• Title/Summary/Keyword: social computing service

Search Result 125, Processing Time 0.024 seconds

Relationship between SOA Adoption and Performance of IT Organizations

  • Niknejad, Naghmeh;Ghani, Imran;Hussin, Ab Razak Che;Jeong, Seung Ryul
    • Journal of Internet Computing and Services
    • /
    • v.17 no.4
    • /
    • pp.173-180
    • /
    • 2016
  • SOA has been adopted by enormous number of organizations world-wide. This study has investigated significant factors which affect SOA adoption in positive and negative manner. Unlike the previous similar studies, where they focused on qualitative analysis for SOA adoption, this study conducted a quantitative analysis to investigate the relationship between the adoption of SOA and the performance of IT organizations. In order to conduct the research, an online questionnaire was created and distributed among SOA experts through the social networking platform of professionals, LinkedIn. Total one hundred and four (104) respondents from thirty (30) different countries participated in this study. The results of this study indicate that there are both positive and negative influences upon SOA adoption. The positive influences includes: governance, strategy, culture and communication, business and IT alignment and ROI; whereas complexity, security concerns, and costs have negatively affected SOA adoption.

The Development of Cloud Computing-Based Integrated EHS Management System for the Construction Companies (클라우드 컴퓨팅 기반 건설사용 EHS 통합관리시스템 개발)

  • Seo, Kwang-Kyu
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.11b
    • /
    • pp.859-861
    • /
    • 2010
  • The construction companies are facing potential EHS(Environment, Health & Safety) of major accidents to cause casualties or a financial loss and increasing social responsibility. So, they have to voluntarily accomplish the EHS management system rather than passively with regard to EHS regulation. In this study, the integrated EHS management system is developed based on cloud computing, and construction companies are to materialize self-regulation EHS process of construction workplace and to standardize the total EHS business process using the developed system. The proposed system also provides risk analysis, education/control and continuous improvement for EHS tasks and users can easily access the system on the web at a low price through cloud computing service. Eventually, the integrated system contributes to the managerial improvement by minimizing economic and physical loss caused by construction accidents.

  • PDF

Ubiquitous Computing & Network Security Analysis (유비쿼터스 컴퓨팅 & 트워크 보안분석)

  • 정상일;송원덕;이원찬;윤동식
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.35-42
    • /
    • 2004
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this situation we must analytics that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.struction.

  • PDF

A Study of the Ubiquitous Computing and Network Security (유비쿼터스 컴퓨팅 및 네트워크의 보안연구)

  • Lee, Dae-Sik;Yun, Dong-Sic
    • Convergence Security Journal
    • /
    • v.5 no.4
    • /
    • pp.59-65
    • /
    • 2005
  • Ubiquitous Computing is gradually accepting in our real society. Already some Advanced State has studying of Ubiquitous for more convenience Ubiquitous environment. Anywhere, Anytime user can be provided information and service that he want, but it has some problem such as Rogue AP, IP spoofing, DoS attack, Warm which can causing social confusion in Ubiquitous society. In this paper we must analysis that security requirement in the Ubiquitous network environment and investigate 'Ad hoc' and RFID which is main technique for network infra construction.

  • PDF

Android API anomaly Detection System Using One-class SVM algorithm (One-class SVM 알고리즘을 이용한 안드로이드 API의 이상치 탐지 시스템)

  • Ji-Eun LEE;Yu-Jun Choi;Yong-Tae Shin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.05a
    • /
    • pp.562-564
    • /
    • 2023
  • 스마트폰 발전으로 인한 SNS(Social Network Service), 웹 검색 및 활용 등 편리함과 유용성을 가져다 주었지만 안드로이드 APP의 개방성으로 인하여 프로그램의 원칙적 특성을 악용한 취약점이 발생하고 있다. 이를 대응하는 해결방안으로 API에 대한 요청 데이터를 모듈을 통하여 로그 값을 수집한다. 수집된 데이터는 로그 값을 시간을 기준으로 라벨링하여 이상치 탐지 알고리즘인 OCSVM의 이상치 평균으로 사용하여 실시간 데이터 영향을 받는 하이퍼파라미터 C 와 r 값을 Grid Search 기법을 통해 조정함으로써 최적의 파라미터 값을 찾는 시스템을 제안한다.

Analysis of multi-dimensional interaction among SNS users (Analysis of multi-dimensional interaction among SNS users)

  • Lee, Kyung-Min;Namgoong, Hyun;Kim, Eung-Hee;Lee, Kang-Yong;Kim, Hong-Gee
    • Journal of Internet Computing and Services
    • /
    • v.12 no.2
    • /
    • pp.113-122
    • /
    • 2011
  • Social Network Service(SNS) has become a hot trend as a web service which helps users construct social relationships in the web and enables online communication. The information about user activities and behaviors obtained from the SNSs is expected to be an useful knowledge source for other services such as recommendation services. Most of previous researches on SNS rely on analyzing overall network topology and surveying the activities in a one-dimensional aspect. This paper propose a system for measuring multi-dimensional interaction through the activities in a SNS. The proposed system delivers an unified profile (consisting of profile and multi-dimension interaction) model from user-activities in Twitter.com. At the experimental section, some meaningful perspectives on a set of the unified profiles are described.

Design and Analysis of Ubiquitous Social Network Management Service Model: u-Recruiting Service Model (유비쿼터스 사회연결망관리 서비스 모델 설계 및 분석: u-구인 구직 서비스 모델을 중심으로)

  • Oh, Jae-Suhp;Lee, Kyoung-Jun;Kim, Jae-Kyeong
    • Information Systems Review
    • /
    • v.13 no.1
    • /
    • pp.33-59
    • /
    • 2011
  • Although online social network services widely used in human networking and recruiting industries, it is showing off its limitations in followings-it's hard to reach the status of seamless connection between offline and online; the incompletion and low credibility of the information came from non-face-to-face profile exchange; and the restraint of user autonomy due to centralized control. This paper defines the ubiquitous social network management which enables the seamless real-time face-to-face social interactions of the users based on WPAN (Wireless Personal Area Network) who share the same interest in real word and deduces a ubiquitous social network management framework based on it. As an instance of ubiquitous social network management, u-Recruiting service model will be designed and analyzed. The Analysis using the business model will be followed by the possible scenario of service model. The role, value proposition and potential benefits of the each participants in this service model and will be given as well. In order to evaluate relative advantages of the model suggested by this study, 6 cases will be compared.

Towards efficient sharing of encrypted data in cloud-based mobile social network

  • Sun, Xin;Yao, Yiyang;Xia, Yingjie;Liu, Xuejiao;Chen, Jian;Wang, Zhiqiang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1892-1903
    • /
    • 2016
  • Mobile social network is becoming more and more popular with respect to the development and popularity of mobile devices and interpersonal sociality. As the amount of social data increases in a great deal and cloud computing techniques become developed, the architecture of mobile social network is evolved into cloud-based that mobile clients send data to the cloud and make data accessible from clients. The data in the cloud should be stored in a secure fashion to protect user privacy and restrict data sharing defined by users. Ciphertext-policy attribute-based encryption (CP-ABE) is currently considered to be a promising security solution for cloud-based mobile social network to encrypt the sensitive data. However, its ciphertext size and decryption time grow linearly with the attribute numbers in the access structure. In order to reduce the computing overhead held by the mobile devices, in this paper we propose a new Outsourcing decryption and Match-then-decrypt CP-ABE algorithm (OM-CP-ABE) which firstly outsources the computation-intensive bilinear pairing operations to a proxy, and secondly performs the decryption test on the attributes set matching access policy in ciphertexts. The experimental performance assessments show the security strength and efficiency of the proposed solution in terms of computation, communication, and storage. Also, our construction is proven to be replayable choosen-ciphertext attacks (RCCA) secure based on the decisional bilinear Diffie-Hellman (DBDH) assumption in the standard model.

Building Hierarchical Knowledge Base of Research Interests and Learning Topics for Social Computing Support (소셜 컴퓨팅을 위한 연구·학습 주제의 계층적 지식기반 구축)

  • Kim, Seonho;Kim, Kang-Hoe;Yeo, Woondong
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.489-498
    • /
    • 2012
  • This paper consists of two parts: In the first part, we describe our work to build hierarchical knowledge base of digital library patron's research interests and learning topics in various scholarly areas through analyzing well classified Electronic Theses and Dissertations (ETDs) of NDLTD Union catalog. Journal articles from ACM Transactions and conference web sites of computing areas also are added in the analysis to specialize computing fields. This hierarchical knowledge base would be a useful tool for many social computing and information service applications, such as personalization, recommender system, text mining, technology opportunity mining, information visualization, and so on. In the second part, we compare four grouping algorithms to select best one for our data mining researches by testing each one with the hierarchical knowledge base we described in the first part. From these two studies, we intent to show traditional verification methods for social community miming researches, based on interviewing and answering questionnaires, which are expensive, slow, and privacy threatening, can be replaced with systematic, consistent, fast, and privacy protecting methods by using our suggested hierarchical knowledge base.

Social Network Based Music Recommendation System (소셜네트워크 기반 음악 추천시스템)

  • Park, Taesoo;Jeong, Ok-Ran
    • Journal of Internet Computing and Services
    • /
    • v.16 no.6
    • /
    • pp.133-141
    • /
    • 2015
  • Mass multimedia contents are shared through various social media servies including social network service. As social network reveals user's current situation and interest, highly satisfactory personalized recommendation can be made when such features are applied to the recommendation system. In addition, classifying the music by emotion and using analyzed information about user's recent emotion or current situation by analyzing user's social network, it will be useful upon recommending music to the user. In this paper, we propose a music recommendation method that makes an emotion model to classify the music, classifies the music according to the emotion model, and extracts user's current emotional state represented on the social network to recommend music, and evaluates the validity of our method through experiments.