• Title/Summary/Keyword: 사이버 공간

Search Result 569, Processing Time 0.031 seconds

Why Won't the Field Wall Collapse in the Typhoon? : Mathematical Approach to Non-orthogonal Symmetric Weighted Hadamard Matrix I (밭담은 태풍에 왜 안 무너지나?: 비직교 대칭 하중 아다마르 행렬에 의한 수학적 접근 I)

  • Lee, Moon-Ho;Kim, Jeong-Su
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.211-217
    • /
    • 2019
  • The three major inventions of Jeju include the field wall of Kim Koo Pan Gwan in 1234, Jeongnang in the custom of grazing the people of Jeju, and Olleh in the tomb of Munbang-gui in 1406. Field wall, Oedam from the stone and the stone of numerical play, made Koendang, a friendship society. Even with a typhoon that is more than 30m/s, the Koendang which is about 1.5m high, will not collapse. Similarly, the main family networks of Jeju society do not collapse under any difficulties situation. When building a field wall, two stones, which are under the ground, are placed side by side, and the upper left stone is placed on top and the upper right stone is attached regularly. One stone or two stone is attached from the bottom to the top, and when a stone is small or large, a flat field is formed in one space. The Family networks is close to the grandfather, grandmother, father, mother, and me, and the distant kin represents a horizontal relationship. The field wall is a vertical relationship that builds up from bottom to top of the vertical relation, while the Koendang is a horizontal relationship where blood is distributed to the grandson of his upper grandparents. This paper proves by a non-orthogonal symmetric weighted Hadamard matrix of whether the stone in the middle of a field wall has large stones (small).

A Qualitative Study on Coping strategies of Older adults with Depression: Focused on the Experience of Coping with Depression in Older Adults Living in Seoul (노인의 우울 대처 전략에 관한 질적 연구: 서울시 거주 도시 노인의 우울 대처 경험을 중심으로)

  • Eo, Yugyeong;Ko, Jung Eun;Kim, Soon Eun
    • 한국노년학
    • /
    • v.37 no.3
    • /
    • pp.583-600
    • /
    • 2017
  • The purpose of this study is to explore qualitatively what kind of coping strategy the Korean older adults use when they are depressed and why. Participants were users, older than 60, of an elderly welfare center in Seoul, and answers of 34 respondents who experienced depression were included in the analysis. The collected data were analyzed through content analysis. The results of the analysis showed that strategies to cope with depression used by participants were composed of 6 domains and 11 sub-domains: health behavior (medical approach / exercise and diet), family and social contact (social interaction / going out and going on a trip / communication with family), Religious activities (Religious activities), lifelong education (hobbies / educational activities), productive activities (labor), health risk behaviors (drinking and gambling / resignation). The depression coping strategies of the older adults and their characteristics are as follows. First, older adults used diverse problem-focused coping strategies to cope with depression. Second, older adults considered various coping strategies together and used them simultaneously. Third, the facility space for older adults functions as a shelter. Fourth, although there were cases where medical approach was used, the intention to reuse was very low. Through this study, the following suggestions were made to help older adults cope with depression more successfully. First, access to various coping strategies should be promoted. Second, more places where older adults can spend their time comfortably need to be provided. Third, resistance to mental health care should be resolved.

A Phenomenological Understanding of Educational Motives of Higher-Educated Adult Learners (고학력 성인학습자 교육동기의 현상학적 이해)

  • Bae, Na-Rae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.12
    • /
    • pp.182-191
    • /
    • 2020
  • This study is about the educational motivations of highly educated adult learners in order to understand the phenomenon of educational participation by highly educated adult learners and to analyze their characteristics. The analysis of this study used phenomenological methods. The findings are as follows. First, as a result of examining the motivations for education, both case 1 and case 2 show goal-oriented features. Second, as a result of examining the nature of education, case 1 was able to grasp the in-depth meaning of education and the nature and meaning of detailed education. In case 2, a learning-oriented characteristic is shown, unlike the goals presented in the motivation for education. Third, as a result of examining the changes in meaning of social welfare after learning about social welfare, case 1 was an opportunity to understand various areas of social welfare, and case 2 was able to explain the expertise of social welfare workers and the poor social welfare practice field. Fourth, an online university cited spatial and temporal flexibility, compared to offline universities, and explained that it has characteristics of self-directed learning.

A Study on IP Camera Security Issues and Mitigation Strategies (IP 카메라 보안의 문제점 분석 및 보완 방안 연구)

  • Seungjin Shin;Jungheum Park;Sangjin Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.111-118
    • /
    • 2023
  • Cyber attacks are increasing worldwide, and attacks on personal privacy such as CCTV and IP camera hacking are also increasing. If you search for IP camera hacking methods in spaces such as YouTube, SNS, and the dark web, you can easily get data and hacking programs are also on sale. If you use an IP camera that has vulnerabilities used by hacking programs, you easily get hacked even if you change your password regularly or use a complex password including special characters, uppercase and lowercase letters, and numbers. Although news and media have raised concerns about the security of IP cameras and suggested measures to prevent damage, hacking incidents continue to occur. In order to prevent such hacking damage, it is necessary to identify the cause of the hacking incident and take concrete measures. First, we analyzed weak account settings and web server vulnerabilities of IP cameras, which are the causes of IP camera hacking, and suggested solutions. In addition, as a specific countermeasure against hacking, it is proposed to add a function to receive a notification when an IP camera is connected and a function to save the connection history. If there is such a function, the fact of damage can be recognized immediately, and important data can be left in arresting criminals. Therefore, in this paper, we propose a method to increase the safety from hacking by using the connection notification function and logging function of the IP camera.

A Study on the Collection and Application Measures for Media Platform Based Materials (매체 플랫폼 기반 자료의 수집 및 적용 방안 연구)

  • Younghee Noh;Youngmi Jung;Aekyoung Son;Inho Chang;Hyunju Cha
    • Journal of Korean Library and Information Science Society
    • /
    • v.55 no.1
    • /
    • pp.193-214
    • /
    • 2024
  • This study aimed to propose a method for collecting and applying media platform based materials at the National Library of Korea. Firstly, we analyzed the current status and limitations of data collection based on domestic media platforms, including the National Library of Korea. Secondly, a literature review method was used to investigate the current status and types of digital content based on media platforms. Thirdly, we identified the types of materials based on media platforms that are not currently included in the National Central Library's online material collection guidelines through the examination of cases from major overseas libraries. Fourthly, after reviewing technical and legal elements such as the definition of collection targets and scope for each new media, and collection methods, we established collection criteria. Fifthly, based on the research results, the policies proposed in this study are as follows: 1) there is a need to establish a clear legal basis for the collection of media platform based materials; 2) the development and presentation of collection guidelines for media platform based materials is necessary; 3) the development of collection tools and infrastructure for media platform based materials is required; 4) for the collection of media platform based materials, it is necessary to obtain permission for collection from targeted social media organizations, and to cooperate in linkage with organizations that produce and service extended reality content; 5) for the service activation of media platform based materials, it is necessary to improve accessibility for the usage activation of these materials, to enhance the content extensibility and ease of use of the e-deposit system including extended reality content, and to advance and construct spaces for reproducing extended reality content.

Development of Practical Problem-Based Home Economics Teaching.Learning Process Plans by Blended Learning Strategy - Focusing on a Unit 'the Youth and Consumer Life' - (Blended Learning(BL) 전략을 활용한 실천적 문제 중심 가정과 교수 학습 과정안 개발 - '청소년과 소비생활' 단원을 중심으로 -)

  • Lee, Jin-Hee;Chae, Jung-Hyun
    • Journal of Korean Home Economics Education Association
    • /
    • v.20 no.4
    • /
    • pp.19-42
    • /
    • 2008
  • The purpose of this study was to develop practical problem-based home economics teaching.learning process plans about a unit 'the youth and consumer life' of middle school eighth-grade Technology and Home Economics by applying blended learning(BL) strategy. According to ADDIE instructional design model, this study was conducted in the following procedure: analysis, design/development, implementation, and evaluation. In the stage of design and development, the selected unit was converted into a practical problem-based unit, and practical problem-based teaching. learning process plans were designed in detail by using BL strategy. An online study room for practical problem-based home economics instruction grounded in BL strategy was prepared by using Edunet(http://community.edunet4u.net/${\sim}$consumer2). Eight-session lesson plans were mapped out, and study aids for students and materials for teachers were prepared. In the implementation stage, the first-session teaching plans that dealt with a minor question 'what preparations should be made to become a wise consumer' were utilized when instruction was provided to 115 eighth graders who were in three different province, and the other one was in a middle school in the city of Daejeon. The experimental teaching was implemented for two weeks in the following procedure: preliminary program, pre-online learning, main instruction and post- online learning. The preliminary program was carried out in a session in the classroom, and pre-online learning was provided before the main instruction was given in a session in the classroom. After the main instruction was completed, post-online learning was offered. In the evaluation stage, a survey was conducted on all the learners and teachers to find out their opinions and suggestions.

  • PDF

Multi-dimensional Security Threats and Holistic Security - Understanding of fusion-phenomenon of national security and criminal justice in post-modern society - (다차원 안보위협과 융합 안보)

  • Yun, Min-Woo;Kim, Eun-Young
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.157-185
    • /
    • 2012
  • Today, the emergence of cyberspace and advancement of globalization caused not only the transformation of our productive and conventional life but also the revolutionary transition of use of destructive violence such as crime and warfare. This transition of environmental condition connects various security threats which separatedly existed in individual, local, national, and global levels in the past, and transformed the mechanical sum of all levels of security threats into the organic sum of multi-dimensional security threats. This article proposes that the sum of multi-dimensional security threats is caused by the interconnectivity of various different levels of security threats and the integrated interdisciplinary perspective is essential to properly understand the fundamental existence of today's security problem and the reality of fear that we face today. The holistic security, the concept proposed here, is to suggest the mode of networked response to multi-dimensional security threats. The holistic security is suggested to overcome the conventional divisional approach based on the principle of "division of labor" and bureaucratic principles, which means more concretely that national security and criminal justice are divided and intelligence, military, police, prosecution, fire-fighting, private security, and etc. are strictly separated into its own expertise and turf. Also, this article introduces integrated security approaches tried by international organization and major countries overseas with the respect of the holistic security. The author have spent some substantial experience of participant observation, meetings, seminar, conference, and expert interviews regarding the issues discussed in the article in various countries including the United States, Russia, Austria, Germany, Canada, Mexico, Israel, and Uzbekistan for the last ten years. Intelligence and information on various levels of security threats and security approaches introduced in this paper is obtained from such opportunities.

  • PDF

A Study on the Restructuration of Norm System in the Field of ICT for the Smart Media (Smart미디어시대 정보통신·미디어(ICT) 분야 규범체계의 재구조화에 관한 연구)

  • Ji, Seong-Woo
    • Journal of Legislation Research
    • /
    • no.44
    • /
    • pp.33-62
    • /
    • 2013
  • In this paper, the consolidation of ICT basic legislation and ICT special legislation concerning "Ministry of Science, ICT and Future Planning" and "Korea Communications Commission" which came on the back of governmental reorganization in recent years is discussed in the theoretical and practical aspect. Development of "data communication technology" innovatively changed the method of livelihood of mankind, the emergence of network under global dimension provided financial social benefit and posed a challenge and a threat at the same time. Form digital revolution human kind can expect to receive many important blessings. Nevertheless, there are many advantages of development of technology by digital revolution, cyberspace like online media, internet etc. has realistically many problems that must be solved. To maximum positive aspects like the expansion of freedom of expression and creating plan of economy by the advance of transmission technology is needed. And to minimize side effects of informatization is required more. The First, Special Act on ICT has an adaptation in normative standardization to be fit in media convergence beyond convergence of broadcasting and telecommunications. Henceforth, there must be established a legal basis for the achievement of protection of economic evolution and freedom of speech in digital media, information, communication technology and content development. The second, the government action is to accomplish economic development and freedom of information in structural aspect of norm. Therefore minimizing normative problem by reorganization of organization remains clearly unresolved in politics. The third, Special Act on ICT must be basic law covering info-communications field, pay telecommunication and media contents field. The forth, from a technical point of view, net neutrality, conflict of interest for digital content and so on can be fixed easily. Special Act on ICT must not only pursuit of development of industry. Special Act on ICT and pursuit of enhancing quality of life of people and preparing program to promote democratization. From now on, we need to make powerful nation of information& communications technology and in information human rights protection field got to be one step ahead of others with reference to appear all the various aspects must be brought together in the discussion of legislation process of Special Act on ICT.

A Study on Transfer Process Model for long-term preservation of Electronic Records (전자기록의 장기보존을 위한 이관절차모형에 관한 연구)

  • Cheon, kwon-ju
    • The Korean Journal of Archival Studies
    • /
    • no.16
    • /
    • pp.39-96
    • /
    • 2007
  • Traditionally, the concept of transfer is that physical records such as paper documents, videos, photos are made a delivery to Archives or Records centers on the basis of transfer guidelines. But, with the automation of records management environment and spreading new records creation and management applications, we can create records and manage them in the cyberspace. In these reasons, the existing transfer system is that we move filed records to Archives or Records centers by paper boxes, needs to be changed. Under the needing conditions of a new transfer paradigm, the fact that the revision of Records Act that include some provisions about electronic records management and transfer, is desirable and proper. Nevertheless, the electronic transfer provisions are too conceptional to apply records management practice, so we have to develop detailed methods and processes. In this context, this paper suggest that a electronic records transfer process model on the basis of international standard and foreign countries' cases. Doing transfer records is one of the records management courses to use valuable records in the future. So, both producer and archive have to transfer records itself and context information to long-term preservation repository according to the transfer guidelines. In the long run, transfer comes to be the conclusion that records are moved to archive by a formal transfer process with taking a proper records protection steps. To accomplish these purposes, I analyzed the 'OAIS Reference Model' and 'Producer-Archive Interface Methodology Abstract Standard-CCSDS Blue Book' which is made by CCSDS(Consultative committee for Space Data Systems). but from both the words of 'Reference Model' and 'Standard', we can understand that these standard are not suitable for applying business practice directly. To solve this problem, I also analyzed foreign countries' transfer cases. Through the analysis of theory and case, I suggest that an Electronic Records Transfer Process Model which is consist of five sub-process that are 'Ingest prepare ${\rightarrow}$ Ingest ${\rightarrow}$ Validation ${\rightarrow}$ Preservation ${\rightarrow}$ Archival storage' and each sub-process also have some transfer elements. Especially, to confirm the new process model's feasibility, after classifying two types - one is from Public Records center to Public Archive, the other is from Civil Records center to Public or Civil Archive - of Korean Transfer, I made the new Transfer Model applied to the two types of transfer cases.