• Title/Summary/Keyword: Personal-usage

Search Result 471, Processing Time 0.023 seconds

A Study on the Development of Intelligent Contents and Interactive Storytelling System (지능형콘텐츠 개발과 인터렉티브 스토리텔링 시스템 연구)

  • Lee, Eun Ryoung;Kim, Kio Chung
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.423-430
    • /
    • 2013
  • The development of information technology introduced digital contents and Social Network Services(SNS), and allowed the virtual transaction and communication between users called "the experience knowledge" advanced from "the objective knowledge." This paper will analyze interactive storytelling system creating different types of stories on narrative genre about family history, personal history and so on. Through analysis on narrative interviews, direct observations, documentations and visual records, contents about CEO story, corporate story, family story and especially family history will be categorized into sampleDB and informationDB. Accumulated contents will allow the user to increase the value and usage of the contents through interactive storytelling system by restructuring the contents on family history. This research has developed writing tool data model using different digital contents such as texts, images and pictures to encourage open communications between first generations and third generations in Korea. Furthermore, researched about connected system on interactive storytelling creation device using various genre of family story that has been data based.

The Status and Suggestions for Big Data Adaptation in the Government and the Public Agency (정부 및 공공기관에서의 빅데이터 활용에 대한 현황 및 실행방안 제안)

  • Byeon, Hyeon-Su
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.13-25
    • /
    • 2017
  • Volume in data storage is growing more than ever before. This phenomenon is caused by the participation of governments and firms as well as general users. As for big data, governments and public agencies are likely to play important roles in applications since they can access and operate personal data for public purposes. In this study, the author examined the status and countermeasure of big data from different countries and drew some common grounds. The suggestions are as follows. First of all, securing manpower and technology have to take precedence. In addition, share and development between the government and the private sector are required. And organizations should come up with long-term strategies along with the development of data loading and analysis. In conclusion, the author propose the recognition of the importance of data management, privacy protection and the expansion of field application possibilities for political usage of big data.

An Analysis of Group Characteristics according to Technological Innovativeness and Clothing Involvement: Focused on the Usage Status of Smart Phone Fashion Information Application (기술혁신성과 의복관여도에 따른 집단별 특성 분석: 스마트폰 패션 정보 애플리케이션 사용현황을 중심으로)

  • Kang, Bongsoo;Sung, Heewon
    • Journal of Fashion Business
    • /
    • v.18 no.5
    • /
    • pp.25-41
    • /
    • 2014
  • As the smart phone market grows rapidly, the significance of the application (app) market also increases. The purposes of this study were to identify market segments according to technological innovativeness and clothing involvement, and to compare the differences in lifestyles, benefits of fashion information app sought, and intention to use. The data were collected from smart phone users in their 10s to 30s in 2013, and a total of 292 data sets were analyzed. The findings of this study were as follows. The respondents were divided into three groups, innovative group, clothing involvement group, and passive group. Significant differences were found among three segments in terms of age, marital status, education level, and monthly income. With respect to five lifestyle factors, innovative group and clothing involvement group had higher mean scores for rational purchase, personal relationship, and personality pursuit than passive group. However, these two groups showed differences in brand pursuit factor. The benefits of the fashion information app were generated into two factors, information benefit and enjoyment benefit. Innovative group and clothing involvement group had higher values than passive group in these two factors. Finally, innovative group had the highest value on the intention to use fashion information app. This study attempts to provide fundamental information about the potential market segment for managers or marketers developing fashion information apps.

A Study on Utilization of Drone for Public Sector by Analysis of Drone Industry (국내외 드론산업 동향 분석을 통한 공공분야에서의 드론 활용방안에 대한 연구)

  • Sim, Seungbae;Kwon, Hunyeong;Jung, Hosang
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.25-39
    • /
    • 2016
  • The drone is an unmanned aerial vehicle which has no human pilot. Drones can be classified into military drones, commercial drones, and personal drones by usage. Also, drones can be classified from large-sized to nano-sized drone by size and autonomous, remote controlled drone by control type. Especially, military drones can be classified into low-altitude drones, medium-altitude, and high-altitude drones by altitude. Recently, the drone industry is one of the fast growing industries in the world. As drone technologies have become more advanced and cost-effective, Korean government has set its goal to become a top-level country in drone business. However, the government's strict regulation for drone operations is one of the biggest hurdles for the development of the related technologies in Korea and other countries. For example, critical problems for drone delivery can be classified into technical issues and institutional issues. Technical issues include durability, conditional awareness, grasp and release mechanisms, collision avoidance systems, drone operating system. Institutional issues include pilot and operator licensing, privacy rules, noise guidelines, security rules, education for drone police. This study analyzes the trends of the drone industry from the viewpoint of technology and regulation. Also, we define the business areas of drone utilization. Especially, the drone business types or models for public sector are proposed. Drone services or functions promoting public interests need to be aligned with the business reference model of Korean government. To define ten types of drone uses for public sector, we combine the business types of government with the future uses of drones that are proposed by futurists and business analysts. Future uses of drones can be divided into three sectors or services. First, drone services for public or military sectors include early warning systems, emergency services, news reporting, police drones, library drones, healthcare drones, travel drones. Second, drone services for commercial or industrial services include parcel delivery drones, gaming drones, sporting drones, farming and agriculture drones, ranching drones, robotic arm drones. Third, drone services for household sector include smart home drones.

An Access Control using SPKI Certificate in Peer-to-Peer Environment (P2P 환경에서 SPKI 인증서를 이용한 접근 제어)

  • Shin, Jung-Hwa;Lee, Young-Kyung;Lee, Kyung-Hyune
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.793-798
    • /
    • 2003
  • The P2P service is a technology that can share their information with each other who is able to be connected ith a relating program without passing by a server. Since all personal compiters that linked to the internet under the P2P service can opetate as server or a client, they can provide and share both their information and services through the direct connection. Currently, the P2P service is giving an equal privilege to all users for sharing their resources,.Under this situation, a lot of vulnerability against the various sttacks through the Unternet is possoble, more sophisticated security services are necessary. In this paper, We propose and access control schemae using SPKI(Simple Public Key Infrastructure). The scheme designates and access and acces control by providing the certificate to users who request a connection for resource sharing and limits the resource usage of information provider according to the access right that is given to their own rights.

Factors that Affect the Intention of Password Security Behavior (패스워드 보안행위의도에 영향을 미치는 요인)

  • Lee, Dong-Hee;Kim, Tae-Sung;Jun, Hyo-Jung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.1
    • /
    • pp.187-198
    • /
    • 2018
  • Recently, financial transactions and electronic commerce in cyberspace are being performed more quickly and conveniently, with the development in diverse types of fintech and biometric authentication. But user authentication using passwords still occupies a big proportion even in these new services. therefore, safe creation and management of passwords is fundamental and indispensable to protect personal information and asset. This study examined the patterns of password usage by conducting a survey and analyzed factors influencing password security behavior intentions using the heath belief model. As a result, perceived susceptibility, perceived severity, perceived benefits, and perceived barriers significantly affected security behavior intentions, and especially, perceived severity had a moderating effect in other factors.

The Risk of Wardriving Attack Against Wireless LAN and its Counterplan (무선랜 워드라이빙 공격의 위험성과 대응방안)

  • Choi, Young-Nam;Cho, Sung-Mok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.10
    • /
    • pp.2121-2128
    • /
    • 2009
  • The application range of IEEE 802.11 wireless LAN has rapidly expanding from campus, enterprise to the public network of Hot Spot area due to the advantages of easiness of construction, mobility of wireless client station, convenience of usage and so on. However the security of WLAN(Wireless LAN) is vulnerable inherently because of using RF as a medium, and so the dangers of infringement of personal information and inside data of enterprises have increased and wardriving attack searching for security vulnerability in wireless LAN has become more serious especially. In this paper, we find out the overview of various procedures and preparatory stages for wardriving attack against wireless LAN, and propose complementary methods to prevent information infringement accidents from wardriving attack in wireless LAN. For this purpose, we make an equipment which is suitable for wardriving in wireless LAN and show security vulnerability of AP(Access Point) operation in WLAN around Yangjae-Dong in Seoul as a result of using the equipment.

A Study of Authentication Design for Youth (청소년을 위한 인증시스템의 설계에 관한 연구)

  • Hong, Ki-Cheon;Kim, Eun-Mi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.4
    • /
    • pp.952-960
    • /
    • 2007
  • Most Websites perform login process for authentication. But simple features like ID and Password have no trust because most people worry about appropriation. So the youth can easily access illegal media sites using other's ID and Password. Therefore this paper examine features be adaptable to authentication system, and propose a design of authentication system using multiple features. A proposed authentication system has two categories, such as low-level and high-level method. Low-level method consists of grant of authentication number through mobile phone from server and certificate from authority. High-level method combines ID/Password and features of fingerprint, character, voice, face recognition systems. For this, this paper surveys six recognition systems such as fingerprint, face, iris, character, vein, voice recognition system. Among these, fingerprint, character, voice, face recognition systems can be easily implemented in personal computer with low cost accessories. Usage of multiple features can improve reliability of authentication.

  • PDF

Analyzing Users' Perception and Attitude Associated with Usage of Signage (사이니지에 대한 이용자 인식 및 태도에 관한 연구)

  • Kim, Hang Sub;Kim, Hyung Joon;Lee, Bong Gyou
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.4
    • /
    • pp.291-302
    • /
    • 2013
  • Signage can be defined as the media device that provides specific information to many unspecified users in public places. Recently applied context-aware technology, signage provides personal on-demand information services in a way that can continue to evolve. The purpose of this study is to analyze characteristics of types which users identify signage on the perceptions and attitudes about consideration of the perspective of the experts in the fields. The research is carried out by applying Q methodology with in-depth interview. First, interviews are conducted to determine the perceptions and attitudes of experts and practitioners on signage. Thereafter users' perceptions and attitudes toward signage are classified by each types using Q methodology. The first type is named as 'signage as smart media', the second type is named as 'signage as passive media', and the third type is named as 'signage as interactive media' is named. The results of this study will be useful guidelines for conducting further academic researches and R&D.

A Computer Program, MAPP, for the Estimation of the Macroalgal Annual Production from Photosynthetic Rates and Biomass Changes (광합성율과 생물량에 기초한 해조류의 년 생산량 계산 프로그람)

  • JOH, SUNG-OK;KOH, CHUL-HWAN
    • 한국해양학회지
    • /
    • v.26 no.3
    • /
    • pp.291-294
    • /
    • 1991
  • MAPP a computer program provides an estimate of the annual production of macroalgae. The calculation of the annual production is based on the Photosynthesis-Irradiance relationship under different temperature conditions and annual changes of algal biomass. The production in a given time was obtained from the multiplication of biomass by the production rate measured by in situ experiments. The annual production, $P_{yr}$, is calculated from $P_{yr}{\;}={\;}{\int}B_t{\cdot}P_r{\;}dt$, where, $P_t$ = f(T,L)and T, L = f(t). The program is written in Pascal language to facilitate the usage with personal computers. The data of the photosynthetic rates and biomass of Sargassum confusum measured at Ohori, on the east coast of Korea, was used for an example.

  • PDF