• Title/Summary/Keyword: Personal network

Search Result 1,447, Processing Time 0.027 seconds

The Influence of the Founder's Social Competence and Social Capital on Access to Funding Sources (창업자의 사회적 역량과 사회적 자본이 투자유치 시도방식에 미치는 영향)

  • Park, Gyehyun;Kim, Dohyeon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.1
    • /
    • pp.21-35
    • /
    • 2021
  • Based on social capital theory, this study investigated the influence of the start-up founder's social competence on the start-up's access to funding sources and performance through the mediating role of the type of social network. This study aimed to examine two types of social networks empirically (i.e., personal networks and business networks) as social capital in analyzing the effect of the founder's social competence and social capital on the method of accessing funding sources. A self-report questionnaire was administered to 252 South Korean start-up founders whose businesses are based in South Korea. Path analysis and mediation effect analysis were performed by structural equation modeling(SEM) using STATA 16.1. This study examined the full mediating effect of the founder's social competence on his/her personal and business networks, respectively, and how the effect leads to different methods to approach funding sources. This is the first study in South Korea to analyze empirically how social competence has contrasting effects on personal and business networks as well as how each type of network varies in its influence on the method founders use to attract investment. This study is also significant in that it proposed a new methodology by utilizing the position generator as the measure of personal and business networks to analyze social networks in detail. The analyses of 252 survey data collected over a period of six months will be a valuable resource that may provide researchers, founders, investors, and other stakeholders in the start-up ecosystem with meaningful implications.

Survey on Personal Information Encryption Technology (개인정보 암호화 기술에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.769-772
    • /
    • 2012
  • Personal Information Article2 defines personal authentication information, secret information, bio information for personal information and it is stipulated under article29 that the one who have duties must take adequate technological, administrative, physical measures to prevent from illegal reading and sneaking. Also it is stipulated under information communication network law28(1), enforcement regulation9, Korea Communications Commitee notice. To satisfy this, the one who have to take security actions of personal information are required to take technological measures and establish positive measures to continuously manage it.The insurance of technological security is possible by encryption of personal information, secure management and operation of encryption key,taking personal information security level of providin access control of personal information reading and audit.In this paper, we will analyze various technologies of personal information encryption which are essencial component in technological security measuresof personal information. This paper will help choose which technological measures you should take in personal information security.

  • PDF

Visualization of unstructured personal narratives of perterm birth using text network analysis (텍스트 네트워크 분석을 이용한 조산 경험 이야기의 시각화)

  • Kim, Jeung-Im
    • Women's Health Nursing
    • /
    • v.26 no.3
    • /
    • pp.205-212
    • /
    • 2020
  • Purpose: This study aimed to identify the components of preterm birth (PTB) through women's personal narratives and to visualize clinical symptom expressions (CSEs). Methods: The participants were 11 women who gave birth before 37 weeks of gestational age. Personal narratives were collected by interactive unstructured storytelling via individual interviews, from August 8 to December 4, 2019 after receiving approval of the Institutional Review Board. The textual data were converted to PDF and analyzed using the MAXQDA program (VERBI Software). Results: The participants' mean age was 34.6 (±2.98) years, and five participants had a spontaneous vaginal birth. The following nine components of PTB were identified: obstetric condition, emotional condition, physical condition, medical condition, hospital environment, life-related stress, pregnancy-related stress, spousal support, and informational support. The top three codes were preterm labor, personal characteristics, and premature rupture of membrane, and the codes found for more than half of the participants were short cervix, fear of PTB, concern about fetal well-being, sleep difficulty, insufficient spousal and informational support, and physical difficulties. The top six CSEs were stress, hydramnios, false labor, concern about fetal wellbeing, true labor pain, and uterine contraction. "Stress" was ranked first in terms of frequency and "uterine contraction" had individual attributes. Conclusion: The text network analysis of narratives from women who gave birth preterm yielded nine PTB components and six CSEs. These nine components should be included for developing a reliable and valid scale for PTB risk and stress. The CSEs can be applied for assessing preterm labor, as well as considered as strategies for students in women's health nursing practicum.

Study on the personal Information Retrieval of Smartphone Messenger Service (스마트폰 메신저 어플리케이션에서의 개인정보보호에 관한 연구)

  • Kang, Sunghoon;Kim, Seungjoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2013
  • The recent increase in smartphone usage has ignited the development of new applications which have changed the way of living in this internet era in the world. Almost all users which have smartphone have used many kinds of applications for lots of part. Especially, Social Network Service is the most popular part for smartphone users. The greater part of smartphone users take messenger service for smartphone. This kinds of applications provide to manage as deactivation of user or change of device. When users take to manage their information, their information would be deleted securely. If secure deletion didn't work correctly and released, their personal information can be easily abused to by others through various means such as internet phishing. In this paper, we analysis that the messenger application's management function keeps on the Personal Information Protection Act and suggest to prevent legally and technically for user's personal information and privacy.

A Study on Efficient Numbering Plan of Communication Networks (통신망의 효율적인 번호배분에 관한 연구)

  • 김석태;최영상
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.2 no.4
    • /
    • pp.485-494
    • /
    • 1998
  • Communication network numbers are used in classifying each kind of network, identifying the communication companies and choosing services that are supplied by the companies. In the present, a new numbering system is needed to distinguish a new additional communication network. However the present numbering system of domestic communication network has some problems such as exhaustion of network number, excessive local numbers, and so forth So, in this thesis we call the wire and the wireless telephone network, the pager network and the personal number as communication networks, and consider the present condition and problems of our country, Korea, and foreign countries. Then we propose the efficient numbering plan. Firstly, the present 10 numbering systems that are distributed, such as communication networking number $\ulcorner$01X$\lrcorner$ are diminished into 5 communication network numbers that have same quality. Secondly, subscriber numbers are united to 8 digit and 144 area codes are made into widened 5 area codes. Thirdly, the personal numbering services are cross-distributed by century. And we examine the technical convening plan and the legal converting plan and investigate expecting efficiency of proposed numbering system. If this numbering plan is executed, subscriber's number on communication networks are unified at 8 digits, 5 reserve numbers are secured in exhausted communication network number of $\ulcorner$01X$\lrcorner$, and they can distribute subscriber numbers over twice as much. In addition, number acceptability is enlarged from 237,600 thousands to 400,000 thousands. Personal number can be classified at not only century but also a decade. Accordingly, acceptable numbers are increased two folds enough to provide unification and population increase. We were able to confirm all the efficiencies.

  • PDF

The Research on the concept and characteristics of the Personal Community Service

  • Ahn, Joong-Ho;Chae, Min-Kyun;Yang, Ji-Youn
    • Proceedings of the CALSEC Conference
    • /
    • 2005.03a
    • /
    • pp.180-185
    • /
    • 2005
  • This is the research on the new services which are called Korean blog, personal media, etc and which showed large increase in usage rate in 2004. In spite of this increase there has been no effort to conceptualize these services. So, we researched whether these new services constituted an independent domain, in what aspects they were different with other established services, how could we conceptualize them with an appropriate name, what were characteristics of them. We used Interview and Delphi method with the participation of professionals in charge of planning and operating these services in 4 major service providers.

  • PDF

Toward the Personal Robot Software Framework (차세대 퍼스널 로봇 소프트웨어 프러임워크에 관한 연구)

  • Kim, Hong-Ryeol;Kim, Dae-Won;Kim, Hong-Seok;Lee, Ho-Gil
    • Proceedings of the KIEE Conference
    • /
    • 2002.07d
    • /
    • pp.2410-2414
    • /
    • 2002
  • In this paper, a software framework is proposed for the personal robot located on home network. The proposed software framework is divided into four layers-a transparency layer, a behavior layer, a distributed task layer, and a mission scenario layer. The transparency layer consists of a virtual machine for platform transparency, and a communication broker for communication transparency among behavior modules. The communication architecture includes both server/client communication and publisher/subscriber communication. A mission scenario is assumed to be a composition of sequentially planned distributed tasks. In addition to the software framework, a new concept, personal robot design center platform as proposed in this paper with its implementation mechanisms. The personal robot design center is defined as a developing and a managing environment for high-level behavior modules, distributed tasks, and mission scenarios.

  • PDF

A Study on the Headway of the Personal Rapid Transit System (개인고속이동(Personal Rapid Transit) 시스템의 운전시격에 대한 연구)

  • Shin Ducko;Kim Yong-Kyu;Lee Jun-Ho
    • Journal of the Korean Society for Railway
    • /
    • v.8 no.6 s.31
    • /
    • pp.586-591
    • /
    • 2005
  • We deal with the headway which effects on the performance of the PRT(Personal Rapid Transit) system and the system safety. The headway, time between passage of one vehicle and the next, is one of the important factors to assess the line capacity, which has a cue to solve the problem of the congestion in public transportation. To decide the headway there are many important factors, especially such as the failure vehicle deceleration rate, the following simple analytical equation can be made to assess the relation between the line speed and the minimum headway. In this paper we employ a numerical analysis method using a simple analytical equations for the evaluation of the minimum headway and show simple simulation results.

Anonymity Personal Information Secure Method in Big Data environment (빅데이터 환경에서 개인정보 익명화를 통한 보호 방안)

  • Hong, Sunghyuck;Park, Sang-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.1
    • /
    • pp.179-185
    • /
    • 2018
  • Big Data is strictly positioning one of method to deal with problems faced with mankind, not an icon of revolution in future anymore. Application of Big Data and protection of personal information have contradictoriness. When we weight more to usage of Big Data, someone's privacy is necessarily invaded. otherwise, we care more about keeping safe of individual information, only low-level of research using Big Data can be used to accomplish public purpose. In this study, we propose a method to anonymize Big Data collected in order to investigate the problems of personal information infringement and utilize Big Data and protect personal. This will solve the problem of personal information infringement as well as utilizing Big Data.

A Study of method to apply MANET Protocol for Route Optimization in Nested Mobile Network (Nested Mobile Network상의 Route Optimization을 위한 MANET Protocol 적용 방안 연구)

  • Choi, Seung-Won;Kim, Sang-Bok;Kim, Young-Beom
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.269-272
    • /
    • 2005
  • 무선 네트워크 이동성 기술에 대한 연구가 수년간 진행되어 오면서 Mobile Network에 PAN(Personal Area Network)과 유사한 형태의 Nested Mobile Network에 대한 관심이 높아지고 있으며, 이러한 Nested Mobile Network에서의 경로최적화(Route Optimization : RO) 기술에 대한 연구가 활발하게 진행되고 있다. NEMO(NEtwork MObility)의 RO를 위해 제안된 논문 중에 ORC(Optimized Route Cache Protocol)에 대한 제안이 있었다.[1] NEMO Basic Support가 표준안으로 채택되면서 연구 대상에서 거론되지 않고 있지만, 복잡한 이동성 기술인 Nested Mobile Network상의 RO를 위해 다시 검토해 볼 수 있을 것이다. 또한 동일 저자에 의해 제안된 Nested Mobile Network 내부에 Ad-hoc Routing 알고리즘인 OLSR(Optimized Link State Routing Protocol)을 적용한 제안이 발표되었다.[2] 본 논문에서는 ORC와 Nested Mobile Network상의 OLSR Scheme을 적용하여 RO를 위한 방안을 제안하고자 한다.

  • PDF