• Title/Summary/Keyword: personal communication services

Search Result 353, Processing Time 0.022 seconds

iPlace : A Web-based Collaborative Work System Using Enterprise JavaBeans Technology (iPlace:EJB 기술을 이용한 웹 기반 협업시스템)

  • An, Geon-Tae;Jeong, Myeong-Hui;Lee, Geun-Ung;Mun, Nam-Du;Lee, Myeong-Jun
    • The KIPS Transactions:PartD
    • /
    • v.8D no.6
    • /
    • pp.735-746
    • /
    • 2001
  • As collaborative works have been spread over the internet, the need for information systems providing virtual workspaces has grown rapidly. Through virtual workspaces, the members participating in those collaborative works share and exchange their information effectively. It is desirable that these systems can be extended according to various requests of users, providing reliable services. In this paper, we describe a group of components for supporting collaboration and the iPlace (internet workPlace) system developed with those components. The iPlace system provides effective sharing and reusing of information among the members of collaborative groups through personal workspaces-the private spaces on the Web for each user and shared workspaces-the shared spaces for each of those groups. In addition, implemented with EJB technology, it provides highly scalable and reliable services.

  • PDF

An Analysis of Security Vulnerabilities Using 5G NAS COUNT (5G NAS COUNT 취약점을 이용한 보안 위협 분석)

  • Kim, Min-Jae;Park, Jong-Geun;Shin, Ji-Soo;Moon, Dae-Sung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.565-573
    • /
    • 2022
  • Current mobile communication system is in the mid-process of conversion from 4G LTE to 5G network. According to the generalization of mobile communication services, personal information such as user's identifiers and location information is transmitted through a mobile communication network. The importance of security technology is growing according to the characteristics of wireless mobile communication networks, the use of wireless shared channels is inevitable, and security technology cannot be applied to all network system elements in order to satisfy the bandwidth and speed requirements. In particular, for security threat analysis, researches are being conducted on various attack types and vulnerability analysis through rogue base stations or attacker UE to make user services impossible in the case of 5G networks. In this paper, we established a 5G network testbed using open sources. And we analyzed three security vulnerabilities related to NAS COUNT and confirmed the validity of two vulnerabilities based on the testbed or analyzing the 3GPP standard.

외식산업의 마케팅 운영방안에 관한 연구 -호텔 식음료를 중심으로-

  • 우성근
    • Journal of Applied Tourism Food and Beverage Management and Research
    • /
    • v.8
    • /
    • pp.179-195
    • /
    • 1997
  • Today's hotel cannot be defined merely as a place of providing food and lodgin. It must be a high level cultural ground serving as a place of rest for the people and as a place of art, culture and communication for the local community. Although each hotel has its own distinctiveness it must share a unified services and product sales strategies with one another in order to raise each other's sales values. The service is evaluated on the basis of the customer's own living standard and social class. There ought to be variety of personal and material services taking the sophistication and complexity of the customer's needs into onsideration. More effective marketing strategy is called for upon knowing such sales strategy and service marketing of the hotel management. Hotel's food marketing must take into consideration the product's simulaneous and vanishing qualities, its dependency upon ordering and its relationship to human services industries. Methods of increasing profit and customer satisfaction management need to be made. Especially the changes in the customer's tourist mind set and eat-out behavior play as important variabls, and the management needs to be reflexive enough to respond quickly to those changes.

  • PDF

A Study on Factors Influencing User's Security Intention for Internet Banking (인터넷 뱅킹 사용자의 보안의도에 영향을 마치는 요인에 관한 연구)

  • Kim, Jong-Ki;Kang, Da-Yeon;Jeon, Jin-Hwan
    • The Journal of Information Systems
    • /
    • v.18 no.2
    • /
    • pp.1-18
    • /
    • 2009
  • Recently, internet banking is growing rapidly. Moot banks in Korea provide internet banking services. Internet banking becomes a major trend in the financial marketplace. With advanced computer technology and declining communication costs, many customers prefer online alternatives such as internet banking, mobile banking or phone banking rather than going to banks by themselves. The number of customers using those alternatives is skyrocketing and domestic commercial banks encourage them of the use. As the internet is highly developed, customers demand higher quality services and banks develop and provide diverse services in order to respond to them. However, internet banking service users are still afraid of their personal and financial information being exposed on the internet. The purpose of this research is to empirically analyze the influence that appropriate internet banking affect user's security intention. The research model proposed in this study includes user's security intention which is influenced by self-efficacy, security trust, Internet banking attitude, perceived security and security intention. According to the result of this study, self-efficacy and security trust are related to the security attitude. There is a significant relationship between security attitude and perceived security. Also, user's security attitude and perceived security is significantly affected by security intention.

The Impact of The User's Social Characteristics of 5G Services on The Intention of Use (중국 5G 서비스의 사용자 사회적 특성이 사용의도에 미치는 영향)

  • Nie, Xin-Yu;Qing, Cheng-lin
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.63-68
    • /
    • 2022
  • This After the debut of 5G, our lives have changed a lot. In particular, the proliferation of wireless network services through smartphones and LTE has completely changed the existing mobile communication services that are limited to voice/text communication between individuals and individuals, and new innovative services have emerged in all aspects of personal and corporate activities. This study verified the relationship between the social characteristics of 5G services and users' willingness to use 5G services. It analyzed the influence relationship between independent variables (social reality, subjective norms), media variables (perceived usefulness) and dependent variables (use intention), set hypotheses, and identified the media effects of perceived usefulness. The measurement items of variables are defined, and the research model of 5G service usage intention is designed. A questionnaire survey was conducted on the measurement items for users who have experience in using 5G services. Based on this result, among the social factors of users of 5G services, social reality and subjective norms are suitable factors to improve users' intentions. And through this research we put forward the enlightenment, discussed the limitations of the research and future research directions.

An Improved High-Performance Protocol for Security Vulnerability of GSM based on SIM Card (SIM 카드 기반 보안 취약성을 개선한 고성능 GSM 보안 프로토콜)

  • Kim, Hee-Jung;Jeon, Ha-Yong;Lee, Ju-Hwa;Jung, Min-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.7
    • /
    • pp.902-911
    • /
    • 2007
  • GSM platform is a hugely successful wireless technology and an unprecedented story of global achievement. In less than ten years since the first GSM network was commercially launched, it became the world's leading and fastest growing mobile standard, using over 1 billion GSM subscribers across more than 200 countries of the world. GSM platform evolved into 3th generation mobile communication which includes not only voice call services but also the international roaming and various kinds of the multimedia services. GSM is an essential element techniques a safe data transmission and a personal private protection while support services. However, a crypto algorithm and a secure protocol for a safe data communication using GSM are indicating various kinds of problems. In this paper, we propose a more safer and more efficient authentication protocol in 3th generation network through analysis of GSM security mechanism of 2th/2.5th generation. This security protocol offers enforced security efficiency by using user verification between SIM/ME and reduction of authentication and key agreement step between SIM/ME/AuC.

  • PDF

Intelligent Agent based on Bayesian Network for Smartphone (스마트폰을 위한 베이지안 네트워크 기반 지능형 에이전트)

  • Han Sang-Jun;Cho Sung-Bae
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.1
    • /
    • pp.81-91
    • /
    • 2005
  • Today, mobile phones have become an essential item for man-to-man communication. As more people use mobile phones, various services based on mobile phone networks and high-end devices have been developed. In addition, with the growth of the concept of ubiquitous computing, there are many ongoing studies on novel and useful services in smartphone. In this paper, for personalized service in smartphone we propose an intelligent agent that uses user modeling based on bayesian network and rule based service selection mechanism. It infers the user's status such as his current affect, how he is busy, and how someone is familiar with him from personal information and communication history using bayesian network and Provides appropriate services on the basis of the inferred information. We apply it to some realistic situation to confirm the usefulness our proposed agent.

Authentication Scheme based on NTRU for the Protection of Payment Information in NFC Mobile Environment (NFC 모바일 환경에서 결제정보보호를 위한 NTRU 기반 인증 기법)

  • Park, Sung Wook;Lee, Im Yeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.3
    • /
    • pp.133-142
    • /
    • 2013
  • Recently, smart devices for various services have been developed using converged telecommunications, and the markets for near field communication (NFC) mobile services is expected to grow rapidly. In particular, the realization of mobile NFC payment services is expected to go commercial, and it is widely attracting attention both on a domestic and global level. However, this realization would increase privacy infringement, as personal information is extensively used in the NFC technology. One example of such privacy infringement would be the case of the Google wallet service. In this paper, we propose an mutual authentication scheme based on NTRU for secure channel in OTA and an zero-knowledge proof scheme NTRU based on for protecting user information in NFC mobile payment systems without directly using private financial information of the user.

A Study on the Actual Use of Mobile Electronic Notification Service (모바일 전자고지서비스의 사용실태에 대한 조사 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.167-180
    • /
    • 2021
  • Due to the development of IT technology and the spread of infectious diseases, online non-face-to-face services are rapidly expanding. In particular, the information delivery process is also changing from the past postal branch-based to an information delivery system using mobile devices. This change is due to the change from the information delivery using the telephone line to the information delivery system using the Internet. Mobile notification service is a service that sends electronic notices to mobile devices held by users to deliver information and is validated for delivery, which has the advantage of reducing the benefits of unnecessary mail production, exposure to personal information, and misdelivery. However, user identification information must be provided to operators that provide mobile electronic notification services. In this paper, the current state of use of the mobile electronic notice service, which has been in effect since 2019, is investigated and analyzed, and the current mobile electronic notice service is to be safely provided and to take appropriate protection measures for personal information. In providing the mobile electronic notification service to users, it is possible to identify the service standards required by the sending agency, and based on this, prepare the technical standards for the mobile electronic notification service that the sending agency must comply with in advance and use it for the mobile electronic notification service.

Private information protection method and countermeasures in Big-data environment: Survey (빅데이터 환경에서 개인민감정보 보호 방안 및 대응책: 서베이)

  • Hong, Sunghyuck
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.10
    • /
    • pp.55-59
    • /
    • 2018
  • Big-data, a revolutionary technology in the era of the 4th Industrial Revolution, provides services in various fields such as health, public sector, distribution, marketing, manufacturing, etc. It is very useful technology for marketing analysis and future design through accurate and quick data analysis. It is very likely to develop further. However, the biggest problem when using Big-data is privacy and privacy. When various data are analyzed using Big-data, the tendency of each user can be analyzed, and this information may be sensitive information of an individual and may invade privacy of an individual. Therefore, in this paper, we investigate the necessary measures for Personal private information infringement that may occur when using Personal private information in Big-data environment, and propose necessary Personal private information protection technologies to contribute to protection of Personal private information and privacy.