• Title/Summary/Keyword: On-line Users

Search Result 665, Processing Time 0.024 seconds

A Study on Critical Factor of Selecting Online Video Flatform by Using AHP (AHP 기법을 활용한 온라인 동영상 플랫폼의 선택 속성 연구)

  • Park, Seonho;Lee, Dasol;Park, Sohyun
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.42 no.4
    • /
    • pp.173-182
    • /
    • 2019
  • This study attempts to improve the understanding of the rapidly growing online video platform market such as Youtube and OTT, and to investigate the attributes and relative importance of them. For this purpose, the factors that influence the choice to use were derived through literature studies and the Focus Group Interview (FGI), and the priority of the factors was calculated through the analytic hierarchy process (AHP). The upper layer of the AHP structure was 'Relationship', 'Entertainment', 'Informativity', and 'Convenience', and the lower layer was structured into 13 elements. The importance priority analysis among the factors that influence the choice to use was done by teenagers, 20s, and 30s and the results are summarized as follows : First, Users consider the 'Just for fun' and 'Satisfaction of interests' as the most important factors, followed by 'Easy accessibility to use', 'Vicarious satisfaction', 'Usefulness of Information', and 'Up-to-dateness of information'. Second, the ranking of the upper layer was in the order of 'Entertainment'-'Informativity'-'Convenience'-'Relationship'.As a result of AHP,'Entertainment' was 3.6 times more important than 'Relationship'. In the comparison by age group, only teenagers regarded that 'Convenience' is more important than 'Informativity'. According to the characteristics of the age group, the lower layer of teenagers consider 'Convenient function' to be important and ranked 'Usefulness of information' in 8th. While 'Vicarious satisfaction' ranked 4th out of 13 factors in the entire age group, those in their 20s and 30s ranked 8th, showing a difference. In the case of 20s, 'Reasonable price' was ranked 4th and the 'Diversity of Information' was ranked 5th, Otherwise 30s consider 'Trustworthiness of Information' to the third. Third, unlike 'Convenience' which was the lower-rank in the upper layer AHP analysis, 'Easy accessibility to use', the lower-layer of convenience, ranked third overall in the importance analysis among the 13 lower-layer factors, and showed a similar patterns in the age groups results. In the conclusion, this study demonstrates that 'Convenience' and 'Vicarious satisfaction' factors, which were not relatively well addressed in the previous studies, are the key factors to be considered in. By presenting the results of the importance analysis on each of the selected attributes, This study has a practical implication that Industries such as on-line video service platform provider can use the importance priority in establishing the directions of future strategy.

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Son, Hong;Jo, In-June;Ju, Young-Ji;Lee, Dal-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.05a
    • /
    • pp.667-671
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can been through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working Group is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, I design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

The Design and Implementation of Secure Instant Messaging System (안전한 단문 전송 시스템 설계 및 구현)

  • Song, Gi-Pyeung;Sohn, Hong;Jo, In-June;Ju, Young-Ki;Lee, Dal-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.5 no.2
    • /
    • pp.357-364
    • /
    • 2001
  • The Instant Messenger(IM) is the most popular personal communication tool today. IM is a tool that can substitute E-mail for a person, and can secure the user for a company. Further, it is claimed as it has a limitless potential. However, there has been several reports on security issues. It has known that the transmitting message is not secured for the attacks, and hacking tools has been developed. In addition, several reports has been made regards to the vulnerability. In other words, anyone can peep through and manipulate the messages that are sent or received via IM. This is a barrier for the IM to be developed as a corporate's strategic tool, and furthermore, it will create serious personal privacy issue. IETF IMPP Working (:roup is preparing a standard mutual relationship between IM. However, it is complicated due to the American On-Lines's absence, whom has ensured the most number of IM users. There was a discussion only about the form of the transmitting data, but it is insufficient state to discuss the security service for general. In this paper, 1 design and implement the Secure Instant Messaging System, to solve the IM's vulnerability and the security issue presented above.

  • PDF

A Study on Safety and Performance Evaluation of Smart All-in-one Cardiopulmonary Assist Device (스마트올인원 심폐순환보조장치의 안전성 및 성능평가에 관한 연구)

  • Park, Junhyun;Ho, YeJi;Lee, Yerim;Lee, Duck Hee;Choi, Jaesoon
    • Journal of Biomedical Engineering Research
    • /
    • v.40 no.5
    • /
    • pp.197-205
    • /
    • 2019
  • The existing Extracorporeal membrane oxygenation(ECMO) and Cardiopulmonary bypass system(CPB) have been developed and applied to various devices according to their respective indications. However, due to the complicated configuration and difficult usage method, it causes inconvenience to users and there is a risk of an accident. Therefore, smart all-in-one cardiopulmonary circulation device is being developed recently. The smart all-in-one cardiopulmonary assist device consists of a blood pump for cardiopulmonary bypass, a blood oxidizer for cardiopulmonary bypass, a blood circuit for cardiopulmonary bypass, and an artificial cardiopulmonary device. It is an integrated cardiopulmonary bypass device that can be used for a variety of purposes such as emergency, intraoperative, post-operative intensive care, and long-term cardiopulmonary assist, combined with CPB used in open heart surgery and ECMO used when patient's cardiopulmonary function does not work normally. The smart all-in-one cardiopulmonary assist device does not exist as a standard and international standard applicable to advanced medical devices. Therefore, in this study, we will refer to the International Standard for Blood Components, the International Standard for Blood, the Guideline for Blood Products, and prepare applicable performance and safety guidelines to help quality control of medical devices, and contribute to the improvement of the health of people. The guideline, which is the result of conducted a survey of the method of safety and performance test, is based on the principle of all-in-one cardiopulmonary aiding device, related domestic foreign standards, the status of domestic and foreign patents, related literature, blood pump(ISO 18242), blood oxygenator (ISO 7199), and blood circuit (ISO 15676) for cardiopulmonary bypass.The items on blood safety are as follows: American Society for Testing and Materials ASTM F1841-97R17), and in the 2010 Food and Drug Administration's Safety Assessment Guidelines for Medical Assisted Circulatory Devices. In addition, after reviewing the guidelines drawn up through expert consultation bodies including manufacturers / importers, testing inspectors, academia, etc. the final guideline was established through revision and supplementation process. Therefore, we propose guidelines for evaluating the safety and performance of smart all-in-one cardiopulmonary assist devices in line with growing technology.

A Study on the Vulnerability Management of Internet Connection Devices based on Internet-Wide Scan (인터넷 와이드 스캔 기술 기반 인터넷 연결 디바이스의 취약점 관리 구조 연구)

  • Kim, Taeeun;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.504-509
    • /
    • 2019
  • Recently, both wireless communications technology and the performance of small devices have developed exponentially, while the number of services using various types of Internet of Things (IoT) devices has also massively increased in line with the ongoing technological and environmental changes. Furthermore, ever more devices that were previously used in the offline environment-including small-size sensors and CCTV-are being connected to the Internet due to the huge increase in IoT services. However, many IoT devices are not equipped with security functions, and use vulnerable open source software as it is. In addition, conventional network equipment, such as switches and gateways, operates with vulnerabilities, because users tend not to update the equipment on a regular basis. Recently, the simple vulnerability of IoT devices has been exploited through the distributed denial of service (DDoS) from attackers creating a large number of botnets. This paper proposes a system that is capable of identifying Internet-connected devices quickly, analyzing and managing the vulnerability of such devices using Internet-wide scan technology. In addition, the vulnerability analysis rate of the proposed technology was verified through collected banner information. In the future, the company plans to automate and upgrade the proposed system so that it can be used as a technology to prevent cyber attacks.

Perceptions of social presence and aggressive behavior in cyberspace (사이버 공간에서 사회적 실재감의 지각과 공격행동)

  • Jae-Hwi Kim ;Yeon-Jung Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.10 no.3
    • /
    • pp.83-101
    • /
    • 2004
  • This study investigated the effects of social presence as means of self-awareness and interpersonal-awareness on the cyber-aggressive behavior. The cyber-aggressive behavior (flaming and direct aggression use of character) should be differ from existence of social presence and type of social presence of internet users. To test hypothesis, an experiment was executed a field study on cyberspace, an on-line game, "fortress 2 blue forever". I made a chat-room in the game site to conduct an experiment to 107 person who entered the chat-room and blinded ignorance of this situation made by researchers. As the subjects enter the chat-room, he chats with 3 researchers who were waiting before he gets in. The social presence was operated with 3 phases by the contents of the chat (①control group; nothing, ②experimental group 1; reaction about other people ③experimental group 2; reaction about other people + self-exposure by an exchange information of their home region). The studies show that, subjects of the control group behaved more aggressively than other subjects of the experimental groups(both flaming and direct aggression use of character). Meantime, I compared experimental group 1 with experimental group 2 to investigate difference between the type of social presence. As the result, subjects of the experimental group 1 behaved more aggressively than experimental group 2 (only flaming, there's no difference in direct aggression use of character).

  • PDF

A Study on Perception Change in Bicycle users' Outdoor Activity by Particulate Matter: Based on the Social Network Analysis (미세먼지로 인한 자전거 이용객의 야외활동 인식변화에 관한 연구: 사회네트워크분석을 중심으로)

  • Kim, Bomi;Lee, Dong Kun
    • Journal of Environmental Impact Assessment
    • /
    • v.28 no.5
    • /
    • pp.440-456
    • /
    • 2019
  • The controversy of the risk perception related to particulate matters becomes significant. Therefore, in order to understand the nature of the particulate matters, we gathered articles and comments in on-line community related to bicycling which is affected by exposure of the particulate matters. As a result, firstly, the government - led particulate matter policy was strengthened and segmented every period, butthe risk perception related to particulate matters in the bicycle community has become active and serious. Second, as a result of analyzing the perception change of outdoor activities related to particulate matters, bicycle users in community showed a tendency of outdoor activity depending on the degree of particulate matters ratherthan the weather. In addition, the level of the risk perception related to particulate matters has been moved from fears of serious threat in daily life and health, combined with the disregard of domestic particulate matter levels or mask performance. Ultimately, these risk perception related to particulate matters have led some of the bicycling that were mainly enjoyed outdoors to the indoor space. However, in comparison with outdoor bicycling enjoyed by various factors such as scenery, people, and weather, the monotonous indoor bicycling was converted into another type of indoor exercise such as fitness and yoga. In summary, it was derived from mistrust of excessive information or policy provided by the government or local governments. It is considered that environmental policy should be implemented after discussion of risk communication that can reduce the gap between public anxiety and concern so as to cope with the risk perception related to particulate matters. Therefore,this study should be provided as an academic basis for the effective communication direction when decision makers establish the policy related to particulate matters.

A Study on Feature Classification and Data Dictionary of Digital Map (수치지도 지형지물 분류체계 개선 및 자료사전에 관한 연구)

  • 조우석;이동구;윤영보
    • Spatial Information Research
    • /
    • v.10 no.3
    • /
    • pp.455-468
    • /
    • 2002
  • Toward the systematic and efficient management of national land, National Geography Institute(NGI, National mapping agency) has been producing national basemap in automated process since middle of 1980's. Under the National Geographic Information System(NGIS) Development Plan, NGI began to produce digital maps in the scales of 1:1,000, 1:5,000, 1:25,000 since 1995. However, those of digital maps that have been generated under NGIS Development Plan need to be modified and corrected due to lack of technology and experience in making digital maps. In this context, those digital maps generated are currently in great need for improving the data dictionary. It is fully appreciated in previous research that data dictionary will be a key element far users and generators of digital maps to rectify the existing problems in digital maps as well as to maximize the application of digital maps. In this paper, we analyzed existing problems in digital maps based on previous researches and interviews with engineers in different fields of geospatial engineering. And then, the existing data dictionary has been redefined and modified. In the line of modification process, a relational matrix was established fur each topographic feature defined in the existing feature classification system. This paper presents newly proposed data dictionary which conforms to newly defined feature classification system from previous research performed by NGI.

  • PDF

Topographical Changes in Torrential Stream After Dredging in Erosion Control Dam - Using Terrestrial LiDAR Data - (사방댐 준설이 계류의 지형변화에 미치는 영향 - 지상 LiDAR 자료를 이용하여 -)

  • Seo, Junpyo;Woo, Choongshik;Lee, Changwoo;Kim, Kyongha;Lee, HeonHo
    • Journal of Korean Society of Forest Science
    • /
    • v.103 no.3
    • /
    • pp.392-401
    • /
    • 2014
  • This research was carried out to understand the impact of mountainous torrent on topographical change of slope and sediment volume within a deposit line by dredging of soil erosion control dam. Terrestrial LiDAR surveys were conducted at dredged and non-dredged sites. Terrestrial LiDAR has an advantage on detecting topographical changes easily without demanding workmanship and technical skill for users. The distribution of erodible slope ($20^{\circ}-40^{\circ}$) was higher in non-dredged site than that of dredged site. However, the distribution was higher in dredged site than that of non-dredged site after rainy season. Erosion and deposition appeared regularly in a dredged site, but those occurred irregularly in the non-dredged site. The inflow of soil per square meter was 1.7 times higher in dredged site than that of non-dredged site after rainy season. The difference of rainfall in each site did not affect to soil erosion. The distribution of erodible slope was increased in dredged site than that of non-dredged site after rainy season due to inflow of soil from upper stream caused by dredging.

Load balancing of a deployment server using P2P (P2P를 이용한 배포 서버의 부하 분산)

  • Son Sei-Il;Lee Suk-Kyoon
    • The KIPS Transactions:PartA
    • /
    • v.13A no.1 s.98
    • /
    • pp.45-52
    • /
    • 2006
  • To perform on-line maintenance for Distributed Information System, it is indispensable to disseminate files to participant nodes in the network. When users' requests for file deployment occur simultaneously in a short period a deployment server falls into overload phase, which is often called Flash Crowds. h common solution to avoid Flash Crowds is to increase hardware capacity. In this paper, we propose a software solution based on P2P, which does not cost any additional expense. In the proposed solution, nodes in the network are grouped into subnetworks one of which is composed of only neighboring nodes. In each subnetwork, copies of deployment files can be transferred to each other. Consequently, it brings about the effect of load balancing in deployment server. To raise the effectiveness, target files for deployment are packed into one package. Before being transferred, each package is divided into multiple equal-sized segments. A deployment server in a normal phase transmits a package requested from nodes in segment units. However a deployment server is overloaded, if segments already exist in the subnetwork participant nodes in the subnetwork receive necessary segments from neighboring nodes. In this paper, we propose data structures and algorithm for this approach and show performance improvement through simulation.