citizens' personal information protection and management system, utilization and service, etc. For the conceptual model, roles of smart city members were defined, so that citizen-centered participation and services could be made. It also includes data collection, information linkage and sharing, and service configuration system. Citizens can perform various roles such as data collector and provider, service planner or requestor, service beneficiary, etc. Ultimately, free communication and exchange of opinions with citizens is a key factor in the success of smart cities.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

A Research on Value Chain Structure on Experience of VR and AR Focused on Means-End Chain Theory on VR and AR (가상현실 미디어 체험이 가치사슬구조형성에 미치는 영향 연구 VR-AR 수단-목적 사슬이론 적용 중심으로)

  • Kweon, Sang Hee
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.49-66
    • /
    • 2018
  • This research explores a value chain structure of VR-AR media including user's perception, uses, and evaluation. The purpose of this research focused on factor analysis and the relationship among user's VR-AR adoption motivations and utilities. This research explores correlation between personal value and using motivation. This study was to identify the value structure of respondent on VR-AR usages based on means-end chain theory. The research used structured APT laddering questions and 251 data was analysed. Through such analysis, category difference by stage and relationship difference were identified and hierarchical value map was compared. There are four different value ladders: first is attributes, functional consequences, psychological consequences, and final value. This study is based on the analysis of the value chain structure factors that affect VR and AR use behavior (attributes, functional benefits, psychological benefits, use value), 'Hierarchical Value Map' between users' The purpose of the model is to construct a model. For this, 'means-end chain theory' was applied to measure the causal relationship between personal value and VR related use behavior. In order to solve this research problem, 135 people were analyzed through the structured questionnaire using the AR and VR content fitness measure and the second APT laddering, and the use of VR-AR : 1) Functional benefits; 2) Psychological benefits; 3) Means to reach value, 4) Objective value chain structure was identified. The results show that VR users tried to smooth the social life through the new virtual reality audiovisual element, the newness of experience, fun, and pleasure through the departure of reality, vividness of experience, and leading fashion. The AR fitness was a game and a new program, and the value of interacting with other people and the value of 'periwinkle' played an important role through the vividness and peripheral interaction of AR, It was an important choice. The important basic values of users' VR and AR selection were correlated with psychological attributes of interaction with others, achievement, happiness and favorable values.

A study on primary control area for information security management system (ISMS): focusing on the finance-related organizations (정보보호 관리체계를 위한 주요 통제영역 연구: 금융 관련 조직을 중심으로)

  • Kang, Youn-chul;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.19 no.6
    • /
    • pp.9-20
    • /
    • 2018
  • Financial service industry has introduced and operated management systems such as information security management system (ISMS), personal information security management system, business continuity management system to protect and maintain suitably customer's financial information and financial service. This study started that it's desirable financial industry takes consideration of ISMS and it can be different types among various organizations taking consideration of culture, practical work, and guideline of information security. The study derives primary control areas of ISMS through analyzing non-conformity trends and control factors according to certification audit for finance-related organizations introduced international ISMS of ISO27001 which is well known and commonly applicable irrespective of areas in financial service industry. Through case analyses for five finance-related organizations operating ISMS, this study analyzed improvement effects of ISMS. It has a meaning as an initial research though it was difficulty in acquiring data for empirical study because of rare organizations maintaining certification in financial sector. As a result, number of non-confirmity from the first audit to three years' elapse was decreased every year. Physical and environmental security, communication and operations management, and access control having the highest frequency of non-conformity each presented 23%, 19%, and 17%, which reached 59% in total and they are derived into primary control areas. ISMS can fulfill technical, managerial, physical security issues, which have not been treated importantly in financial industry. In addition, this study presented that ISMS can be an effective management system applicable for financial service industry.

The Effects of Types of Self-Identity on Quasi-social Interactions and Information Sharing Intentions with Facebook Opinion Leaders (자아정체성의 유형이 페이스북 의견 지도자와의 준사회적 상호작용 및 정보공유 의도에 미치는 효과)

  • Park, Sunkyung;Kang, Yoon Ji
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.225-232
    • /
    • 2021
  • Nowadays, opinion leaders influence the formation of public opinion on various issues in social network services. There has been a lack of research on the personal characteristics that inspire users to interact with opinion leaders and show intent to act. This paper verifies how the disposition of Facebook users' self-identity affects the quasi-social interaction with opinion leaders on Facebook and the intention to share information. As the perception and behavior of users on social media platforms differ depending on the type of issue, an online survey was conducted by classifying issue types into life culture and political sectors. Research found that personal identity had a significant positive effect on quasi-social interactions in the life culture and politics sectors, while group identity negatively affected quasi-social interactions. In addition, the intention to share information was confirmed to have a significant effect only in the life and culture areas of self-identity (social and group identity). Quasi-social interaction was confirmed to have a significant positive effect on all issue areas. The results of this study suggest the need to consider variations in opinion leader marketing strategies based on the types of self-identity of Facebook users in the future. In addition, the study shows that raising the level of quasi-social interaction at the corporate level without distinction of issue types can lead to effective results.

A Study on the Diffusion Factor of e-finance (e-Finance의 확산요인에 관한 연구)

  • Kim, Min-Ho;Song, Chae-Hun;Song, Sun-Yok;Cha, Sun-Kwon
    • International Commerce and Information Review
    • /
    • v.4 no.2
    • /
    • pp.253-277
    • /
    • 2002
  • Nowaday, the advanced technology in information and communication has been leading the dramatic change of transaction paradigm expansion from physical basis to electronic one. As we know, financial services support most of financial exchange between two business parties. So the expansion of electronic transaction paradigm affects to every financial institutions which provide financial services. Thus, financial institutions have accepted e-Finance systems and providing internet financial services to live in the competition. The purpose of this study is to contribute the qualitative enhancement of its customer service, rapid diffusion and accurate strategy establishment for e-Finance industry in the user side. Through the literature review and factor and reliability analysis, this study selects six diffusion factors such as efficiency of perceived e-Finance, reliability and safety of e-Finance in perceived e-Finance itself's characteristic; confidence, technical factors and the customer service quality of e-Finance system in perception on e-Finance System; inclination to innovation in the personal characteristic. According to result of hypothesis verification by using logistics regression analysis, technical factors and the customer service quality of e-Finance system in perception on e-Finance System and inclination to innovation in the personal characteristic gave statistically positive effect to the diffusion decision at the significant level 0.05 and 0.01. However efficiency of perceived e-Finance, reliability and safety of e-Finance in perceived e-Finance itself's characteristic didn't affect to diffusion decision and confidence of e-Finance system in perception on e-Finance System didn't have any statistical significancy. This study can be used as a basic material for the forward empirical study of diffusion factors in the user side and be able to apply to company and government policy making or embodiment, determination for customer service quality degree of financial institutions. But this study has some limitations like didn't touch satisfaction factors and its effect, only deal domestic customers and didn't use multi-regression analysis.

  • PDF

Analysis of the First Time User Experience of the online memorial platform and suggestion of service developments (온라인 장례 플랫폼의 초기 사용자 경험 분석및서비스 개발 제안)

  • Jueun Lee;Jindo Hwang
    • Journal of Service Research and Studies
    • /
    • v.14 no.1
    • /
    • pp.44-62
    • /
    • 2024
  • The development of online funeral services and social issues of eco-friendly funeral culture have raised awareness of the new need for online funeral culture. There have been several attempts to revitalize online funeral services in domestic institutions and companies, but the effect is weak. The purpose of this study is to propose a design that can improve the accessibility and usability of online memorial services by analyzing the usability problem factors through a First Time User Experience analysis of the online memorial platform. Therefore, in this study, in order to identify the problem factors of the online memorial platform, a literature review on the UX, OOBE, and FTUE theories was conducted. The subject of the study was the app 'Memorial'. Before analyzing the First-Time User-Experience, IA was compared and analyzed with other similar services to understand the characteristics of the UX service of the app 'Memorial', which is the subject of the study. In addition, tasks corresponding to the Unpack-Setup/Configure-First Use stage were performed on 10 subjects who had no experience using the online memorial platform. The experimental process was expressed as the UX Curve to identify factors that caused negative experiences. As a result, the major problem factors included unnecessary UI elements, the need for sensitive personal information at the membership stage, and lack of immersion in the service. The improvements included strengthening community functions to facilitate the sharing of emotions and promote smooth communication between users. We proposed UI/UX service developments that enhanced the app by incorporating these insights. In order to verify the effectiveness, serviceability, and value of the developed prototype, an interview with a expert was conducted. The interviewes consisted of three service design experts. This study was conducted to contribute to the quality improvement and activation of the recently emerging online funeral services. The study is significant as it aims to understand the current status of these services and identify the factors necessary to improve service accessibility and usability. Subsequent studies require in-depth user verification of how much the proposed improvement plan affects the actual user experience.

Target Advertisement based on a TV Viewer's Profile Inference and TV Anytime Metadata (시청자 프로파일 추론과 TV Anytime 메타데이타를 이용한 표적 광고)

  • Kim, Mun-Jo;Lee, Bum-Sik;Lim, Jeong-Yon;Kim, Mun-Churl;Lee, Hee-Kyung;Lee, Han-Gyu
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.10
    • /
    • pp.709-721
    • /
    • 2006
  • The traditional broadcasting services over terrestrial, satellite and cable media have been unidirectional mass media regardless of TV viewer's preferences. Recently ich media streaming has become possible via the broadb and networks. Furthermore, since bidirectional communication is possible, personalcasting such as personalized streaming services has been emerging by taking into account the user's preference on content genres, viewing times and actors/actresses etc. Accordingly, personal media becomes an important means for content provision service in addition to the traditional broadcasting service as mass media. In this paper, we introduce a user profile reasoning method for target advertisement which is considered an important application in personalcasting service. The proposed user profile reasoning method predicts an unknown TV viewer's gender and ages by analyzing TV Viewing history data. Based on the estimated user's gender and ages, a target advertisement is provided with TV Anytime metadata. A proposed target advertisement system is developed based on the user profile reasoning and the target advertisement selection method. To show the effectiveness of our proposed methods, we present a plenty of experimental results by using realistic TV viewing history data.

Voronoi-Based Search Scheme for Road Network Databases (도로 망 데이터베이스를 위한 보로노이 기반의 탐색 방안)

  • Kim, Dae-Hoon;Hwang, Een-Jun
    • Journal of IKEEE
    • /
    • v.11 no.4
    • /
    • pp.348-357
    • /
    • 2007
  • Due to the improved performance and cost of personal mobile devices and rapid progress of wireless communication technology, the number of users who utilize these devices is increasing. This trend requires various types of services be available to users. So far, there have been many solutions provided for the shortest path problem. But, technologies which can offer various recommendation services to user depending on user’s current location are focused on Euclidean spaces rather than road network. Thus, in this paper, we extend the previous work to satisfy this requirement on road network database. Our proposed scheme requires pre-computation for the efficient query processing. In the preprocessing step, we first partition the input road network into a fixed number of Voronoi polygons and then pre-compute routing information for each polygon. In the meantime, we select the number of Voronoi polygons in proposition to the scale of road network. Through this selection, the required size of pre-computation is linearly increasing to the size of road network. Using this pre-computated information, we can process queries more quickly. Through experiments, we have shown that our proposed scheme can achieve excellent performance in terms of scheduling time and the number of visited nodes.

  • PDF