• 제목/요약/키워드: 문형 정보

Search Result 179, Processing Time 0.023 seconds

Exploration of Emotional Labor Research Trends in Korea through Keyword Network Analysis (주제어 네트워크 분석(network analysis)을 통한 국내 감정노동의 연구동향 탐색)

  • Lee, Namyeon;Kim, Joon-Hwan;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.3
    • /
    • pp.68-74
    • /
    • 2019
  • The purpose of this study was to identify research trends of 892 domestic articles (2009-2018) related to emotional labor by using text-mining and network analysis. To this end, the keyword of these papers were collected and coded and eventually converted to 871 nodes and 2625 links for network text analysis. First, network text analysis revealed that the top four main keyword, according to co-occurrence frequency, were burnout, turnover intention, job stress, and job satisfaction in order and that the frequency and the top four core keyword by degree centrality were all relatively the high. Second, based on the top four core keyword of degree centrality the ego network analysis was conducted and the keyword for connection centroid of each network were presented.

스마트팜의 기술적 특성이 수용의도에 미치는 영향요인 연구: 노력기대의 매개효과를 중심으로

  • An, Mun-Hyeong;Heo, Cheol-Mu
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2018.11a
    • /
    • pp.111-120
    • /
    • 2018
  • 최근 농촌 고령화와 노동력 부족, 경지면적의 감소, 이상기후에 따른 환경 변화, 시장개방에 따른 무한경쟁 상태에 놓인 국내 농업의 어려운 상황 속에서 스마트팜은 미래 농업의 새로운 트렌드로 주목받고 있다. 이에 본 연구는 스마트팜의 기술수용의도에 미치는 영향요인들을 살펴보고 이를 바탕으로 스마트팜 도입 확산을 위한 제언을 하고자 한다. 본 연구에서는 스마트팜 수용의도에 가장 영향을 미치는 요인으로 통합기술수용이론(UTAUT)을 근거로 스마트팜의 기술적 특성과 노력기대를 제시하였다. 실제 농업에 종사하고 있는 농업인들을 대상으로 수집한 설문결과를 자료분석에 사용하였으며, 독립변수로는 스마트팜의 기술적 특성으로 가용성, 신뢰성, 경제성을 선정하여 종속변수인 스마트팜 수용의도에 미치는 영향요인을 분석하였고, 노력기대의 매개효과를 분석하였다. 연구결과, 스마트팜의 기술적 특성 중 가용성과 경제성은 스마트팜 수용의도에 정(+)의 영향을 미치며, 신뢰성은 스마트팜 수용의도에 영향을 미치지 않는 것으로 나타났다. 또한, 스마트팜의 기술적 특성인 가용성, 신뢰성, 경제성은 스마트팜 노력기대에 정(+)의 영향을 미치는 것으로 나타났다. 이와 함께 스마트팜에 대한 노력기대는 스마트팜의 기술적 특성과 독립적으로 스마트팜 수용의도에 정(+)의 영향을 미치는 것으로 나타났다. 매개효과와 관련해서는, 스마트팜에 대한 노력기대는 스마트팜의 기술적 특성인 가용성, 신뢰성, 경제성과 스마트팜 수용의도간의 관계를 매개하는 것으로 나타났다. 이러한 분석결과는 농업인들의 스마트팜 도입을 촉진시키기 위해서는 스마트팜 기술의 안정적 기능 수행을 체감할 수 있는 전문적인 현장실습교육 프로그램, 기기 및 통신의 표준화, 스마트팜 도입에 따른 투자대비 수익성 변화의 구체적 제시, 양질의 환경 생육 데이터 수집 및 활용 체계 구축이 필요함을 시사한다.

  • PDF

Reference Model for the Service of Smart City Platform through Case Study (사례 연구를 통한 스마트 시티 플랫폼의 서비스를 위한 참조 모델)

  • Kim, Young Soo;Mun, Hyung-Jin
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.241-247
    • /
    • 2021
  • As a way to solve the side effects of urban development, a smart city with information and communication technology converges in the city is being built. For this, a smart city platform should support the development and integration of smart city services. Therefore, the underlying technology and the functional and non-functional requirements that the smart platform must support were analyzed. As a result of this, we classified the Internet of Things, cloud computing, big data and cyber-physical systems into four categories as the underlying technologies supported by the smart city platform, and derived the functional and non-functional requirements that can be implemented and the reference model of the smart city platform. The reference model of the smart city platform is used for decision-making on investment in infrastructure technology and the development scope of services according to functional or non-functional requirements to solve specific city problems for city managers. It provides platform developers with guidelines to identify and determine the functional and non-functional requirements and implementation technologies of software platforms for building smart cities.

Design of Intelligent Intrusion Context-aware Inference System for Active Detection and Response (능동적 탐지 대응을 위한 지능적 침입 상황 인식 추론 시스템 설계)

  • Hwang, Yoon-Cheol;Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.4
    • /
    • pp.126-132
    • /
    • 2022
  • At present, due to the rapid spread of smartphones and activation of IoT, malicious codes are disseminated using SNS, or intelligent intrusions such as intelligent APT and ransomware are in progress. The damage caused by the intelligent intrusion is also becoming more consequential, threatening, and emergent than the previous intrusion. Therefore, in this paper, we propose an intelligent intrusion situation-aware reasoning system to detect transgression behavior made by such intelligent malicious code. The proposed system was used to detect and respond to various intelligent intrusions at an early stage. The anticipated system is composed of an event monitor, event manager, situation manager, response manager, and database, and through close interaction between each component, it identifies the previously recognized intrusive behavior and learns about the new invasive activities. It was detected through the function to improve the performance of the inference device. In addition, it was found that the proposed system detects and responds to intelligent intrusions through the state of detecting ransomware, which is an intelligent intrusion type.

Design of a Secure Keypads to prevent Smudge Attack using Fingerprint Erasing in Mobile Devices (모바일 단말기에서 지문 지우기를 활용한 스머지 공격 방지를 위한 보안 키패드 설계)

  • Hyung-Jin, Mun
    • Journal of Industrial Convergence
    • /
    • v.21 no.2
    • /
    • pp.117-123
    • /
    • 2023
  • In the fintech environment, Smart phones are mainly used for various service. User authentication technology is required to use safe services. Authentication is performed by transmitting authentication information to the server when the PIN or password is entered and touch the button completing authentication. But A post-attack is possible because the smudge which is the trace of using screen remains instead of recording attack with a camera or SSA(Shoulder Surfing Attack). To prevent smudge attacks, users must erase their fingerprints after authentication. In this study, we proposed a technique to determine whether to erase fingerprints. The proposed method performed erasing fingerprint which is the trace of touching after entering PIN and designed the security keypads that processes instead of entering completion button automatically when determined whether the fingerprint has been erased or not. This method suggests action that must erase the fingerprint when entering password. By this method, A user must erase the fingerprint to complete service request and can block smudge attack.

Design for Position Protection Secure Keypads based on Double-Touch using Grouping in the Fintech (핀테크 환경에서 그룹핑을 이용한 이중 터치 기반의 위치 차단이 가능한 보안 키패드 설계)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.3
    • /
    • pp.38-45
    • /
    • 2022
  • Due to the development of fintech technology, financial transactions using smart phones are being activated. The password for user authentication during financial transactions is entered through the virtual keypad displayed on the screen of the smart phone. When the password is entered, the attacker can find out the password by capturing it with a high-resolution camera or spying over the shoulder. A virtual keypad with security applied to prevent such an attack is difficult to input on a small touch-screen, and there is still a vulnerability in peeping attacks. In this paper, the entire keypad is divided into several groups and displayed on a small screen, touching the group to which the character to be input belongs, and then touching the corresponding character within the group. The proposed method selects the group to which the character to be input belongs, and displays the keypad in the group on a small screen with no more than 10 keypads, so that the size of the keypad can be enlarged more than twice compared to the existing method, and the location is randomly placed, hence location of the touch attacks can be blocked.

농업벤처기업의 빅데이터 사용의도에 미치는 영향요인과 기대편익에 대한 연구: 농업벤처 사업분야별 차이에 대한 비교를 중심으로

  • An, Mun-Hyeong;Heo, Cheol-Mu
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2020.11a
    • /
    • pp.47-53
    • /
    • 2020
  • 빅데이터 기술은 기업의 경쟁력을 높일 수 있는 혁신 기술 중 하나로 급성장하고 있는 가운데 농업 분야 또한 빅데이터를 활용한 경쟁력 제고와 미래 산업으로의 발전이 중요 당면과제로 부상하고 있다. 해외의 경우 농업 빅데이터를 활용한 스타트업이 빠른 속도로 증가하며 성장하는 반면 국내의 경우 생산 분야 일부 농업 벤처 외에는 빅데이터 활용이 미흡한 실정이다. 또한 기업의 빅데이터 활용수준이나 활용의도에 영향을 미치는 요인에 대한 연구가 대기업이나 특정 산업에 국한되어 이루어지고 있으며, 연구마다 영향요인 변수의 검증결과가 상이하게 나타나 산업/기업특성에 따라 연구가 필요하다. 본 연구의 목적은 농업벤처기업에서 새로운 ICT인 빅데이터를 도입하고 사용하는 데 영향을 미치는 요인을 파악하고, 이를 통해 기대하는 편익에 대해 파악함으로써 활용을 촉진할 수 있는 방안을 제시하는 데 있다. 본 연구는 빅데이터가 조직의 프로세스를 변화시키고, 최고경영층의 지원이 필수적이며, 기업이 처한 환경적 압박에 대응할 수 있는 수단으로 보고 기술·조직·환경(TOE: Technology-Organization-Environment) 프레임워크를 기반으로 혁신확산이론(Diffusion of Innovation Theory) 모형을 결합하여 본 연구에 적합한 변수들을 도출한 후 이들 변수간의 인과관계를 설정하여 연구모형을 구성하였다. 이에 따라 TOE모형의 기술적 요인에 관한 변수로는 혁신확산이론 변수인 상대적이점, 호환성, 복잡성을 채택하였고, 조직적 요인에 관한 변수로 최고경영층 지원, 비용부담능력을, 환경적 요인에 관한 변수로는 법적·정책적 지원, 경쟁자 압력을 채택하였다. 이들 3가지 요인에 속한 7가지 변수들과 빅데이터 사용의도와 기대편익 간의 관련성, 그리고 농업벤처 사업분야의 조절효과에 대한 8개의 가설을 설정하였다. 본 연구는 실제 농업벤처기업 종사자 대상 설문을 통한 실증연구를 통해 벤처 현장에서의 빅데이터 활용수준을 높이기 위한 기술적, 조직적, 환경적 관점의 정책 개선방안을 제시하고, 생산/가공/유통 등 사업분야별 비교를 통해 영향요인의 중요도 차이를 규명해 영역별로 차별적이고 효과적인 정책 방향성을 도출하는 데 시사점을 제시하고자 한다.

  • PDF

Secure PIN Authentication Technique in Door-Lock Method to Prevent Illegal Intrusion into Private Areas (사적 영역에 불법 침입 방지를 위한 도어락 방식의 안전한 PIN 인증 기법)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • v.16 no.3_spc
    • /
    • pp.327-332
    • /
    • 2024
  • The spread of smart phones provides users with a variety of services, making their lives more convenient. In particular, financial transactions can be easily made online after user authentication using a smart phone. Users easily access the service by authenticating using a PIN, but this makes them vulnerable to social engineering attacks such as spying or recording. We aim to increase security against social engineering attacks by applying the authentication method including imaginary numbers when entering a password at the door lock to smart phones. Door locks perform PIN authentication within the terminal, but in smart phones, PIN authentication is handled by the server, so there is a problem in transmitting PIN information safely. Through the proposed technique, multiple PINs containing imaginary numbers are generated and transmitted as processed values such as hash values, thereby ensuring the stability of transmission and enabling safe user authentication through a technique that allows the PIN to be entered without exposure.

Design of an Efficient Control System for Harbor Terminal based on the Commercial Network (상용망 기반의 항만터미널 효율적인 관제시스템 설계)

  • Kim, Yong-Ho;Ju, YoungKwan;Mun, Hyung-Jin
    • Journal of Industrial Convergence
    • /
    • v.16 no.1
    • /
    • pp.21-26
    • /
    • 2018
  • The Seaborne Trade Volume accounts for 97% of the total. This means that the port operation management system can improve port efficiency, reducing operating costs, and the manager who manages all operations at the port needs to check and respond quickly when delays of work and equipment support is needed. Based on the real-time location information confirmation of yard automation equipment used the existing system GPS, the real-time location information confirmation system is a GPS system of the tablet, rather than a port operation system that monitors location information for the entered information, depending on the completion of the task or the start of the task. Network configurations also reduce container processing delays by using commercial LTE services that do not have shading due to containers in the yard also reduce container processing delays. Trough introduction of smart devices using Android or IOS and container processing scheduling utilizing artificial intelligence, we will build a minimum delay system with Smart Device usage of container processing applications and optimization of container processing schedule. The adoption of smart devices and the minimization of container processing delays utilizing artificial intelligence are expected to improve the quality of port services by confirming the processing containers in real time to consumers who are container information demanders.

Status of Interchange of Medical Imaging in Korea: A Questionnaire Survey of Physicians (영상정보교류 실태 파악을 위한 의사 설문조사)

  • Choi, Moon Hyung;Jung, Seung Eun;Kim, Sungjun;Shin, Na-Young;Yong, Hwan Seok;Woo, Hyunsik;Jeong, Woo Kyoung;Jin, Kwang Nam;Choi, SeonHyeong
    • Journal of the Korean Society of Radiology
    • /
    • v.79 no.5
    • /
    • pp.247-253
    • /
    • 2018
  • The purpose of this study was to summarize the results of a survey for physicians with specialties other than radiology about imaging studies of patients referred from other institutions. The survey was promoted through individual contacts or social network service and physicians who voluntarily responded to the survey were the subjects of the study. The questionnaire consisted of 11 questions about basic information and referrals about medical imaging. A total of 160 physicians from 30 specialties participated in the survey and 95.6% of the respondents worked in tertiary care center or general hospital. Patients were frequently referred with outside medical images. The most frequently referred imaging modalities were computed tomography and magnetic resonance imaging. However, radiological reports from outside institutions were rarely referred. Most physicians thought that reinterpretation for outside imaging is necessary to acquire a secondary opinion. In conclusion, considering that outside radiological reports are frequently missing and there are high demands on reinterpretation for outside imaging, guidelines for referral of radiological reports with medical imaging, basic elements of radiological reports, and reinterpretation need to be developed.