• Title/Summary/Keyword: 디지털 위험

Search Result 648, Processing Time 0.025 seconds

The Effect of 12Weeks Complexed Lower Body Muscle-Strengthening Exercise Program on Fall Risk in Elderly women (여성노인에게 적용한 12주간 복합하지근력 운동프로그램이 낙상위험도에 미치는 영향)

  • Baek, Soon-Gi;Choi, Hye-Jung
    • Journal of Digital Convergence
    • /
    • v.13 no.10
    • /
    • pp.533-539
    • /
    • 2015
  • The purpose of this study was to investigate the effects of 12weeks complexed lower body muscle-strengthening exercise program on fall risk in elderly women. Twenty subjects volunteered to participate who use a welfare center in W city For the study we divided into two groups: exercise group (EC, n=10, mean age:$69.6{\pm}2.2$), comparative group(CG, n=10, mean age:$71.3{\pm}4.6$). In order to investigate the effect of lower body muscle-strengthening program on the degree of risk of fall. It reached a conclusion as follows after having applied BBS (Berg Balance Scale) and OLST (One-Leg Stance Test) to examine the degree of risk of fall. As a result of changes in BBS and OLST, there were significant differences between EG and CG for each test(p<.00). Therefore, it confirmed that the application of complexed lower body muscle-strengthening program to the elderly who have a high risk of fall influences the risk of fall positively.

A study on the Effective Selection of the Personal Information Audit Subject Using Digital Forensic (디지털 포렌식 기법을 활용한 효율적인 개인정보 감사 대상 선정 방안 연구)

  • Cheon, Jun-Young;Lee, Sang-Jin
    • Journal of Advanced Navigation Technology
    • /
    • v.18 no.5
    • /
    • pp.494-500
    • /
    • 2014
  • Recently the leak of personal information from in-house and contract-managed companies has been continually increasing, which leads a regular observation on outsourcing companies that perform the personal information management system to prevent dangers from the leakage, stolen and loss of personal information. However, analyzing many numbers of computers in limited time has found few difficulties in some circumstances-such as outsourcing companies that own computers that have personal information system or task continuities that being related to company's profits. For the reason, it is necessary to select an object of examination through identifying a high-risk of personal data leak. In this paper, this study will formulate a proposal for the selection of high-risk subjects, which is based on the user interface, by digital forensic. The study designs the integrated analysis tool and demonstrates the effects of the tool through the test results.

Security Problems in Aircraft Digital Network System and Cybersecurity Strategies (항공기 디지털 네트워크 시스템 보안 문제점과 사이버 대응 전략)

  • Lim, In-Kyu;Kang, Ja-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.6
    • /
    • pp.633-637
    • /
    • 2017
  • Cyber attacks on aircraft and aeronautical networks are not much different from cyber attacks commonly found in the ground industry. Air traffic management infrastructure is being transformed into a digital infrastructure to secure air traffic. A wide variety of communication environments, information and communications, navigation, surveillance and inflight entertainment systems are increasingly threatening the threat posed by cyber terrorism threats. The emergence of unmanned aircraft systems also poses an uncontrollable risk with cyber terrorism. We have analyzed cyber security standards and response strategies in developed countries by recognizing the vulnerability of cyber threats to aircraft systems and aviation infrastructure in next generation data network systems. We discussed comprehensive measures for cybersecurity policies to consider in the domestic aviation environment, and discussed the concept of security environment and quick response strategies.

Effects of Omni-channel Service Characteristics on Utilitarian/Hedonic Shopping Value and Reuse Intention (옴니채널 서비스 특성이 실용적·쾌락적 쇼핑가치 지각과 재이용의도에 미치는 영향)

  • Shin, Jong-Kuk;Oh, Mi-Ok
    • Journal of Digital Convergence
    • /
    • v.15 no.10
    • /
    • pp.183-191
    • /
    • 2017
  • This study tries to explain the relationships among omni-channel service characteristics, utilitarian/hedonic shopping value, and reuse intention. We derive instant connectivity, localization, consistency, integration, privacy risk as omni-channel service characteristics from previous studies and collect data from 190 omni-channel service users. The major findings are as follows. First, localization, consistency, and privacy risk have a significant effect on utilitarian shopping value but no significant effect on hedonic shopping value. Second, instant connectivity and integration have a positive effect on both utilitarian and hedonic value. Third, utilitarian and hedonic shopping value have a positive effect on reuse intention. This study extends the scope of omni-channel consumer behaviors by focusing on multi-dimensionality of shopping value. The results of this research can provide useful implications for practitioners to build successful strategies on omni-channel service.

The complexity of opt-in procedures in mobile shopping: Moderating effects of visual attention using the eyetracker (모바일 쇼핑에서 옵트인의 절차적 복잡성 연구: 아이트래커(eyetracker) 기반 시각적 주의의 조절효과)

  • Kim, Sang-Hu;Kim, Yerang;Yang, Byunghwa
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.127-135
    • /
    • 2017
  • Consumers tend to feel concern about disclosure of personal information and, at the same time, to avoid inconvenience of procedural complexity caused by the privacy protections. The purpose of current paper is to investigate relationships between opt-in procedural complexity and shopping behavior using smart phones, moderating by the amount of visual attentions using eyetrackers. Therefore, we created a virtual mobile Web-site in which the complexity of opt-in procedures in our experiment is manipulated and measured. Also, we measured the dwell-time of area of interest using SMI-RED 250 instrument for tracking the real eye movement. Results indicated that the levels of procedural complexity are related to repurchase, indicating a moderating effect of the amount of visual attentions. Finally, we discussed several theoretical and practical implications of management for mobile commerce.

Chinese Online Circulation Market and Market Approaching Strategy (중국 온라인 유통시장의 발전과 시장진출 전략)

  • Song, Jae-Do;Lee, Chan-Woo
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.477-487
    • /
    • 2017
  • This paper releases strategies for firms that wish to enter into online circulation business in China. SWOT based on a Korean manufacturing company teaches us better way to approach Chinese online market. Chinese online market is under oligopoly, where Alibaba and Jingdong account for about 80% of the total market. Game theory is used as a measure of threat and opportunity between Korean manufacturer and Chinese online market retailer. Game shows that they are easy to accept opportunity and sales uplift rather than low risk. Analysis shows that Korean companies should improve its products and brand competitiveness in the offline market before entering into the Chinese online retail market. They need to prepare a localization model.

5G service and universal service (5G시대 통신서비스의 공익성 제고 방안에 대한 모색)

  • Kim, Sung-Wook
    • Journal of Digital Convergence
    • /
    • v.18 no.2
    • /
    • pp.103-110
    • /
    • 2020
  • The fire incident of KT's Ahyun branch occurred last year indicates that hyper-connected society led by 5G technology would be a dystopia instead of a utopia unless seamless connection of 5G service is well secured. Looking backward on 1999, we could peacefully and happily greet the new millennium by making a great effort to prevent the millennium bugs(Y2K) from causing the catastrophe such as a shut-down of banking system. Likewise, we should make a great effort to keep 5G networks and 5G service continuously working without the disruption of even just a second, which would enable us to avoid facing any catastrophes caused by the disruption of 5G service. As a way to do so, it can be considered that 5G service is designated as universal service because it has the key features of public goods like telephone and high-speed internet services.

Effects of Physical Activity Intervention on Obesity and Metabolic Syndrome Risk Factors and Smartphone Game Time in Children (신체활동 중재가 초등학생의 비만 및 대사증후군 위험인자와 스마트폰 게임 참여 시간에 미치는 영향)

  • Sa, Seok-Eun;Kim, Won-Hyun;Kim, Yong-Geun;Lee, Ji-Young
    • Journal of Digital Convergence
    • /
    • v.14 no.4
    • /
    • pp.479-486
    • /
    • 2016
  • The purpose of this study was to investigate effects of 12-week physical activity intervention on obesity and metabolic syndrome risk factors and smartphone game time in children. A total of 27 children(fifth grade elementary school students) participated in this study. The subjects were divided to exercise group(n=16) and control group(n=11), and participants in exercise group performed running and jump rope(60min/day; 3days/week; 50~70% of THR) during 12-week. We analyzed measurement data using two-way ANOVA. As results, obesity indices except body weight and metabolic syndrome risk factor decreased significantly in exercise group compare with control group. And VO2max increased and smartphone game time decreased significantly in exercise group compare with control group. In conclusion, we suggest that 12-week exercise intervention in children has positive effects on obesity and metabolic syndrome and improve negative lifestyle such as smartphone game.

An Empirical Research on Information Privacy Concern in the IoT Era (사물인터넷 시대의 정보 프라이버시 염려에 대한 실증 연구)

  • Park, Cheon-Woong;Kim, Jun-Woo
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.65-72
    • /
    • 2016
  • This study built the theoretical frameworks for empirical analysis based on the analysis of the relationship among the concepts of risk of information privacy, the experience of information privacy, the policy of information privacy and information control via the provision intention studies. Also, in order to analyze the relationship among the factors such as the risk of information privacy, intention to offer the personal information, this study investigated the concepts of information privacy and studies related with the privacy, established a research model about the information privacy. Followings are the results of this study: First, the information privacy risk, information privacy experience, information privacy policy, and information control have positive effects upon the information privacy concern. Second, the information privacy concern has the negative effects upon the provision intention of personal information.

Safety Management Network of Sports Facilities Abroad and System Status (해외의 스포츠시설 안전관리 네트워크 및 시스템 현황)

  • Kim, Il-Gwang;Kwon, Hei-Won;Choi, Jin-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.6
    • /
    • pp.547-562
    • /
    • 2016
  • The purpose of this research was to provide the information of mandatory regulation for Korean sports facilities and the preliminary data for building sport safety management manual through sports facilities abroad and system status. Futhermore, based on the information of sports facilities safety management, this research performed the benchmarking of each country sports facilities safety management system. As a result, in the U.S, Department of Homeland Security(DHS) leads effort to achieve a safe, secure, and resilient homeland. In Germany, law & regulations, sports facilities safety guideline and expert extension have been reviewed. Germany is more realistic and practical than other countries. In Australia, Major Hazard Facilities(MHF) is responsible for eliminating the risk of a major incident. Emergency Management System(EMS) should spontaneously respond when the alarm is raised as early detection and intervention are vital to ensuring that a small incident does not escalate to become a major disaster.