• Title/Summary/Keyword: service provider

Search Result 1,415, Processing Time 0.026 seconds

A Identity Escrow mechanism supporting key recovery (키 복구를 지원하는 향상된 신원위탁 메커니즘)

  • 이용호;이임영;김주한;문기영
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.119-128
    • /
    • 2002
  • In case certification between user and service provider is achieved, problem that user's identity is revealed is occurring by social issue, so it was presented identity escrow scheme to solve these problem. In identity escrow scheme, the issuer who have correct user's identity transmits securely anonymity authentication information to user, and user achieves authentication phase with service provider keeping oneself anonymity using this. In this paper, we present requirement for security and trusty of identity escrow scheme and propose new mechanism that can security this. Also, propose method that service provider can deliver securely contents to user and propose mechanism that improve that support ky recovery at encryption communication that using secret key that it was generated by key agreement between users.

The Study of User Resistance to Fintech Payment Service: In the Perspective of Innovation Diffusion And Status Quo Bias Theory (핀테크 지급결제 서비스 수용 저항요인 연구 : 혁신저항이론과 현상유지편향이론을 중심으로)

  • Hwang, Sin-Hae;Kim, Jeoung-Kun
    • The Journal of Information Systems
    • /
    • v.27 no.1
    • /
    • pp.133-151
    • /
    • 2018
  • Purpose Global fintech industry is proliferating. Although domestic investment in fintech service is also increasing fast, user acceptance of fintech payment service seems slower than expected. Previous fintech literature mainly focuses on overall characteristics and technical aspects of fintech including security issues and explores factors affecting the service adoption. This study aims to examine crucial factors affecting user's resistance intention to fintech payment service adoption. The research model was formulated based on innovation diffusion theory and status quo bias theory and validated empirically. Design/methodology/approach The proposed research model was empirically validated with 149 responses from college students who have used fintech payment service. The component-based SEM was employed for data analysis. Findings The significant findings are as follow. First, compatibility has significant negative effect and complexity, and perceived risk has a positive effect on user resistance. Second, institutional trust does not show a significant effect on user resistance but has an indirect effect through the mediation of trust in service provider. Finally, trust in service provider shows the significant negative effect on user resistance.

The design and implementation of Service architecture for USN application service (USN 응용 서비스를 위한 서비스 아키텍처의 설계 및 구현)

  • Shin, Geuk-Jae;Kim, Yong-Woon;Yoo, Sang-Keun;Kim, Hyung-Jun;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.4
    • /
    • pp.1015-1022
    • /
    • 2010
  • USN(Ubiquitous Sensor Network) environment that provides the service measured from sensors in real-time the information is delivered to application service. However, domestic service, application service provider environment between providers and users, most of the research are on the service platform architecture, and process the information detected by sensors between the providers of standard services platform architecture, which is a very weak level. In this paper, we proposed new service architecture though analysis of the OGC SWE(Sensor Web Enablement) with standards and research analysis of domestic standards. And we designed and implemented to each component of provider side.

Application of the AHP for Evaluating Third-Party Logistics Service Quality: Shipper's Perspective (제3자물류 서비스 품질 평가를 위한 AHP의 적용에 관한 연구: 화주기업의 관점에서)

  • So, Soon-Hoo
    • Journal of Korea Port Economic Association
    • /
    • v.21 no.3
    • /
    • pp.259-270
    • /
    • 2005
  • This study applies the Analytic Hierarchy Process (AHP) to evaluate service quality of Third-Party Logistics (3PL) providers. For this, 3PL service quality is conceptualized and measured using SERVQUAL's five dimensions such as tangibles, reliability, responsiveness, assurance and empathy. Then, the AHP method is applied to determining the relative importance of five service quality dimensions and eventually selecting the best 3PL provider. Finally, this study conducts an empirical case study on four companies providing 3PL services in Korea to demonstrate the basic idea suggested in this paper. The results obtained in the present study indicate that responsiveness to customers is the most important factor perceived by 3PL customers and 3PL C is the best 3PL provider according to the overall service quality scores. In contrast to some previous researches, this study examined issues of service quality from the perspective of 3PL customers as opposed to the perspective of 3PL providers. In order for this study to be more complete, future research is needed in establishing a set of metrics to quantify each dimension of 3PL service quality proposed.

  • PDF

Radio Resource Management using a Game Theoretic Approach Method in Heterogeneous Wireless Networks (이종 네트워크 환경에서 게임 이론적 접근방법을 이용한 무선 자원관리)

  • Kim, Nam-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.3
    • /
    • pp.2178-2184
    • /
    • 2015
  • With the development of wireless network technologies, mobile users may use various networks easily and expect more advanced services. On the other hand, it may bring on some problems with network resource management that should lead the service provider to improve the current service quality and manage the network resource efficiently. This paper proposes the optimized radio resource management (RRM) scheme that integrates the Grey Relational Analysis (GRA) and game theory. The first applies the GRA to determine the Grey Relation Coefficient (GRC) factors that represent the network preference, and the network provider then selects the requested service that provide maximum payoff through Nash Equilibrium. Six requested services that have one application service among four different types of service classes were considered and the game was played repeatedly. In WiMAX, WLAN 1 and WLAN 2 game, the maximum payoff of each players was 93, 90.6 and 92.8 respectively. The experimental results show that every requested service can be selected by the network provider. Consequently, the proposed radio resource management mechanism is more effective in heterogeneous wireless networks.

Study on Privacy in the IPTV Broadcasting Service (IPTV 방송서비스에서의 개인정보보호에 관한 연구)

  • Lee, Jinhyuk;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.3
    • /
    • pp.701-712
    • /
    • 2016
  • The number of subscriber of digital pay TV service such as Digital Cable TV and IPTV is increasing from various kind of service provider world widely. These services require personal information of users to provide VOD(Video on Demand) and customized contents. Therefore, massive amount of personal information collected by service provider can cause social confusion such as leakage of privacy and property damage. This paper investigates whether broadcasting stations are providing enough notification for privacy policy and methodology of collecting private information in proper way. Furthermore, we analyze actual network traffic of IPTV service between user and service provider to suggest solution of privacy protection along with current status analysis.

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks (모바일 네트워크에서 인터넷 응용을 위한 향상된 ID관리 프로토콜)

  • Park, In-Shin;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.

Mobile Payment Use in Light of Privacy Protection and Provider's Market Control

  • Mohammad Bakhsh;Hyein Jeong;Lingyu Zhao;One-Ki Daniel Lee
    • Asia pacific journal of information systems
    • /
    • v.31 no.3
    • /
    • pp.257-276
    • /
    • 2021
  • This study investigates the factors that facilitate or hinder people to use mobile payment, especially drawing upon the theoretical perspectives on individual's privacy protection motivation and perceived market condition. Survey data (n = 200) were collected through a web-based platform and used to test a theoretical model. The results show that one's privacy protection power is formed by various individual and technological factors (i.e., perceived data exposure, self-efficacy, and response efficacy), and in turn it determines his/her intention to use mobile payment. Moreover, the relationship between privacy protection power and mobile payment use is conditional on the perceived market control by the service provider - with a perception of the high level of provider's market control, one uses mobile payment regardless of his/her privacy protection power, while under the low level of provider's market control, the decision depends on the degree of privacy protection power. The findings would help our understanding of why some people are more susceptible to mobile payment and others are not.

Recommendation Method of SNS Following to Category Classification of Image and Text Information (이미지와 텍스트 정보의 카테고리 분류에 의한 SNS 팔로잉 추천 방법)

  • Hong, Taek Eun;Shin, Ju Hyun
    • Smart Media Journal
    • /
    • v.5 no.3
    • /
    • pp.54-61
    • /
    • 2016
  • According to many smart devices are development, SNS(Social Network Service) users are getting higher that is possible for real-time communicating, information sharing without limitations in distance and space. Nowadays, SNS users that based on communication and relationships, are getting uses SNS for information sharing. In this paper, we used the SNS posts for users to extract the category and information provider, how to following of recommend method. Particularly, this paper focuses on classifying the words in the text of the posts and measures the frequency using Inception-v3 model, which is one of the machine learning technique -CNN(Convolutional Neural Network) we classified image word. By classifying the category of a word in a text and image, that based on DMOZ to build the information provider DB. Comparing user categories classified in categories and posts from information provider DB. If the category is matched by measuring the degree of similarity to the information providers is classified in the category, we suggest that how to recommend method of the most similar information providers account.