• Title/Summary/Keyword: Internet Personal Broadcasting

Search Result 201, Processing Time 0.021 seconds

Interactive Data Acquisition System based on Hand Tracking to evaluate Children's Cognitive Abilities

  • Ekaterina, Ten;Lee, Suk-Ho
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.14 no.3
    • /
    • pp.108-114
    • /
    • 2022
  • Autism (ASD) is a mental disorder characterized by a pronounced deficit in personal, social, speech, and other aspects of development and communication skills. Since autism is a complex developmental disorder that requires a lot of effort to recognize, this research was conducted to develop an interactive data Acquisition System and detect the first signs of ASD in children. The proposed system presents several variants of the tasks in an entertaining form, using hand tracking. Hand tracking is used to attract children's attention and interest them more to achieve more accurate results. The creation of the system is based on such libraries as OpenCV, PyGame, TensorFlow, and Mediapipe. The ultimate goal of the paper is to obtain data on the disease of autism in children for use in further diagnosis by medical experts.

Revising the Korean Newspaper Advertising Code of Ethics: An Empirical Investigation Leveraging Expert Interviews and Analytic Hierarchy Process (AHP) Surveys

  • Yoo, Seung-Chul;Kang, Seung-Mi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.135-148
    • /
    • 2023
  • The Code of Ethics for Newspaper Advertising in Korea, first implemented in 1976 and subsequently revised in 1976, 1996, and 2021, is a critical regulatory instrument for the country's advertising sector. However, the specialized domain of "advertising ethics," particularly the "code of advertising ethics," remains under-explored. This research addresses this scholarly gap, providing an empirical analysis of the 2021 amendment's revision trajectory. This study employs a robust methodological approach, integrating expert interviews and small-group AHP-based surveys. This approach allows for a comprehensive understanding of the revision needs, referencing existing ethical codes studies, and comparing similar ethics codes nationally and internationally. The research further investigates key challenges such as personal data protection and copyright issues in the rapidly evolving digital media landscape, while preserving the existing code's inherent value. The findings are expected to significantly contribute to the emerging field of advertising ethics in Korea, offering practical implications for future code revisions.

Predicting Continuance Intention of Personal Preventive Behavior after COVID-19: A Framework of Health Belief Model

  • Zong-Yi Zhu;Suleimen Madina;Hyeon-Cheol Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.239-249
    • /
    • 2023
  • This study aims to investigate the factors influencing preventive behavior among foreigners residing in Korea. Drawing upon the Health Belief Model (HBM), this study seeks to gain insights into the decisionmaking processes underlying preventive behavior within this specific population. A comprehensive online survey was conducted among 364 foreigners. An analysis revealed that perceived barriers and perceived benefits played crucial roles as mediators, mediating the relationship between the examined factors and preventive behavior. The insights gained from this study have implications for public health interventions and self-preventive product businesses aiming to promote and sustain self-preventive behavior practices among foreigners residing in Korea, even after all COVID-19 restrictions have been lifted.

Factors Influencing the Intention to Continue Using the Metaverse: Focusing on the Influence of Social Norms

  • Mina Lee;Minjung Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.51-60
    • /
    • 2023
  • This study aims to examine factors influencing the intention to continue using the metaverse, focusing on the impact of social norms. Specifically, direct and indirect effects of technical characteristics (perceive quality, interactivity, perceived playfulness), user characteristics (self-efficacy, personal innovativeness), and social influence factors (descriptive norm, injunctive norm, subjective norm) on continuous use intention were examined. The role of perceived ease of use and perceived usefulness as a mediator was also examined. An online survey was conducted with 165 college students attending universities in two large cities in South Korea who had used the metaverse. As a result, perceived playfulness, descriptive norm, and perceived usefulness directly influenced continuous use intention. Perceived playfulness, interactivity, and subjective norm influenced continuous use intention indirectly through perceived usefulness. This study theoretically extends the Technology Acceptance Model by specifying social influence in metaverse contexts. Practical implications are provided in terms of marketing strategy for the metaverse industry to continue to grow and develop.

A Case Study on the Application of Security Policy for Outsourcing Personnel in case of Large-Scale Financial IT Projects (금융회사 대형 IT프로젝트 추진 시 외주직원에 대한 보안정책 적용 사례 연구)

  • Son, Byoung-jun;Kim, In-seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.4
    • /
    • pp.193-201
    • /
    • 2017
  • Financial firms strengthen to protect personal information from the leakage, introducing various security solutions such as print output security, internet network Isolation system, isolationg strorage of customer information, encrypting personal information, personal information detecting system, data loss prevention, personal information monitoring system, and so on. Financial companies are also entering the era of cutthroat competition due to accept of the new channels and the paradigm shift of financial instruments. Accordingly, The needs for security for customer information held by financial firms are keep growing. The large security accidents from the three card companies on January 2014 were happened, the case in which one of the outsourcing personnel seized customer personal information from the system of the thress card companies and sold them illegally to a loan publisher and lender. Three years after the large security accidents had been passed, nevertheless the security threat of the IT outsourcing workforce still exists. The governments including the regulatory agency realted to the financail firms are conducting a review efforts to prevent the leakage of personal information as well as strengthening the extent of the sanction. Through the analysis on the application of security policy for outsourcing personnel in case of large-scale Financial IT projects and the case study of appropriate security policies for security compliance, the theis is proposing a solution for both successfully completing large-scale financial IT Project and so far as possible minizing the risk from the security accidents by the outsouring personnel.

A Study on Wireless Network Management for Security Enhancement (보안강화를 위한 무선 네트워크 관리 방안에 관한 연구)

  • Lee, Eun-Sub;Kim, Young-Kon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.3
    • /
    • pp.195-200
    • /
    • 2020
  • Wireless LANs are being used in many fields due to their ease of use. The biggest advantage of the WLAN can be said above all mobility. Domestic wired internet service has been saturated since 2006, but wireless internet users have been steadily increasing. However, WLAN has many advantages and characteristics of wireless service. It has a number of security vulnerabilities, and various security related technologies have been developed and applied to solve these problems. On the other hand, security awareness of WLAN users is still insufficient, and security accidents such as personal information leakage occur repeatedly every year. We will study the main weaknesses that can occur in WLAN and suggest security measures from the management level.

Factors Influencing Resistance to the Metaverse: Focusing on Propagation Mechanisms

  • Mina Lee;Minjung Kim
    • International journal of advanced smart convergence
    • /
    • v.13 no.2
    • /
    • pp.110-118
    • /
    • 2024
  • This study examines factors influencing nonusers' resistance to the adoption of the metaverse, focusing on propagation mechanisms. It elucidates the role of innovation resistance within the metaverse adoption process. We applied the Innovation Resistance Model in the context of the metaverse and considers three major groups of factors influencing resistance to the metaverse: innovation characteristics (perceived usefulness, compatibility, perceived risk, and complexity), consumer characteristics (personal innovativeness), and propagation mechanisms (mass media, online media, and personal communication). An online survey of college students who do not use the metaverse revealed that perceived usefulness, compatibility, personal innovativeness, and online media were negative predictors of resistance to the metaverse. Conversely, perceived risk, mass media, and personal communication were positive predictors of resistance to the metaverse. Furthermore, innovation resistance was found to play a mediating role in the metaverse adoption process. Drawing upon the findings, we suggested marketing strategies to decrease resistance to the metaverse.

The Effect of the SNS service and personal characteristics on Participation Intention (SNS 서비스특성과 개인특성이 참여의도에 미치는 영향)

  • Oh, Duk-Shin;Lee, Sin-Bok;An, Ki-Hun;Moon, Jun-Hwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.3
    • /
    • pp.243-258
    • /
    • 2017
  • Recently, Due to advances in smart-phones and mobile devices, the use of SNS is increasing in recent years. Online networking is building new paradigms in terms of creating personal needs. Along with the nature of mobile devices, it is expected to have a lot of impact on SNS service participation. The study focused on the effect of SNS on SNS participation and ease of use of social characteristics and ease of use of SNS. A survey was conducted on a survey of SNS users and analyzed the data through the structural equations. The study found that the study of social networking was statistically significant in terms of the intent of identifying the usefulness of SNS and ease of use and ease of use.

Resource Allocation Method in High-Rate Wireless Personal Area Networks (고속 무선 PAN에서의 자원 할당 방식)

  • Kim, Byung-Seo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.39-45
    • /
    • 2008
  • High-Rate Wireless Personal Area Networks (HR-WPANs) in IEEE 802.15.3 standard use a TIme Devision Multiple Access (TDMA) protocol to support isochronous traffic. Isochronous traffic requires a delay-bounded service. However, the HR-WPAN standard suffers from long access delay and association delay. In this paper, we propose an enhanced MAC protocol for the delay-bounded traffic. This proposed protocol provides a way that a central node is able to collect traffic status on all member nodes. Furthermore, by utilizing the information, a scheduling algorithm is also proposed in order to synchronize the instant of a packet transmission with that of the packet arrival. With the proposed protocol and algorithm, the delay of access and association can be reduced. Performance analysis is carried out and the significant performance enhancement is observed.

  • PDF

A GDPR based Approach to Enhancing Blockchain Privacy (GDPR에 기반한 블록체인 프라이버시 강화 방안)

  • Han, Sejin;Kim, Suntae;Park, Sooyoung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.33-38
    • /
    • 2019
  • In this paper, we propose a new blockchain technology that could comply with GDPR. The proposed model can prevent illegal access by controlling access to the personal information according to a access policy. For example, it can control access to the information on a role-basis and information validation period. The core mechanism of the proposed model is to encrypt the personal information with public key which is associated with users attributes policy, and then decrypt it with a private key and users attributes based on a Attribute-based Encryption scheme. It can reduce a trusted third-part risk by replacing it with a number of nodes selected from the blockchain. And also the private key is generated in the form of one-time token to improve key management efficiency. We proved the feasibility by simulating the proposed model using the chaincode of the Hyperledger Fabric and evaluate the security.