• Title/Summary/Keyword: 사회네트워크서비스

Search Result 730, Processing Time 0.029 seconds

Metaverse Technology and Security Threats and Countermeasures (메타버스 기술과 보안 위협 및 대응방안)

  • Woo, SungHee;Lee, HyoJeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.328-330
    • /
    • 2022
  • Currently, the Metaverse is introduced in various fields, and a virtual convergence economy that uses NFTs for content or item transactions is expected to develop into a 'metaverse environment'. The 'metaverse environment' will lead the changes in our society in the future and it will be fused with AI, big data, cloud, IoT, block chain, and next-generation network technology. However, personal information, device information, and behavior information provided by Metaverse users to use the service are subject to major attacks. Therefore, in order to provide a safe environment for users to use and to expand the business base of related companies, building a public-private cooperation system and developing a security guide are the leading tasks. Therefore, in this study, we compare and analyze metaverse features and technologies, and examine possible security threats and countermeasures.

  • PDF

Factor Analysis of Negative SNS Behaviors using Association Rules (연관규칙을 이용한 SNS에서의 부정적 행동 요인 분석)

  • Lee, Soojung
    • The Journal of Korean Association of Computer Education
    • /
    • v.16 no.2
    • /
    • pp.61-68
    • /
    • 2013
  • SNS is a social networking service that helps people to have a two-way communication, manage their personal relationships and share information. The domestic and international SNS markets have attained a steady growth, and their growth is being more accelerated recently. Under these circumstances, immature students are more likely to show negative cyber behavior. This study attempted to analyze the relationship between the use of SNS, motives of SNS use, the use of active SNS functions, SNS-dependency and views in SNS and negative SNS behaviors among elementary and middle school students. For this, negative cycber behaviors are classified into four stages depending on the severity, for each of which distribution of factors is investigated and the combination of factors to determine each stage is obtained through association rule analysis. As a result, it is found that 85% of the students rarely show negative cyber behaviors, stealing personal information and contacting with strangers are the most frequent negative behaviors, and students with a great dependency on SNS are highly probable to show negative behaviors.

  • PDF

Design of Life Habits Disease System using Neural Network (신경망을 이용한 생활습관성 질환 시스템 설계)

  • Lee, Young-Ho;Chung, Kyung-Yong;Kang, Un-Gu
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.1-6
    • /
    • 2012
  • In modern society, the amount of information has been significantly increased according to the development of IT convergence technology. That leads to develop information obtaining and searching technologies from lots of data. However, they don't seem to have been actually effective for users' health care and promotion not only for limitations of Web-based information and but for lack of personalization. Health information support services have been generally developed in a format of inputting data on bio-information acquired into the computer for the existing network-based transmission. In this paper, a life habits disease system that uses the existing medical data and Framingham risk factor(FRS) performs neural network is proposed. Based on the proposed system, it is possible to provide the fundamental data and guideline to doctors for recognizing the life habits disease diagnosis of patients and that represents increases in the welfare of patients.

UCQM: A Quality Model for Practical Evaluation of Ubiquitous Computing Systems (유비쿼터스 컴퓨팅 시스템의 실용적 품질 평가 모델)

  • Oh, Sang-Hun;Kim, Soo-Dong;Rhew, Sung-Yul
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.4
    • /
    • pp.342-358
    • /
    • 2007
  • Ubiquitous Computing System (UCS) is a system where the user can get information through computer network anytime and anywhere regardless of the places. Since UCS is a personalized system, it should interact with other systems. UCS will bring a remarkable change in production, consumption, politics, economy, community, culture, and other areas related to our daily life. That is, a high-quality UCS results in high-quality services provided to users. Hence, this paper proposes a systematic quality model based on ISO/lEC 9126 in order to evaluate the ubiquitous computing system, based on ISO/lEC 9126. And, we identify key characteristics of UCS and derive the set of quality attributes based on identified characteristics. We define metrics for each quality attribute and Ubiquitous Computing Quality Model CUCQM) so that we can evaluate overall environment and important characteristics of UCS.

A Study of an Mobile Agent System Based on Hybrid P2P (변형 P2P 기반 시스템을 활용한 이동 에이전트 시스템에 관한 연구)

  • Lee, Seok-Hee;Yang, Il-Deung;Kim, Seong-Ryeol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.5
    • /
    • pp.19-28
    • /
    • 2012
  • Recently a grid and cloud computing collaboration have become a social issue. These collaborative network system, the P2P system based on this system. Distingui shed from the client/server systems, P2P systems in order to exchange information, its purpose and functions are divided according to the morphological Category. In accordance with the purposes and functions of information and data retrieval, remote program control and integration services for the offers. Most P2P systems client/server scalability, and management takes the form, but to overcome the disadvantages in terms of applying the mixed-mode system is increasing. And recently the distributed computing aspects of the service to users in order to provide suitable to accommodate the diverse needs of various types of mobile agent technology is needed. In this paper, as required by the mobile agent access to a remote resource access control and agent for the execution and management capabilities and improve the reliability of the mobile agent system designed to suggest.

Design of Health Warning Model on the Basis of CRM by use of Health Big Data (의료 빅데이터를 활용한 CRM 기반 건강예보모형 설계)

  • Lee, Sangwon;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1460-1465
    • /
    • 2016
  • Lots of costs threaten the sustainability of the national health-guarantee system. Despite research by the national center for disease control and prevention on health care dynamics with its auditing systems, there are still restrictions of time limitation, sample limitation, and, target diseases limitation. Against this backdrop, using huge volume of total data, many technologies could be fully adopted to the preliminary forecasting and its target-disease expanding of health. With structured data from the national health insurance and unstructured data from the social network service, we attempted to design a model to predict disease. The model can enhance national health and maximize social benefit by providing a health warning service. Also, the model can reduce the advent increase of national health cost and predict timely disease occurrence based on Big Data analysis. We researched related medical prediction cases and performed an experiment with a pilot project so as to verify the proposed model.

Data Analysis of Facebook Insights (페이스북 인사이트 데이터 분석)

  • Cha, Young Jun;Lee, Hak Jun;Jung, Yong Gyu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.2 no.1
    • /
    • pp.93-98
    • /
    • 2016
  • As information technologies are rapidly developed recently, social networking services through a variety of mobile devices and smart screen is becoming popular. SNS is a social networking based services which is online forms from existed offline. SNS can also be used differently which is confused with the online community. A modelling algorithm is a variety of techniques, which are assocoation, clustering, neural networks, and decision trees, etc. By utilizing this technique, it is necessary to study to effectively using the large number of materials. In this paper, we evaluate in particular the performance of the algorithm based on the results of the clustering using Facebook Insights data for the EM algorithm to be evaluated as a good performance in clustering. Through this analysis it was based on the results of the application of the experimental data of the change and the South Australian state library according to the performance of the EM algorithm.

Analysis of Government R&D Contribution to the IT Industry (공공부문의 R&D 투자가 IT 산업에 미치는 파급효과 분석)

  • Seo, Hwanjoo;Hong, Pilky
    • Informatization Policy
    • /
    • v.17 no.1
    • /
    • pp.63-77
    • /
    • 2010
  • This paper investigates the impact of the government R&D expenditure on the IT industry in Korea. The analysis of such impact can be used to derive the policy implications for the IT industry. The contribution of government R&D to the IT industry was analyzed based on the input-output table of the year 1990-1995-2000. The results show that the amount of the government R&D expenditure induced the IT industry to book twice greater production than it would have been in the absence of such government R&D expenditure during the period under investigation. It is also shown that job creation was strongly encouraged in the broadcasting equipment, software and computer-related services. During the period under the study, the composition of the workers in the IT hardware industry remained unchanged while the production increased significantly, which confirms the jobless growth in the IT hardware industry. The results of this study suggest that the government R&D should focus on improving the competitiveness of the intermediate good and parts industry.

  • PDF

A Study on Logistics Distribution Industry's IoT Situation and Development Direction (국내외 물류산업의 사물인터넷(IoT) 현황과 발전방향에 관한 연구)

  • Park, Young-Tae
    • Management & Information Systems Review
    • /
    • v.34 no.3
    • /
    • pp.141-160
    • /
    • 2015
  • IoT(Internet of Things) has become a major issue as new type of convergence technology, expending existing of USNs(Ubiquitous Sensor Networks), NFC(Near Field Communication), and M2M(Machine to Machine). The IoT technology defines as a networking for things, which can establish intelligent links collaboratively for sensing networking and processing between each other without human intervention. The purpose of this study is to investigate to forecast the future distribution changes and orientation of contribution of distribution industry on IoT and to provide the implication of distribution changes. To become a global market leader, IoT requires much more development of core technology of IoT for distribution industry, new service creation and try to use a market-based demand side strategy to create markets. So, to become a global leader in distribution industry, this study results show that first of all establishment of standardization of IoT, privacy safeguards, security issues, stability and value were more important than others. The research findings suggest that the development goals of IoT should strive to boost the creation of a global leader in distribution industry and convenience to consider consumers' demands as the most important thing.

  • PDF

The design and implementation of user interface based on contents rating service for blocking harmful Internet information (유해 인터넷 정보 차단을 위한 내용 등급 서비스 기반 사용자 인터페이스 설계 및 구현)

  • 이재선;전용희;장정숙
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.10B
    • /
    • pp.957-964
    • /
    • 2003
  • The circulation of unwholesome information such as obscene and violent information is gradually increasing based on the rapid expansion of information communications infrastructure. Those kinds of information are harmful to the adolescents and even cause social problems so that active countermeasure is requited. In order to cope with the spread of unwholesome information, appropriate regulating methods are absolutely in need by establishing or revising information communications-related laws. In this paper, we had analyzed domestic and foreign programs with existing harmful information blocking method, and then designed and implemented a selective blocking program based on Platform for Internet Contents Selection(PICS) by using selective blocking technology based on Internet contents rating system. We also proposed a compromised rating system blocking method that consists of selective filtering function by age and the popular blocking list. The proposed system has advantages in that there would be no increase in network load resulting from blocking list update and inquiry, it is possible to perform active selective filtering considering user's age, and it may introduce self-imposed rating.