• Title/Summary/Keyword: via internet

Search Result 1,301, Processing Time 0.026 seconds

Effect of Smart-Phone Use on Performance (스마트폰 사용이 성과에 미치는 영향)

  • Lee, Jong Man;Park, Jong Hak
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.2
    • /
    • pp.451-459
    • /
    • 2013
  • The purpose of this paper is to investigate the role of the internet based deviant behavior of smart phone during work hours on performance and the antecedents to deviant behavior mechanism. To do this, this paper proposes a theoretical model consisting of factors such as internet-based deviant behavior, work performance and intention, habit as it's influencing factors. It was analyzed via a survey of employees using smart phone at workplace. The results of this empirical study is summarized as followings. First, internet-based deviant behavior using smart phone has a negative effect on work performance. Second, intention and habit toward internet-based deviant behavior using smart phone are identified as the determinants of it's behavior. The findings have significant implications for the framework of internet-based deviant behavior using smart phone in the workplace.

Application of the Internet GIS on Rice Pest Information (인터넷 GIS를 이용한 벼 병해충 정보제공에 관한 연구)

  • 조정호;심정민;윤홍식
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.17 no.4
    • /
    • pp.383-391
    • /
    • 1999
  • This paper describe the interpretation of population density of rice pest in 1998 all over the country using GIS technique and the development of Internet GIS for sharing and analyzing information through Internee. Due to the widespread availability of computer network, GIS solution is available to users on your Internet via the web. Through Internet Rice Pest Information System developed visually the related information of rice pest all over the country and also interactive communication with the web interface concerning the existing system which provides simply static map, texts and numerical statement on the internet, the advantages of developed system are visually information, dynamic map, easy user interface and interactive map through the internet. This system provide more effective method of rice pest data to client.

  • PDF

Responsibility for Dissemination of Inaccurate Information on the Internet

  • Romanova, Vera;Nikitin, Yurii;Vozniuk, Natalia;Sverdlyk, Zoriana;Boichuk, Nelia;Kunderevych, Olena
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.137-140
    • /
    • 2021
  • The article is devoted to the study of the issue of liability for the dissemination of inaccurate information on the Internet. The article emphasizes that now the public opinion of socially active segments of the population is mainly formed on the basis of not critical but subjective ("consumer") analysis of the received information. The modern realities show that the main source of its origin is the Internet: electronic media and, above all, the relevant social networks. The problem of dissemination by the mass media of inaccurate information obtained via the Internet is solved; it is seen in bringing the laws of Ukraine, which regulate public relations regarding the dissemination of information, into compliance with the Civil Code of Ukraine. The issues of development and implementation of new legislative acts aimed at regulating the status of subjects of informational relations on the Internet and establishing the grounds for their liability are also investigated.

An Application of TAM and TRI on the Factors Affecting Internet Banking Adoption in Bangladesh

  • AMIN, Md. Iftekharul;ERFAN, Nafis;NAVID, Mashrur;KHAN, Mohammed Shafiul Alam;ISLAM, Md. Shariful
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.9
    • /
    • pp.75-91
    • /
    • 2022
  • This study assesses the Internet banking adoption tendency by existing bank customers of Bangladesh. Currently, almost all the leading banks in the country have implemented Internet banking platforms. However, the active user count remains relatively low and there hasn't been any conclusive research on the drivers and inhibitors of Internet banking. This study evaluates the reasons and quantitatively establishes the factors leading to the adoption and usage continuance of internet banking by existing bank customers. Responses from 460 bank account holders were collected via online questionnaires using a purposive sampling approach, and a core conceptual framework based on Technology Acceptance Model (TAM) and Technology Readiness Index (TRI) was used. The study concluded that internet banking adoption is significantly impacted by the ease of use, customer service, and technology familiarity. Similarly, customer satisfaction is affected by the perceived value and the perceived risk. Through regression analysis, it was found that usage continuance is 89% explained by adoption and customer satisfaction. Multi-group moderation showed significant impact by groups divided based on usage frequency, income level, and age. Perceived risk weakened the impact of perceived value and technology familiarity on usage adoption. Additionally, perceived risk reduced the impact of consumer satisfaction and usage continuance.

Study on Automatic Human Body Temperature Measurement System Based on Internet of Things

  • Quoc Cuong Nguyen;Quoc Huy Nguyen;Jaesang Cha
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.50-58
    • /
    • 2024
  • Body temperature plays an important role in medicine, some diseases are characterized by changes in human body temperature. Monitoring body temperature also allows doctors to monitor the effectiveness of medical treatments. Accurate body temperature measurement is key to detecting fevers, especially fevers related to infection with the SARS-CoV-2 virus that caused the recent Covid-19 pandemic in the world. The solution of measuring body temperature using a thermal camera is fast but has a high cost and is not suitable for some organizations with difficult economic conditions today. Use a medical thermometer to measure body temperature directly for a slow rate, making it easier to spread disease from person to person. In this paper, we propose a completely automatic body temperature measurement system that can adjust the height according to the person taking the measurement, has a measurement logging system and is monitored via the internet. Experimental results show that the proposed method has successfully created a fully automatic human body measurement system. Furthermore, this research also helps the school's scientists and students gain more knowledge and experience to apply Internet of Things technology in real life.

Handling Of Sensitive Data With The Use Of 3G In Vehicular Ad-Hoc Networks

  • Mallick, Manish;Shakya, Subarna;Shrestha, Surendra;Shrestha, Bhanu;Cho, Seongsoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.49-54
    • /
    • 2016
  • Data delivery is very challenging in VANETs because of its unique characteristics, such as fast topology change, frequent disruptions, and rare contact opportunities. This paper tries to explore the scope of 3G-assisted data delivery in a VANET within a budget constraint of 3G traffic. It is started from the simple S_Random (Srand) and finally reached the 3GSDD, i.e., the proposed algorithm. The performance evaluation of different algorithms is done through the two metrics delivery ratio and average delay. A third function utility is created to reflect the above two metrics and is used to find out the best algorithm. A packet can either be delivered via multihop transmissions in the VANET or via 3G. The main challenge is to decide which set of packets should be selected for 3G transmissions and when to deliver them via 3G. The aim is to select and send those packets through 3G that are most sensitive and requiring immediate attention. Through appropriate communication mechanism, these sensitive information are delivered via VANET for 3G transmissions. This way the sensitive information which could not be transmitted through normal VANET will certainly find its destination through 3G transmission unconditionally and with top priority. The delivery ratio of the packets can also be maximized by this system.

Network analysis of issue diffusion on the sanitary pad cancer-causing agent via Twitter and Youtube (트위터와 유튜브를 통해 확산된 생리대 발암물질 이슈에 대한 네트워크 분석)

  • Hong, Juhyun
    • Journal of Internet Computing and Services
    • /
    • v.19 no.4
    • /
    • pp.15-26
    • /
    • 2018
  • This study focused on the difference of the volume of sanitory pad issue and The aim of this study is to explore the relationship between the characteristics of SNS and the diffusion of issue in the process of crisis issue. SNS is categorized into communication diffusion, communication restriction,, diffusion, restriction base on the media interactivity and the user interactivity, In case of Twitter, media interactivity is low and user interactivity is low. In case of Youtube, media interactivity and user interactivity are all high. Crisiss issue is interactively diffused via Youtube compared to via Twitter. There was a negative public opinion in social media even if the government and the manufacturer said that there was no harm in the sanitary goods. In conclusion, this study highlights the importance of social media environment in the diffusion of information. The government prepared for the use of SNS in crisis because there was a negative opinion on the government and the manufacturer via SNS.

Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity

  • Hamarsheh, Ala;Goossens, Marnix;Alasem, Rafe
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.7
    • /
    • pp.1230-1251
    • /
    • 2011
  • This document specifies a new IPv6 deployment protocol called CHANC, which stands for Configuring Hosts to Auto-detect (IPv6, IPv6-in-IPv4, or IPv4) Network Connectivity. The main part is an application level tunneling protocol that allows Internet Service Providers (ISPs) to rapidly start deploying IPv6 service to their subscribers whom connected to the Internet via IPv4-only access networks. It carries IPv6 packets over HTTP protocol to be transmitted across IPv4-only network infrastructure. The key aspects of this protocol are: offers IPv6 connectivity via IPv4-only access networks, stateless operation, economical solution, assures most firewall traversal, and requires simple installation and automatic configuration at customers' hosts. All data packets and routing information of the IPv6 protocol will be carried over the IPv4 network infrastructure. A simple application and a pseudo network driver must be installed at the end-user's hosts to make them able to work with this protocol. Such hosts will be able to auto-detect the ISP available connectivity in the following precedence: native IPv6, IPv6-in-IPv4, or no IPv6 connectivity. Because the protocol does not require changing or upgrading customer edges, a minimal cost in the deployment to IPv6 service should be expected. The simulation analysis showed that the performance of CHANC is pretty near to those of native IPv6, 6rd, and IPv4 protocols. Also, the performance of CHANC is much better than that of D6across4 protocol.

Bandwidth Dimensioning for High-Speed Internet Access Networks (초고속인터넷 가입자망의 대역설계)

  • Lee, Tae-Joon;Lee, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12B
    • /
    • pp.1017-1027
    • /
    • 2006
  • Recently, Internet service providers are offering triple play service which combines voice and video services with the existing high speed Internet service under the common network infrastructure of IP protocol, so that they can create more benefit from operating a single network architecture. In line with this movement in the convergence of network and services, in this work we propose a bandwidth dimensioning method for the subscriber network of the IP network at flow level. To that purpose, let us propose a series of bandwidth dimensioning methods: bandwidth for best effort service only, bandwidth dimensioning for premium services, and bandwidth dimensioning schemes for the premium Internet services as well as the best effort service which comprise the TPS. Our link dimensioning method is based on the flow level that incorporates the flow blocking probability as a measure of grade of services(GoS), and investigates the characteristics of the proposed methods via extensive numerical experiments. After that, let us carry out a simulation experiment concerning the delay and loss performance of the packet scheduling for the premium services (QoS) using the bandwidth designed by our proposed method, via which the packet level quality of service (QoS) for the proposed link dimensioning method can be observed.

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks (모바일 네트워크에서 인터넷 응용을 위한 향상된 ID관리 프로토콜)

  • Park, In-Shin;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.