• Title/Summary/Keyword: 열람서비스

Search Result 135, Processing Time 0.027 seconds

Investigating Change of Users' Perception of Privacy Pre- and Post-Education on Library User Privacy (도서관이용자프라이버시에 대한 교육전후의 이용자인식변화 분석 연구)

  • Noh, Younghee;Kim, Tae-Kyung;Kim, Dong-Seok
    • Journal of the Korean Society for information Management
    • /
    • v.32 no.1
    • /
    • pp.63-84
    • /
    • 2015
  • Library users must provide their personal information to libraries. This study surveyed these library users' perception of privacy and the effect of the education after providing library user privacy education. As a result, first, it was found that after education, users were more interested in their privacy, rated the problem of library user privacy as more severe, and rated library user data collection as more likely to be considered privacy invasion. Second, we investigated users' perception of how much user service records being collected in libraries violate users' privacy, which showed a great perception change in 25 questions after the education. Third, in the survey about library and librarians' efforts for protecting library user privacy, it was found that all 15 questions were rated as significantly more important after education. Fourth, library users have recognized that is necessary to process and handle the library record and are more sympathetic to the need for this procedure. Fifth, library users felt the possibility of a library record leak was a very serious threat.

Airtouch technology smart fusion DID system design (Airtouch 기술을 활용한 스마트융합 DID 시스템 설계)

  • Lee, Gwang-Yong;Hwang, Bu-Hyun
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.2
    • /
    • pp.240-246
    • /
    • 2013
  • Airtouch technology to integrate the system in the way of information delivery devices, touch screen DID this study is to develop new ways of information delivery systems. Airtouch technology to design and implement a system that can be utilized to view the college campus announcements, education, information, and employment information, and store the remote operation and sharing content, the development of cloud services to sync content via smart technology implementation fusion DID systemto develop. Packs USB interface kinek because you may be used in connection with the information appliances, and low-cost product by leveraging the Kinect sensor, Airtouch technology implementation. Types of input devices paper Airtouch technology systems, the user's hand gestures alone can interact with information appliances, smart fusion system developed by DID by tracking the user's hand movements to manipulate the mouse pointer, and information through the user's hand gestures to command the unit so that you can make. Airtouch technology smart fusion DID system technology utilizing a ripple effect on other industries, such as the online education industry, advertising, information industry increases. Also, replace the existing interface device with the versatility of a wide range of technologies, usability is an infinite expansion.

A Study on Utilization Method of Spaces on the University Libraries (대학도서관 공간활용 방안 연구)

  • Chung, Jae-Young
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.3
    • /
    • pp.333-352
    • /
    • 2012
  • Building a new library and remodeling an existing library for the multi-cultural space is a recent trend of the university libraries. That is, the spaces for using the digital and multimedia equipments, the rooms for reading and studying, the spaces for the cultural activities such as watching movies and holding an exhibition, and the spaces for the communication and refreshment are increasing in the libraries. However, this movement of securing and providing the new spaces is not closely connected with the off-line services and happens without the consideration of how to change the librarian's role and position. Therefore, the university libraries need to plan and provide the multi-learning space rather than the multi-cultural space considering the university library is an academic organization. Additionally, understanding the purpose of the university libraries, user's need, utilization method of books and considering the librarian's roles and placement are necessary in planning and providing the space of the libraries.

A Tile-Image Merging Algorithm of Tiled-Display Recorder using Time-stamp (타임 스탬프를 이용한 타일드 디스플레이 기록기의 타일 영상 병합 알고리즘)

  • Choe, Gi-Seok;Nang, Jong-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.327-334
    • /
    • 2009
  • The tiled-display system provides a high resolution display which can be used in different applications in co-working area. The systems used in the co-working field usually save the user logs, and these log information not only makes the maintenance of the tiled-display system easier, but also can be used to check the progress of the co-working. There are three main steps in the proposed tiled display log recorder. The first step is to capture the screen shots of the tiles and send them for merging. The second step is to merge the captured tile images to form a single screen shot of the tiled-display. The final step is to encode the merged tile images to make a compressed video stream. This video stream could be stored for the logs of co-working or be streamed to remote users. Since there could be differences in capturing time of tile images, the quality of merged tiled-display could be degraded. This paper proposes a time stamp-based metric to evaluate the quality of the video stream, and a merging algorithm that could upgrade the quality of the video stream with respect to the proposed quality metrics.

Implementation of Secure E-Mail System based on lava (자바기반의 안전한 전자 메일 시스템 구현)

  • 이원구;김성준;이희규;조한진;이재광
    • Journal of Internet Computing and Services
    • /
    • v.2 no.3
    • /
    • pp.51-62
    • /
    • 2001
  • Recently, as computers and networks become popular, distributing information on the Internet is common In our daily life. also, the explosion of the Internet. of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. The e-mail has been commonly used by users as well recognizing It as the standard of manners among users on the Internet. In the past, e-mail has been the primary choice of exchanging Information, but secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. it has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. most of existing e-mail system don't have any security on the transmitted information. Thus. security mail system need to provide security including message encryption, content Integrity, message origin authentication, and non-repudiation. In this paper, we design implement secure mail system with non-repudiation service and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services. API.

  • PDF

U-Healthcare user's privacy protection protocol with Implantable medical Device of State Information (상태정보에 따른 체내삽입형 장치를 부착한 유-헬스케어 환자의 프라이버시 보호 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4C
    • /
    • pp.297-306
    • /
    • 2012
  • IT technology of U-healthcare system is being grafted onto medical services and the use of U-healthcare system are extending steadily. However, in case of patients using Implantable Medical Device (IMD) in U-healthcare system, patients' privacy protection and safe access to system recently has emerged as a major issue. This paper proposes a patients' privacy protection protocol to prevent any illegal accesses from third parties as state value and action value are synchronized after patients' information virtualization. The proposed protocol can limit the access range of patients' information according to authentication information of hospitals, doctors, nurses, and pharmacies registered in the U-healthcare server. Additionally, this protocol can increase management efficiency for patients' privacy by synchronizing state values and action values only for approved information and, by instituting this process, third parties cannot easily access patients' information.

Diary Application Design Based Augmented Reality Using Tree(metaphor) (나무를 메타포로 하는 증강현실 기반 일상다이어리 어플리케이션 기획 및 설계)

  • Kim, Yoo-bin;Roh, Jong-hee;Lee, Ye-Won;Lee, Hyo-Jeong;Park, Jung Kyu;Park, Su e
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.201-204
    • /
    • 2017
  • People live in their everyday life busy with studies, part-time jobs, and searching for an ideal job. In their busy routine, they try to find time for themselves and expose their emotions through diverse social network services(SNS). We made a service that we can plant a virtual tree in places we daily visit and go by. You can keep note on the virtual tree and look through the past records. It is a reality based mobile application service that can be used like a diary.In this project we chose the tree as the metaphor and tried to express time passing in a specific place. As our memory is a part of our daily life, we emphasized the meaning of space important.

  • PDF

Design and Implementation of a Secure E-Mail System using Elliptic Curve Cryptosystem (타원곡선 암호 시스템을 이용한 보안 메일 시스템의 설계 및 구현)

  • Lee, Won-Goo;Kim, Sung-Jun;Lee, Hee-Gyu;Mun, Ki-Young;Lee, Jae-Kwang
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.4
    • /
    • pp.333-345
    • /
    • 2002
  • As computers and networks become popular, distributing information on the Internet is common in our daily life. Also, the explosion of the Internet, of wireless digital communication and data exchange on Internet has rapidly changed the way we connect with other people. But secure mail is gaining popularity abroad and domestically because of their nature of providing security. That is. It has been used a variety of fields such as general mail and e-mail for advertisement. But, As the data transmitted on network can be easily opened or forged with simple operations. Most of existing e-mail system don't have any security on the transmitted information. Thus, security mail system need to provide security including message encryption, content integrity, message origin authentication, and non-repudiation. In this paper, we design and implement secure mail system with secure key agreement algorithm, non-repudiation service, and encryption capability to provide services for certification of delivery and certification of content as well as the basic security services.

A Comparative Study of the Perceptions on Public Libraries between Librarians and Users: A Survey of the Seoul Metropolitan Office of Education Public Libraries (공공도서관에 대한 사서와 이용자 인식 비교 연구- 서울시교육청 소속 공공도서관을 대상으로 -)

  • Pyo, Soon-Hee;Cha, Mikyeong
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.52 no.2
    • /
    • pp.221-244
    • /
    • 2018
  • The purpose of this study was to provide basic information necessary for establishing library development plan and service direction by comparing and analyzing the perception of librarian and user's public library. For this purpose, a questionnaire survey was conducted with 270 librarians and 820 public users of the Seoul Metropolitan Office of Education Public Libraries regarding the current environment of the library, the role and status of the future library, and the library policy. The results showed librarians viewed the long history and accumulated information resources as strengths, while users had the highest satisfaction with human resources. As for the role of the public library and its future status, both librarians and users perceived reading and education as more important, confirming that the two groups had common expectations for public libraries. Yet the two groups had different perceptions about the policy for enhancing future library roles. Librarians suggested the needs for the improvement of old facilities and continuing education for librarians, users indicated the collections and enlargement of reading room as more important, which suggested the library policy development considering the difference of the perceptions between the two groups.

Personal Information Detection and Blurring Cloud Services Based on Machine Learning (머신러닝에 기반을 둔 사진 속 개인정보 검출 및 블러링 클라우드 서비스)

  • Kim, Min-jeong;Lee, Soo-young;Lee, Jiyoung;Ham, Na-youn
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2019.05a
    • /
    • pp.152-155
    • /
    • 2019
  • 클라우드가 대중화되어 많은 모바일 유저들이 자동 백업 기능을 사용하면서 민감한 개인정보가 포함된 사진들이 무분별하게 클라우드에 업로드 되고 있다. 개인정보를 포함한 클라우드가 악의적으로 해킹 될 시, 사진에 포함된 지문, 자동차 번호판, 카드 번호 등이 유출됨에 따라 대량의 개인정보가 유출될 가능성이 크다. 이에 따라 적절한 기준에 맞게 사진 속 개인 정보 유출을 막을 수 있는 기술의 필요성이 대두되고 있다. 현재의 클라우드 시스템의 문제를 해결하고자 본 연구는 모바일 기기에서 클라우드 서버로 사진을 백업하는 과정에서 영역 검출과 블러링의 과정을 제안하고 있다. 클라우드 업로드 과정에서 사진 속의 개인 정보를 검출한 뒤 이를 블러링하여 클라우드에 저장함으로써 악의적인 접근이 행해지더라도 개인정보의 유출을 방지할 수 있다. 머신러닝과 computer vision library등을 이용하여 이미지 내에 민감한 정보를 포함하고 있는 영역을 학습된 모델을 통해 검출한 뒤, OpenCV를 이용하여 블러링처리를 진행한다 사진 속에 포함될 수 있는 생체정보인 지문은 손 영역을 검출한 뒤, 해당 영역을 블러링을 하여 업로드하고 카드번호나 자동차 번호판이 포함된 사진은 영역을 블러링한 뒤, 암호화하여 업로드 된다. 후에 필요에 따라 본인인증을 거친 후 일정기간 열람을 허용하지만 사용되지 않을 경우 삭제되도록 한다. 개인정보 유출로 인한 피해가 꾸준히 증가하고 있는 지금, 사진 속의 개인 정보를 보호하는 기술은 안전한 통신과 더불어 클라우드의 사용을 더 편리하게 할 수 있을 것으로 기대된다.