• Title/Summary/Keyword: 지능정보사회

Search Result 1,082, Processing Time 0.028 seconds

The Analysis of K-WISC-IV Profiles in Children with High-Functioning Autism Spectrum Disorder (고기능 자폐 스펙트럼 장애 아동의 K-WISC-IV 프로파일 분석 및 융합적 적용)

  • Cho, Eun-Young;Kim, Hyun-Mi;Song, Dong-Ho;Cheon, Keun-Ah
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.7
    • /
    • pp.341-348
    • /
    • 2017
  • The aim of this study is to distinguish children with high-functioning autism spectrum disorder (ASD) from the norm group by identifying their Intelligence with Korean Wechsler Intelligence Scale for Children-Fourth Edition (K-WISC-IV) profile analysis. The article were administered to 90 children with high-functioning ASD (6-16) years and has surveyed the average of the Full scale IQ, index scores, and subtest scores of K-WISC-IV. Also, this study has conducted a single-subject T-test in order to verify whether Full scale IQ, index scores, subtest scores are different from those of the norm group. The results show that children with high-functioning ASD achieved significantly lower scores on Processing Speed Index, compared to the norm group. Furthermore, their scores in Comprehension, Picture Concept, Picture completion, Coding, and Symbol Search were significantly lower than those of the norm group. It is likely that what have turned out to be the cognitive weaknesses of high-functioning ASD children by K-WISC-IV analysis, including slow process speed, low social judgement, and difficulty in visual stimuli in everyday life are interrelated to their unique characters.

A Prepaid System Promotion Policy for the 3G MVNO - Carrier Selection, Interconnection, Number Portability, Prepay, Wholesale Provision - (3G MVNO를 통한 선불요금제 활성화 정책 - 선불요금, 상호접속, 사업자선택, 도매제공 및 번호이동 -)

  • Kim, Byung-Woon
    • Informatization Policy
    • /
    • v.18 no.3
    • /
    • pp.88-107
    • /
    • 2011
  • This paper proposes a prepaid system promotion policy for the 3G(WCDMA) MVNO with regard to the newly included paragraphs 3, 4 and 5 of Article 32 (User Protection) and Article 38 (Provision of Wholesale Telecommunications Services) of the Telecommunication Business Act, which was revised on March 22, 2010. As of June 2011, there are only a few prepaid system subscribers to the mobile communications service due to various limitations, including prepay, interconnection, carrier selection, the MVNO policy, and number portability. However, overseas communications service regulatory agencies and service providers are increasingly presenting policies and strategies for mobile prepaid plans, in order to accommodate the various customer demands that are increasing the use of smart phones and data. This paper advances various proposals concerning promotion of the prepaid system by the 3G MVNO under the current Telecommunication Business Act, including separation of the prepaid data system and the mobile network; introduction of a monthly fixed-rate hybrid prepaid system, a top-up system and USIM system; introduction of mobile network carrier selection; differentiated retail discounts between prepaid and post-paid prices; revision of the retail discount policy for wholesale provision; increase in the number of mandatory service providers; and in-depth consideration of the introduction of a number portability policy for the prepaid and post-paid systems.

  • PDF

An Exploratory Study on the Sharing and Application of Public Open Big Data (공공 빅데이터 개방 및 활용 활성화 방안에 대한 연구)

  • Jeon, Byeong-Jin;Kim, Hee-Woong
    • Informatization Policy
    • /
    • v.24 no.3
    • /
    • pp.27-41
    • /
    • 2017
  • With the growing interest in the 4th industrial revolution and big data, various policies are being developed for facilitating the use of public open big data, which are leading to a wide range of added values created from use of such data. Despite the expanded requirements for public data disclosure and the legal system improvement, however, the use of public open big data is still limited. According to the literature review, there are studies on policy proposals for the government guiding directions for public open big data, but there is a lack of studies that handle the issue from the users' viewpoint. Therefore, this study aims to analyze the public open data ecosystem in Korea and to analyze public open big data through interviews with the providers (the government and public institutions) and users (private sector companies and citizens). This way, the study finds inhibition factors and facilitation factors, draws out issues and suggests solutions through a causal relationship analysis between each factor. Being a research on finding measures for facilitating both public big data release and use, this study has theoretical implications. In the meanwhile, the derived issues and alternatives provide practical implications also for stakeholders who are planning to facilitate release and use of public open big data.

Organizational and Personal Characteristics to Determine the Intentions and Actions of the Computer Abuse (컴퓨터 오남용의 의도와 행동을 결정하는 조직 및 개인적 특성)

  • Chang, Hwal-Sik;Jung, Dae-Hyun
    • Informatization Policy
    • /
    • v.20 no.1
    • /
    • pp.42-60
    • /
    • 2013
  • In the information age, it is common to use the computer for company's business. Even though there are lots of investment to prevent the abuse of computer, the frequency and amount is increasing. Therefore, the purpose of this study is how individuals misusing computers in the company, and identifying factors of it separated by group and personal characteristics. Code of ethics and discipline has a significant impact on attitude and intention from the view of organizational characteristics. This proofs that code of ethics is clearly codified and reflect the management policy. So, it imprints employee's commitment to protect themselves, and this could be conjunction with the company's policy. Moreover, reflecting on performance assesment and discipline also has a effect. Organizational loyalty appeared significantly in attitude, but was not important in intentions. This means that the intensity of organizational loyalty is not always connected to the abuse of computer. It can be depending on individual's tendency, psychological state and organization mood. The action for misusing the computer has a significant impact on attitude and intention. Those people might have a strong tendency to judge that it is totally fine to use the company's computer as long as it does not harm others and using during non-business hours, instead of thinking that it is inappropriate to use the company's computer not for business intention.

  • PDF

An Organizational Maturity Assessment Model for Public Data Quality Management (공공데이터 품질관리를 위한 조직 성숙도 평가 모델)

  • Kim, Sunho;Lee, Changsoo;Chung, Seungho;Kim, Hakcheol;Lee, Changsoo
    • Informatization Policy
    • /
    • v.22 no.1
    • /
    • pp.28-46
    • /
    • 2015
  • Although the demand for the use of public data increases in accordance with the expansion of Government 3.0, the poor level of data quality and its management currently implemented is becoming obstacles to opening data to the public. To improve the efficiency of management, linkage and usage for data, standardized processes for data quality management have to be prepared and appropriate data quality assessment criteria should be established. In this paper, we propose the organizational maturity model that can assess the public data quality management level. This model consists of the process reference model and the measurement framework. Fifteen processes grouped by the PDCA cycle are defined in the process reference model. The measurement framework measures the organizational maturity level based on process capability levels. The organizational maturity model can be used to establish objectives and directions for public data quality improvement by diagnosis of current level of public data quality management and problem solving. This model can also facilitate open to the private sector and activate usage of stable public data through reliability enhancement.

Observation of the pattern of changes in the ideological orientation of the Korean National Assembly: Application of an automated method of text scaling (한국 국회의 이념성향 변화에 대한 패턴 탐색: 자동화된 텍스트 스케일링 방법의 적용)

  • Kim, Jeong-Yeon
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.73-94
    • /
    • 2021
  • This study aimed to analyze the minutes of the Legislation and Judiciary Committee, one of the standing committees of the Korean National Assembly, by applying the WORDFISH algorithm of automated text analysis to estimate the pattern of changes in the ideological orientation of the members of Korea's political elite. The results of the analysis showed that the Legislation and Judiciary Committee generally undergoes changes in ideological orientation around the time of a major administrative change, especially during the period preceding a change up to the time of its implementation. Compared with the United States, where changes in the ideological orientation of the political elite occur simultaneously based on parties, changes in that of the political elite at the Korean National Assembly tend to occur in response to a certain transitional point in time or a change in the ruling government. What is especially noteworthy in terms of the ideological orientation reflected in the minutes of the Legislative Judiciary Committee is that the microscopic effect tends to disappear when the macroscopic effect occurs and, conversely, that the microscopic effect emerges once the macroscopic effect has disappeared. In other words, changes in the ideological orientation of the political elite appear to indicate the effect of a particular legislator's individual characteristics when no effect is observed during a given term or year of the National Assembly, whereas they revealed the effect of a given time itself when no effects related with the individual characteristics of a legislator are discerned.

Explication and Rational Conceptualization of Metaverse (메타버스 해석과 합리적 개념화)

  • Song, Stephen W.;Chung, Dong-Hun
    • Informatization Policy
    • /
    • v.28 no.3
    • /
    • pp.3-22
    • /
    • 2021
  • This article reviews previous literature on the metaverse and attempts to provide a refined definition for this phenomenon. Metaverse has recently been in the spotlight among discussions by the industry and the media while a consensus on the exact definition of metaverse is yet to be determined. Since Neal Stephenson first coined the term metaverse in his novel "Snow Crash" in 1992, the Acceleration Studies Foundation (ASF) was the first to analyze the concept of metaverse in 2007. While ASF's effort did not receive much spotlight it may have deserved, metaverse gained much attention in the fall of 2020 when NVIDIA announced its real-time simulation and collaboration platform for 3D production named "Omniverse" as a next-generation alternative for the Internet along with Roblox defining its service as metaverse during its IPO. Since then, metaverse has been commonly recognized as a world where we can cross over reality and virtuality. Based on the two axes and four scenarios proposed by the ASF, we review the literature across four realms as follows - virtual reality, mirror world, augmented reality, and lifelogging. Then, we examine the issues with the existing definition of metaverse and propose an alternative explanation by focusing on human behavior and user experience. Finally, we reassess the concept of metaverse and incorporate human communication, reality-based and virtual-based activities, and eXtended reality as elements to properly define metaverse.

A Study on the Measures for Detection Error from the Displacement Distortion of the RADAR Waveform (레이더 전파의 왜곡현상에서 오는 탐지 오류 저감 방안 연구)

  • Kim, Jin Hieu;Kim, ChangEun;Lee, Yong-Soo
    • Journal of the Korea Institute of Construction Safety
    • /
    • v.2 no.1
    • /
    • pp.36-44
    • /
    • 2019
  • $21^{st}$ century is digitally civilized era. Technologies such as AI, Iot, Big Data, Mobile and etc makes this era digitally advanced. These advancement of the technology greatly impacted detection range of the radar. Human's eye sight can see about 20Km and hear 20 ~ 20000 Hz. These limitations can be overcome using radar. This radar technology is used in military, aircraft, ship, vehicle and etc. to replace human eye. However, radar technology is capable of making False Alarm Rate. This document will propose the fix of these problems. Radar's distortion includes beam refraction, diffraction and reflection. These inaccurate data result in deterioration of human judgements and my cause various casualties and damages. Radar goes through annual testing to test how many false alarm is being produced. Normal radar usually makes 10 to 20 False alarms. In emergency situation, if operator were to follow this false alarm, this might result in following false object or take 12 more seconds to follow the right object. This problem can be overcome by using different radar data from different places and angles. This helps reduces False Alarm rate and track the object twice as fast.

An Integrated Test of Interaction Effect between Causes and Internet Ethics of Smart Phone Cyber Bullying (스마트폰 이용에서 사이버폭력의 그 원인들 및 인터넷윤리의 통제효과에 대한 통합적 검증 연구)

  • Jang, Ha-Young;Lee, Seong-Sik
    • Informatization Policy
    • /
    • v.26 no.2
    • /
    • pp.46-61
    • /
    • 2019
  • This study constructs an integrated model for university students' smart phone cyber bullying and tests interaction effects between causal and control factors. Causal factors include low self-control, differential association with cyber bullying peers, and victimization experiences; and control factors include internet ethics, perceived certainty of formal punishment, and bond to parents. This study focuses on examining how internet ethics buffers the effect of causal factors in cyber bullying. Results show that both differential association with cyber bullying peers and victimization experiences have significant effects on cyber bullying. And among the control factors, internet ethics only has a negative direct effect on cyber bullying. In addition, it is found that there are significant interaction effects between two causal factors - differential association with cyber bullying peers and victimization experiences - and internet ethics. It is also shown that there is a significant interaction effect between victimization experience and bond to parents, but a perceived formal punishment has no significant control effect. It is revealed that internet ethics is a main control factor in buffering the effects of causal factors in cyber bullying.

Empathy Recognition Method Using Synchronization of Heart Response (심장 반응 동기화를 이용한 공감 인식 방법)

  • Lee, Dong Won;Park, Sangin;Mun, Sungchul;Whang, Mincheol
    • Science of Emotion and Sensibility
    • /
    • v.22 no.1
    • /
    • pp.45-54
    • /
    • 2019
  • Empathy has been observed to be pivotal in enhancing both social relations and the efficiency of task performance. Empathetic interaction has been shown to begin with individuals mirroring each other's facial expressions, vocal tone, actions, and so on. The internal responses of the cardiovascular activity of people engaged in empathetic interaction are also known to be synchronized. This study attempted to objectively and quantitatively define the rules of empathy with regard to the synchronization of cardiac rhythm between persons. Seventy-four subjects participated in the investigation and were paired to imitate the facial expressions of their partner. An electrocardiogram (ECG) measurement was taken as the participants conducted the task. Quantitative indicators were extracted from the heart rhythm pattern (HRP) and the heart rhythm coherence (HRC) to determine the difference of synchronization of heart rhythms between two individuals as they pertained to empathy. Statistical significance was confirmed by an independent sample t-test. The HRP and HRC correlation(r) between persons increased significantly with empathy in comparison to an interaction that was not empathetic. A difference of the standard deviation of NN intervals (SDNN) and the dominant peak frequency decreased. Therefore, significant parameters to evaluate empathy have been proposed through a step-wise discrimination analysis. Empathic interactions may thus be managed and monitored for high quality social interaction and communication.