• Title/Summary/Keyword: 디지털위험

Search Result 634, Processing Time 0.025 seconds

Established Smart Disaster Safety Management Response System based on the 4th Industrial Revolution (4차 산업혁명 기반 스마트 재난안전관리 대응체계 구축)

  • Kang, Heau-Jo
    • Journal of Digital Contents Society
    • /
    • v.19 no.3
    • /
    • pp.561-567
    • /
    • 2018
  • In this paper, we apply this method to the entire process of smart disaster safety management based on the $4^{th}$ industrial revolution to minimize human, social, economic and environment damage from accidents and disasters, prevention evaluation and disaster information collection analysis and real-time detection of field situation. Prevention of $5^{th}$ generation communication system by analysis, contrast by education and training using virtual reality and augmented reality disaster safety management decision support system intelligent robot for recovery, disaster, discovery, reconnaissance relief, and scale analysis of damages were proposed.

Influence of Privacy Concerns on Intention to Use Location-based Services Based on Privacy Calculus Perspective (프라이버시 계산 관점에서 위치기반서비스 이용의도에 대한 프라이버시 염려의 영향)

  • Kim, Jongki
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.265-272
    • /
    • 2017
  • As Location-based services on smartphone are getting more popular, users have more concern on exposing their location information. This study developed a research model to identify how smartphone users perceive on providing information pertaining to their location based on privacy calculus theory. 203 responses were analyzed with SmartPLS 2.0. The outcome of this research is quite interesting because conventional belief of privacy calculus perspective does not hold. The privacy calculus theory is based on assumption that human being is rational and decision to provide privacy information is determined by risk and benefit aspects. However, the result of this study is in accordance with behavioral economics perspective in which emotional judgment and behavioral judgement are affected by different factors.

Design and Development of Sensor-based Virtual Experiment Contents for Smart Phone (스마트폰의 센서를 이용한 가상 실험 콘텐츠의 개발 및 설계)

  • Chung, Kwang Sik;Kwon, Sooyoul;Huang, Wen-Hao
    • Journal of Digital Contents Society
    • /
    • v.14 no.2
    • /
    • pp.161-169
    • /
    • 2013
  • Experiments and practices are critical instructional activities for teaching and learning natural sciences. However, by learning the experimental procedures in advance with the help of Virtual Experiments, natural science majors may address danger of handling chemicals before carrying out experiments in the laboratories. Virtual Experiments, a mobile learning app, provides learners with interactions between the learners and the contents by using the sensor built-in Android-platform smart phones. With the app, learners may handle the chemicals and experiment apparatuses, verify the reactions and assembly of the chemicals and instruments in advance. This paper describes the design and development of the Virtual Experiments in hope to promote the integration of mobile learning apps in order to better engage learners in the laboratories.

A Study on the RFID Security Technologies in Ubiquitous Computing Environment (유비쿼터스 컴퓨팅 환경에서 RFID보안 기술에 대한 연구)

  • Bang Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.6 no.4
    • /
    • pp.267-272
    • /
    • 2005
  • The ubiquitous computing environment is a new paradigm that represents the future life and is expected to bring about great changes in IT and in the lives of individuals. However, since a good deal of information can be easily obtained and shared in the ubiquitous computing environment, problems such as a security threat and infringement of privacy are getting serious. The present study is intended to explore some ways to minimize such problems by introducing RFID technology in the ubiquitous computing environment. This study also examines the causes of violation of security and privacy that might occur in the RFID system and requirement for security. In addition it seeks possible technical solutions to those causes.

  • PDF

Research on the Game Elements and Mechanism that Affect the Game Overindulgence and Addiction (게임 과몰입과 중독에 영향을 미치는 게임 요소와 메커니즘 연구)

  • Yun, Chan;Woo, Tack
    • Journal of Korea Game Society
    • /
    • v.18 no.6
    • /
    • pp.131-142
    • /
    • 2018
  • As the gaming industry grows, the need to understand and study on game Addiction and overindulgence have also grown. For this object, in this study, the author first studied how game elements and game mechanisms were categorized by using previous studies. As a result, game elements are divided into three elements that compose visual, competitive, and probability elements. And the game mechanisms that establish three elements were grouped into subcategories. Risk of competitive and visual element that effect on overindulgence is depended on what mechanism has used. But, in the probability element, Gambling mechanism must be viewed in terms of addiction, not overindulgence.

Design and Implementation of a Rule-based Risk Classification Algorithm for Risk-based Inspection (RBI) of Imported Goods (수입 화물의 위험 기반 검사(RBI)를 위한 규칙 기반 위험 분류 알고리즘의 설계 및 구현)

  • Cha Jooho;Heo Hoon
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.3
    • /
    • pp.129-136
    • /
    • 2023
  • In this paper, we describe a rule-based risk classification algorithm to perform Risk-based Inspection (RBI) on imported goods at customs. The RBI system is a method to automatically select which cargos have to be inspected and manage potential risks in boarder. In this study, we designed a rule-based risk classification algorithm for RBI solutions and implemented them using the Svelte web application framework. The risk classification algorithm proposed in this paper uses different indicative risk factors such as HS code, country of origin, importer's reliability, trade relationships, and logistics routes to classify cargos into Green, Yellow, and Red channels. To achieve this, we assigned risk categories to each risk factor and randomly generated risk scores within a specific range for each risk category. This system is expected to contribute to the increased efficiency of customs operations and protect public safety by minimizing the risk of imported hazardous materials.

Literary Research Using Digital Analysis Tools: A Case Study of 『Dangerous Liaisons』 ('디지털 분석 도구를 활용한 문학 연구 : 라클로의 『위험한 관계Les liaisons dangereuses』를 중심으로)

  • RYU Sun-Jung;YOU Eun-Soon
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.3
    • /
    • pp.173-180
    • /
    • 2024
  • We This study aimed to quantitatively analyze the theme of 'libertinage' and the associated issues of reason and emotion in 『Dangerous Liaisons』, a novel considered a masterpiece of libertine literature and an epistolary novel of the 18th century, using digital analysis tools. First, based on the frequency analysis of word usage using Voyant and LIWC 22, we confirmed that libertinage is manifested with keywords such as 'love' and 'time'. With Voyant's 'Contexts' feature, it was found that the letters sent by Valmont to Madame de Tourvel and those sent by Madame de Merteuil both have 'love' as the central theme. However, emotional vocabulary was higher in the former, whereas strategic vocabulary was more prevalent in the latter. Additionally, it was observed that the most frequently used word in the letters sent by Madame de Merteuil is 'time', with a higher frequency than 'love'. Thirdly, using LIWC 22, we measured the analytical thinking and emotional tone of the letters exchanged by the main characters, and analyzed how these values changed according to the chapters. Through these analyses, we confirmed that this novel, alongside Rousseau's "New Eloise," anticipates romanticism by embracing the theme of 'emotion,' which was rejected by 18th-century Enlightenment ideals.

A Study on Electronic Contract Systems Using Digital Multisignature (디지털다중서명 방식의 전자계약시스템 적용에 관한 연구)

  • 박희운;강창구;이임영
    • Journal of Korea Multimedia Society
    • /
    • v.1 no.1
    • /
    • pp.56-65
    • /
    • 1998
  • The multignature system is a digital contract system which can process multi-party contracts electronically. In this paper, we analyzed various insecure elements involved in general multisignature contract systems and suggest requirements needed for making such systems secure. Based on our analysis, we propose a new secure multisignature method and apply it to the conventional electronic digital contract systems along with several other existing multisignature methods. The applicability and the effectiveness of the newly developed method are demonstrated by comparing how well the suggested security requirements are satisfied by each method.

  • PDF

A Study on the Trend and Prospect of Visual Art Archives (시각예술 아카이브의 동향과 전망)

  • Shim, Bo-Mee
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 2013.08a
    • /
    • pp.185-188
    • /
    • 2013
  • 전시 중심의 단기적 활용을 벗어나 일종의 문화유산으로 시각예술 아카이브를 관리하려는 움직임이 국가단위 또는 주요 기관간 컨소시엄의 형태로 활발히 진행 중인 해외 문화선진국의 사례와는 달리 국내 시각예술계는 아카이브 기반 전시나 프로젝트의 인기를 넘어서지 못하는 단편적 접근방식으로 아직 국가차원의 종합적인 비전이나 장기적인 전략을 창출해내지 못하고 있는 것이 우리의 현실이다. 국내 디지털 인프라의 선진성에 의지한 공공기관 주도 디지털 아카이브 사업에 대한 낙관적 전망도 몇몇 기관의 디지털 아카이브 구축 및 운영 경험을 통해 그 불투명성 및 위험성이 노출된 바 있다. 새 정부 출범 이후 국가정책을 지배하고 있는 창조경제 화두를 관통하는 핵심 키워드 중의 하나로서 시각예술 콘텐츠 자산의 근간인 국내 시각예술 아카이브의 경쟁력은 전면적으로 검토될 필요가 있다.

  • PDF

Understanding and Applications of Blockchain-based Decentralized Identitiy (블록체인 기반 분산신원증명의 이해와 서비스 적용 사례)

  • Kwon, Jun-Woo;Seo, Seung-Hyun;Lee, Kang-Hyo;Park, So-Hyeon
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2021.11a
    • /
    • pp.309-312
    • /
    • 2021
  • 최근 사회는 디지털기술을 기반으로 비대면전환이 빠르게 이루어지고 있다. 이에 디지털 신분증과 디지털 신원인증에 대한 관심이 증가하고 있다. 기존 오프라인에서 사용되고 있는 플라스틱 신분증은 분실 및 위·변조의 위험성이 존재한. 또한 현재 온라인에서 널리 사용되고 잇는 신원인증 모델들을 데이터의 주권이 사용자가 아닌 서비스 제공자에게 있다는 문제점이 있다. 위와 같은 문제들을 해결하고 사용자의 신원정보를 효과적으로 관리하기 위해 분산신원증명의 필요성이 제기되었다. 본 논문에서는 분산신원증명의 구조와 서비스 적용 사례에 대해 살펴본다.