• Title/Summary/Keyword: 명예

Search Result 276, Processing Time 0.028 seconds

A study on digital jewelry design through reinterpretation of symbolic element of Peony flower in Minwha with Linguistic analysis (민화 '모란' 의 언어학적 상징요소 재해석을 통한 디지털 주얼리 디자인 연구)

  • Lee, Ji-Won;Nah, Ken
    • Journal of Digital Convergence
    • /
    • v.14 no.8
    • /
    • pp.407-413
    • /
    • 2016
  • This research is aimed to discuss for Korean cultural contents; symbol structure of Minwha painting which not only expresses openness, flexible expression and methods of communication of our ancestors but also possibly passes down as precious cultural heritage to modern society with new developed mediums. From this perspectives, as a method of research, modern jewelry design is created through digital process with linguistics analysis of its symbol structure that contains universal wishes of people. As a result, this research showed jewelry design and design process, titled "Blossom" and "Big Smile" grafting modern technology of 3D digital tool onto universal meaning symbolized by Peony flower, wealth and honor, and also grafted modern manufacturing methods of 3D printing and laser cut onto openness and flexible thinking in symbol structure in Minwha.

A Malicious Comments Detection Technique on the Internet using Sentiment Analysis and SVM (감성분석과 SVM을 이용한 인터넷 악성댓글 탐지 기법)

  • Hong, Jinju;Kim, Sehan;Park, Jeawon;Choi, Jaehyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.2
    • /
    • pp.260-267
    • /
    • 2016
  • The Internet has brought lots of changes to us sharing information mutually. However, as all social symptom have double-sided character, it has serious social problem. Vicious users have been taking advantage of anonymity on the Internet, stating comments aggressively for defamation, personal attacks, privacy violation and more. Malicious comments on the Internet are creating the biggest problem regarding unlawful acts and insults which occur on the Internet. In order to solve the issues, several studies have been done to efficiently manage the comments. However, there are limitations to recognize modified malicious vocabulary in previous research. So, in this paper, we propose a malicious comments detection technique by improving limitation of previous studies. The experimental result has shown accuracy of 87.8% providing higher accuracy as compared to previous studies done.

Image Identification Plan for SeJong-City Presidential Archives (세종시 대통령기록관 상설전시 연출을 위한 색채·전시사인 계획)

  • Lee, In-Ho;Lee, Heung-Wu;Kyung, Byung-Pyo;Ryu, Seuc-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.12
    • /
    • pp.169-174
    • /
    • 2018
  • The museum, run by the archives, should show historical facts about the president through objective records that are not fully evaluated. The wartime atmosphere should maintain solemnity to highlight the evidential value of records about history, but include an interesting element that allows visitors to come comfortably. It would be possible to accommodate 360 viewers at the same time, and it would be an option to limit the number of visitors considering the operation of weekend events and the donor honor hall. In this study, we established and presented an image integration plan centered on the color plan and the signature plan. Although the real image integration plan is a case study that starts with symbols and logos and is conducted through an integrated and systematic system through the basic design and application design system, it is considered to be a meaningful study in terms of practical use.

A Study on the Major Satisfaction and Job Preferences of Dental Hygiene Students according to Their DISC Behavioral Patterns (일부 치위생(학)과 학생의 DISC행동유형에 따른 전공만족도와 직업선호도 연구)

  • Lee, Sun-Hee;Shim, Hyun-Ju
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.5
    • /
    • pp.217-227
    • /
    • 2019
  • The purpose of this study had been conducted to figure out the relationship of DISC typy behavioral patterns between major satisfaction and job preference. The survey in this subject had been carried out for 192 dental hygiene students from April 1 to 10, 2019. The findings were as follows: Among the sub-factors of major satisfaction based on DISC typy behavioral patterns, S type is higher in the contents of instruction and the way of teaching, the type C and S are higher in school facilities and environments. Among the sub-factors of job preference based on DISC typy behavioral patterns, the type D is higher in honor, development and stability, the type S is higher in aptitude, interest, development, stability and working environment, and the type C is higher in aptitude and interest. As DISC typy behavioral patterns, major satisfaction, and job preference were found to be related to one another, this finding should be considered when teaching career guidance for college students.

Applied Method to Trusted Digital Content Distribution Architecture (신뢰할 수 있는 디지털 콘텐츠 유통 아키텍처 방안)

  • Kim, Hye-Ri;Hong, Seng-Phil;Lee, Chul-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.6A
    • /
    • pp.151-162
    • /
    • 2008
  • As the innovative internet technologies and multimedia are being rapidly developed, digital content is a remarkable new growth industry and supplied by various channel. For example, domestic sales volume in digital contents marked an annual increase of 14.7% since 2003. Against the merits of digital content distribution, Information reengineering aspects are getting more serious issues in these days such as infringement of copyright, flood of inappropriate content, invasion and infringement of privacy, etc. In this paper, we are making a suggestion of the TDCDA-Trusted Digital Content Distribution Architecture in order to solve above problems. TDCDA is provided to how well-define and design the trusted path in digital contents distribution in internet environments using a secure distribution mechanism, digital content integrity and copyright protection. Finally, we also proposed the TDCDA algorithm and applicable guidelines for feasible approach in real computing environment.

A Study on Threat factors of Information Security in Social Network Service by Analytic Hierarchy Process (AHP를 이용한 SNS 정보보호 위협요인 분석)

  • Sung, Ki-Hoon;Kong, Hee-Kyung;Kim, Tae-Han
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.6
    • /
    • pp.261-270
    • /
    • 2010
  • As the usage of social network service(SNS) increases recently, great attention has been shown to the information security in SNS. However, there has been little investment in SNS environment for security while preferential investment to attract subscribers has been made so far. Moreover, there is still a lack of confidence for investment effect and an absence of framework to analyze the threat factors of information security in SNS. In this paper, we propose to model for decision-making standard of SNS information security investment by the AHP. The result shows that 'service image' is the most important criterion for the decision of SNS information security. It also shows that 'Profile-squatting and reputation slander through ID thefts' and 'Corporate espionage' are important threat factors in SNS information security.

A Study on Comparative Analysis and Activation Plan of Library Week (도서관주간의 비교 분석 및 활성화 방안에 관한 연구)

  • Sim, Hyojung;Noh, Younghee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.2
    • /
    • pp.157-177
    • /
    • 2022
  • This study, in relation to the decision to designate April 12 as the Library Day and the week from that day as the Library Week starting in 2023 in accordance with the amendment of the Libraries Act, suggests ways how the Library Week could be activation plan based on the analysis of the meaning and history of the Library Week which started in 1964 and cases of the use of library week at home and abroad. The uses of library week at home and abroad were analyzed and based on the implications drawn, suggestions for promoting the Library Week, were made in terms of three aspects - efficient methods for using the Library Week, changes in programs, diversification of promotional strategies. This paper suggests in order to promote the Library Week, various ways of running events, online and offline platforms, honorary ambassadors, unique commemorative events, national campaigns, archiving and all-year-round promotional channels and system are needed. This study could be used as a reference for promoting the Library Day and Library Week that will start in 2023.

Analysis of Psychological Factors Inducing Cybercrime (사이버범죄를 유발하는 심리적요인 분석)

  • Lim, HeonWook
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.2
    • /
    • pp.157-163
    • /
    • 2021
  • This study attempted to find individual reasons for inducing cybercrime. The survey was conducted targeting investigators and security experts on 11 types of cybercrime. There are 16 internal factors that cause crime and classified according to Maslow's 5 steps. As a result of the survey on a total of 176 items, the credibility of the Cronbach's Alpha coefficient was 0.925. The result of the factor analysis is as follows. Factor analysis results are maslow phase 1 physiological desire is commercial, sykes. Phase 2 safety desires are not punishable and crowd. The three-stage social desire is impulsiveness, indifference, etc. The fourth stage of respect is anonymity and honor. The desire for self-reality in stage 5 has been reduced to indesity, a loss of moderation, morality, and media effects. In conclusion, the physiological desire, the desire for respect for the crime of infringing on the information and communication network, the desire for menstruation, the desire for self-realization for the crime of using information and communication networks, the desire for self-actualization for the crime of illegal content. It was in the order of desire.

A Comparative Study about Different Perceptions on Creative Individuals in South Korea (창의적 인물에 대한 지역 및 세대별 인식차이 비교 연구)

  • Kim, Seonghwan
    • Journal of Creative Information Culture
    • /
    • v.5 no.3
    • /
    • pp.192-201
    • /
    • 2019
  • This study aims to explore the different perceptions of South Koreans about creative individuals. The author collected data from the rural and urban areas of South Korea. Also, the author developed the creative traits scale and used it in investigating the different perceptions between teenagers in rural and urban areas. As a result, mainly, research participants from urban areas and young generations indicated businessmen as creative individuals and explained their creativity with creative thinking, personalities, and products. However, the majority of participants in rural areas and old generations reported politicians as creative individuals and described their creativity with social reputation and morality. There were also statistically different viewpoints about the traits of creative individuals between teenagers in rural and urban areas in a similar way.

Authorship and Inappropriate Authorship from an Ethical Publication Perspective (출판 윤리적 관점에서의 저자됨과 부적절한 저자됨)

  • Sung Hun Kim;Jung Im Jung
    • Journal of the Korean Society of Radiology
    • /
    • v.83 no.4
    • /
    • pp.752-758
    • /
    • 2022
  • Authorship is important for research integrity and publication ethics, acting as the basis for credit and academic achievement. Moreover, publication achievements have a significant impact on research grants and academic careers. Inappropriate authorship has been reported for several reasons, including complex interests and competitive environments. One form of this is representative authorship misuse, which includes honorary and ghost authorships. Kin co-authorship, such as parent-children authorship, is another form of inappropriate authorship that has recently emerged as a social problem in Korea. To address these issues, the International Committee of Medical Journal Editors (ICMJE) has established criteria for authorship. Similarly, many journals use the Contributor Roles Taxonomy (CRediT) and Open Researcher and Contributor ID (ORCID) systems to prevent authorship misuse and systematically evaluate author credit and responsibility. Herein, this article reviews authorship and inappropriate authorship, as well as introduces methods to avoid authorship misuse.