• Title/Summary/Keyword: Measures to use media

Search Result 86, Processing Time 0.028 seconds

A Study on the User Experience of the Complex Cultural Space -Focused on Starfield Library and ARC.N.BOOK- (복합문화공간의 사용자 경험 연구 -별마당도서관과 아크앤북을 중심으로-)

  • Jeong, Su-Hyun;Kim, Seung-In
    • Journal of Digital Convergence
    • /
    • v.17 no.9
    • /
    • pp.367-373
    • /
    • 2019
  • In modern society, with the changing lifestyle, demand for complex cultural spaces is rising and various cultural spaces are emerging. However, user-centered cultural space research has not yet been shown. In order to find out whether various cultural experience functions and user experience types of complex cultural spaces are being delivered properly, this study compared and analyzed the representative cultural spaces of Korea, 'Starfield Library' and 'ARC.N.BOOK'. User experience analysis tools and individual in-depth interviews were used as research methods. As a result, both spaces responded that commercial space and brand library were out of harmony and that the use of services in complex cultural spaces was inconvenient. This is interpreted as the result of the need for improvement measures in the value and usability of experience provided by the current complex cultural space and is expected to help develop the complex cultural space in the future.

Study of the Service Improvement and Revitalization Measures of Student-Centered University Library through the Book Lending Data Analysis of Freshmen (대학 신입생의 도서대출 자료 분석을 통한 학생 중심의 대학도서관 서비스 개선 및 활성화 방안 연구)

  • Shim, Jaeruen
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.12
    • /
    • pp.7060-7067
    • /
    • 2014
  • The reading activity of university students is the key element for the cultivation of creative human resources, and each university develops and performs the various cultural education and library program. Actually, the university libraries check the service periodically through library satisfaction surveys and the library user's actual condition survey to improve it, but the amount of reading, number of books lent and the rate of borrowers are still under expectation. Therefore, in this research, an in-depth analysis of lending books data for freshmen, as the service improvement and revitalization measures of university libraries for students, suggested the following: (1) the early education for the library users, (2) the opening of the students-participating library collections, (3) the use of the data using a library for the consulting with students (4) the establishment of the library depositary for education support, and (5) the introduction of the library CRM for individual student. Through this result, it would be substantially helpful for each university library (including two-year college), in which the number of lending books and the rate of borrowers are below expectations.

An Empirical Investigation on the Adoption of E-Commerce in Bangladesh

  • Hoque, Md. Rakibul;Ali, Mohammad Afshar;Mahfuz, Mohammad Abdullah
    • Asia pacific journal of information systems
    • /
    • v.25 no.1
    • /
    • pp.1-24
    • /
    • 2015
  • Electronic Commerce or e-commerce implies such an industry where goods and services are bought and sold over electronic systems. This is rapidly growing sectors in Bangladesh which influence local and international trade. Government of Bangladesh has also initiated quite a good number of measures for the expansion of e-commerce. However, low adoption of e-commerce is not uncommon in Bangladesh. The objective of this study is to determine the factors that influence the adoption of e-commerce services in Bangladesh. Extended version of Technology Acceptance Model (TAM) is envisaged as the theoretical backbone of the study. Reliability analysis using Cronbach's Alpha test indicates that the research model is internally consistent. The study reveals that 35 percent of respondents became interested in e-commerce services from advertisement on Internet or other electronic media. The findings of the study shows that all the four constructs, namely-Computer Self Efficacy, Perceived Credibility, Perceived Usefulness and Perceived Ease of Use have significant effect on the adoption of e-commerce. The study has also demonstrated that Perceived Usefulness appeared as the most important factor in describing user's adoption of e-commerce.

Attack Scenarios and Countermeasures using CoAP in IoT Environment (IoT기기에서 SSDP 증폭 공격을 이용한 공격기법 및 대응 방안)

  • Oh, Ju-Hye;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.4
    • /
    • pp.33-38
    • /
    • 2016
  • DDoS attack has been continuously utilized that caused the excessively large amount of traffic that network bandwidth or server was unable to deal with paralyzing the service. Most of the people regard NTP as the biggest cause of DDoS. However, according to recently executed DDoS attack, there have been many SSDP attack in the use of amplified technique. According to characteristics of SSDP, there is no connection for making a forgery of source IP address and amplified resources feasible. Therefore, it is frequently used for attack. Especially, as it is mostly used as a protocol for causing DDoS attack on IoT devices that constitute smart home including a wireless router, media server, webcam, smart TV, and network printer. Hereupon, it is anticipated for servers of attacks to gradually increase. This might cause a serious threat to major information of human lives, major government bodies, and company system as well as on IoT devices. This study is intended to identify DDoS attack techniques in the use of weakness of SSDP protocol occurring in IoT devices and attacking scenario and counter-measures on them.

A Study on the Conflict between the Use of Personally non-Identifiable Information and the Protection of Personal Information in Digital Behavioral Advertising: Focusing on the Domestic and Foreign Status and System (디지털 맞춤형 광고에서 비식별개인정보의 활용과 개인정보 보호와의 갈등에 관한 연구: 국내외 현황과 제도를 중심으로)

  • Choi, Min-Wook
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.1
    • /
    • pp.71-79
    • /
    • 2021
  • This study looked at the conflict between the aspect of the use of personally non-identifiable information for the development of the big data industry and the digital advertising industry and the aspect of personal information protection. In order to achieve the research purpose, this study focused on literature research such as thesis, legal texts, administrative regulations, and recent media articles. As a result of this study, the main issues related to the protection of personally non-Identifiable Information in digital behavioral advertising were 'conflict between freedom of advertising expression and personal rights', 'personalization of unidentifiable information', 'information imbalance'. In this regard, as measures to protect personally non-identifiable information in digital behavioral advertising, it was proposed to 'harmonize with freedom of advertising expression and personal rights, 'improve notification and consent. process', and 'reinforce the right to control personal information'.

A Study on the Measures against Suicide Terrorism (자살테러에 대한 대책 연구)

  • Choi, Jin-Tai
    • Journal of the Society of Disaster Information
    • /
    • v.2 no.1
    • /
    • pp.139-155
    • /
    • 2006
  • Over the past two decades suicide terrorism has become an ever-widening phenomenon. When suicide terrorism was first introduced in the Middle East it seemed that this new phenomenon was invincible and that it might change the innate imbalance between terror groups and their rivalry governments. This did not in fact occur. Looking at history of terrorism, it can be seen that suicide attacks are in actuality a very old modus operandi. However, contemporary suicide terrorism differs from such historical tactics, just as the whole phenomenon of terrorism differs from ancient modes of warfare. Modern suicide terrorism is aimed at causing devastating physical damage. through which it inflicts profound fear and anxiety. Its goal is to produce a negative psychological effect on an entire population rather than just the victims of the actual attack. The relatively high number of casualties guaranteed in such attacks, which are usually carried out in crowded areas, ensures full media coverage. Thus, suicide terrorism, ranks with other spectacular modus operandi such as blowing up airplanes in mid air or the use of Weapons of Mass Destruction as a sure means to win maximum effect. For the purposes of this paper a suicide terror attack is defined as a politically motivated violent attack perpetrated by a self-aware individual (or individuals) who actively and purposely causes his own death through blowing himself up along with his chosen target. The perpetrator's ensured death is a precondition for the success of his mission. The greatest potential risk suicide terrorism may pose in future is if terrorists carry out operations combined with other spectacular tactics such as blowing up airplanes or the use of Weapons of Mass Destruction. Such a combination will increase immensely the death toll of a single terror attack and will have a shocking psychological effect on public moral. At this level suicide terrorism would constitute a genuine strategic threat and would probably be confronted as such. This study portrays a general overview of the modern history of suicide terror activity worldwide, focusing on its main characteristics and the various aims and motivations of the terror groups involved. In addition, This study provides an overview what is to be done to prevent such terrorist attacks.

  • PDF

A Study on IP Camera Security Issues and Mitigation Strategies (IP 카메라 보안의 문제점 분석 및 보완 방안 연구)

  • Seungjin Shin;Jungheum Park;Sangjin Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.111-118
    • /
    • 2023
  • Cyber attacks are increasing worldwide, and attacks on personal privacy such as CCTV and IP camera hacking are also increasing. If you search for IP camera hacking methods in spaces such as YouTube, SNS, and the dark web, you can easily get data and hacking programs are also on sale. If you use an IP camera that has vulnerabilities used by hacking programs, you easily get hacked even if you change your password regularly or use a complex password including special characters, uppercase and lowercase letters, and numbers. Although news and media have raised concerns about the security of IP cameras and suggested measures to prevent damage, hacking incidents continue to occur. In order to prevent such hacking damage, it is necessary to identify the cause of the hacking incident and take concrete measures. First, we analyzed weak account settings and web server vulnerabilities of IP cameras, which are the causes of IP camera hacking, and suggested solutions. In addition, as a specific countermeasure against hacking, it is proposed to add a function to receive a notification when an IP camera is connected and a function to save the connection history. If there is such a function, the fact of damage can be recognized immediately, and important data can be left in arresting criminals. Therefore, in this paper, we propose a method to increase the safety from hacking by using the connection notification function and logging function of the IP camera.

Voice Activity Detection using Motion and Variation of Intensity in The Mouth Region (입술 영역의 움직임과 밝기 변화를 이용한 음성구간 검출 알고리즘 개발)

  • Kim, Gi-Bak;Ryu, Je-Woong;Cho, Nam-Ik
    • Journal of Broadcast Engineering
    • /
    • v.17 no.3
    • /
    • pp.519-528
    • /
    • 2012
  • Voice activity detection (VAD) is generally conducted by extracting features from the acoustic signal and a decision rule. The performance of such VAD algorithms driven by the input acoustic signal highly depends on the acoustic noise. When video signals are available as well, the performance of VAD can be enhanced by using the visual information which is not affected by the acoustic noise. Previous visual VAD algorithms usually use single visual feature to detect the lip activity, such as active appearance models, optical flow or intensity variation. Based on the analysis of the weakness of each feature, we propose to combine intensity change measure and the optical flow in the mouth region, which can compensate for each other's weakness. In order to minimize the computational complexity, we develop simple measures that avoid statistical estimation or modeling. Specifically, the optical flow is the averaged motion vector of some grid regions and the intensity variation is detected by simple thresholding. To extract the mouth region, we propose a simple algorithm which first detects two eyes and uses the profile of intensity to detect the center of mouth. Experiments show that the proposed combination of two simple measures show higher detection rates for the given false positive rate than the methods that use a single feature.

A Study on Classification of Mobile Application Reviews Using Deep Learning (딥러닝을 활용한 모바일 어플리케이션 리뷰 분류에 관한 연구)

  • Son, Jae Ik;Noh, Mi Jin;Rahman, Tazizur;Pyo, Gyujin;Han, Mumoungcho;Kim, Yang Sok
    • Smart Media Journal
    • /
    • v.10 no.2
    • /
    • pp.76-83
    • /
    • 2021
  • With the development and use of smart devices such as smartphones and tablets increases, the mobile application market based on mobile devices is growing rapidly. Mobile application users write reviews to share their experience in using the application, which can identify consumers' various needs and application developers can receive useful feedback on improving the application through reviews written by consumers. However, there is a need to come up with measures to minimize the amount of time and expense that consumers have to pay to manually analyze the large amount of reviews they leave. In this work, we propose to collect delivery application user reviews from Google PlayStore and then use machine learning and deep learning techniques to classify them into four categories like application feature advantages, disadvantages, feature improvement requests and bug report. In the case of the performance of the Hugging Face's pretrained BERT-based Transformer model, the f1 score values for the above four categories were 0.93, 0.51, 0.76, and 0.83, respectively, showing superior performance than LSTM and GRU.

The Application of an EU REACH Protocol to the Occupational Exposure Assessment of Methanol: Targeted Risk Assessment (메탄올 작업장 노출 평가에의 EU REACH 프로토콜 적용: Targeted Risk Assessment)

  • Ra, Jin-Sung;Song, Moon Hwan;Choe, Eun Kyung
    • Journal of Environmental Health Sciences
    • /
    • v.47 no.5
    • /
    • pp.432-445
    • /
    • 2021
  • Background: The European Centre for Ecotoxicology and Toxicology of Chemicals' Targeted Risk Assessment (ECETOC TRA) tool has been recognized by EU REACH as a preferred approach for calculating worker health risks from chemicals. Objectives: The applicability of the ECETOC TRA to occupational exposure estimation from industrial uses of methanol was studied by inputting surveyed and varied parameters for TRA estimation as well as through comparison with measured data. Methods: Information on uses of methanol was collected from seven working environment monitoring reports along with the measured exposure data. Input parameters for TRA estimation such as operating conditions (OCs), risk management measures (RMMs) and process categories (PROCs) were surveyed. To compare with measured exposures, parameters from the surveyed conditions of ventilation but no use of respiratory protection were applied. Results: PROCs 4, 5, 8a, 10, and 15 were assigned to ten uses of methanol. The uses include as a solvent for manufacturing sun cream, surfactants, dyestuffs, films and adhesives. Methanol was also used as a component in a release agent, hardening media and mold wash for cast products as well as a component of hard-coating solution and a viscosity-controlling agent for manufacturing glass lenses. PROC 8a and PROC 10 of a cast product manufacturer without LEV (local exhaust ventilation) and general ventilation as well as no respiratory protection resulted in the highest exposure to methanol. Assuming the identical worst OCs and RMMs for all uses, exposures from PROC 5, 8a, and 10 were the same and the highest followed by PROC 4 and 15. The estimation resulted in higher exposures in nine uses except one use where measured exposure approximated exposures without RMMs. Conclusions: The role of ECETOC TRA as a conservative exposure assessment tool was confirmed by comparison with measured data. Moreover, it can guide which RMMs should be applied for the safe use of methanol.