• Title/Summary/Keyword: Internet Personal Broadcasting

Search Result 201, Processing Time 0.029 seconds

Smartphone Usage Experience of College students (대학생들의 스마트폰 사용 경험)

  • Kim, Jungae;Cho, Eui-young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.187-201
    • /
    • 2016
  • The purpose of this study was to analyze the smart phone usage experience structure for college students. The phenomenology approach was used by conducting 4 times in-depth interviews with the 7 college students age between 20~23. Collected Data was analyzed by Giorgi's phenomenological method. There were 4 general structure descriptions and 28 themes. General structure descriptions were 'Dependence on smart phone', 'Phenomenon of smart phone usage', 'Results of smart phone usage' and 'Relationship between stress and smart phone'. Themes consisted of 'Ambivalence', 'Positive feelings for smart phones', 'Separation anxiety', 'Negative feelings for smart phones'. 'Dependent feelings for smart phones', 'A sense of unity with smart phones', 'Helpful for my life', 'Deeply involved with my life', 'Useful tool in my life', 'Study, communication, relaxation and health care', 'Maintain personal relationship', 'The most important thing in my life', 'Shallow relationship stress', 'Interference with personal relationship', 'Forming a negative relationship', 'Invasion of privacy', 'Forming a Incorrect relationship', 'Unwanted participation', 'No effort to improve relationship', 'Poor concentration', 'Interference with academic study', 'Study assistance', 'Limited help for study in depth', 'Shelter from the stress', 'Amplification of the stress', 'Obsessive focus', 'Feel separation for the reality' and 'Waste of time'. Smart phone usage make college students dependent on smart phones and had negative influence on both personal relationship and academic results. Usage of smart phone also amplified stress. Therefore we need fundamental principles on usage of smart phone and propose to build cultural etiquette that provides reasonable way to use smartphone.

A study on the selection of the target scope for destruction of personal credit information of customers whose financial transaction effect has ended (금융거래 효과가 종료된 고객의 개인신용정보 파기 대상 범위 선정에 관한 연구)

  • Baek, Song-Yi;Lim, Young-Bin;Lee, Chang-Gil;Chun, Sam-Hyun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.3
    • /
    • pp.163-169
    • /
    • 2022
  • According to the Credit Information Act, in order to protect customer information by relationship of credit information subjects, it is destroyed and stored separately in two stages according to the period after the financial transaction effect is over. However, there is a limitation in that the destruction of personal credit information of customers whose financial transaction effect has expired cannot be collectively destroyed when the transaction has been terminated, depending on the nature of the financial product and transaction. To this end, the IT person in charge is developing a computerized program according to the target and order of destruction by investigating the business relationship by transaction type in advance. In this process, if the identification of the upper relation between tables is unclear, a compliance issue arises in which personal credit information cannot be destroyed or even information that should not be destroyed because it depends on the subjective judgment of the IT person in charge. Therefore, in this paper, we propose a model and algorithm for identifying the referenced table based on SQL executed in the computer program, analyzing the upper relation between tables with the primary key information of the table, and visualizing and objectively selecting the range to be destroyed. presented and implemented.

The Status of the Korean Image Consulting Industry, and Related Education Programs (국내의 이미지 컨설팅 산업과 교육 현황)

  • Chung, Su-In;Shin, Sae-Young;Kim, Yoo-Jung;Kim, Young-In
    • Journal of the Korean Society of Costume
    • /
    • v.61 no.2
    • /
    • pp.47-59
    • /
    • 2011
  • This study provides a systematic investigation about objective personal image consulting, tool development and image-making research by analyzing the status of the Korean image-consulting industry and education. For the research, we carried out literature surveys of books on image consulting and previous research reports. In particular, we surveyed image consulting businesses that have internet web sites, and educational institutes. The results of the survey are as follows: First, domestic image consulting businesses in Korea are investigated about 93 private companies and 4 associations. They do the image making, color consulting, and education for individuals and business. Second, professional image consulting education is carried out not only in the 93 private companies, but also in the continuing and professional studies for adults of 10 universities. Furthermore, more then 90 universities have specific academic programs related to the image consulting such as facial management, beauty coordination, cosmetology, stylists, fashion events, broadcasting stylists, and so on. Third, a typical image consulting job is the personal shoppers who assists VIP customers in department stores. Professionals and politicians have personal fashion stylists for their image making. Today, the job has expanded to public fashion therapist. Fourth, the contents of an image consulting education have appeared in similar industries and educations. These contents include fashion styles, personal color analysis, make-up, facial expressions, gestures, perfumes, accessories, etc. This study is based on research on the current Korean image-consulting industry, and will enable follow-up details to be implemented. using the basis of this study for a strategic self-image formation system.

Design and Implementation of the Security System using RFID and Biometric Information (RFID 및 생체정보를 이용한 보안시스템의 설계 및 구현)

  • Choi, Jae-Kwan;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.6
    • /
    • pp.251-256
    • /
    • 2010
  • In times past, simple numeric password was the commonly used method in security system. For complement this method, the security system using biometric information is appeared. But it usually uses the scheme to utilize portion of biometric information, and has limited application fields. This biometric security system has low reliability because of some problems such as steal, robbery, and so on. Furthermore, it is associated secondary crime as leaking personal information. For this reason new security system using the unique individual biometric is required. In this paper, we propose the security scheme which used face image and iris analysis. While face image processing for specific person identification, it calculate some feature points of face image and iris's features in our proposed scheme. After person identification applying RFID tags in doorway, several feature information is extracted from camera image, and these compare with registered information of our system for final identification.

A Design of Authentication Method for Secure Communication based on Wearable Device (웨어러블 디바이스 기반의 안전한 통신을 위한 인증기법 설계)

  • Park, Jung-Oh
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.41-46
    • /
    • 2016
  • Recently, many domestic and foreign corporates are concentrating in investment to wearable devices and users are provided with various service based on wearable devices 26% more than compared to last year. It is widely used in previous healthcare, smart work, smart home environment, and it is now introduced to get connection to fused service environment. However, as products of G company are commercialized, the security issue of personal information is causing dispute in society, and the danger of data management and security regarding telecommunication is increasing. Also, because the password system used in previous wireless environment is still in use, there are possible vulnerability considering the new and mutant security threat. This thesis conducted study about protocols that can exercise safe telecommunication in the basis of wearable devices. In the registration and certification process, the signature value is created based on the code value. The telecommunication method is designed to conduct safe telecommunication based on the signature value. As for the attack method occurring in the wearable device environment, the safety was analyzed and conducted performance evaluation of previous password system and proposal system, and verified about 14% of efficiency.

Design of Adaptive User Interface(AUI) for Bus Information Terminal (Bus Information Terminal(BIT)를 위한 Adaptive User Interface(AUI) 설계)

  • Nam, Doo-Hee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.89-94
    • /
    • 2011
  • Today, the utilization of communication devices is being increased including information terminals, cell phones, handheld personal digital assistants (PDA) caused by the development of information and communication technology. The development of information and services is speeding up, whereas most communication devices have provided a inefficient hierarchical menu and sequential searching structure. In this study, the Adaptive User Interface is applied to the Bus Information Terminal(BIT) which is one of communication equipment installed in the bus stop. It will be based on analysis of unspecified individuals' preferences and user's directly personalization in the BIT prototype. We expect the results of this study to be possible to provide users with efficient and convenient information acquisition and contribute to the development of public transport use by improving the accessibility and usability of BIT.

Hospital Security System using Biometric Technology (바이오메트릭스 기술을 이용한 병원보안시스템)

  • Jung, Yong-Gyu;Kang, Jeong-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.219-224
    • /
    • 2011
  • Recently increasing importance of information security, personal security is researched. Among them, biometrics research is very good at recognition and security particularly in terms of iris recognition. Recent hospital physicians and employees for access control is emphasized. But most of them, easy-employee card access control systems are used. It has difficulties of iris recognition on the issue of accurate iris recognition algorithm to eliminate noise and inaccuracy of pretreatment methods for recognition from existing research. Therefore, this paper complements existing encryption methods to the disadvantages of biometric iris recognition using high-access records in the hospital management system is applied. In addition to conventional pretreatment process to increase recognition eyebrows when mask line component added to the extraction mask, the correct preparation method, and accordingly proposed to improve the recognition of records management systems offer access to the hospital.

Implementation of Untouched Interactive Digital Signage Control using Kinect (키넥트를 사용한 터치 없는 디지털 사이니지 제어기의 구현)

  • Kim, Jiyoung;Lee, Youngkyung;Baek, Wookjin;An, Beongku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.4
    • /
    • pp.127-132
    • /
    • 2014
  • In this paper, we propose a digital signage method that can control the contents of the screen and download the desired files to individual smart terminal with no touch of digital signage screen by using Kinect. The main features and contributions of the proposed method are as follows. First, can solve the problems such as the risk of bacterial infection, not cleanliness on the screen as well as maximize advertising effectiveness. Second, can support bi-directional communications with computer while we touch only wanted advertisements. The performance evaluation shows the effectiveness of the proposed method. Especially, we can see that the proposed system operates through the recognition of user's actions when the cursor is within the scope of a certain coordinate and the file transfer time to download information is different depending on the PC performance and the version of personal smart device.

An Efficient Bot Detection Mechanism in Smartphones (스마트폰에서 효율적인 봇 탐지 기법)

  • Choe, Ujin;Park, Jiyeon;Jung, Jinman;Heo, Junyoung;Jeon, Gwangil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.61-68
    • /
    • 2015
  • Recently, with increasing use of smartphones, the security threats also have increased rapidly. Especially, the compromised smartphone is very dangerous because it could be exploited in a DDOS attacks such as cyberterrorism as well as in the leakage of personal information. However, most bot detection mechanisms are still unsuitable for smartphone with its lower computing capability and limited battery capacity because they incur additional computational overheads or require pre-defined signatures. In this paper, we present an efficient bot detection mechanism in smartphones. Our mechanism detects effectively bots in outgoing traffic by using a correlation between user events and network traffic. We have implemented its prototype in Android smartphone and measured its performance. The evaluation results show that our mechanism provides low overhead to detect bots in smartphones.

Medical prescription design using QR Codes (QR코드를 적용한 진료 처방전 설계)

  • Lim, Myung-Jae;Jung, Dong-Keun;Kim, Myung-Gwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.13 no.6
    • /
    • pp.161-166
    • /
    • 2013
  • With recent development in information technology, IT convergence has been achieved ubiquitously in all areas of industry. In particular, there have been a lot of changes in medical IT conversion sector in terms of user service. In this regard, this paper attempts to propose an environment in which the existing paper prescription can be transferred in the form of QR codes using mobile handsets as one of practices from the perspective of user service. QR codes can minimize the burden resulting from the process of the output, delivery and storage of paper prescriptions. In addition, they can utilize the representation of the information in a wide variety of ways, and they are considered to be media that can minimize the risk of personal information exposure and falsification due to the restoration and encryption of the information. Accordingly, the application of QR codes to the medical field is expected to improve confidentiality ad storage capability of the information, along with users' convenience.