Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
Journal of Internet Computing and Services
Journal Basic Information
Journal DOI :
Korean Society for Internet Information
Editor in Chief :
Volume & Issues
Volume 13, Issue 6 - Dec 2012
Volume 13, Issue 5 - Oct 2012
Volume 13, Issue 4 - Aug 2012
Volume 13, Issue 3 - Jun 2012
Volume 13, Issue 2 - Apr 2012
Volume 13, Issue 1 - Feb 2012
Selecting the target year
Comparison of Initial Seeds Methods for K-Means Clustering
Lee, Shinwon ;
Journal of Internet Computing and Services, volume 13, issue 6, 2012, Pages 1~8
DOI : 10.7472/jksii.2012.13.6.1
Clustering method is divided into hierarchical clustering, partitioning clustering, and more. K-Means algorithm is one of partitioning clustering and is adequate to cluster so many documents rapidly and easily. It has disadvantage that the random initial centers cause different result. So, the better choice is to place them as far away as possible from each other. We propose a new method of selecting initial centers in K-Means clustering. This method uses triangle height for initial centers of clusters. After that, the centers are distributed evenly and that result is more accurate than initial cluster centers selected random. It is time-consuming, but can reduce total clustering time by minimizing the number of allocation and recalculation. We can reduce the time spent on total clustering. Compared with the standard algorithm, average consuming time is reduced 38.4%.
Comparative analysis on Social Network Service users access : Based on Twitter, Facebook, KakaoStory
Hong, Sam-Yull ; Oh, Jae-Cheol ;
Journal of Internet Computing and Services, volume 13, issue 6, 2012, Pages 9~16
DOI : 10.7472/jksii.2012.13.6.9
Social Network Service (SNS) such as Twitter and Facebook has explosively grown nationwide since iPhone was introduced to Korea in 2009. In addition, KakaoStory has recently opened and joined to the SNS market, and it has grown to one of the most popular SNS in the domestic market in a short period of time. Social Network Service supports not only the formation of relationship between SNS users in common interests but also various activities such as management of personal connections and the sharing of information or contents. These three types of SNS have several common functions of sharing and distributing various contents rooted on the personal relationship formed through SNS. As each SNS user has specific reasons for the use of each service, a survey was conducted targeting those who use all of Twitter, Facebook, and KakaoStory was drawn by the statistical analyses of survey answers on users' reasons for each service. This result of study suggests factors to consider in order to exploit a new SNS or to enhance an existing service and can be used as a standard of which SNS for users to select for their own different purposes. It will also provide the basic data for the trust formation, one of the ethics in the upcoming Social Era.
The Effect of Personal Communication Activities using Smart Phone Instant Messenger on Job Performance
Lee, Jong Man ;
Journal of Internet Computing and Services, volume 13, issue 6, 2012, Pages 17~24
DOI : 10.7472/jksii.2012.13.6.17
The purpose of this study is to test the effect of personal communication activities using smart phone instant messenger during normal office hours on job performance in the workplace. To do this, empirical data were collected by conducting a field survey of smart phone users, and structural equation model was used for the purpose of analyzing the data acquired by the survey. A structural equation model was designed and constructed by such factors like personal instant messaging with the outside friends and co-workers on job performance. In addition, task characteristics set as a moderating effect between personal instant messaging with the outside friends/co-workers and job performance. The results of the analysis are summarized as follows; First, personal instant messaging with the outside friends generally has a negative effect on job performance, in addition in high task interdependence area the former has more effect on the latter. Second, personal instant messaging with co-workers has a positive effect on job performance.
Studying a Regulation for Real-time Broadcasting Services in Smartphone - the Case of CJ's Tving Service
Lee, Chi Hyung ; Park, Seong Won ;
Journal of Internet Computing and Services, volume 13, issue 6, 2012, Pages 25~32
DOI : 10.7472/jksii.2012.13.6.25
There is a growing controversy on whether and how to regulate real-time broadcasting services carried on smartphone. Some advocates strict regulation on them but the others minimal regulation. This study aims to suggest guiding rules for how to regulate broadcasting services in smartphone. For this, the study interviewed fourteen (14) executives of broadcasting companies, content providers, policy research center and regulatory body. The analysis indicates that linear channel service in smartphone is similar in form to traditional broadcasting but they should not be regulated at this moment. The supporting reasons are 1) regulating them is technically not effective, 2) they were already regulated in their primary service platforms, 3) they don't have a significant impact on a society. Consequently, the study suggests that the service providers are categorized as value added common carriers as defined in the Telecommunication Business Act.
The Important Factors in Security for Introducing the Cloud Services
Yoon, Young Bae ; Oh, Junseok ; Lee, Bong Gyou ;
Journal of Internet Computing and Services, volume 13, issue 6, 2012, Pages 33~40
DOI : 10.7472/jksii.2012.13.6.33
The cloud service has become the significant factor to save the IT operation cost and to improve the productivities in companies. It was introduced to Korea for enterprise services of major companies in 2008. As the increase of recognition for its effect, more small businesses and public institutions plan to introduce the cloud computing services. The cloud computing researches have only focused on the security threats and response technologies to them. Therefore, this research analyzed the importances of responses to security threats in specific domains. The domains were divided into managerial, physical, and technical security. The specific factors in three domains were used for the analysis in this research as well. The ordered logit model was used for the analysis and the analysis results showed that physical security and managerial security are considered to be significantly important in the cloud computing security. The results also presented that the security policy, the control and surveillance to service infrastructure, and application security are highly important in the respect of specific factors. This research will contribute to enterprises or institutions in Korea, which want to introduce the cloud computing services, by aiding the establishment of effective security strategies.
An Analysis of the Status of OER(Open Educational Resources) Usage in Asia
Lee, Eunjung ; Kim, Yong ;
Journal of Internet Computing and Services, volume 13, issue 6, 2012, Pages 41~53
DOI : 10.7472/jksii.2012.13.6.41
Open educational resources(OER) enable the spread of mutual information exchange and provide advantages to both their users and institutions, such as reducing costs, improving content quality, and establishing relationships. The recent research on OER was about their connection to formal education, copyright trends, and corporate e-learning. There have been very few studies, however, on the utilization of OER and on the problems related to their practical use. Thus, this study was conducted for the purposes of analyzing the status of OER usage in education-related institutions and of providing suggestions for institution operation based on the analysis results, to promote the use of OER. A survey was conducted among more than 200 institutions in Asia, and the survey results showed that 'images and visual materials' are the most commonly used materials in Asia, and that the factors barring OER usage in the said region are 'lack of awareness', 'lack of skills', 'the absence of a reward system', and poor cooperation in participation. To promote OER usage, each institution should provide training courses about awareness, utilization skills, and copyrights. There is also a need to provide support for the establishment of reward systems and environments for OER usage. Finally, more active participation is required for inter-agency cooperation in OER sharing.
OAuth based Proxy Delegation Service
Heo, Daeyoung ; Hwang, Suntae ;
Journal of Internet Computing and Services, volume 13, issue 6, 2012, Pages 55~62
DOI : 10.7472/jksii.2012.13.6.55
Grid web applications by standard Web technology are increasingly used to provide grid service to users as normal Web user interface and service. It is however difficult to integrate a grid security system such as Grid Security Infrastructure (GSI) into Web applications because the delegation way of standard Web security is not the same as the one of Grid security. This can be solved by allowing Web applications to get a Grid credential by using an online credential repository system such as MyProxy. In this paper, we investigate the problem that occurs when MyProxy, which assumes mutual trust between a user and Grid web application, is adapted for achieving security integration between Web and Grid, and we propose a new Grid proxy delegation service to delegate a Grid credential to the Web without assuming mutual trust. In the service, the X.509 proxy delegation process is added to OAuth protocol for credential exchange, and authentication can be done by an external service such as OpenID. So, users can login onto the Grid web application in a single sign-on manner, and are allowed to securely delegate and retrieve multiple credentials for one or more Virtual Organizations.
Dynamic Reconfigurable Integrated Management and Monitoring System for Heterogeneous Distributed Environments
Min, Bup-Ki ; Seo, Yongjin ; Kim, Hyeon Soo ; Kuk, Seunghak ; Jung, Yonghwan ; Kim, Chumsu ;
Journal of Internet Computing and Services, volume 13, issue 6, 2012, Pages 63~74
DOI : 10.7472/jksii.2012.13.6.63
In this paper, we develop an integrated management/monitoring system that supports to dynamically reconfigure information models for systems or applications managed by heterogeneous distributed systems. When the subsystems on diverse platforms are added, removed, or modified, the altered configurations should conform to the configuration information of the integrated management/monitoring system. Further, upon the system configurations being changed, the altered system configurations should be synchronized with the information on the integrated management/monitoring system. Moreover, availability should be assured during synchronization to the extent that users can access the monitoring information with no system halting. This paper focuses on notifying the integrated management/monitoring system of any changes in hardware/software configurations on any subsystems under its management, and on dynamically re-configuring the information about hardware and software being managed based on the information notified. Finally, we expect that this research will be contributory to carrying out reliable integrated management by reflecting the information on any heterogeneous distributed systems in the integrated management/monitoring system.