• Title/Summary/Keyword: 디지털 위험

Search Result 648, Processing Time 0.025 seconds

A study on the Design of Recipe Sharing Service for Single-Person Households (1인 가구를 위한 레시피 공유 서비스 디자인 연구 -백주부 요리 레시피를 중심으로-)

  • Kim, Han-Jun;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.18 no.8
    • /
    • pp.419-425
    • /
    • 2020
  • This study proposes functional services within the cooking recipe sharing application. Many single-person households often eat alone, and eating out. their usual eating habits are not considered well. when living alone, the risk of exposure to mental illnesses increases compared than multi-person households, and if nutrition has unbalanced, it can be easily exposed to diseases. in this study, define these problems and emphasize the importance of maintaining physical and mental health of one-person households, and explored user experience and expectations through cano models, focusing on the Baekjubu fooe recipe is often used by 20-30s. and users can feel the cooking process is not a hassle. and they will have a cooking themselves and even manage their mental health through communication with neighbors.

A study on the effect of information types on Drivers in Takeover period of automated vehicles (자율주행 자동차의 제어권 전환 상황에서 요구되는 정보 유형에 관한 연구)

  • Kim, Naeun;Yang, Min-young;Lee, Jiin;Kim, Jinwoo
    • Journal of Digital Contents Society
    • /
    • v.19 no.1
    • /
    • pp.113-122
    • /
    • 2018
  • In level 3 automated vehicles, drivers are expected to encounter transition of control when the system reaches its limit. Drivers need to refocus their attention on the road ahead and gain situational awareness. Appropriate information should be conveyed during this period in order to prevent human errors. In this paper, we defined the takeover process as 'in-the-middle-of-the-loop' and conducted Task Analysis and Work Domain Analysis to find out information requirements. As a result, we specified required information types and interface considerations. Moreover, we conducted an experimental study to find how the information types affect drivers on situation awareness, cognitive load and reaction time. Consequently, we found different information on system transparency should be conveyed depending on the urgency of takeover situation and driver guidance could help drivers with better situation awareness after the takeover.

Verification of a Communication Method Secure against Attacks Using Convergence Hash Functions in Inter-vehicular Secure Communication (차량간 보안 통신에서 융합 해시함수를 이용하여 공격에 안전한 통신방법 검증)

  • Lee, Sang-Jun;Bae, Woo-Sik
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.297-302
    • /
    • 2015
  • The increase in applying IT to vehicles has given birth to smart cars or connected cars. As smarts cars become connected with external network systems, threats to communication security are on the rise. With simulation test results supporting such threats to Convergence security in vehicular communication, concerns are raised over relevant vulnerabilities, while an increasing number of studies on secure vehicular communication are published. Hacking attacks against vehicles are more dangerous than other types of hacking attempts because such attacks may threaten drivers' lives and cause social instability. This paper designed a Convergence security protocol for inter-vehicle and intra-vehicle communication using a hash function, nonce, public keys, time stamps and passwords. The proposed protocol was tested with a formal verification tool, Casper/FDR, and found secure and safe against external attacks.

A Study on the method of existing system migration for Cloud computing (클라우드 컴퓨팅 환경을 위한 기존 시스템의 이전 방안 연구)

  • Park, Sung-Hee;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.271-282
    • /
    • 2014
  • Cloud computing technology will provide application that needs many resources and various services to customers without any restriction of time and place. So, many of companies are now adopting cloud computing technology to this business and this trend is now increasing. However, cloud technology adoption rate is low because of security, compatibility, loss of control, security, data protection, performance and uptime, to the risk of vendor lock-in Cloud computing services, and compatibility with existing systems and anxiety. Now, many people are interest on the migration of existing systems but there are many study on this issue. So, more of study on this issue should be needed. This paper will show you the method that how to adopt cloud computing to their business and also show you evolution of cloud computing for existing system.

A Proposal of Efficient Method for Data Center Information System Migration (데이터센터 정보시스템 이전을 위한 효율적인 방안 제시)

  • Song, Min-Gu;Kim, Sun-Bae
    • Journal of Digital Convergence
    • /
    • v.12 no.3
    • /
    • pp.201-210
    • /
    • 2014
  • Recently, the more complicated with the elements made of information system, the more dangerous in migration them. So it is need to accomplish information system migration systematically. According to the movement of public institution, a large scale of information system migration is in processing and will be made. In this paper, I would like to suggest the use of migration solution in order to speed & effect information system migration process. This will be provided the pursuit function of information system movement, movement location pursuit in real time, monitoring function through the situation room, separation migration possibility on the basis of business attribute. Therefore, if you use the suggested solution, it will be decreased trial and error & minimized the movement time.

Big data, how to balance privacy and social values (빅데이터, 프라이버시와 사회적 가치의 조화방안)

  • Hwang, Joo-Seong
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.143-153
    • /
    • 2013
  • Big data is expected to bring forth enormous public good as well as economic opportunity. However there is ongoing concern about privacy not only from public authorities but also from private enterprises. Big data is suspected to aggravate the existing privacy battle ground by introducing new types of privacy risks such as privacy risk of behavioral pattern. On the other hand, big data is asserted to become a new way to by-pass tradition behavioral tracking such as cookies, DPIs, finger printing${\cdots}$ and etc. For it is not based on a targeted person. This paper is to find out if big data could contribute to catching out behavioral patterns of consumers without threatening or damaging their privacy. The difference between traditional behavioral tracking and big data analysis from the perspective of privacy will be discerned.

Convergence Study for Relationship Between Cholesterol Level on Serum and Depression in Korean Adults (우리나라 성인에서 혈청 콜레스테롤 수준과 우울증의 연관성에 대한 융복합적 연구)

  • Lee, Tae-Yong;Choi, Se-Mook
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.269-276
    • /
    • 2015
  • In order to examine the relationship between cholesterol level on serum and depression in Korean adults, this study used data of the fourth Korea National Health and Nutrition Examination Survey (KNHANES). 834 persons with depressive symptoms were selected as an index group and 3,317 persons without depressive symptoms as a control group, and odds ratios were calculated by multivariate logistic regression. As a result, odds ratio of depressive symptoms was higher in low LDL group (OR=6.435, 95% CI; 2,358-17.557) than in high LDL group adjusted after monthly income, marital status, period of education, occupation, smoking status, and physical activity. Etiopathogenic mechanism must be found by convergent study in the future.

Design The User Authentication Framework Using u-health System (u-health 시스템을 이용한 사용자 인증 프레임워크 설계)

  • Choo, Yeun-Su;Jin, Byung-Wook;Park, Jae-Pyo;Jun, Moon-Seog
    • Journal of Digital Convergence
    • /
    • v.13 no.5
    • /
    • pp.219-226
    • /
    • 2015
  • OTP(One Time Password) is for user authentication of Internet banking and users should carry their security card or OTP generator to use OTP. If they lost their security card or OTP generator, there is at risk for OTP leak. This paper suggests a new User Authentication Framework using personal health information from diverse technology of u-Health. It will cover the problem of OTP loss and illegal reproduction A User Authentication Framework is worthy of use because it uses various combinations of user's physical condition which is inconstant. This protocol is also safe from leaking information due to encryption of reliable institutes. Users don't need to bring their OTP generator or card when they use bank, shopping mall, and game site where existing OTP is used.

The influence of the attachment of parents and the stress of school life middle-school students to the Internet game addiction (중학생의 부모애착과 학교생활 스트레스가 인터넷 게임중독에 미치는 영향)

  • Yun, Sung-Il;An, Hong-Seon;Oh, Seok-Won
    • Journal of Digital Convergence
    • /
    • v.10 no.7
    • /
    • pp.221-227
    • /
    • 2012
  • In this study, attachment to parents of middle school students and they relate to school life stressors, and self-esteem of adolescent Internet addiction affects the aimed to clarify. The findings on gender statistics, chi-square value 9.347 corresponding to the Internet than female students at risk of addiction involves a lot, and self-esteem on the relationship between internet addiction and Kruskal-Wallis test statistic value of self-esteem to 3.868 two were negatively correlated. The school stresses and Internet gaming addiction Kruskal-Wallis test statistic values are 7.763, 3.819 correlation appeared to. Thus, self-esteem, peer relationships, teacher support programs that strengthen the relationship to develop, to deploy more concentrating on the policy implications and suggestions you have made that is meaningful to them.

A Study on the Cooperative Strategy of Enterprises -Focusing on the Importance Weight of Cooperative Strategy Factors- (기업의 협력 전략 방안에 관한 연구 -협력전략 요소를 중심으로-)

  • Choi, Kyong-Soon;Kim, Sang-Wook
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.189-201
    • /
    • 2013
  • With the rapid development of information and communication technologies, the boundaries of markets become blurred, and with the increasing uncertainties and risks of the future, competition among global companies becomes more intense. Accordingly the enterprises are considering or already taking cooperation strategies with enterprises in a competitive relationship as well as cooperative enterprises in a high correlation with one's own company as a plan to actively cope with changes in management environments. Thus, a cooperation strategy is an important element for the strengthening of the competitiveness of enterprises as well as the survival of the enterprises. However most preceding studies on cooperation strategies focus only on the effects of the properties of cooperation enterprises on the selection of cooperation partner enterprises and the business performance of the enterprises. Therefore, this study carried out an empirical analysis of the motivation and purpose of the construction of cooperation strategies by enterprise and what differences there are in factors to which importance is attached in selecting partners. In addition, this study analyzed the differences depending on the size: large and small enterprises and depending on the industry: electronics and chemical industries during AHP using a pairwise comparison technique.