• Title/Summary/Keyword: 사회네트워크서비스

Search Result 734, Processing Time 0.025 seconds

Scenario for sudden change in North Korea! : Comparing North Korea with countries of Jasmine Revolution (북한 급변사태 시나리오 I : 재스민혁명 국가들과 북한의 비교를 중심으로)

  • Lee, Dae Sung
    • Convergence Security Journal
    • /
    • v.17 no.1
    • /
    • pp.63-68
    • /
    • 2017
  • The Jasmine Revolution started from Tunisia in January 2011 has brought many changes into countries in North Africa and Middle East. We need to study the causes of the revolution. First, the kings and dictators in those countries oppressed the opposition parties and the media aiming for long-term seizure of power. The power concentrated on specific people produced illegalities and corruption. Secondly, most of the national income of those countries belonged to kings and dictators producing problems during the distribution of the income. Especially, with the decrease of oil price in 1990s and the increase of the price of daily necessities in 2000s people lost their credits on their governments. Lastly, the number of people in those countries using the Internet has increased by 4,863% from 2000 to 2010. The expansion of social network services such as Facebook and Twitter was one of factors that made the information control by those countries difficult. We should think about the possibility of sudden change in North Korea. It is necessary to compare and analyze the political, economic and social characteristics between those countries and North Korea. It shouldn't be just a simple comparison or analysis. It should provide basic data for objective and quantified index development in relation to sudden change in North Korea.

An Evaluation of the Necessity of Security Management of Personal Information Consignees : using Privacy Policy and ISMS data (개인정보 수탁사의 보안관리 대상 식별 방안 연구 : 개인정보처리방침 및 정보보호인증 데이터 이용)

  • Choi, Won-Nyeong;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.20 no.3
    • /
    • pp.79-88
    • /
    • 2020
  • Business consignment using personal information is increasing for the operating profit and work efficiency of Internet companies. If the personal information leakage accident occurs at the consignee, the consigner who provided personal information will be damaged greatly. The purpose of this study is to analyze the business attributes of consignee using consigned personal information and present a model that can be used to select companies with high risk of personal information leakage by considering the importance of the involved personal information. For this, personal information consignment relations, consignment services, and personal information items used were analyzed. Social network analysis and cluster analysis were applied to select companies with high network centrality that are advisable to obtain information security certification. The results of this study could be used to establish information protection strategies for private or public enterprises that manage companies using personal information.

A Study on Comparative Amount of Idea Thinking between Brainstorming and Webstorming (브레인스토밍과 WebStorming의 아이디어 발상량(發想量) 비교 연구)

  • Han, Kyung-Don;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.189-196
    • /
    • 2011
  • To develop a creative design concept, amount of idea thinking between team members is important. In the process of planning to proposal brainstorming helps clarification of problems and allows a creative solution. Here, idea generation is to express thinking into words, and greater amount of idea is more valued than to choose one fine idea at first. This paper studies actual processes of brainstorming, and we utilize network services upgraded in Web and multimedia techniques to develop idea with arrangement. We compare the amount of idea generation by groups and topics with Brainwriting and Braindrawing of Webstorming, without limitation of space and time. Then, we propose a creative idea thinking by analyzing the characteristics of design team members in various aspects. This result will contribute in improving national potential value and design competitiveness by the help of design and IT, on product research and marketing.

SEED and Stream cipher algorithm comparison and analysis on the communication (통신에서의 SEED와 스트림 암호 알고리즘의 비교 분석)

  • Ahn, In-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.199-206
    • /
    • 2010
  • Society of digital information becomes gradually advancement, and it is a situation offered various service, but it is exposed to a serious security threat by a fast development of communication such as the internet and a network. There is required a research of technical encryption to protect more safely important information. And we require research for application of security technology in environment or a field to be based on a characteristics of market of an information security. The symmetric key cipher algorithm has same encryption key and decryption key. It is categorized to Block and Stream cipher algorithm according to conversion ways. This study inspects safety and reliability of proposed SEED, Stream cipher algorithm. And it confirms possibility of application on the communication environments. This can contribute to transact information safely by application of suitable cipher algorithm along various communication environmental conditions.

A Study On the Healthcare Technology Trends through Patent Data Analysis (특허 데이터 분석을 통한 헬스케어 기술 트렌드 연구)

  • Han, Jeong-Hyeon;Hyun, Young-Geun;Chae, U-ri;Lee, Gi-Hyun;Lee, Joo-Yeoun
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.179-187
    • /
    • 2020
  • In a social environment where population aging is rapidly progressing, the healthcare service market is growing fast with the increasing interest in health and quality of life based on rising income levels and the evolution of technology. In this study, after keywords were extracted from Korean and US patent data published on KIPRIS from 2000 to October 2019, frequency analysis, time series analysis, and keyword network analysis were performed. Through this, the change of technology trends were identified, which keywords related to healthcare was shifted from traditional medical words to ICT words. In addition, although the keywords in Korean patents are 55% similar to those in the US, they show an absolute gap in patent production volume. In the next study, we will analyze various data such as domestic and international research and can obtain meaningful implications in the global market on the identified keywords.

An Improvement of Education in Multicultural Families Using Social Network Service (소셜 네트워크 서비스를 활용한 다문화 가족의 교육 향상 방안)

  • Yoon, Byung Rock;Lee, Soo Yong;Kim, Chang Suk
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.6
    • /
    • pp.558-564
    • /
    • 2015
  • This study is how to effectively apply this SNS based education to multicultural families and is to analyze how any change in the lives of multicultural families. Multicultural education in Korea has been steadily run by the government and local authorities, however the lack of free time, distances, for economic reasons and unfamiliarity of the new culture and language, immigrant women are not getting the education. To solve this problem, we provide the necessary information, such as culture, education, laws of the Korea for multicultural families and analyze their effect on life adjustment. And we also analyze changes to relieve loneliness. As a result multicultural family education utilizing SNS is verified that there is effectiveness to adapt and understand Korea. As well as inter-family, multicultural members to seamlessly communicate between each other that proved helpful to relieve loneliness.

USN Secure Communication Design Using Chaotic System Feedback Synchronization (혼돈계의 피드백 동기화를 이용한 USN 보안통신 설계)

  • Yim, Geo-Su
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1011-1016
    • /
    • 2018
  • Ubiquitous services for the convenience and safety of human beings along with the development of society are being realized through RFID technology and sensor network, and its application range of fields is also broaden. However, since the USN contains all the information of individuals and things, all of its private spaces can be attacked by external attacks; so, that the problem of security continues to arise. We designed a one-way chaotic feedback synchronization method as a secure communication method to fit the USN composed of one sync node and n number of sensor nodes. We designed the method by which the sensor node is synchronized in one direction of the sync node. This method solves the problem that all sensor nodes need to be resynchronized when the sync node is changed, which is shown in bidirectional synchronization. This is a security method that can be effectively applied to 1:n communication such as USN.

Design and Implementation of an Instant Messenger between the two different domain mobile terminal systems (이종(異種) 모바일 단말 간 인스턴트 메신저 설계 및 구현)

  • Bang, Ji-Woong;Kim, Dae-Won
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.4
    • /
    • pp.255-262
    • /
    • 2010
  • Recently, we are living in the world of information and ubiquitous technology strayed away from the fixed network systems resulting in an increase of using mobile terminals which is convenient for mobility and functionality. Because the diversification of mobile devices to communicate between disparate mobile terminals is difficult, the two kinds of operating systems and hardware for data communication between the terminals is needed to convert the data. The proposed instant messenger design in MRP-S3C2440A (Windows CE 5.0) and Nexio XP30 (Windows CE .NET 4.1) were tested and applied. Usually the mobile terminal has an information on a central server. Sender terminal receives the message according to the characteristics of the terminal after converting was sent to the receiving terminal. Receiving-side terminal without a separate conversion process, it was the output terminals. This paper deals with the proposal and implementation of designing an instant messenger application program between the two different mobile terminals and network systems.

The Study on the patient safety culture convergence research topics through text mining and CONCOR analysis (텍스트마이닝 및 CONCOR 분석을 활용한 환자안전문화 융복합 연구주제 분석)

  • Baek, Su Mi;Moon, Inn Oh
    • Journal of Digital Convergence
    • /
    • v.19 no.12
    • /
    • pp.359-367
    • /
    • 2021
  • The purpose of this study is to analyze domestic patient safety culture research topics using text mining and CONCOR analysis. The research method was conducted in the stages of data collection, data preprocessing, text mining and social network analysis, and CONCOR analysis. A total of 136 articles were analyzed excluding papers that were not published. Data analysis was performed using Textom and UCINET programs. As a result of this study, TF (frequency) of patient safety culture-related studies showed that patient safety was the highest, and TF-IDF (importance in documents) was highest in nursing. As a result of the CONCOR analysis, a total of seven clusters were derived: knowledge and attitude, communication, medical service, team, work environment, structure, organization and management that constitute the patient safety culture. In the future, it is necessary to conduct research on the relationship between the establishment of a patient safety culture and patient outcomes.

The Public Choice Analysis of Korean Mobile Telecom Policy (이동통신 정책의 공공 선택 분석)

  • Shin, Jin;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.917-920
    • /
    • 2014
  • In Korea mobile phone subscribers exceeded 1 million people in 1995, and ten million people in 1998. Prevalence of the mobile phone increased dramatically over 110% compared to the population. And all family members including children and students use one or two mobile terminal. Mobile phone is obviously necessary good more than washer, vacuum cleaner, passenger car. Our daily life with mobile communication are conveniently positioned, but communication related costs including the price of the device has become a big burden on the household. But the government does not seem to do the right role at the right time to prevent the failure of the market to further maximize consumer welfare and social welfare through fair competition. This principal-agent problems exist especially in perspective of joint use of the mobile communication network, number portability, separation of phone distribution and phone service and network neutrality among in mobile communication policies since the early 1990s up to now.

  • PDF