• Title/Summary/Keyword: 디지털위험

Search Result 634, Processing Time 0.027 seconds

An Analysis of Hydrophobic Characteristics of Concrete Surfaces by Antifouling Coating Agent using Cellulose Nonofiber and Alkyl Ketene Dimer (셀룰로오스 나노 섬유와 AKD를 활용한 방오 코팅제에 의한 콘크리트 표면의 소수 특성 분석)

  • Nag-Seop Jang;Chi-Hoon Noh;Hongseob Oh
    • Journal of the Korean Recycled Construction Resources Institute
    • /
    • v.11 no.2
    • /
    • pp.120-129
    • /
    • 2023
  • Marine structures are subject to damage not only from sea salt but also from the adhesion of marine microorganisms and suspended particles, which cause additional damages. In order to prevent this, periodic coating is employed in the case of vessels to maintain the necessary performance. However, it is true that periodic coating is difficult for concrete or steel support structures, and there is a risk of marine environmental pollution. In this study, authors developed an anti-fouling coating agent using eco-friendly materials that possess hydrophilic cellulose nanofibers and AKD(alkyl ketene dimer). To achieve a homogeneous mixture, the content of cellulose nanofibers was fixed at 1 %, and AKD, distilled water, and waste glass were mixed using a digital mixer and homogenizer. The contact angle of the prepared coated surface was observed to be over 130°, indicating sufficient performance even in a water droplet flow test with a 15° slope, suggesting self-cleaning capability. Furthermore, through the analysis of viscosity characteristics at different temperatures, it was confirmed that the application is feasible at room temperature. Microstructure analysis also verified that the coating agent is uniformly applied to the concrete surface.

User Perception of Personal Information Security: An Analytic Hierarch Process (AHP) Approach and Cross-Industry Analysis (기업의 개인정보 보호에 대한 사용자 인식 연구: 다차원 접근법(Analytic Hierarch Process)을 활용한 정보보안 속성 평가 및 업종별 비교)

  • Jonghwa Park;Seoungmin Han;Yoonhyuk Jung
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.233-248
    • /
    • 2023
  • The increasing integration of intelligent information technologies within organizational systems has amplified the risk to personal information security. This escalation, in turn, has fueled growing apprehension about an organization's capabilities in safeguarding user data. While Internet users adopt a multifaceted approach in assessing a company's information security, existing research on the multiple dimensions of information security is decidedly sparse. Moreover, there is a conspicuous gap in investigations exploring whether users' evaluations of organizational information security differ across industry types. With an aim to bridge these gaps, our study strives to identify which information security attributes users perceive as most critical and to delve deeper into potential variations in these attributes across different industry sectors. To this end, we conducted a structured survey involving 498 users and utilized the analytic hierarchy process (AHP) to determine the relative significance of various information security attributes. Our results indicate that users place the greatest importance on the technological dimension of information security, followed closely by transparency. In the technological arena, banks and domestic portal providers earned high ratings, while for transparency, banks and governmental agencies stood out. Contrarily, social media providers received the lowest evaluations in both domains. By introducing a multidimensional model of information security attributes and highlighting the relative importance of each in the realm of information security research, this study provides a significant theoretical contribution. Moreover, the practical implications are noteworthy: our findings serve as a foundational resource for Internet service companies to discern the security attributes that demand their attention, thereby facilitating an enhancement of their information security measures.

TAGS: Text Augmentation with Generation and Selection (생성-선정을 통한 텍스트 증강 프레임워크)

  • Kim Kyung Min;Dong Hwan Kim;Seongung Jo;Heung-Seon Oh;Myeong-Ha Hwang
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.10
    • /
    • pp.455-460
    • /
    • 2023
  • Text augmentation is a methodology that creates new augmented texts by transforming or generating original texts for the purpose of improving the performance of NLP models. However existing text augmentation techniques have limitations such as lack of expressive diversity semantic distortion and limited number of augmented texts. Recently text augmentation using large language models and few-shot learning can overcome these limitations but there is also a risk of noise generation due to incorrect generation. In this paper, we propose a text augmentation method called TAGS that generates multiple candidate texts and selects the appropriate text as the augmented text. TAGS generates various expressions using few-shot learning while effectively selecting suitable data even with a small amount of original text by using contrastive learning and similarity comparison. We applied this method to task-oriented chatbot data and achieved more than sixty times quantitative improvement. We also analyzed the generated texts to confirm that they produced semantically and expressively diverse texts compared to the original texts. Moreover, we trained and evaluated a classification model using the augmented texts and showed that it improved the performance by more than 0.1915, confirming that it helps to improve the actual model performance.

Implementation of AI-based Object Recognition Model for Improving Driving Safety of Electric Mobility Aids (객체 인식 모델과 지면 투영기법을 활용한 영상 내 다중 객체의 위치 보정 알고리즘 구현)

  • Dong-Seok Park;Sun-Gi Hong;Jun-Mo Park
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.24 no.2
    • /
    • pp.119-125
    • /
    • 2023
  • In this study, we photograph driving obstacle objects such as crosswalks, side spheres, manholes, braille blocks, partial ramps, temporary safety barriers, stairs, and inclined curb that hinder or cause inconvenience to the movement of the vulnerable using electric mobility aids. We develop an optimal AI model that classifies photographed objects and automatically recognizes them, and implement an algorithm that can efficiently determine obstacles in front of electric mobility aids. In order to enable object detection to be AI learning with high probability, the labeling form is labeled as a polygon form when building a dataset. It was developed using a Mask R-CNN model in Detectron2 framework that can detect objects labeled in the form of polygons. Image acquisition was conducted by dividing it into two groups: the general public and the transportation weak, and image information obtained in two areas of the test bed was secured. As for the parameter setting of the Mask R-CNN learning result, it was confirmed that the model learned with IMAGES_PER_BATCH: 2, BASE_LEARNING_RATE 0.001, MAX_ITERATION: 10,000 showed the highest performance at 68.532, so that the user can quickly and accurately recognize driving risks and obstacles.

Study on Developing the Information System for ESG Disclosure Management (ESG 정보공시 관리를 위한 정보시스템 개발에 관한 연구)

  • Kim, Seung-wook
    • Journal of Venture Innovation
    • /
    • v.7 no.1
    • /
    • pp.77-90
    • /
    • 2024
  • While discussions on ESG are actively taking place in Europe and other countries, the number of countries pushing for mandatory ESG information disclosure related to non-financial information of listed companies is rapidly increasing. However, as companies respond to mandatory global ESG information disclosure, problems are emerging such as the stringent requirements of global ESG disclosure standards, the complexity of data management, and a lack of understanding and preparation of the ESG system itself. In addition, it requires a reasonable analysis of how business management opportunities and risk factors due to climate change affect the company's financial impact, so it is expected to be quite difficult to analyze the results that meet the disclosure standards. In order to perform tasks such as ESG management activities and information disclosure, data of various types and sources is required and management through an information system is necessary to measure this transparently, collect it without error, and manage it without omission. Therefore, in this study, we designed an ESG data integrated management model to integrate and manage various related indicators and data in order to transparently and efficiently convey the company's ESG activities to various stakeholders through ESG information disclosure. A framework for implementing an information system to handle management was developed. These research results can help companies facing difficulties in ESG disclosure at a practical level to efficiently manage ESG information disclosure. In addition, the presentation of an integrated data management model through analysis of the ESG disclosure work process and the development of an information system to support ESG information disclosure were significant in the academic aspects needed to study ESG in the future.

The Factors Influencing Intention to Use Bit Coin of Domestic Consumers (국내 소비자들의 비트코인 사용 의도에 영향을 미치는 요인 연구)

  • Shin, Dong-Hee;Kim, Yong-Moon
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.24-41
    • /
    • 2016
  • Study is about Bit Coin that is electronic cash that is received attention globally in recent. It is increasing domestically that uses bit coin for convenience of micro payment, and also bit coin is possible to exchange each countries' currency. In this point, we searched understanding degree and acceptance of bit coin. Also we applied transformed TAM(Technology Acceptance Model) to search factors that have an effect on consumers' intention to use it. In advance, we analyze features of bit coin, and extract factors through preceding researches for existing electronic cash, because studies for intention to use bit coin are weak in internal and external. First of results is that 'economic efficiency' which is a characteristic variable of bit coin influences 'intention to use,' a dependent variable through 'perceived usefulness,' a parameter. It was investigated that monetary and mental costs that was costed when we use bit coin were less than using other cash. Secondly, 'payment convenience' that is a characteristic variable affects 'intention to use', a dependent variable through 'perceived usefulness,' a parameter. It was measured that problems of inconvenience that include transaction process, cash management time shortage and exchange changes will be solved by using bit coin. Thirdly, 'reliability' that is a perceived risk variable of bit coin has a direct effect on 'intention to use,' a dependent variable. It was investigated that we could achieve purpose of payment because we weren't influenced by breakdown on system by processing distributed database in some computers. Fourthly, 'perceived usefulness,' a parameter of bit coin directly affects 'intention to use,' a dependent variable. Then consumers who want to use bit coin are fascinated bit coin for various usability. Moreover, we want to provide implications to all of finance corporations, companies related electronic cash and bit coin users based on these results.

A Correlation Analysis between International Oil Price Fluctuations and Overseas Construction Order Volumes using Statistical Data (통계 데이터를 활용한 국제 유가와 해외건설 수주액의 상관성 분석)

  • Park, Hwan-Pyo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.24 no.2
    • /
    • pp.273-284
    • /
    • 2024
  • This study investigates the impact of international oil price fluctuations on overseas construction orders secured by domestic and foreign companies. The analysis employs statistical data spanning the past 20 years, encompassing international oil prices, overseas construction orders from domestic firms, and new overseas construction orders from the top 250 global construction companies. The correlation between these variables is assessed using correlation coefficients(R), determination coefficients(R2), and p-values. The results indicate a strong positive correlation between international oil prices and overseas construction orders. The correlation coefficient between domestic overseas construction orders and oil prices is found to be 0.8 or higher, signifying a significant influence. Similarly, a high correlation coefficient of 0.76 is observed between oil prices and new orders from leading global construction companies. Further analysis reveals a particularly strong correlation between oil prices and overseas construction orders in Asia and the Middle East, potentially due to the prevalence of oil-related projects in these regions. Additionally, a high correlation is observed between oil prices and orders for industrial facilities compared to architectural projects. This suggests an increase in plant construction volumes driven by fluctuations in oil prices. Based on these findings, the study proposes an entry strategy for navigating oil price volatility and maintaining competitiveness in the overseas construction market. Key recommendations include diversifying project locations and supplier bases; utilizing hedging techniques for exchange rate risk management, adapting to local infrastructure and market conditions, establishing local partnerships and securing skilled local labor, implementing technological innovations and digitization at construction sites to enhance productivity and cost reduction The insights gained from this study, coupled with the proposed overseas expansion strategies, offer valuable guidance for mitigating risks in the global construction market and fostering resilience in response to international oil price fluctuations. This approach is expected to strengthen the competitiveness of domestic and foreign construction firms seeking success in the international arena.

A Study on Cinematic Representations of Posthuman Girls in South Korea-Focused on The Silenced and The Witch: Part 1. The Subversion (한국 영화에 나타난 포스트휴먼 소녀의 재현 양상 연구 -<경성학교: 사라진 소녀들>, <마녀>를 중심으로)

  • Kim, Eun Joung
    • Journal of Popular Narrative
    • /
    • v.27 no.3
    • /
    • pp.95-124
    • /
    • 2021
  • As the symbolic images of girls besides its definition have varied according to the age and society, a posthuman girl character recently appears in the digital cinema. This study aims to analyze its cinematic representations and the social contexts in which they are created. For this purpose, the study focuses on what extent the society allows its imagined figurations as a future female body and the meanings revolving around the image of 'technologically body-enhanced female fighter'. Current digital visualization technology has developed to the extent any imaged future humans can be represented, but posthuman girls' representations have its limitation that only a human-like figuration can be allowed in accord with the traditionally idolized image of girls. It is because of the representation logic in which digital cinema is visualized based on perceptual realism that values audiences' experiences. Despite such less critical figuration which does not dare to cross the boundary between the image of human and inhuman, the posthuman girl characters create a new category of the 'dangerous girls' who are both void of sexual femininity and independent of motherhood and heterosexual romance narrative. Of course, they support the modern human-centered belief that humans can take entire control of technology with their moral behaviors and dispel the fear about the negative impact the nature of technology may have on society at large by showing their child-like figuration protecting ethical values. However, the new character of 'unruly girl' exerts her subversive act that seeks to fight against the human-centered liberal humanistic values and melancholic feeling and vulnerability that the neoliberalism and technocracy enforce. When posthuman girl characters are considered to be a marker through which we can see how different social forces are intervening and competing each other in the upcoming posthuman age, the limited figuration of the posthuman girl characters in South Korean movies illustrates the opinionated thoughts toward the instrumentalism in technology but their bloodshed struggles reveal how the corporate or state-governed techno-biopower has oppressively treated and appropriated the human body as the technology-object and also provide a meaningful opportunity to rethink its unethical violence.

Clickstream Big Data Mining for Demographics based Digital Marketing (인구통계특성 기반 디지털 마케팅을 위한 클릭스트림 빅데이터 마이닝)

  • Park, Jiae;Cho, Yoonho
    • Journal of Intelligence and Information Systems
    • /
    • v.22 no.3
    • /
    • pp.143-163
    • /
    • 2016
  • The demographics of Internet users are the most basic and important sources for target marketing or personalized advertisements on the digital marketing channels which include email, mobile, and social media. However, it gradually has become difficult to collect the demographics of Internet users because their activities are anonymous in many cases. Although the marketing department is able to get the demographics using online or offline surveys, these approaches are very expensive, long processes, and likely to include false statements. Clickstream data is the recording an Internet user leaves behind while visiting websites. As the user clicks anywhere in the webpage, the activity is logged in semi-structured website log files. Such data allows us to see what pages users visited, how long they stayed there, how often they visited, when they usually visited, which site they prefer, what keywords they used to find the site, whether they purchased any, and so forth. For such a reason, some researchers tried to guess the demographics of Internet users by using their clickstream data. They derived various independent variables likely to be correlated to the demographics. The variables include search keyword, frequency and intensity for time, day and month, variety of websites visited, text information for web pages visited, etc. The demographic attributes to predict are also diverse according to the paper, and cover gender, age, job, location, income, education, marital status, presence of children. A variety of data mining methods, such as LSA, SVM, decision tree, neural network, logistic regression, and k-nearest neighbors, were used for prediction model building. However, this research has not yet identified which data mining method is appropriate to predict each demographic variable. Moreover, it is required to review independent variables studied so far and combine them as needed, and evaluate them for building the best prediction model. The objective of this study is to choose clickstream attributes mostly likely to be correlated to the demographics from the results of previous research, and then to identify which data mining method is fitting to predict each demographic attribute. Among the demographic attributes, this paper focus on predicting gender, age, marital status, residence, and job. And from the results of previous research, 64 clickstream attributes are applied to predict the demographic attributes. The overall process of predictive model building is compose of 4 steps. In the first step, we create user profiles which include 64 clickstream attributes and 5 demographic attributes. The second step performs the dimension reduction of clickstream variables to solve the curse of dimensionality and overfitting problem. We utilize three approaches which are based on decision tree, PCA, and cluster analysis. We build alternative predictive models for each demographic variable in the third step. SVM, neural network, and logistic regression are used for modeling. The last step evaluates the alternative models in view of model accuracy and selects the best model. For the experiments, we used clickstream data which represents 5 demographics and 16,962,705 online activities for 5,000 Internet users. IBM SPSS Modeler 17.0 was used for our prediction process, and the 5-fold cross validation was conducted to enhance the reliability of our experiments. As the experimental results, we can verify that there are a specific data mining method well-suited for each demographic variable. For example, age prediction is best performed when using the decision tree based dimension reduction and neural network whereas the prediction of gender and marital status is the most accurate by applying SVM without dimension reduction. We conclude that the online behaviors of the Internet users, captured from the clickstream data analysis, could be well used to predict their demographics, thereby being utilized to the digital marketing.

Autopoietic Machinery and the Emergence of Third-Order Cybernetics (자기생산 기계 시스템과 3차 사이버네틱스의 등장)

  • Lee, Sungbum
    • Cross-Cultural Studies
    • /
    • v.52
    • /
    • pp.277-312
    • /
    • 2018
  • First-order cybernetics during the 1940s and 1950s aimed for control of an observed system, while second-order cybernetics during the mid-1970s aspired to address the mechanism of an observing system. The former pursues an objective, subjectless, approach to a system, whereas the latter prefers a subjective, personal approach to a system. Second-order observation must be noted since a human observer is a living system that has its unique cognition. Maturana and Varela place the autopoiesis of this biological system at the core of second-order cybernetics. They contend that an autpoietic system maintains, transforms and produces itself. Technoscientific recreation of biological autopoiesis opens up to a new step in cybernetics: what I describe as third-order cybernetics. The formation of technoscientific autopoiesis overlaps with the Fourth Industrial Revolution or what Erik Brynjolfsson and Andrew McAfee call the Second Machine Age. It leads to a radical shift from human centrism to posthumanity whereby humanity is mechanized, and machinery is biologized. In two versions of the novel Demon Seed, American novelist Dean Koontz explores the significance of technoscientific autopoiesis. The 1973 version dramatizes two kinds of observers: the technophobic human observer and the technology-friendly machine observer Proteus. As the story concludes, the former dominates the latter with the result that an anthropocentric position still works. The 1997 version, however, reveals the victory of the techno-friendly narrator Proteus over the anthropocentric narrator. Losing his narrational position, the technophobic human narrator of the story disappears. In the 1997 version, Proteus becomes the subject of desire in luring divorcee Susan. He longs to flaunt his male egomaniac. His achievement of male identity is a sign of technological autopoiesis characteristic of third-order cybernetics. To display self-producing capabilities integral to the autonomy of machinery, Koontz's novel demonstrates that Proteus manipulates Susan's egg to produce a human-machine mixture. Koontz's demon child, problematically enough, implicates the future of eugenics in an era of technological autopoiesis. Proteus creates a crossbreed of humanity and machinery to engineer a perfect body and mind. He fixes incurable or intractable diseases through genetic modifications. Proteus transfers a vast amount of digital information to his offspring's brain, which enables the demon child to achieve state-of-the-art intelligence. His technological editing of human genes and consciousness leads to digital standardization through unanimous spread of the best qualities of humanity. He gathers distinguished human genes and mental status much like collecting luxury brands. Accordingly, Proteus's child-making project ultimately moves towards technologically-controlled eugenics. Pointedly, it disturbs the classical ideal of liberal humanism celebrating a human being as the master of his or her nature.