• Title/Summary/Keyword: CyberIdentity

Search Result 98, Processing Time 0.029 seconds

The gender difference in concept of calling in childrearing: Visual Comparison through Social Network Analysis (부모소명 개념에 대한 부와 모의 인식 차이: 사회연결망 분석을 통한 시각적 비교)

  • Su Jin Kim;Young Woo Shon;Suran Lee
    • The Korean Journal of Coaching Psychology
    • /
    • v.6 no.2
    • /
    • pp.93-114
    • /
    • 2022
  • The purpose of this study is to investigate whether there was a difference between men and women in conceptualizing a calling in childrearing through social network analysis. The results are as follows. IAs a result of the study, it was found that mothers showed significantly larger networks and higher density than fathers did, indicating that mothers, more than fathers do, experience parenting and child-rearing based more on a concept of calling in childrearing. Parents directly linked responsibility, children's growth, direction, commitment, and parental character to a calling in childrearing. In addition, mothers also linked a sense of identity and parental growth to it. In the case of fathers, only four concepts were directly connected with a calling in childrearing. This shows that mothers, in comparison to fathers, connect essential self-concepts, such as identity as a parent and themes of growth, to a calling in childrearing. In centrality, similar concepts also were evaluated as important. The common parental closeness centrality is composed of responsibility, child growth, direction, and belief starting from the center. In the case of fathers, child growth, responsibility, and belief were evaluated in order, and in the case of mothers, responsibility, parental growth, and identity were evaluated as relatively important concepts.

Self-Disclosure and Cyberbullying on SNS (SNS상에서 자기노출과 사이버불링)

  • Jooyeon Won;DongBack Seo
    • Information Systems Review
    • /
    • v.19 no.1
    • /
    • pp.1-23
    • /
    • 2017
  • Since the development of information communication technologies, social networking sites (SNSs) have been diffused to the world with benefits such as building and maintaining relationships among people. SNSs have become more popular with the development of mobile devices. Despite this advantage, SNSs also present unexpected effects on people, such as cyberbullying and identity theft. Cyberbullying has emerged as one of the most serious issues among people who use SNSs. In fact, almost 20% of teenagers confessed that they have been cyberbullied on SNSs. In consideration of this serious social issue, this study investigates the influences of self-disclosure and self-control on the cyberbullying victimization experience from the perspective of Social Exchange Theory. Self-disclosure is a basic characteristic of SNSs. It is classified into self-disclosure for access to SNS and self-disclosure for relationship building and maintaining on SNSs. The cyberbullying victimization experience is classified into being cyber-excluded and being cyber-attacked. We examine how two types of self-disclosure and self-control affect two types of cyberbullying victimization experience based on the survey data of people who are in their 20s and are greatly familiar with SNSs.

The Aspectual Theory of the Cybercharacter (사이버캐릭터의 위상론)

  • 이선교
    • Archives of design research
    • /
    • v.12 no.4
    • /
    • pp.182-190
    • /
    • 1999
  • There has been the rapid change of paradigm with the overflow of terms related to computers such as information, digital, cyber, virtual world and the change of time concept on the ground that it is common to change the world into virtual time. This study is about cybercharacters working in air-broadcasting with rapidly-developing internet, The cybercharacters including 3D animation developed from 2D animation are know to be manufactured with use of electronic mediun and computers and to exist in electronics. Though the emergence of the cybercharacters has a lot of gflnetic roots according to their objectives, they have in common that they are made by 3D graphics and they work in the virtual space, The great traits of the cybercharaters lie in the extension of interfacial function and ecological growth. In the cyberspace the interface, the meeting point between a computer and its users is the most important, The cybercharacters as medium providing new ruman interface become effective with growing interest in virtual reality, The cybercharacters also keep the ecological traits, They can also bring about added value with infusion of image and development of the network, These cybercharacters can also play the important parts in the continually developing cyberspace, The successful birth of the cybercharacter are based on, the technological power. assistance of fund and the ctrltural background, The information-entertainment of the cybercharacters functions well with the accompinimene of these three things, The cybercharacters can make a subject which keeps single issue as a central point of the virtual realty, The cybercharacters can also be connected with equity of "Korean knowledge information society" in the cultural rule of the internet and sociocul tural identity, identity.

  • PDF

A qualitative study on family roles on the job activities of women with acquired physical disabilities (중도지체장애여성의 직업활동에 대한 가족 역할 연구)

  • Lee Eun-Mi;Paik Eun-Ryoung
    • Journal of Family Resource Management and Policy Review
    • /
    • v.10 no.2
    • /
    • pp.61-86
    • /
    • 2006
  • This phenomenological study aims at exploring the role of family in promoting, maintaining, and developing job activities of women with acquired physical disabilities. As a result of in-depth interviews with 8 women with physical disabilities, 6 theme clusters and 14 sub-themes have appeared. Participants have vividly revealed their experiences with regard to the various support and help of their family. They were provided physical, emotional and financial supports which helped at great extent to overcome the anger and loss resulted from the acquired disabilities. Although most of the participants have experienced failure in job finding several times, they have at last succeeded in it by the consistent help of their family. In particular, the support and help given from the family were substantial and specific which promoted maintaining and developing their career. Therefore the participants could obtain more confidence in themselves and this made the participants to speak for themselves. Although the family roles for the job finding and maintaining of the participants are played in various ways which is positive, effective and specific, there remains some significant problems and limitations. Participants expressed their uncomfortableness in opening their most in-depth thinking and emotions to their family. They have also experienced a great deal of difficulties in maintaining job because of the housework load and child bearing work which is mainly regarded by the family members as the woman's(participant's)duties. In addition to this, sexual needs and sexual identity of the participants are neither recognized nor dealt with seriously in family, The participants also mentioned about the inequal relationships and their self-consciousness among family member as well as the lack of career guidance role of the family. Based on these research findings, we have made a number of suggestions to promote the positive roles and overcome the limited roles of the family.

  • PDF

A Qualitative Case Study on the Development of Network as Communities of Practice in Welfare Network of S District in Seoul, Korea (실천공동체로서의 네트워크 발달에 대한 질적 사례연구 : 서울시 S구 재가복지연합회 사례를 중심으로)

  • Kim, Young-Sook;Lim, Hyo-Yeon
    • Korean Journal of Social Welfare
    • /
    • v.62 no.3
    • /
    • pp.299-321
    • /
    • 2010
  • The purpose of this study was to analyze the development of social welfare network. The qualitative case study method was utilized from a communities of practice perspective. Depth interviews were conducted among 10 social workers of community welfare agencies who have practiced network activities. Data were analyzed with constant-comparative methods(Strauss and Corbin(1990)). The result are the followings; In incubation stage, the core theme was "collaboration for surmount overcoming difficulties from the bottom". In intergration stage, "acquirement of normative value basement" was emerged. "Reinforcement of solidarity" and "reconfirmation of identity" were drawn as core themes in muturation stage. There were core themes "construction of original image" and "shifting from private connection to public connection" in maintenance stage. Lastly stage a care theme of "qualitative transition" was emerged in transformation.

  • PDF

Development of an Index Model on the Information and Communication Ethics (정보통신윤리지수 모델 개발)

  • Lee, Jae-Woon;Han, Keun-Woo;Lee, YoungJun;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.10 no.3
    • /
    • pp.19-29
    • /
    • 2007
  • The informationization policies undertaken in concentration only on the national economic growth invited the unbalance between technology and social culture, displayed the serious reverse function phenomena, and these problems threatened the personal identity of individual in the cyber space. In this study, we developed an index model on the information and communication ethics where the national level of information and communication ethics can be examined. For this purpose, based on diverse previous research data, the areas of the ethical indicators in information and communication has been developed through the brain storming of the research staff. Through the consultation with experts, the feasibility and representation as index was heightened, and the weighted values to the each index was provided by the AHP method. The outcome of questionnaires from the information users and information providers (great portals) was also reflected in simple average method into the calculation of the weighted value to the each index element.

  • PDF

Yi et al.'s Group Key Exchange Protocol : A Security Vulnerability and its Remediation (Yi등이 제안한 그룹 키 교환 프로토콜의 보안 취약성 및 개선 방법)

  • Lee, Young-Sook;Kim, Jee-Yeon;Won, Dong-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.91-98
    • /
    • 2012
  • A group key exchange (GKE) protocol is designed to allow a group of parties communicating over a public network to establish a common secret key. As group-oriented applications gain popularity over the Internet, a number of GKE protocols have been suggested to provide those applications with a secure multicast channel. Among the many protocols is Yi et al.'s password-based GKE protocol in which each participant is assumed to hold their individual password registered with a trusted server. A fundamental requirement for password-based key exchange is security against off-line dictionary attacks. However, Yi et al.'s protocol fails to meet the requirement. In this paper, we report this security problem with Yi et al.'s protocol and show how to solve it.

A Study on Establishment of Connecting Information Conversion Criteria for Mobile Electronic Notification Service of Private Institutions (민간기관 모바일 전자고지서비스를 위한 연계정보 변환기준 수립에 대한 연구)

  • Kim, JongBae
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.735-743
    • /
    • 2021
  • The mobile electronic notice service (MENS) is a service that delivers a mobile electronic notice to a smartphone in the person's name through an authorized electronic document intermediary instead of a bill that was delivered by mail using paper. In order to provide the MENS, information is needed to identify the same user between the sending agency and the authorized electronic document relay. In this paper, we propose a standard for safe conversion and utilization of Connecting Information (CI) used as user identification information for MENS. In the proposed method, it is necessary for the requesting institution to send the electronic notice to provide the resident registration number to the identity verification institution and convert it into the CI. In this case, a safe and efficient MENS will be possible by proposing a review standard and processing method to verify the appropriateness of the conversion of CI. By applying the proposed method to the MENS, it can contribute to service activation and reinforcement of user privacy protection.

The Design Research on ICT Security Concepts and Domains (ICT기반 보안개념 정의와 범위에 관한 설계연구)

  • Minseo Jeon;Hangbae Chang
    • Information Systems Review
    • /
    • v.21 no.3
    • /
    • pp.49-61
    • /
    • 2019
  • As the number of security incidents and damages increase steadily, interest in the security of society is growing, and the amount of academic interest and research is steadily increasing. However, despite these concerns and the quantitative increase in research, the terms 'security' and 'safety' have been mixed and studies have been conducted without the conceptual definition of various security terms being clearly defined. As a result, various forms of security concepts based on ICT environments have been misused. Therefore, we tried to derive the consensus of experts among the various security terms which are mixed in this study, and to summarize the concepts based on the analysis of domestic and foreign documents based on the concept of the terms. Through this research, we intend to contribute to the establishment of the academic identity of security by preventing related mistakes caused by the mixed use of terminology.

Development of School Health Nursing Phenomena in Korea by Retrospective Method of ICNP (ICNP의 후향적 개발방법에 의한 한국의 학교간호현상)

  • Kim, Young-Im;Young, Soon-Ok;Wang, Myoung-Ja;Kim, Chung-Nam;Kim, Hyeon-Suk;Park, Tae-Nam;Chung, Mi-Ja;Hyun, Hye-Jin
    • Research in Community and Public Health Nursing
    • /
    • v.13 no.4
    • /
    • pp.595-607
    • /
    • 2002
  • The objectives of this study were to identify the phenomena of school health nursing at schools in Korea and to contribute to building a school health domain of International Classification for Nursing Practice. A retrospective method was used in this study to develop ICNP during the period from July to October 200l. The procedure of the study involved choosing nursing phenomena using preliminary terms from the reports on the field of school health nursing practice documented by nursing students in 10 different nursing colleges. The detail procedures of the study were as follows. 1) Choosing nursing phenomena by using preliminary terms 2) Choosing the characteristics of school health nursing practice from the selected nursing phenomena 3) In order to make a consensus regarding the appropriate characteristics of phenomena. 15 study group members re-categorized the nursing phenomena through 5 times of cyber meetings and 3 times of formal meetings. 4) To verify each characteristic, 5 community nursing faculties and 25 school health nurses participated in the procedure to give scores on nursing characteristics. 5) Classification of the definite nursing phenomena and characteristics. Following the 5 step procedures, school health nursing phenomena were categorized into human and environmental domains. Human domains were classified into human behavioral and functional domains. Environmental domains were classified into physical and psychosocial domains. The essential characteristics of each phenomena were selected when it obtains the mean score of 3.0 or over at the related characteristics. The human behavioral domain consisted of 7 phenomena including risk for spinal disorder, inadequate dietary habit, inadequate weight control, smoking and substance abuse, inadequate stress management, inadequate sex related coping strategies and inadequate accident management. The human functional domain consisted of 6 phenomena including inadequate eye care and visual management, risk for respiratory disorder, inadequate dental health care, inappropriate infectious disease control, risk for gastrointestinal disorder, and lack of sexual identity. The physical environmental domain consisted of 6 phenomena including risk for incident at inside classroom, risk for incident at outside classroom, risk for incident around school, risk for exposure to hazardous facilities around school. inadequate garbage and disposal management, and inadequate physical environment for learning. The psychosocial domain included impaired social interaction at school. Each phenomenon was composed of 2 to 8 characteristics and all phenomena will include a total number of 85 characteristics. The phenomena of school health nursing in Korea partially confirmed school health architecture of ICNP. Further study on verification of school health nursing phenomena in Korea needs to be done to support the findings of this study through review of literature on nursing classifications or field studies.

  • PDF