• Title/Summary/Keyword: smartphone application services

Search Result 150, Processing Time 0.024 seconds

A Study on the Strategies for Promoting Spatial Information Service for Mobile Environment (모바일 공간정보서비스 활용 활성화 방안 연구)

  • Hwang, Jung-Rae;Kim, Tae-Hoon;Choi, Hyun-Sang
    • Spatial Information Research
    • /
    • v.20 no.4
    • /
    • pp.57-67
    • /
    • 2012
  • Recently, market of mobile spatial information service is increasing along with enlargement of geo-spatial information utilization area and spread of smartphone. In particular, smartphone users look forward to utilizing spatial information service more easily and conveniently. Korea has the potential for spatial information technology development, but does not have enough governmental support to develop various spatial information service in mobile network environment. Hence, it is need to make governmental support plans for utilizing mobile services and promoting the related industry base on mobile spatial information. In this paper, we propose governmental action plans for utilizing mobile services and promoting the related industry by surveying mobile application/web services and analyzing demands of mobile spatial information experts.

The Researches in the Present State of Applying Smart Device in Vehicle and Implementing Bi-Directional Mirroring Services (Smart Device 차량 도입 현황 및 양방향 Mirroring 구현에 관한 연구)

  • Park, Hwa-Beom;Lee, Jean;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.127-130
    • /
    • 2017
  • The information and communication technology that is being developed recently has been greatly influencing the automobile market. In recent years, devices equipped with IT technology have been installed for the safety and convenience of the driver. It is necessary to develop a system that can link the Smartphone with the vehicle in accordance with these changes. In this paper, first of all we analyze the car connectivity services that served by the other competitors. In addition, we proposed and implemented the improved system that can support and control most of smart device application in vehicle by user's NEEDS. We also implemented the application that can restrict the applications which unsatisfied the drive regulations and designed and proposed the scenario that can apply our company's car connectivity system in future.

  • PDF

Factors Associated with Dependence among Smartphone-Dependent Adults in Their 20s (스마트폰에 의존하는 20대 성인의 의존 관련 요인)

  • Park, Jeong-Hye
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.6
    • /
    • pp.366-373
    • /
    • 2020
  • This study explored the factors associated with dependence among smartphone-dependent adults in their 20s. The data was derived from the 2017 survey on smartphone over-dependence conducted by the Ministry of Science and ICT and the National Information Society Agency. The participants were 879 adults in their 20s. The data was analyzed by frequencies, percentages, means, standard deviations, independent t-tests, Pearson's correlation coefficients, and multiple regression analysis. The results revealed instant messengers as the most used application by participants. Participants in the high risk category of dependence also used SNS (Social Networking Services), music, and games more than those in the potential risk category. The more serious the dependence, the greater the frequency of smartphone use (β=.16, p=.000), and use of games (β=.10, p=.028), webtoons (β=.14, p=.004), SNS (β=.09, p=.047), and financial transactions (β=.17, p=.000). They did not recognize their smartphone dependence when it was relatively low. However, when this became serious, they then realized that they depended on the smartphone more than others. That means that it is not easy for adults to recognize their smartphone dependence on their own. However, recognition of the problem is the first step for adults to solve their problems. A program that evaluates their problematic smartphone use should be installed and used on all smartphones.

Jxta-based SmartPhone Collaboration Application Supporting Group Workspace (Jxta 기반의 그룹 작업공간을 지원하는 스마트폰 협업 어플리케이션)

  • Park, Jong-Eun;Lee, Hong-Chang;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.3
    • /
    • pp.511-521
    • /
    • 2012
  • JXTA technology is a set of open protocols that enable any connected device on the internet or MANET(Mobile Adhoc NETwork) to communicate in a P2P manner. In this paper, we present a JXTA-based smartphone collaborative application. For this, we define the core services and collaborative services necessary for a P2P network, and design proper protocols to support the services. The developed application provides the effective environment for group works in smartphones, supporting the various virtual workspaces. Since application supports the group works among users in close-range without relying on the mobile network, it could be very useful in various situations such as the disaster area.

Authentication Algorithm using Random Graphic Code (무작위적인 그래픽 코드를 이용한 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.63-69
    • /
    • 2019
  • Using a smartphone allows quick and easy authentication and payment. However, smartphone security threats are evolving into a variety of new hacking technologies, and are changing to attacks specific to the mobile environment. Therefore, there is a demand for an authentication method suitable for a mobile environment. In order to solve security weaknesses in knowledge-based authentication, many companies provide two-step authentication services such as OTP(One Time Password) to provide authentication services such as finance, games, and login. Although OTP service is easy to use, it is easy to duplicate random number table and has a disadvantage that can be reused because it is used as valid value within time limit. In this paper, we propose a mechanism that enables users to quickly and easily authenticate with high security using the authentication method that recognizes special characters through smartphone's dedicated application.

Identification of Counterfeit Android Malware Apps using Hyperledger Fabric Blockchain (블록체인을 이용한 위변조 안드로이드 악성 앱 판별)

  • Hwang, Sumin;Lee, Hyung-Woo
    • Journal of Internet Computing and Services
    • /
    • v.20 no.2
    • /
    • pp.61-68
    • /
    • 2019
  • Although the number of smartphone users is continuously increasing due to the advantage of being able to easily use most of the Internet services, the number of counterfeit applications is rapidly increasing and personal information stored in the smartphone is leaked to the outside. Because Android app was developed with Java language, it is relatively easy to create counterfeit apps if attacker performs the de-compilation process to reverse app by abusing the repackaging vulnerability. Although an obfuscation technique can be applied to prevent this, but most mobile apps are not adopted. Therefore, it is fundamentally impossible to block repackaging attacks on Android mobile apps. In addition, personal information stored in the smartphone is leaked outside because it does not provide a forgery self-verification procedure on installing an app in smartphone. In order to solve this problem, blockchain is used to implement a process of certificated application registration and a fake app identification and detection mechanism is proposed on Hyperledger Fabric framework.

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

A Step towards User Privacy while Using Location-Based Services

  • Abbas, Fizza;Oh, Heekuck
    • Journal of Information Processing Systems
    • /
    • v.10 no.4
    • /
    • pp.618-627
    • /
    • 2014
  • Nowadays mobile users are using a popular service called Location-Based Services (LBS). LBS is very helpful for a mobile user in finding various Point of Interests (POIs) in their vicinity. To get these services, users must provide their personal information, such as user identity or current location, which severely risks the location privacy of the user. Many researchers are developing schemes that enable a user to use these LBS services anonymously, but these approaches have some limitations (i.e., either the privacy prevention mechanism is weak or the cost of the solution is too much). As such, we are presenting a robust scheme for mobile users that allows them to use LBS anonymously. Our scheme involves a client side application that interacts with an untrusted LBS server to find the nearest POI for a service required by a user. The scheme is not only efficient in its approach, but is also very practical with respect to the computations that are done on a client's resource constrained device. With our scheme, not only can a client anonymously use LBS without any use of a trusted third party, but also a server's database is completely secure from the client. We performed experiments by developing and testing an Android-based client side smartphone application to support our argument.

Development of a WebDAV-based Smartphone Collaborative Application (웹데브 기반의 스마트폰 협업 어플리케이션 개발)

  • Lee, Hong-Chang;Kim, Bo-Hyeon;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.3
    • /
    • pp.680-690
    • /
    • 2011
  • To support asynchronous collaboration among remote users, collaborative applications provide collaboration services and environment through virtual workspaces. In general, collaborative applications support collaboration based on desktop-based personal computers, using the features such as resource sharing or asynchronous communication among users. Unfortunately, since those applications mainly run on personal computers, they do not easily support collaborative works in various places. In this paper, we describe the development of smartphone collaborative application which provides effective collaboration facilities like resource sharing through various types of workspaces or group communication, communicating with a WebDAV-based collaboration server. The developed application provides users with high accessibility through multi-touch/touch-slide based user-interfaces in mobile environment. To support effective communication with a collaboration server, we also present a WebDAV-based collaboration library using a collaboration protocol designed to analyze easily the responses from the collaboration server.

Development of a Blocks Recognition Application for Children's Education using a Smartphone Camera (스마트폰 카메라 기반 아동 교육용 산수 블록 인식 애플리케이션 개발)

  • Park, Sang-A;Oh, Ji-Won;Hong, In-Sik;Nam, Yunyoung
    • Journal of Internet Computing and Services
    • /
    • v.20 no.4
    • /
    • pp.29-38
    • /
    • 2019
  • Currently, information society is rapidly changing and demands innovation and creativity in various fields. Therefore, the importance of mathematics, which can be the basis of creativity and logic, is emphasized. The purpose of this paper is to develop a math education application that can further expand the logical thinking of mathematics and allow voluntary learning to occur through the use of readily available teaching aid for children to form motivation and interest in learning. This paper provides math education applications using a smartphone and blocks for children. The main function of the application is to shoot with the camera and show the calculated values. When a child uses a block to make a formula and shoots a block using a camera, you can directly see the calculated value of your formula. The preprocessing process, text extraction, and character recognition of the photographed images have been implemented using OpenCV libraries and Tesseract-OCR libraries.