• 제목/요약/키워드: personal service

검색결과 2,436건 처리시간 0.029초

개인용 클라우드 컴퓨팅의 특성 도출에 관한 탐색적 연구 (An Exploratory Study on the Derivation of Characteristics of Personal Cloud Computing)

  • 문혜영;류재홍;최진호
    • Journal of Information Technology Applications and Management
    • /
    • 제20권2호
    • /
    • pp.57-68
    • /
    • 2013
  • Recently, cloud computing has been viewed as a technology of great influence. Despite the importance of personal cloud services, the majority of cloud computing studies has been focused on an enterprise level. Therefore, in this research, we list variables of personal cloud computing characteristics (accessibility, storage, trust, perceived ease of use, availability) from preceding research done on an enterprise level. So, through pilot testing, we analyze whether examined characteristic variables affect the intention to use personal cloud computing. Next, we investigate the relevancy between user characteristics, including gender, age, and occupation, and the usage rate of personal cloud computing. Lastly, we implement an analysis of variance in order to speculate whether there is any difference between the five characteristic variables in using personal cloud computing between cloud service enterprises. For empirical testing people with experience in personal cloud computing are surveyed. Frequency analysis, exploratory factor analysis, internal consistency analysis, T-test, ANOVA, and multiple regression analysis are implemented with 325 valid samples. The analysis results are as follows: First, among user characteristic variables, 'occupation' shows a significant relationship with cloud service usage, Second, between cloud service enterprises, all five characteristic variables of 'Naver N Drive' are thoroughly evaluated and 'Google Drive' receives a high evaluation in availability and accessibility. Third and finally, all of the selected characteristic variables affect the intention to use personal cloud computing. However, availability is identified to be the most important factor. This research will serve as a reference to enterprises for the practical implementation of personal cloud computing service.

군장병 휴대전화 사용제도 시행에 따른 개인정보 안정성 확보 방안 연구 (A Study on ways to secure personal information stability according to the implementation of the mobile phone use system for milityary personnel)

  • 황보원규;신동규
    • 인터넷정보학회논문지
    • /
    • 제23권6호
    • /
    • pp.49-58
    • /
    • 2022
  • 군장병의 일과 후 병 휴대전화 사용을 전면 허용함에 따라 휴대전화 개통시 통신사에서 개인정보 직접 수집을 최소화 하여 군장병의 개인정보 안정성 확보가 필요한 시점이다. 국방부는 일과 후 군장병의 휴대전화 사용을 도입하기에 앞서 사이버 불법도박, 게임중독, 음란물 시청 등 일부 역기능에 대한 우려 및 보안사고 예방을 위해 휴대전화 촬영기능을 차단하는 등의 보안통제 체계를 구축해 왔다. 이동통신사는 통신대리점에 휴대전화 개통 등 개인정보 처리업무를 위탁하고 개인정보 보호조치 실태점검 등 관리감독을 수행하지만 통신대리점에서 위탁업무 목적외로 개인정보의 수집하는 행위가 발견되고 있다. 군장병이 휴대전화를 개통할 경우 개인정보 이동권을 활용하여 개인정보관리 전문기관을 신설하고 개인정보관리 전문기관에 군장병의 개인정보 전송을 요구하는 체계를 제시한다.

국내 작업환경측정기관들의 개인시료 채취기 운용현황 실태 조사 (A Survey on Management Status of Personal Air Sampler in Domestic Provider for Work Environment Monitoring Service)

  • 김기연;조만수;마혜란;이광용;정지연
    • 한국산업보건학회지
    • /
    • 제24권3호
    • /
    • pp.359-364
    • /
    • 2014
  • Objectives: The principal aim of this study is to provide fundamental data for suggesting substantial management plan of personal air sampler by investigating current situation of work environment monitoring service provider. Materials and Methods: The questionnaires regarding a personal air sampler were sent by electronic mail to 150 institutions, except for 22 institutions which are out of business or closed temporarily, among total 172 domestic work environment monitoring service providers designated by Ministry of Employment and Labor based on 2013. The institutions which did not reply to the questionnaire for 30 days were required directly by phone call. Finally 97 institutions gave an answer to the questionnaire and therefore the respondence rate was 65%. Results: The normal operation rate of personal air sampler exceeded 70% in all the types (particle, gas and both combination) in terms of purchased year. Furthermore the personal air sampler purchased recently showed a trend of high operation rate compared to the personal air sampler purchased previously. The distribution patterns of personal air sampler In terms of manufacturers were Gillian>MSA>SKC for particle, Gillian>SKC>AMETEK for gas and Gillian>MSA>Casella for both combination, respectively. As a result, it was found that the personal air sampler manufactured by Gillian company was utilized the most in domestic work environment monitoring service provider regardless of types of personal air sampler. Conclusions: Based on the results obtained from this study, the normal operation rate according to types of personal air sampler was as follows: 94% for personal air sampler for collecting particle only, 93% for personal air sampler for collecting gas only and 89% for collecting both particle and gas. Overall, the numbers of personal air sampler possessed and operated normally in domestic work environment monitoring service provider were 5,458 and 5,062, which indicates the normal operation rate of personal air sampler in total aspect is 93%.

개인용 클라우드 컴퓨팅 서비스 수용저항에 영향을 미치는 요인에 관한 연구 (A Study on Influencing Factors on User's Adoption Resistance to Personal Cloud Computing Service)

  • 조인제;김선규;양성병
    • 지식경영연구
    • /
    • 제16권1호
    • /
    • pp.117-142
    • /
    • 2015
  • Recently, the personal cloud computing service has been being spotlighted as an individual tool of productivity enhancement. However, compared to the rosy forecast, its diffusion rate in the domestic (Korean) market is much slower than expected. In order to find the reason for the slow growth of personal cloud computing service, we attempt to identify influencing factors on user's adoption resistance, while most prior research has focused on the factors affecting its adoption. Based on both the person-technology fit model and the privacy calculus model, we propose technostress and perceived value as key antecedents of adoption resistance. In addition, we identify (1) technical (pace of change and complexity) and personal (self-efficacy) influencing factors on technostress, and (2) beneficial (perceived mobility and perceived availability) and harmful (perceived vulnerability) influencing factors on perceived value. To validate our research model, 133 individual samples were gathered from undergraduate and graduate students who had actual experience of using at least one of personal cloud computing services. The results of the structural equation modeling confirm that both technostress and perceived value have significant effects on adoption resistance, but they have different influencing mechanisms to different types of adoption resistance (indifference, postponement, and rejection). Theoretical and practical contributions are discussed in the conclusion.

신용카드사의 가맹점 서비스품질 결정요인에 관한 탐색적 연구 (A Study on Service Quality Determinants of Store Available for Credit Card)

  • 김동균
    • 경영과정보연구
    • /
    • 제2권
    • /
    • pp.295-310
    • /
    • 1998
  • This exploratory study examines critical quality factors of store that can give access to credit card. The procedures of developing instrument is followed by recommendations on the developing measures of marketing constructs. The results shows that service quality of store available for credit card is divided four dimensions(personal service, payment-approving service, information-providing service, problem responsiveness service). These dimensions and scales are verified through the assessment of reliability and validity. Finally, the importance of personal service is showed to be different across types of industry.

  • PDF

프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론 (A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development)

  • 권오병
    • Asia pacific journal of information systems
    • /
    • 제18권1호
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.

스마트폰 기반의 개인 환경 서비스 및 기술 (Personal Environment Service and Technology Based on Smart Phone)

  • 오종택
    • 한국통신학회논문지
    • /
    • 제38C권5호
    • /
    • pp.454-463
    • /
    • 2013
  • 스마트폰은 이미 보편화되었고 가전기기나 자동차 등의 각종 생활기기에 통신장치 및 센서가 내장되어 스마트폰과 연동되는 스마트 기기들이 연구 개발되고 있다. 또한 현재는 스마트폰을 이용한 단순한 리모컨이나 원격 제어장치, 사용자 인터페이스의 수준이지만 향후에는 스마트폰에 지능화 기술이 융합되어, 사용자나 기기, 생활환경의 속성을 반영하여 자동으로 기기들이 개인 맞춤형으로 설정되는 개인 환경 서비스 기술이 활성화될 것이다. 본 논문에서는 관련 서비스와 시스템 구조, 요소 기술에 관해 기술한다.

모바일 웹 브라우징 서비스의 사용 의도에 영향을 미치는 요인 : 자기효능감과 사회적 영향 (Determinants of User Intentions to Use Mobile Web Browsing Service: Self Efficacy and Social Influences)

  • 김경규;류성렬;김문오;김효진
    • Journal of Information Technology Applications and Management
    • /
    • 제16권1호
    • /
    • pp.149-168
    • /
    • 2009
  • This paper aims to empirically examine how personal characteristics and social influence affect user acceptance of mobile web browsing service. To examine the intention to use mobile web browsing service, we applied the Technology Acceptance Model (TAM) which has been widely used to explain and predict the IT acceptance to this study. This research also includes personal characteristics such as computer self-efficacy, mobile self-efficacy, and personal innovativeness in IT and social influences such as subjective norms, image, and visibility as the external variables of the TAM. The results indicate that computer self-efficacy do not directly influence ease of use, but indirectly through mobile self-efficacy. And the results indicate that mobile self-efficacy and personal innovativeness in IT have direct effects on ease of use. Empirical results also show that subjective norms and image affect usefulness. Additional theoretical and practical implications of these findings are also discussed in the paper.

  • PDF

공인인증서를 이용한 주민등록번호 대체수단에 관한 연구 (A Study of the Alternative Means of Korean Resident Registration Number using the Authorized Certificate)

  • 이영교;안정희
    • 디지털산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.107-117
    • /
    • 2014
  • The personal information extrusion accident(hacking, improper maintenance) by the internet has been increased rapidly during the last ten-year period. The personal information includes Korean resident registration number, name, cellphone number, home telephone number, E-mail address, home address, etc. Korean resident registration number is unchangeable from the cradle to the grave. Illegally accessed personal information can be wrongfully resoled or used at phishing scam. In this paper, we propose a alternative means of Korean resident registration number using the authorized certificate. The authorized certificate is in use safely in Internet. The authorized certificate(included Chinese name) is in used in offline service, the authorized certificate(included English name) is used in online(for government service) and the authorized certificate(not included name) is used in online(for private service). The authorized certificates are possible for discard, republication. The method can reduce the possibility of the personal information extrusion.

메타마스크와 연동한 블록체인 기반 사용자 인증모델 (A Blockchain-based User Authentication Model Using MetaMask)

  • 최낙훈;김희열
    • 인터넷정보학회논문지
    • /
    • 제20권6호
    • /
    • pp.119-127
    • /
    • 2019
  • 본 논문은 사용자 인증과 개인정보의 관리를 위해 중앙집중화된 서버를 사용하는 서비스 제공자들의 개인정보 탈취와 그로인한 개인정보 도용 문제의 해결을 위한 새로운 인증 모델을 제안한다. 탈중앙화 플랫폼인 블록체인을 통해 사용자 인증과 정보저장공간을 제공해 중앙집중화 이슈를 해결하며, 사용자별 대칭키 암호화를 통해 정보의 기밀성을 보장한다. 제안 모델은 퍼블릭 블록체인인 이더리움과 웹기반의 지갑 확장프로그램인 메타마스크를 이용해 구현되었으며, 사용자는 브라우저상에서 메타마스크를 통해 이더리움 메인네트워크에 접속해 스마트 컨트랙트에 암호화한 개인정보를 저장한다. 향후 사용자는 새로운 서비스 이용을 위해 자신의 이더리움 계정을 통해 서비스 제공자에게 개인정보를 제공하며, 이 과정은 가입이나 새로운 인증과정 없이 사용자 인증과 개인정보를 제공한다. 서비스 제공자는 별도의 인증 방식 및 개인정보의 저장을 위한 비용을 절감하고 개인정보유출로 인한 문제를 방지할 수 있다.