• Title/Summary/Keyword: Personal data

Search Result 5,555, Processing Time 0.042 seconds

A qualitative study on the process of maintaining the 'eating alone'(honbob) lifestyle (직장인의 '혼밥' 유지 과정에 대한 질적 연구)

  • Hye Jin Kwon;Younga Ju
    • Korean Journal of Culture and Social Issue
    • /
    • v.24 no.4
    • /
    • pp.657-689
    • /
    • 2018
  • The purpose of this study is to develop a substantive theory on 'eating alone'(honbob)and the process of maintaining the lifestyle of eating alone for the need of a non-judgmental understanding on the new 'honbob' lifestyle. Data were collected through in-depth interviews with 10 male and female workers in Seoul and Gyeonggi-do, who voluntarily eat alone over 70% of their meals per week with the minimum duration of 5 years. Data analysis was performed using grounded theory proposed by Strauss & Corbin (1998) in the qualitative research method. As a result, a paradigm model on the process of maintaining 'honbob' was derived. Based on categorical analysis, the causal condition was 'not trying to tune' and the central phenomenon was 'following the desire to set efficiency as the top priority. Contextual conditions were 'the atmosphere of fierce competition', 'weakening of organizational culture', 'diffusion of individualistic culture'. The intervening conditions were 'personal trait and emotional experience', 'job characteristics of less organization culture'. The action/interaction strategies were 'accepting internal conflicts', 'acting in autonomy', 'finding relationship through media', and 'distancing from superficial relationship'. The consequences were 'enjoying time for self-exploration', 'valuing self-care', 'becoming a epicurean conventionalist', and 'becoming aware of the need for balance'. The core category has been shown as 'self-oriented in accordance to priority of efficiency and being able to appreciate the importance of social group'. The Such phenomenon passes through four different stages - first, the stage of weighing time efficiency while beginning hon-bob; second, the stage of conflict when one feels nervous and not free from others' view; third, the stage of adjustment to justify his/her 'hon-bob'; and the final stage of balance to perceive the importance of social group while going on 'honbob'. The study had the aim of increasing the understanding and acceptance of the new 'honbob' lifestyle through an in-depth exploration of office worker's 'honbob' experience and the process of maintaining 'honbob' so the society can better accept it and, further, to embrace co-existence of various cultures.

Re-validation of the Revised Systems Thinking Measuring Instrument for Vietnamese High School Students and Comparison of Latent Means between Korean and Vietnamese High School Students (베트남 고등학생을 대상으로 한 개정 시스템 사고 검사 도구 재타당화 및 한국과 베트남 고등학생의 잠재 평균 비교)

  • Hyonyong Lee;Nguyen Thi Thuy;Byung-Yeol Park;Jaedon Jeon;Hyundong Lee
    • Journal of the Korean earth science society
    • /
    • v.45 no.2
    • /
    • pp.157-171
    • /
    • 2024
  • The purposes of this study were: (1) to revalidate the revised Systems Thinking Measuring Instrument (Re_STMI) reported by Lee et al. (2024) among Vietnamese high school students and (2) to investigate the differences in systems thinking abilities between Korean and Vietnamese high school students. To achieve this, data from 234 Vietnamese high school students who responded to translated Re_STMI consisting of 20 items and an Scale consisting of 20 items were used. Validity analysis was conducted through item response analysis (Item Reliability, Item Map, Infit and Outfit MNSQ, DIF between male and female) and exploratory factor analysis (principal axis factor analysis using Promax). Furthermore, structural equation modeling was employed with data from 475 Korean high school students to verify the latent mean analysis. The results were as follows: First, in the item response analysis of the 20 translated Re_STMI items in Vietnamese, the Item Reliability was .97, and the Infit MNSQ ranged from .67 to 1.38. The results from the Item Map and DIF analysis align with previous findings. In the exploratory factor analysis, all items were loaded onto intended sub-factors, with sub-factor reliabilities ranging from .662 to .833 and total reliability at .876. Confirmatory factor analysis for latent mean analysis between Korean and Vietnamese students yielded acceptable model fit indices (χ2/df: 2.830, CFI: .931, TLI: .918, SRMR: .043, RMSEA: .051). Lastly, the latent mean analysis between Korean and Vietnamese students revealed a small effect size in systems analysis, mental models, team learning, and shared vision factors, whereas a medium effect size was observed in personal mastery factors, with Vietnamese high school students showing significantly higher results in systems thinking. This study confirmed the reliability and validity of the Re_STMI items. Furthermore, international comparative studies on systems thinking using Re_STMI translated into Vietnamese, English, and other languages are warranted in the context of students' systems thinking analysis.

The Research on Recommender for New Customers Using Collaborative Filtering and Social Network Analysis (협력필터링과 사회연결망을 이용한 신규고객 추천방법에 대한 연구)

  • Shin, Chang-Hoon;Lee, Ji-Won;Yang, Han-Na;Choi, Il Young
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.4
    • /
    • pp.19-42
    • /
    • 2012
  • Consumer consumption patterns are shifting rapidly as buyers migrate from offline markets to e-commerce routes, such as shopping channels on TV and internet shopping malls. In the offline markets consumers go shopping, see the shopping items, and choose from them. Recently consumers tend towards buying at shopping sites free from time and place. However, as e-commerce markets continue to expand, customers are complaining that it is becoming a bigger hassle to shop online. In the online shopping, shoppers have very limited information on the products. The delivered products can be different from what they have wanted. This case results to purchase cancellation. Because these things happen frequently, they are likely to refer to the consumer reviews and companies should be concerned about consumer's voice. E-commerce is a very important marketing tool for suppliers. It can recommend products to customers and connect them directly with suppliers with just a click of a button. The recommender system is being studied in various ways. Some of the more prominent ones include recommendation based on best-seller and demographics, contents filtering, and collaborative filtering. However, these systems all share two weaknesses : they cannot recommend products to consumers on a personal level, and they cannot recommend products to new consumers with no buying history. To fix these problems, we can use the information which has been collected from the questionnaires about their demographics and preference ratings. But, consumers feel these questionnaires are a burden and are unlikely to provide correct information. This study investigates combining collaborative filtering with the centrality of social network analysis. This centrality measure provides the information to infer the preference of new consumers from the shopping history of existing and previous ones. While the past researches had focused on the existing consumers with similar shopping patterns, this study tried to improve the accuracy of recommendation with all shopping information, which included not only similar shopping patterns but also dissimilar ones. Data used in this study, Movie Lens' data, was made by Group Lens research Project Team at University of Minnesota to recommend movies with a collaborative filtering technique. This data was built from the questionnaires of 943 respondents which gave the information on the preference ratings on 1,684 movies. Total data of 100,000 was organized by time, with initial data of 50,000 being existing customers and the latter 50,000 being new customers. The proposed recommender system consists of three systems : [+] group recommender system, [-] group recommender system, and integrated recommender system. [+] group recommender system looks at customers with similar buying patterns as 'neighbors', whereas [-] group recommender system looks at customers with opposite buying patterns as 'contraries'. Integrated recommender system uses both of the aforementioned recommender systems to recommend movies that both recommender systems pick. The study of three systems allows us to find the most suitable recommender system that will optimize accuracy and customer satisfaction. Our analysis showed that integrated recommender system is the best solution among the three systems studied, followed by [-] group recommended system and [+] group recommender system. This result conforms to the intuition that the accuracy of recommendation can be improved using all the relevant information. We provided contour maps and graphs to easily compare the accuracy of each recommender system. Although we saw improvement on accuracy with the integrated recommender system, we must remember that this research is based on static data with no live customers. In other words, consumers did not see the movies actually recommended from the system. Also, this recommendation system may not work well with products other than movies. Thus, it is important to note that recommendation systems need particular calibration for specific product/customer types.

Electronic Roll Book using Electronic Bracelet.Child Safe-Guarding Device System (전자 팔찌를 이용한 전자 출석부.어린이 보호 장치 시스템)

  • Moon, Seung-Jin;Kim, Tae-Nam;Kim, Pan-Su
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.143-155
    • /
    • 2011
  • Lately electronic tagging policy for the sexual offenders was introduced in order to reduce and prevent sexual offences. However, most sexual offences against children happening these days are committed by the tagged offenders whose identities have been released. So, for the crime prevention, we need measures with which we could minimize the suffers more promptly and actively. This paper suggests a new system to relieve the sexual abuse related anxiety of the children and solve the problems that electronic bracelet has. Existing bracelets are only worn by serious criminals, and it's only for risk management and positioning, there is no way to protect the children who are the potential victims of sexual abuse and there actually happened some cases. So we suggest also letting the students(children) wear the LBS(Location Based Service) and USN(Ubiquitous Sensor Network) technology based electronic bracelets to monitor and figure out dangerous situations intelligently, so that we could prevent sexual offences against children beforehand, and while a crime is happening, we could judge the situation of the crime intelligently and take swift action to minimize the suffer. And by checking students' attendance and position, guardians could know where their children are in real time and could protect the children from not only sexual offences but also violent crimes against children like kidnapping. The overall system is like follows : RFID Tag for children monitors the approach of offenders. While an offender's RFID tag is approaching, it will transmit the situation and position as the first warning message to the control center and the guardians. When the offender is going far away, it turns to monitoring mode, and if the tag of the child or the offender is taken off or the child and offender stay at one position for 3~5 minutes or longer, then it will consider this as a dangerous situation, then transmit the emergency situations and position as the second warning message to the control center and the guardians, and ask for the dispatch of police to prevent the crime at the initial stage. The RFID module of criminals' electronic bracelets is RFID TAG, and the RFID module for the children is RFID receiver(reader), so wherever the offenders are, if an offender is at a place within 20m from a child, RFID module for children will transmit the situation every certain periods to the control center by the automatic response of the receiver. As for the positioning module, outdoors GPS or mobile communications module(CELL module)is used and UWB, WI-FI based module is used indoors. The sensor is set under the purpose of making it possible to measure the position coordinates even indoors, so that one could send his real time situation and position to the server of central control center. By using the RFID electronic roll book system of educational institutions and safety system installed at home, children's position and situation can be checked. When the child leaves for school, attendance can be checked through the electronic roll book, and when school is over the information is sent to the guardians. And using RFID access control turnstiles installed at the apartment or entrance of the house, the arrival of the children could be checked and the information is transmitted to the guardians. If the student is absent or didn't arrive at home, the information of the child is sent to the central control center from the electronic roll book or access control turnstiles, and look for the position of the child's electronic bracelet using GPS or mobile communications module, then send the information to the guardians and teacher so that they could report to the police immediately if necessary. Central management and control system is built under the purpose of monitoring dangerous situations and guardians' checking. It saves the warning and pattern data to figure out the areas with dangerous situation, and could help introduce crime prevention systems like CCTV with the highest priority. And by DB establishment personal data could be saved, the frequency of first and second warnings made, the terminal ID of the specific child and offender, warning made position, situation (like approaching, taken off of the electronic bracelet, same position for a certain time) and so on could be recorded, and the data is going to be used for preventing crimes. Even though we've already introduced electronic tagging to prevent recurrence of child sexual offences, but the crimes continuously occur. So I suggest this system to prevent crimes beforehand concerning the children's safety. If we make electronic bracelets easy to use and carry, and set the price reasonably so that many children can use, then lots of criminals could be prevented and we can protect the children easily. By preventing criminals before happening, it is going to be a helpful system for our safe life.

A study of Spiritual Well-Being in Nursing Students (간호대학생의 영적안녕에 관한 연구)

  • Lee, Yeong-Eun;Park, Hye-Seon;Gang, Yang-Hui
    • Korean Journal of Hospice Care
    • /
    • v.7 no.1
    • /
    • pp.5-14
    • /
    • 2007
  • Objective : This study was done to identify the status of Spiritual Well-Being in Nursing Students and to investigate the correlation between related various characteristics and Spiritual Well-Being and to provide baseline data for ride school-life and development of Spiritual-education program for nursing students. Method : The data was collected from 188 christian Nursing students by using questionary method. they are all all agreed to participate in this study. Their Spiritual Well-Being were measured using Spiritual Well-Being scale developed by Paloutzian & Ellison(1983) and translated by Choi(1990) and reversed by Kang(1996). Results : The data was analyzed by using SPSS/PC+12.0. The summary of results were as follows; 1. The mean score of Spiritual Well-Being were $63.95\pm10.256$(range from 20-80) 2. There were significant differences between the grade(F=6.101, p= .001), type of religion(F= 17.703, p= .000), In Christian, the level of devotee(F=8.194, p= .000), duration of church attendance(F=7.947, p= .000), regular attendance of chapel(F=4.242, p= .000), regular reading(study) of Bible and prayer (F=5.863, p= .001=0). perceived personal encounter with Jesus(F=4.160, p= .000), religion of parent(F=9.320, p= .000), perceived attitude of parenting(F=4.146, p= .000), hope to admit/transfer to other course or not(F=-2.050, p= .050). Conclusion : Our results were valuable to provide basic guidelines for ride school-life and for the development of Spiritual-education program for Nursing students.

  • PDF

Bereavement Care of Hospice Services in Korea (국내 호스피스 기관의 사별 관리 실태)

  • Ro, You-Ja;An, Young-Lan
    • Journal of Hospice and Palliative Care
    • /
    • v.3 no.2
    • /
    • pp.126-135
    • /
    • 2000
  • Purpose : To evaluate the present status of bereavement care in Korean hospice service as a basic database for the effective bereavement care. Method : The data were collected two sets from September to October, 1999 and from November to December, 2000, 55 hospice institutions identified by the Hospice Education Institution, College of Nursing, Catholic University were contacted for a telephone survey. The researchers conducted telephone interviews with hospice administrators for 10 to 30 minutes. Result : 1) Among the 55 Korean Hospice institutions, 38 institutions(69.1%) provided bereavement services. 2) The contents of bereavement services consisted of telephone call 28 institutions(74.5%), bereaved family meeting 26 institutions(69.4%), home visiting 22 institutions(57.9%), mail 16 institutions(42.1%), personal counselling 7 institutions(18.4%). 3) The 26 hospice institutions(68.4%) which provided meetings for bereaved families met with the following frequency : Annually is 11 institutions(42.3%), biannually 6 institutions(23.1%), monthly 6 institutions(23.1%) and bimonthly 3 institutions(11.5%). 4) Only 4 hospice institutions(10.5%) used the assessment tool to screen for high risk of bereaved. 5) The major difficulties of current bereavement services were low attendance for the bereaved family meeting, shortage of professional managers and volunteers, limited accessibility to hospice institutions, little social awareness for the bereaved, and financial difficulties. 6) The hospice administrators expressed the need for the development of bereavement program, the education program for the bereavement services, trained professionals, the sufficient provision of human resource and financial support for more effective bereavement services. Conclusion : Although many hospice institutions(69.1%) provided bereavement services, they generally lacked capable bereavement professionals and various individualized bereavement services. In conclusion, it is required to develop the specified bereavement program and the training program for the staff and volunteers, so as to provide customized bereavement services based on individual needs. Further research will be necessary to evaluate the effects of customized bereavement services in Korea before applying to practice.

  • PDF

Home Economics teachers' stages of concern and levels of use about the Practical Reasoning Instruction (실천적 추론 수업에 대한 가정과 교사의 관심 단계와 실행 수준)

  • Park, Mi-Ok;Chae, Jung-Hyun
    • Journal of Korean Home Economics Education Association
    • /
    • v.24 no.4
    • /
    • pp.133-144
    • /
    • 2012
  • The purpose of this study was to investigate Home Economics(HE) teachers' stages of concern, levels of use, and needs about the practical reasoning instruction focusing on the Concerns Based Adoption Model(CBAM). Questionnaires were administrated to HE teachers who worked for middle or high school in Korea and used HE textbooks according to the revised 2007 HE curriculum through mailing and visiting HE teacher training centers. 350 data collected from the responses were finally analyzed using SPSS 12.0. The results of the study were as follows: First, HE teachers' stages of concern about the Practical Reasoning Instruction(PRI) were demonstrated by the following order: awareness stage 0(97.05%), informational stage 1(87.06%), personal stage 2(86.23%), management stage 3(79.85%), refocusing stage 6(63.22%), consequence stage 4(61.26%), and collaboration stage 5(60.12%). Second, HE teachers' levels of use for PRI were demonstrated by the following order: preparation level 2(30.3%), orientation level 1(18.30%), refinement level 5 (18.30%), mechanical level 3: (16.0%), routine level 4(10.09%), nonuse level 0(4.0%), integration level 6(1.70%), and renewal level 7(0.60%). Third, needs for HE teachers' practical reasoning process were shown as the following order: '(O)Outline and implement a plan for action'(1.89), '(A)Analyze choices and consequences'(1.75), '(N)Note the results of your action(s)'(1.57), '(E)Evaluate information needed to solve the problem'(1.44), '(R)Recognize the problem'(1.39), and '(S)Select the best choices'(1.36).

  • PDF

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

The Implication and Recognition of International Garden Exposition Suncheon Bay Korea 2013 on Blogs (블로그(Blog)를 통해 본 2013순천만국제정원박람회에 대한 인식)

  • Jang, Min-Ji;Choi, Jung-Min
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.42 no.4
    • /
    • pp.60-75
    • /
    • 2014
  • The purpose of this study was to look for useful implications in its next application or similar planning by assessing visitors' recognition of International Garden Exposition Suncheon Bay Korea 2013. To do this, blogs acknowledged as powerful communication media in modern information society were used. After searching for blogs related to International Garden Exposition Suncheon Bay Korea in the portal site ranked first in the domestic market share, this study classified 300 cases. This study was able to grasp the consciousness as bloggers gave descriptions of information and impressions and experiences of spaces without making any adjustments. The survey results are as follows: First, Dutch gardens were the most preferred, followed by Korean gardens, Chinese gardens and French gardens; in general, visitors were not satisfied with the national gardens. Inquiry is needed into the method of determining diverse cultural identity rather than a sample garden type through blogs delivering regret regarding the world gardens. Second, the survey results showed that the level of awareness of designers' gardens was low. This study judges that more emphasis should be placed on their roles as places speaking for the original purpose of the garden exposition which introduces gardening art and design through experimental design. Third, it was understood that many bloggers were deeply impressed by ephemeral landscapes like the change in landscape consequent on the elapse of time, distinctive atmosphere, and detailed-landscapes. These aspects are important landscape elements, and those elements should be addressed with weight in a subsequent study. Fourth, the most impressive places are 'Suncheon Lake Garden' and 'Bridge of Dreams', which are establishing themselves as icons of International Garden Exposition Suncheon Bay Korea 2013. However, relatively, public attitude towards the world gardens and designers' gardens are weak. Fifth, bloggers were providing a variety of information like transportation, events schedules, ticket purchasing & prices, discount information, etc. Ticket price was commented on the most, and most of the bloggers thought ticket prices were 'expensive'. This study understands such a phenomenon as a result of the general population's non-establishment of the perception that it's proper to view gardens at visitors' own expense. Generally, bloggers expressed satisfaction with International Garden Exposition Suncheon Bay Korea 2013, but with criticism as well. Their criticism included disappointing matters, to be improved upon and wishes without any distortion, providing meaningful implications deserving reference for similar cases. In this context, a blogger could be called a citizen-reviewer while a blog could be referred to as 'a field of informal discourse' for the public. As a research method of this study, blogs are difficult to interpret as they are subjective and personal, and have limited data analysis through their quantifications; however, blogs as methods of recognition survey are channels for varied, concrete and detailed awareness which are hard to grasp through a questionnaire survey or interviews. This study judges that such an aspect of a blog could be a useful means of grasping and reflecting upon visitors' attitude in future studies.

The Effect of Oral Health Behavior by Oral Health Belief of Student in Dental Hygiene Department of College Students in Seoul (서울지역 일부대학 치위생과 학생의 구강건강신념이 구강보건행태에 미치는 영향)

  • Park, Mi-Sook
    • Journal of dental hygiene science
    • /
    • v.11 no.2
    • /
    • pp.107-119
    • /
    • 2011
  • The purpose of this study was to examine the effects of oral health behavior by oral health belief from the students in the dental hygienics department who take charge of oral health office, and therefore to lead a clear oral health care, to complete desirable oral health belief, and finally to utilize them for oral health field. The survey was conducted using structured self-administered questionnaires based on oral health belief model targeting 163 students in the dental hygienics department of one of the college in Seoul, and collected data were statistically analyzed using the SPSS 18.0 program. As a result of analysis to determine that the oral health belief significantly affects on the oral heal behavior, the personal variables such as age, economic status and occupation, and the seriousness for the oral health belief were indicated to be significant variables(p<0.05), and as a result of analysis that effects on the number of the oral health behavior, the susceptibility and the seriousness were indicated to be significant variables for oral health belief(P<0.05). As a conclusion, oral health belief was identified as a factor of salience through understanding that oral health belief of the students in the dental hygienics department effects on oral health behavior based on an oral health belief model, and it can be concluded that the necessity of oral health belief investigation should be discussed as a crucial issue to provide a more effective oral health promotion plan.