• Title/Summary/Keyword: Personal-usage

Search Result 473, Processing Time 0.025 seconds

A Study of Collective Knowledge Production Mechanisms of the three Great SNS (3대 SNS에서의 집단적 지식생산 메커니즘 연구)

  • Hong, Sam-Yull;Oh, Jae-Chul
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.7
    • /
    • pp.1075-1081
    • /
    • 2013
  • Twitter, Facebook, and KakaoStory are the major SNS in Korea. Social knowledge production is being produced by those services from numerous collaboration and co-participation in those SNS. Wikipedia or Naver JishikIN service was regarded as the representative product of collective knowledge production during the wired internet era. However now at the wireless internet era centered with smart phones, various forms of collective knowledge production would be achieved by connecting to SNS in real-time. In this thesis, the survey data of collective knowledge production for users of three SNS have been compared and analyzed. The difference of the collective knowledge production mechanism among Twitter, Facebook and KakaoStory has been studied and compared through three variables: the motivation of collective knowledge production, the preference of collective knowledge production model, and collective knowledge production cultural perception. As a result of the analysis of the discriminant factors for three SNS user groups, it turns out that the diversity-toward usage motivation, personal contribution motivation, and collective knowledge production tendency perception are the most influential variables. This thesis is of significance in that it unites the value of social science such as social capital and collective knowledge production from the viewpoint of computer science and opens the new chapter of collective knowledge production with the real-time SNS of wireless internet from the wired internet.

A Design of Wireless Sensor Node Using Embedded System (임베디드 시스템을 활용한 무선 센서 노드설계)

  • Cha, Jin-Man;Lee, Young-Ra;Park, Yeon-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.623-628
    • /
    • 2009
  • The emergence of compact and low-power wireless communication sensors and actuators in the technology supporting the ongoing miniaturization of processing and storage allows for entirely the new kinds of embedded systems. These systems are distributed and deployed in environments where they may have been designed into a particular control method, and are often very dynamic. Collection of devices can communicate to achieve a higher level of coordinated behavior. Wireless sensor nodes deposited in various places provide light, temperature, and activity measurements. Wireless sensor nodes attached to circuits or appliances sense the current or control the usage. Together they form a dynamic and multi-hop routing network connecting each node to more powerful networks and processing resources. Wireless sensor networks are a specific-application and therefore they have to involve both software and hardware. They also use protocols that relate to both applications and the wireless network. Wireless sensor networks are consumer devices supporting multimedia applications such as personal digital assistants, network computers, and mobile communication devices. Wireless sensor networks are becoming an important part of industrial and military applications. The characteristics of modem embedded systems are the capable of communicating adapting the different operating environments. In this paper, We designed and implemented sensor network system which shows through host PC sensing temperature and humidity data transmitted for wireless sensor nodes composed wireless temperature and humidity sensor and designs sensor nodes using embedded system with the intention of studying USN.

Nursing Students' Safety-Climate, Perception and Performance of Standard Precautions for Healthcare-associated Infection Control (간호대학생의 의료관련 감염관리를 위한 표준주의 안전환경과 인지도, 수행도)

  • Cha, Ji-eun;Cho, Ji-Young;Kim, Yu-Gyeong;Nam, Guk-Hee;Lee, Seo-Young;Lee, Sun-Young;Lee, A-Rim;Lee, Ji-Yae;Chae, Su-Bin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.8
    • /
    • pp.72-83
    • /
    • 2017
  • This study was conducted to investigate nursing students' safety-climate: perception and performance of standard precautions for healthcare-associated infection control. We also identified actors influencing performance of standard precautions. Data were collected from 246 junior and senior nursing students at nine colleges in D city from July to September, 2016. The mean score of performance was significantly lower than that of perception in all areas of standard precautions. The biggest difference between perception and performance was in the usage of personal protective equipment and safe injection practices. We also detected significant positive correlations among safety-climate, perception, and performance of standard precautions. In the regression analysis, performance of standard precautions was influenced by safety-climate and grade accounting for 10.7% of variance. To improve healthcare-associated infection control among nursing students, safer and more supportive practical environments need to be provided, and new training strategies such as simulation education need to be expanded.

Changes in Consumption Life and Consumer Education in the Fourth Industrial Revolution (제4차 산업혁명 시대의 소비생활 변화와 소비자교육)

  • Jung, Joowon
    • Journal of Korean Home Economics Education Association
    • /
    • v.29 no.3
    • /
    • pp.89-104
    • /
    • 2017
  • Considering the advent of the Fourth Industrial Revolution, this study examines the changes and influences of intelligent information technology and the role of consumer education in the context of consumption life. The purpose of this study is to provide a theoretical foundation to effectively respond to the future consumption society as an independent consumer by enhancing the understanding of the Fourth Industrial Revolution in terms of consumption life. First, in terms of changes in the consumption paradigm in the Fourth Industrial Revolution, production and consumption are converged by being shared through a comprehensive connection platform in real time. Regarding the meaning of consumption, mental experience is being emphasized; moreover, usage and sharing, rather than ownership, are being highlighted. In terms of major changes in consumption life, the emergence of a more convenient smart consumption life and the possibility of personalized consumption optimized for individual demand are anticipated. Moreover, sustainable eco-friendly consumption is expected to increase further, and rapidly changing consumption trends will experience accelerated progress in consumer-centered changes. Next, the predicted problems in consumption life in the Fourth Industrial Revolution include unequal consumption due to intelligent information technology power center and the use and management of personal information data. Furthermore, ethical concerns related to the introduction of new technologies will become prominent, eventually resulting in issues concerning consumption satisfaction. To effectively respond to these new paradigm changes, consumer education should be value-centered. Ethical aspects of consumption should be considered, and consumption life should include trust and mutual cooperation. Furthermore, consumer education should facilitate creative convergence.

A Study on Legal Regulation of Neural Data and Neuro-rights (뇌신경 데이터의 법적 규율과 뇌신경권에 관한 소고)

  • Yang, Ji Hyun
    • The Korean Society of Law and Medicine
    • /
    • v.21 no.3
    • /
    • pp.145-178
    • /
    • 2020
  • This paper examines discussions surrounding cognitive liberty, neuro-privacy, and mental integrity from the perspective of Neuro-rights. The right to control one's neurological data entails self-determination of collection and usage of one's data, and the right to object to any way such data may be employed to negatively impact oneself. As innovations in neurotechnologies bear benefits and downsides, a novel concept of the neuro-rights has been suggested to protect individual liberty and rights. In Oct. 2020, the Chilean Senate presented the 'Proyecto de ley sobre neuroderechos' to promote the recognition and protection of neuro-rights. This new bill defines all data obtained from the brain as neuronal data and outlaws the commerce of this data. Neurotechnology, especially when paired with big data and artificial intelligence, has the potential to turn one's neurological state into data. The possibility of inferring one's intent, preferences, personality, memory, emotions, and so on, poses harm to individual liberty and rights. However, the collection and use of neural data may outpace legislative innovation in the near future. Legal protection of neural data and the rights of its subject must be established in a comprehensive way, to adapt to the evolving data economy and technical environment.

Maintaining Professional Dignity in the Age of Social Media (소셜미디어 시대에서 의료전문직으로서의 품위 유지)

  • KIM, Claire Junga;BHAN, Yoo Wha
    • Korean Journal of Medical Ethics
    • /
    • v.21 no.4
    • /
    • pp.316-329
    • /
    • 2018
  • Although the use of social media by doctors raises important issues concerning medical professionalism, the relevant professional bodies in South Korea have failed to issue clear guidelines on social media usage. The Korean Medical Association's newly revised ethics guidelines do require members to maintain dignity while using social media, but the idea of "maintaining dignity" is far from clear, and its premodern connotation prevents it from being reliably used in professional codes of conduct. The authors of this article examine the concept of maintaining dignity and conclude that once it is clarified and redefined it can and should be used as a viable ethical standard in a variety of contexts, including the use of social media. Social media's unpredictability and uncontrollability, and the blurred distinction between professional/public and personal/private can be a threat to medical professionalism. In order to deal with this threat, the concept of dignity is important. We present three examples in which the dignity of medical professionals is undermined and explain why these jeopardize public trust. We conclude that in order to maintain public trust the Korean Medical Association should provide more detailed guidelines on the use of social media by its members.

Impacts of Perceived Value and Trust on Intention to Continue Use of Individuals' Cloud Computing: The Perception of Value-based Adoption Model (클라우드 컴퓨팅의 지각된 가치와 신뢰가 지속적 사용의도에 미치는 영향: 가치기반수용모델을 기반으로)

  • Kim, Sanghyun;Park, Hyunsun;Kim, Bora
    • Journal of Digital Convergence
    • /
    • v.19 no.1
    • /
    • pp.77-88
    • /
    • 2021
  • Cloud computing is getting a lot of attention by many people and businesses due to IT environmental changes such as the proliferation of smart devices, the increase of digital data, and the cost of IT resources. More individuals use personal cloud computing services for storing and managing information and data. Therefore, this study proposed determinants that are expected to have an influence on evaluating the value of cloud computing based on the value-based adoption model, examining the relationship between the continuous use intention of cloud computing. Results of the study show that usefulness, convenience of information access, extensibility had a positive impact on perceived value while privacy concerns and costs had a negative impact on perceived value. In addition, perceived value was found to have a significant effect on the intention to continue use of cloud computing. Finally, trust was found to have a significant effect on the perceived value and the intention to continue use of cloud computing. The findings are expected to provide useful information for understanding the factors that individual users consider important in the steadily growing cloud computing market.

Extending the OMA DRM Framework for Supporting an Active Content (능동형 콘텐츠 지원을 위한 OMA DRM 프레임워크의 확장)

  • Kim, Hoo-Jong;Jung, Eun-Su;Lim, Jae-Bong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.5
    • /
    • pp.93-106
    • /
    • 2006
  • With the rapid growth of the wireless Internet communication, a new generation of mobile devices have made possible the broad distribution of mobile digital contents, such as image, music, video, games and applications over the wireless Internet. Mobile devices are rapidly becoming the major means to extend communication channels without copy Protection, usage rule controlling and authentication. As a result, mobile digital contents may be illegally altered, copied and distributed among unauthorized mobile devices. In this paper, we take a look at Open Mobile Alliance (OMA) DRM v2.0 in general, its purpose and function. The OMA is uniquely the focal point for development of an open standard for mobile DRM. Next we introduces features for an active content and illustrates the difference between an active content and an inactive content. Enabling fast rendering of an active content, we propose an OMA-based DRM framework. This framework include the following: 1) Extending DCF Header for supporting an selective encryption, 2) Content encryption key management, 3) Rendering API for an active content. Experimental results show that the proposed framework is able to render an active content fast enough to satisfy Quality of Experience. %is framework has been proposed for a mobile device environment, but it is also applicable to other devices, such as portable media players, set-top boxes, or personal computer.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.

Oral hygiene management of patients with dental implants using electronic media (Smartphone) (전자매체(스마트폰)를 이용한 치과임플란트환자의 구강위생 관리)

  • Yang, Hyun Woo;Kim, Jin;Choi, Hanmaeum;Fang, Yiqin;Kim, So Young;Lee, Chunui
    • Journal of Korean Academy of Dental Administration
    • /
    • v.7 no.1
    • /
    • pp.39-43
    • /
    • 2019
  • Smartphone usage has become so common that it has reached 2 billion people in the last year. As a result of this, hospitals have started making use of smartphones at various medical sites and research services for patients. This study aimed to establish support for developing a long distance program for patients with implants who have difficulty visiting clinics or with busy modern lives, by using smartphones for oral hygiene management instruction. The data were collected for 12 weeks, from July 24 to October 21, 2015, for patients who agreed to participate in the study. Although the subjects found the process of transferring photos via smartphone to be cumbersome (75%), the satisfaction level of the oral hygiene management program was excellent for all participating patients, and they all wanted to continue with further management using this process. The results from the phone satisfaction survey showed that oral hygiene self-management after oral hygiene control training by smartphones was mostly equal to previous habits (87.5%) or had partially increased but had not decreased. The need for data on more varied age groups and the issues of protecting the security of personal information on smartphones require further study. However, our study confirmed the efficacy of using electronic media (smartphones) for oral hygiene management in patients with a dental implant due to their improvement of oral hygiene performance as evidenced by less bleeding from probing on post-program visit.