• Title/Summary/Keyword: 인터넷 사용자

Search Result 6,170, Processing Time 0.041 seconds

A Study on the Real Condition and the Improvement Directions for the Protection of Industrial Technology (산업기술 보호 관리실태 및 발전방안에 관한 연구)

  • Chung, Tae-Hwang;Chang, Hang-Bae
    • Korean Security Journal
    • /
    • no.24
    • /
    • pp.147-170
    • /
    • 2010
  • This study is to present a improvement directions for the protection of industrial key technology. For the purpose of the study, the survey was carried out on the administrative security activity of 68 enterprises including Large companies, small-midium companies and public corporations. survey result on the 10 items of security policy, 10 items of personal management and 7 items of the assets management are as follows; First, stable foundation for the efficient implement of security policy is needed. Carrying a security policy into practice and continuous upgrade should be fulfilled with drawing-up of the policy. Also for the vitalization of security activity, arrangement of security organization and security manager are needed with mutual assistance in the company. Periodic security inspection should be practiced for the improvement of security level and security understanding. Second, the increase of investment for security job is needed for security invigoration. Securing cooperation channel with professional security facility such as National Intelligence Service, Korea internet & security agency, Information security consulting company, security research institute is needed, also security outsourcing could be considered as the method of above investment. Especially small-midium company is very vulnerable compared with Large company and public corporation in security management, so increase of government's budget for security support system is necessary. Third, human resource management is important, because the main cause of leak of confidential information is person. Regular education rate for new employee and staff members is relatively high, but the vitalization of security oath for staff members and the third party who access to key technology is necessary. Also access right to key information should be changed whenever access right changes. Reinforcement of management of resigned person such as security oath, the elimination of access right to key information and the deletion of account. is needed. Forth, the control and management of important asset including patent and design should be tightened. Classification of importance of asset and periodic inspection are necessary with the effects evaluation of leak of asset.

  • PDF

Analysis of health habit and hair mineral nutrition status of media addicted adolescent (미디어중독 청소년의 스마트폰 사용의존도에 따른 건강습관 및 모발 무기질 영양상태 분석)

  • Lim, Hee-Sook;Kim, Soon-Kyung
    • Journal of Nutrition and Health
    • /
    • v.51 no.4
    • /
    • pp.295-306
    • /
    • 2018
  • Purpose: Koreans' internet and smartphone usage hours are steadily increasing and the dependence of young people on smartphones is causing social problems. Therefore, this study was conducted to examine health and dietary habits, as well as hair mineral contents according to the level of dependence of smartphone use among adolescents to clarify the interrelation of smartphone dependence, lifestyle, dietary behavior, and mineral nutrition status. Methods: A total of 80 smartphone-addicted adolescents participated in this study and were divided into three groups (general, potential and danger group) according to smartphone dependence. The subjects' lifestyles and dietary behaviors were then surveyed, and hair mineral contents were analyzed. Results: Higher smartphone dependence was associated with lower average weekly sleeping time and later first smoking age. In the danger group, the rate of eating fast and the rate of snacking twice a day was also relatively high. Parents (45.0%) and mobile (30.0%) were the factors having the greatest influence on an individual's dietary behavior. In the hair mineral analysis, all subjects had lower selenium concentrations and higher lead concentrations than normal. In addition, the levels of aluminum in the danger group were higher than in the normal range and the highest among the three groups. Conclusions: It is necessary to guide adolescents to use smartphones correctly and manage dietary habits. In addition, careful attention is needed the mineral nutritional status of smartphone-addicted adolescents.

Analyzing the Issue Life Cycle by Mapping Inter-Period Issues (기간별 이슈 매핑을 통한 이슈 생명주기 분석 방법론)

  • Lim, Myungsu;Kim, Namgyu
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.4
    • /
    • pp.25-41
    • /
    • 2014
  • Recently, the number of social media users has increased rapidly because of the prevalence of smart devices. As a result, the amount of real-time data has been increasing exponentially, which, in turn, is generating more interest in using such data to create added value. For instance, several attempts are being made to analyze the relevant search keywords that are frequently used on new portal sites and the words that are regularly mentioned on various social media in order to identify social issues. The technique of "topic analysis" is employed in order to identify topics and themes from a large amount of text documents. As one of the most prevalent applications of topic analysis, the technique of issue tracking investigates changes in the social issues that are identified through topic analysis. Currently, traditional issue tracking is conducted by identifying the main topics of documents that cover an entire period at the same time and analyzing the occurrence of each topic by the period of occurrence. However, this traditional issue tracking approach has two limitations. First, when a new period is included, topic analysis must be repeated for all the documents of the entire period, rather than being conducted only on the new documents of the added period. This creates practical limitations in the form of significant time and cost burdens. Therefore, this traditional approach is difficult to apply in most applications that need to perform an analysis on the additional period. Second, the issue is not only generated and terminated constantly, but also one issue can sometimes be distributed into several issues or multiple issues can be integrated into one single issue. In other words, each issue is characterized by a life cycle that consists of the stages of creation, transition (merging and segmentation), and termination. The existing issue tracking methods do not address the connection and effect relationship between these issues. The purpose of this study is to overcome the two limitations of the existing issue tracking method, one being the limitation regarding the analysis method and the other being the limitation involving the lack of consideration of the changeability of the issues. Let us assume that we perform multiple topic analysis for each multiple period. Then it is essential to map issues of different periods in order to trace trend of issues. However, it is not easy to discover connection between issues of different periods because the issues derived for each period mutually contain heterogeneity. In this study, to overcome these limitations without having to analyze the entire period's documents simultaneously, the analysis can be performed independently for each period. In addition, we performed issue mapping to link the identified issues of each period. An integrated approach on each details period was presented, and the issue flow of the entire integrated period was depicted in this study. Thus, as the entire process of the issue life cycle, including the stages of creation, transition (merging and segmentation), and extinction, is identified and examined systematically, the changeability of the issues was analyzed in this study. The proposed methodology is highly efficient in terms of time and cost, as it sufficiently considered the changeability of the issues. Further, the results of this study can be used to adapt the methodology to a practical situation. By applying the proposed methodology to actual Internet news, the potential practical applications of the proposed methodology are analyzed. Consequently, the proposed methodology was able to extend the period of the analysis and it could follow the course of progress of each issue's life cycle. Further, this methodology can facilitate a clearer understanding of complex social phenomena using topic analysis.

A Study on the Effects of User Participation on Stickiness and Continued Use on Internet Community (인터넷 커뮤니티에서 사용자 참여가 밀착도와 지속적 이용의도에 미치는 영향)

  • Ko, Mi-Hyun;Kwon, Sun-Dong
    • Asia pacific journal of information systems
    • /
    • v.18 no.2
    • /
    • pp.41-72
    • /
    • 2008
  • The purpose of this study is the investigation of the effects of user participation, network effect, social influence, and usefulness on stickiness and continued use on Internet communities. In this research, stickiness refers to repeat visit and visit duration to an Internet community. Continued use means the willingness to continue to use an Internet community in the future. Internet community-based companies can earn money through selling the digital contents such as game, music, and avatar, advertizing on internet site, or offering an affiliate marketing. For such money making, stickiness and continued use of Internet users is much more important than the number of Internet users. We tried to answer following three questions. Fist, what is the effects of user participation on stickiness and continued use on Internet communities? Second, by what is user participation formed? Third, are network effect, social influence, and usefulness that was significant at prior research about technology acceptance model(TAM) still significant on internet communities? In this study, user participation, network effect, social influence, and usefulness are independent variables, stickiness is mediating variable, and continued use is dependent variable. Among independent variables, we are focused on user participation. User participation means that Internet user participates in the development of Internet community site (called mini-hompy or blog in Korea). User participation was studied from 1970 to 1997 at the research area of information system. But since 1997 when Internet started to spread to the public, user participation has hardly been studied. Given the importance of user participation at the success of Internet-based companies, it is very meaningful to study the research topic of user participation. To test the proposed model, we used a data set generated from the survey. The survey instrument was designed on the basis of a comprehensive literature review and interviews of experts, and was refined through several rounds of pretests, revisions, and pilot tests. The respondents of survey were the undergraduates and the graduate students who mainly used Internet communities. Data analysis was conducted using 217 respondents(response rate, 97.7 percent). We used structural equation modeling(SEM) implemented in partial least square(PLS). We chose PLS for two reason. First, our model has formative constructs. PLS uses components-based algorithm and can estimated formative constructs. Second, PLS is more appropriate when the research model is in an early stage of development. A review of the literature suggests that empirical tests of user participation is still sparse. The test of model was executed in the order of three research questions. First user participation had the direct effects on stickiness(${\beta}$=0.150, p<0.01) and continued use (${\beta}$=0.119, p<0.05). And user participation, as a partial mediation model, had a indirect effect on continued use mediated through stickiness (${\beta}$=0.007, p<0.05). Second, optional participation and prosuming participation significantly formed user participation. Optional participation, with a path magnitude as high as 0.986 (p<0.001), is a key determinant for the strength of user participation. Third, Network effect (${\beta}$=0.236, p<0.001). social influence (${\beta}$=0.135, p<0.05), and usefulness (${\beta}$=0.343, p<0.001) had directly significant impacts on stickiness. But network effect and social influence, as a full mediation model, had both indirectly significant impacts on continued use mediated through stickiness (${\beta}$=0.11, p<0.001, and ${\beta}$=0.063, p<0.05, respectively). Compared with this result, usefulness, as a partial mediation model, had a direct impact on continued use and a indirect impact on continued use mediated through stickiness. This study has three contributions. First this is the first empirical study showing that user participation is the significant driver of continued use. The researchers of information system have hardly studies user participation since late 1990s. And the researchers of marketing have studied a few lately. Second, this study enhanced the understanding of user participation. Up to recently, user participation has been studied from the bipolar viewpoint of participation v.s non-participation. Also, even the study on participation has been studied from the point of limited optional participation. But, this study proved the existence of prosuming participation to design and produce products or services, besides optional participation. And this study empirically proved that optional participation and prosuming participation were the key determinant for user participation. Third, our study compliments traditional studies of TAM. According prior literature about of TAM, the constructs of network effect, social influence, and usefulness had effects on the technology adoption. This study proved that these constructs still are significant on Internet communities.

Performance Analysis of Implementation on IoT based Smart Wearable Mine Detection Device

  • Kim, Chi-Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.12
    • /
    • pp.51-57
    • /
    • 2019
  • In this paper, we analyzed the performance of IoT based smart wearable mine detection device. There are various mine detection methods currently used by the military. Still, in the general field, mine detection is performed by visual detection, probe detection, detector detection, and other detection methods. The detection method by the detector is using a GPR sensor on the detector, which is possible to detect metals, but it is difficult to identify non-metals. It is hard to distinguish whether the area where the detection was performed or not. Also, there is a problem that a lot of human resources and time are wasted, and if the user does not move the sensor at a constant speed or moves too fast, it is difficult to detect landmines accurately. Therefore, we studied the smart wearable mine detection device composed of human body antenna, main microprocessor, smart glasses, body-mounted LCD monitor, wireless data transmission, belt type power supply, black box camera, which is to improve the problem of the error of mine detection using unidirectional ultrasonic sensing signal. Based on the results of this study, we will conduct an experiment to confirm the possibility of detecting underground mines based on the Internet of Things (IoT). This paper consists of an introduction, experimental environment composition, simulation analysis, and conclusion. Introduction introduces the research contents such as mines, mine detectors, and research progress. It consists of large anti-personnel mine, M16A1 fragmented anti-mine, M15 and M19 antitank mines, plastic bottles similar to mines and aluminum cans. Simulation analysis is conducted by using MATLAB to analyze the mine detection device implementation performance, generating and transmitting IoT signals, and analyzing each received signal to verify the detection performance of landmines. Then we will measure the performance through the simulation of IoT-based mine detection algorithm so that we will prove the possibility of IoT-based detection landmine.

Development of Education Materials for Healthy Consumption of Milk in a Card News Format for Korean Adults (성인의 바른 우유 섭취를 위한 카드뉴스 형식의 교육자료 개발)

  • Kim, Sun Hyo
    • Journal of Korean Home Economics Education Association
    • /
    • v.32 no.3
    • /
    • pp.97-110
    • /
    • 2020
  • The purpose of this study is to develop milk education materials for adults based on the scientific basis of right milk consumption in the format of card news that can be easily accessed on a mobile phone or the internet and has high impact. The topics to be included in the card news were selected based on the findings from literature analysis and focus group interviews with 10 adults(32.0±6.4 years). For the eight selected topics, effective communication was made by suggesting some information that users want to know while reflecting adult eating habits, lifestyle habits, and nutrition and health interests. The card news draft was reviewed by researcher and consulting experts, and then questionnaire survey was conducted using Likert 5-point scales by 50 adults(42.7±10.2 years). Based on the results of the review, consultation and questionnaire survey, a final draft of the card news consisting of 11 cuts was completed. Card news proposal is expected to produce educational effects, since the respondents showed high satisfaction with the card news (higher than 4 on the 5-point scales) according to the questionnaire survey. Adults can easily access and use the card news developed in this study, and thus this card news is expected to increase milk consumption in adulthood and improve nutrition and health through friendly and systematic milk education.

A study on an application of 'Virtual Reality Therapy' concerning a technology of real-time interaction. (실시간 상호작용 기술의 '가상현실치료' 적용에 관한 연구)

  • Kim, Jeong-Hwan
    • Cartoon and Animation Studies
    • /
    • s.22
    • /
    • pp.81-97
    • /
    • 2011
  • The technology of 'Virtual Reality' has placed in advanced tools for human beings' joy and anger together with sorrow and pleasure in our generation. It has recently tried in a variety ways to use as an implication for treatment in the field of Cognitive Psychology. Especially, it widely approaches to human in terms of that a sense of reality in a virtual world through the five senses should reinterpret the meaning of cognition in the real world. Based on this paradigm shift, it allows for new treatment using the technology of virtual reality. A typical example is a field of Therapy in order to overcome panic disorder. It has advantages that in particular development of flexible interaction technologies in a virtual space can lead patients to experience psychological environments rather than physical one. the interaction technology provides environments in which users' five senses can be actively stimulated, it is very useful that information from the experiences in the virtual world allows people to learn through real experiences by renewing potential energies, advantages of Virtual Reality Therapy can be customized treatment by depending on symptoms in patients with panic disorder and are capable of differentiate application for the cure at each stage. It is to treat by leading patients to get accustomed to environments and situations in real world through care process with each symptom and stage. It is helpful that based on A Human-Sensibility Ergonomics, technologies like immersive virtual reality equipment, force-relative feedback and stereophonic sound, and like stimulating the sense of smell make people to induce experiences by stimulating human's five senses. There are many advantages of immersion in virtual world in that the phenomenon such as challenge, interaction, reality, illusion, and cooperation is expanded. As an application for therapy by growing such augmented reality, virtual space and sharing of data through the Internet and also inexpensive its availability have recently expanded the base. There are other benefits of Virtual Reality Therapy offering active interaction environments for cognitive experience which can provide appropriately adjusted environments for patients who are hard to overcome the real situation because of phobia. In addition to that it is safe and economical and patients' confidentiality is assured. Moreover, due to the principles of applying real-time navigation the Virtual Reality Therapy makes modification and supplementation easier and also it can reduce cybersickness because of the supply of Lenticular allowing people to see stereoscopy without eyeglasses, which makes sense of presence clearer. On top of that due to the development of interactive technologies, it is becoming close to sense of reality similar to real world by leading users to navigate by themselves and to operate objects in a virtual space. This paper will therefore examine, although it is of limited, characteristics of application of virtual reality technology based on A Human-Sensibility Ergonomics used for treatment for a disorder. this paper will analyse a range of its application and problems and it will suggest the future possibilities.

  • PDF

A Study on the Analysis of Difference between IT and Non-IT Companies on the Consumer Dispute Resolution System's Continuous Use Intention -Focusing on Korean Small and Medium Enterprises (소비자 분쟁처리시스템 지속사용의도에 대하여 IT기업과 비IT기업 간의 차이분석에 관한 연구 -한국 중소기업을 중심으로)

  • Jung, Soo-Yong;Shin, Yong-tae;Han, Jeong-Hoon;Lee, Sung-Hoon
    • Journal of Digital Convergence
    • /
    • v.15 no.12
    • /
    • pp.203-212
    • /
    • 2017
  • This research analyzed the factors that have the influences on the intentions to use the consumer dispute settlement system for the small- and medium-sized corporations. The consumer dispute settlement system is a general Internet information portal service which enables the small- and medium-sized corporations and the small businesses receive the support for the accurate damage handling method and the legal service through the Internet in their disputes with the black consumers or the consumers. With the small- and medium-sized corporation users who use the consumer dispute settlement system as the subjects, the research took a lot at what influences the consumer dispute settlement system has on the quality of the information, the quality of the system, the ease-of-use regarding which the environmental factors are perceived, and the ease that was perceived and, finally, what influences it has on the intention of the use. The accuracy, the convenience, and the costs of the consumer dispute settlement system had the positive influences on the ease-of-use that was perceived and the accuracy and the convenience, also had the positive influences on the usefulness that was perceived. Also, it was verified that the ease-of-use of the consumer dispute settlement system that was perceived and the usefulness of use of the consumer dispute settlement system that was perceived finally had the positive influence relationships with the intention of the use. It is highly expected that if, based on the results of this research, the quality of the consumer dispute settlement system is maintained and supplemented to fit the priority order, there will be the maintenance of, and the development toward, a system that is even more improved than the previously existent system.

A study on security independent behavior in social game using expanded health belief model (건강신념모델을 확장한 소셜게임(Social Game) 보안의지행동에 관한 연구)

  • Ahn, Ho-Jeong;Kim, Sung-Jun;Kwon, Do-Soon
    • Management & Information Systems Review
    • /
    • v.35 no.2
    • /
    • pp.99-118
    • /
    • 2016
  • With the development of Internet and popularization of smartphones over recent years, social network services are experiencing rapid growth. On top of this, smartphone gaming market is showing a rapid growth and the use of mobile social games is on the significant rise. The occurrence of game data manipulation targeting these services and personal information leakage is highlighting the importance of social gaming security. This study is intended to propose development plans effective and efficient in social game services by figuring out factors putting effects on security dependent behavior of social game users in Korea and carrying out a practical study on the casual relationship between factors influencing security dependent behavior through recognized behavioral control and attitudes for privacy infringement of these factors. To do this, proposed was a study model in which the HBM(Health Belief Model) allowing the social game user to influence security dependent behavior was expanded and applied as a major variable. To verify the study model of this study practically, a survey was conducted among university students in Seoul-based K University and S University who had experienced using social game services. According to the study findings, firstly, the perceived seriousness turned out to provide positive influence to trust. But, the perceived seriousness turned out not to put positive effects on self-efficacy. Secondly, the perceived probability turned out not to put positive effects on self-efficacy and trust. Thirdly, the perceived gain turned out to put positive effects on self-efficacy and trust. Fourthly, the perceived disorder turned out not to put positive effects on self-efficacy and trust. Fifthly, self-efficacy turned out to put positive effects on trust. But, self-efficacy turned out not to put positive effects on security dependent behavior. Sixthly, trust turned out not to put positive effects on security dependent behavior. This study is intended to make a strategic proposal so that social game users can raise awareness of their level of security perception and security willingness through this.

  • PDF

Implementation of integrated monitoring system for trace and path prediction of infectious disease (전염병의 경로 추적 및 예측을 위한 통합 정보 시스템 구현)

  • Kim, Eungyeong;Lee, Seok;Byun, Young Tae;Lee, Hyuk-Jae;Lee, Taikjin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.69-76
    • /
    • 2013
  • The incidence of globally infectious and pathogenic diseases such as H1N1 (swine flu) and Avian Influenza (AI) has recently increased. An infectious disease is a pathogen-caused disease, which can be passed from the infected person to the susceptible host. Pathogens of infectious diseases, which are bacillus, spirochaeta, rickettsia, virus, fungus, and parasite, etc., cause various symptoms such as respiratory disease, gastrointestinal disease, liver disease, and acute febrile illness. They can be spread through various means such as food, water, insect, breathing and contact with other persons. Recently, most countries around the world use a mathematical model to predict and prepare for the spread of infectious diseases. In a modern society, however, infectious diseases are spread in a fast and complicated manner because of rapid development of transportation (both ground and underground). Therefore, we do not have enough time to predict the fast spreading and complicated infectious diseases. Therefore, new system, which can prevent the spread of infectious diseases by predicting its pathway, needs to be developed. In this study, to solve this kind of problem, an integrated monitoring system, which can track and predict the pathway of infectious diseases for its realtime monitoring and control, is developed. This system is implemented based on the conventional mathematical model called by 'Susceptible-Infectious-Recovered (SIR) Model.' The proposed model has characteristics that both inter- and intra-city modes of transportation to express interpersonal contact (i.e., migration flow) are considered. They include the means of transportation such as bus, train, car and airplane. Also, modified real data according to the geographical characteristics of Korea are employed to reflect realistic circumstances of possible disease spreading in Korea. We can predict where and when vaccination needs to be performed by parameters control in this model. The simulation includes several assumptions and scenarios. Using the data of Statistics Korea, five major cities, which are assumed to have the most population migration have been chosen; Seoul, Incheon (Incheon International Airport), Gangneung, Pyeongchang and Wonju. It was assumed that the cities were connected in one network, and infectious disease was spread through denoted transportation methods only. In terms of traffic volume, daily traffic volume was obtained from Korean Statistical Information Service (KOSIS). In addition, the population of each city was acquired from Statistics Korea. Moreover, data on H1N1 (swine flu) were provided by Korea Centers for Disease Control and Prevention, and air transport statistics were obtained from Aeronautical Information Portal System. As mentioned above, daily traffic volume, population statistics, H1N1 (swine flu) and air transport statistics data have been adjusted in consideration of the current conditions in Korea and several realistic assumptions and scenarios. Three scenarios (occurrence of H1N1 in Incheon International Airport, not-vaccinated in all cities and vaccinated in Seoul and Pyeongchang respectively) were simulated, and the number of days taken for the number of the infected to reach its peak and proportion of Infectious (I) were compared. According to the simulation, the number of days was the fastest in Seoul with 37 days and the slowest in Pyeongchang with 43 days when vaccination was not considered. In terms of the proportion of I, Seoul was the highest while Pyeongchang was the lowest. When they were vaccinated in Seoul, the number of days taken for the number of the infected to reach at its peak was the fastest in Seoul with 37 days and the slowest in Pyeongchang with 43 days. In terms of the proportion of I, Gangneung was the highest while Pyeongchang was the lowest. When they were vaccinated in Pyeongchang, the number of days was the fastest in Seoul with 37 days and the slowest in Pyeongchang with 43 days. In terms of the proportion of I, Gangneung was the highest while Pyeongchang was the lowest. Based on the results above, it has been confirmed that H1N1, upon the first occurrence, is proportionally spread by the traffic volume in each city. Because the infection pathway is different by the traffic volume in each city, therefore, it is possible to come up with a preventive measurement against infectious disease by tracking and predicting its pathway through the analysis of traffic volume.