• Title/Summary/Keyword: 기업데이터 분석

Search Result 2,116, Processing Time 0.039 seconds

Effects of Depression and Self-Esteem on Life Satisfaction of the Elderly: Comparison between Elderly People Who Live Alone and Those Who Live with Others (노인의 우울감과 자아존중감이 생활만족도에 미치는 영향: 독거노인과 비독거노인의 비교를 중심으로)

  • Choi, Jung-Hyun;Choi, So-Yun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.12
    • /
    • pp.49-58
    • /
    • 2021
  • This study examined the effects of antecedent variables on life satisfaction of elderly people who live alone and who live with others by comparing the levels of depression, self-esteem, and life satisfaction. Using the 15th data of the Korean Welfare Panel held in 2020, independent sample t-test and hierarchical regression analysis were conducted. Elderly people who live alone had a high sense of depression, low self-esteem, and low life satisfaction. For both of them, the older the age and the higher the income level, the higher the life satisfaction. The regression model, which added depression and self-esteem, had a significant effect on both of them, but the effect of self-esteem was higher (𝛽=.40, .41) than that of depression (𝛽=-.28, -.29). The effects of depression and self-esteem on life satisfaction were higher in elderly people who live alone (R2=.409) than in elderly people who live with others (R2=.398). Based on the research results, this study suggested appropriate policies and practice directions to enhance self-esteem and improve life satisfaction of elderly people who live alone.

A Study on the Detection Model of Illegal Access to Large-scale Service Networks using Netflow (Netflow를 활용한 대규모 서비스망 불법 접속 추적 모델 연구)

  • Lee, Taek-Hyun;Park, WonHyung;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.21 no.2
    • /
    • pp.11-18
    • /
    • 2021
  • To protect tangible and intangible assets, most of the companies are conducting information protection monitoring by using various security equipment in the IT service network. As the security equipment that needs to be protected increases in the process of upgrading and expanding the service network, it is difficult to monitor the possible exposure to the attack for the entire service network. As a countermeasure to this, various studies have been conducted to detect external attacks and illegal communication of equipment, but studies on effective monitoring of the open service ports and construction of illegal communication monitoring system for large-scale service networks are insufficient. In this study, we propose a framework that can monitor information leakage and illegal communication attempts in a wide range of service networks without large-scale investment by analyzing 'Netflow statistical information' of backbone network equipment, which is the gateway to the entire data flow of the IT service network. By using machine learning algorithms to the Netfllow data, we could obtain the high classification accuracy of 94% in identifying whether the Telnet service port of operating equipment is open or not, and we could track the illegal communication of the damaged equipment by using the illegal communication history of the damaged equipment.

A Study on SNS Records Management (기록관리 대상으로서 SNS 연구)

  • Song, Zoo-Hyung
    • The Korean Journal of Archival Studies
    • /
    • no.39
    • /
    • pp.101-138
    • /
    • 2014
  • This study examined the influence and meaning of SNS as the hot topic of our time from the archival perspective and also studied the 'SNS records management'. The many users mean a high accessibility and utilization of SNS, which increase the influence and value of SNS as a record. Politically, SNS is a tool that strengthens the communication among the voters, politicians and the public while economically, it is a window to accept the complaints of the customers and a marketing tool. In addition, the voices of social minorities are also recorded unlike in the traditional media, which makes the SNS record a method to gain the social variety and diversity. SNS is a place of formation of collective memory and collective memory itself. Furthermore, it can play the role of public sphere. It also is a place for generation of 'big data' in an archival sense. In addition, this study has classified the SNS records management into primary and secondary management that include record management entities, subjects, periods, methods, and causes. This study analyzed the history, status, and the meaning of SNS to assess the values and meanings as the preliminary study for the future SNS record management studies.

A System Recovery using Hyper-Ledger Fabric BlockChain (하이퍼레저 패브릭 블록체인을 활용한 시스템 복구 기법)

  • Bae, Su-Hwan;Cho, Sun-Ok;Shin, Yong-Tae
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.2
    • /
    • pp.155-161
    • /
    • 2019
  • Currently, numerous companies and institutes provide services using the Internet, and establish and operate Information Systems to manage them efficiently and reliably. The Information System implies the possibility of losing the ability to provide normal services due to a disaster or disability. It is preparing for this by utilizing a disaster recovery system. However, existing disaster recovery systems cannot perform normal recovery if files for system recovery are corrupted. In this paper, we proposed a system that can verify the integrity of the system recovery file and proceed with recovery by utilizing hyper-ledger fabric blockchain. The PBFT consensus algorithm is used to generate the blocks and is performed by the leader node of the blockchain network. In the event of failure, verify the integrity of the recovery file by comparing the hash value of the recovery file with the hash value in the blockchain and proceed with recovery. For the evaluation of proposed techniques, a comparative analysis was conducted based on four items: existing system recovery techniques and data consistency, able to data retention, recovery file integrity, and using the proposed technique, the amount of traffic generated was analyzed to determine whether it was actually applicable.

The Influence of HR Department's Strategic Role on Organizational Effectiveness through Education and Training Satisfaction: Focusing on the Manufacturing Industry (HR부서의 전략적 역할이 교육훈련만족도를 매개로 조직유효성에 미치는 영향: 제조업을 중심으로)

  • Choi, Jae Won;Lee, Seok Kee;Kim, Sung-Dong
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.175-184
    • /
    • 2021
  • The purpose of this study is to investigate the effect of the strategic role of the human resources department in the manufacturing industry on organizational effectiveness through education and training satisfaction. Among the data from the 7th human capital company panel survey, data from the manufacturing industry were used and analyzed through a structural equation model. The results of this study are as follows: First, the strategic role of the HR department has a positive effect on satisfaction with education and training. Second, satisfaction with education and training and the strategic role of HR departments have a positive effect on job satisfaction among organizational effectiveness. Third, it was confirmed that education and training satisfaction has a mediating effect on the relationship between the HR department's strategic role and job satisfaction. The results of this study are expected to become the basis for expanding the authority and responsibilities of the HR department, which is an important factor in overcoming the crisis faced by SMEs as well as innovation, and redefining their role.

The Improvement Plan for Personal Information Protection for Artificial Intelligence(AI) Service in South Korea (우리나라의 인공지능(AI)서비스를 위한 개인정보보호 개선방안)

  • Shin, Young-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.3
    • /
    • pp.20-33
    • /
    • 2021
  • This study is to suggest improvements of personal information protection in South Korea, according to requiring the safety of process and protection of personal information. Accordingly, based on data collection and analysis through literature research, this study derived the issues and suitable standards of personal information for major artificial intelligence services. In addition, this cases studies were reviewed, focusing on the legal compliance and porcessing compliance for personal information proection in major countries. And it suggested the improvement plan applied in South Korea. As the results, in legal compliance, it is required reorganization of related laws, responsibility and compliance to develop and provide AI, and operation of risk management for personal information protection laws in AI services. In terms of processing compliance, first, in pre-processing and refining, it is necessary to standardize data set reference models, control data set quality, and voluntarily label AI applications. Second, in development and utilization of algorithm, it is need to establish and apply a clear regulation of the algorithm. As such, South Korea should apply suitable improvement tasks for personal information protection of safe AI service.

Setting Up of VTS Areas Around Jeju Using AIS Data (AIS 데이터를 활용한 제주지역 VTS 관제구역 설정)

  • Yoo, Sang-Lok;Kim, Kwang-Il
    • Journal of Navigation and Port Research
    • /
    • v.46 no.3
    • /
    • pp.209-215
    • /
    • 2022
  • On the Jeju coast, international cruise ships, passenger ships, and other ships pass frequently, as well as many fishing boats. Thus, there is a high risk of marine accidents and frequent ship collisions. Accordingly, it is urgent to establish a coastal VTS for systematic safety management of ships passing through the coastal waters of Jeju. The purpose of this study was to set the area of the VTS to be newly established. In this study, to calculate the workload of the VTS operators, a formula was proposed that reflects the monitoring workload considering the monitoring frequency and required time for target as well as non-target ships and the workload for ship collision situations. The proposed formula was applied to the newly established VTS area in Jeju. Three control sectors were set up in each VTS center. The average number of workstations per hour was approximately 1, so the division between sectors was appropriate. Thus, it was deduced that there would be no workload for the VTS operators. It is expected that the method proposed in this study can be used as primary data for calculating the appropriate number of workstations for the current VTS, and setting the VTS area for a new coastal VTS in the future.

A Hybrid Blockchain-Based E-Voting System with BaaS (BaaS를 이용한 하이브리드 블록체인 기반 전자투표 시스템)

  • Kang Myung Joe;Kim Mi Hui
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.8
    • /
    • pp.253-262
    • /
    • 2023
  • E-voting is a concept that includes actions such as kiosk voting at a designated place and internet voting at an unspecified place, and has emerged to alleviate the problem of consuming a lot of resources and costs when conducting offline voting. Using E-voting has many advantages over existing voting systems, such as increased efficiency in voting and ballot counting, reduced costs, increased voting rate, and reduced errors. However, centralized E-voting has not received attention in public elections and voting on corporate agendas because the results of voting cannot be trusted due to concerns about data forgery and modulation and hacking by others. In order to solve this problem, recently, by designing an E-voting system using blockchain, research has been actively conducted to supplement concepts lacking in existing E-voting, such as increasing the reliability of voting information and securing transparency. In this paper, we proposed an electronic voting system that introduced hybrid blockchain that uses public and private blockchains in convergence. A hybrid blockchain can solve the problem of slow transaction processing speed, expensive fee by using a private blockchain, and can supplement for the lack of transparency and data integrity of transactions through a public blockchain. In addition, the proposed system is implemented as BaaS to ensure the ease of type conversion and scalability of blockchain and to provide powerful computing power. BaaS is an abbreviation of Blockchain as a Service, which is one of the cloud computing technologies and means a service that provides a blockchain platform ans software through the internet. In this paper, in order to evaluate the feasibility, the proposed system and domestic and foreign electronic voting-related studies are compared and analyzed in terms of blockchain type, anonymity, verification process, smart contract, performance, and scalability.

A Study on the Trend Change using Trademark Information before and after COVID-19 (상표권 정보를 활용한 코로나19 전후의 트렌드 변화 연구)

  • Na, Myung-Sun;Park, Inchae
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.2
    • /
    • pp.116-126
    • /
    • 2022
  • Many studies using trademark information have suggested that trademark information is good data to monitor business trends. This study intends to analyze the trend change before and after COVID-19 using trademark information. Changes before and after COVID-19 were analyzed by using goods & service classification, similar group code, and designated goods information as trademark information. Among the trademark information, it was statistically significant that the change in trends before and after COVID-19 using designated goods names. To verify the results, the changes in keywords using designated goods names before and after COVID-19 were compared with the frequency of keywords in Google Trends. Among the top 8 keywords extracted from designated goods names, the frequency of Google trend searches for 'online, antibacterial, prevention of epidemics, meal kit, virtual' is on the rise, and 'mask, droplet' is not on the rise, but it increased rapidly at the time of COVID-19, and even after COVID-19, it showed a higher level than before. The frequency of 'unmanned' does not differ much before and after COVID-19, but it has been maintained at a consistently high level, and related businesses have been active since before COVID-19, and it can be interpreted as a keyword with high public interest. This study has academic achievements in that it specifically identified information that could be used in business trends by using three types of trademark information.

Implementation of Security Information and Event Management for Realtime Anomaly Detection and Visualization (실시간 이상 행위 탐지 및 시각화 작업을 위한 보안 정보 관리 시스템 구현)

  • Kim, Nam Gyun;Park, Sang Seon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.303-314
    • /
    • 2018
  • In the past few years, government agencies and corporations have succumbed to stealthy, tailored cyberattacks designed to exploit vulnerabilities, disrupt operations and steal valuable information. Security Information and Event Management (SIEM) is useful tool for cyberattacks. SIEM solutions are available in the market but they are too expensive and difficult to use. Then we implemented basic SIEM functions to research and development for future security solutions. We focus on collection, aggregation and analysis of real-time logs from host. This tool allows parsing and search of log data for forensics. Beyond just log management it uses intrusion detection and prioritize of security events inform and support alerting to user. We select Elastic Stack to process and visualization of these security informations. Elastic Stack is a very useful tool for finding information from large data, identifying correlations and creating rich visualizations for monitoring. We suggested using vulnerability check results on our SIEM. We have attacked to the host and got real time user activity for monitoring, alerting and security auditing based this security information management.