• Title/Summary/Keyword: Security Concepts

Search Result 266, Processing Time 0.027 seconds

A Study on the Smart Tourism Awareness through Bigdata Analysis

  • LEE, Song-Yi;LEE, Hwan-Soo
    • The Journal of Industrial Distribution & Business
    • /
    • v.11 no.5
    • /
    • pp.45-52
    • /
    • 2020
  • Purpose: In the 4th industrial revolution, services that incorporate various smart technologies in the tourism sector have begun to gain popularity. Accordingly, academic discussions on smart tourism have also started to become active in various fields. Despite recent research, the definition of smart tourism is still ambiguous, and it is not easy to differentiate its scope or characteristics from traditional tourism concepts. Thus, this study aims to analyze the perception of smart tourism exposed online to identify the current point of smart tourism in Korea and present the research direction for conceptualizing smart tourism suitable for the domestic situation. Research design, data, and methodology: This study analyzes the perception of smart tourism exposed online based on 20,198 news data from portal sites over the past six years. Data on words used with smart tourism were collected from the leading portal sites Naver, Daum, and Google. Text mining techniques were applied to identify the social awareness status of smart tourism. Network analysis was used to visualize the results between words related to smart tourism, and CONCOR analysis was conducted to derive clusters formed by words having similarity. Results: As a result of keyword analysis, the frequency of words related to the development and construction of smart tourism areas was high. The analysis of the centrality of the connection between words showed that the frequency of keywords was similar, and that the words "smartphones" and "China" had relatively high connection centrality. The results of network analysis and CONCOR indicated that words were formed into eight groups including related technologies, promotion, globalization, service introduction, innovation, regional society, activation, and utilization guide. The overall results of data analysis showed that the development of smart tourism cities was a noticeable issue. Conclusions: This study is meaningful in that it clearly reflects the differences in the perception of smart tourism between online and research trends despite various efforts to develop smart tourism in Korea. In addition, this study highlights the need to understand smart tourism concepts and enhance academic discussions. It is expected that such academic discussions will contribute to improving the competitiveness of smart tourism research in Korea.

Participation in Common Activities and Satisfaction with Common Space - In a Tentative Framework of Housing Adjustment for Swedish Cohousing Residents - (공동활동참여도와 공동생활공간만족도의 효과 - 스웨덴 코하우징 거주자의 잠정적 주거조절 틀 속에서 -)

  • Choi, Jungshin;Cho, Jaesoon;Suh, Kueesook
    • Journal of the Korean housing association
    • /
    • v.25 no.4
    • /
    • pp.125-133
    • /
    • 2014
  • The purpose of this study was to find the role of participation in common activities and satisfaction with common space in a tentative housing adjustment framework for Swedish cohousing residents, applying the housing adjustment behavior model of Morris and Winter (1978, 1996). The data used for this research were a subset of data Choi and Paulsson (2011) surveyed from 12 Swedish cohousing units. Number of 216 cases whose age was 40 and over were selected and analyzed with Pearson correlations and hierarchical linear regressions by SPSS. The regression analyses included four main concepts as endogenous variables, which were participation in common activities, satisfaction with common space, overall life satisfaction, and intention to move out. The results showed that participation in common activities raised satisfaction with common space and overall life satisfaction but reduced intention to move out. Meanwhile, satisfaction with common space diminished intention to move out but did not impact overall life satisfaction. When overall life satisfaction was added to the final regression model, the direct impacts of security reasons, participation in common activities, and satisfaction with common space on intention to move out disappeared. It may be concluded that participation in common activities and satisfaction with common space acted as intervening variables in the tentative cohousing adjustment framework. Even though this study leaves further research on specifying the framework, it may be noteworthy as a first attempt that explains the flow of main concepts. This study may broaden the possibility of empirical studies to develop an analytical path model of housing adjustment for cohousing residents.

Mapping Tool for Semantic Interoperability of Clinical Terms (임상용어의 의미적 상호운영성을 위한 매핑 도구)

  • Lee, In-Keun;Hong, Sung-Jung;Cho, Hune;Kim, Hwa-Sun
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.1
    • /
    • pp.167-173
    • /
    • 2011
  • Most of the terminologies used in medical domain is not intended to be applied directly in clinical setting but is developed to integrate the terms by defining the reference terminology or concept relations between the terms. Therefore, it is needed to develop the subsets of the terminology which classify categories properly for the purpose of use and extract and organize terms with high utility based on the classified categories in order to utilize the clinical terms conveniently as well as efficiently. Moreover, it is also necessary to develop and upgrade the terminology constantly to meet user's new demand by changing or correcting the system. This study has developed a mapping tool that allows accurate expression and interpretation of clinical terms used for medical records in electronic medical records system and can furthermore secure semantic interoperability among the terms used in the medical information model and generate common terms as well. The system is designed to execute both 1:1 and N:M mapping between the concepts of terms at a time and search for and compare various terms at a time, too. Also, in order to enhance work consistency and work reliability between the task performers, it allows work in parallel and the observation of work processes. Since it is developed with Java, it adds new terms in the form of plug-in to be used. It also reinforce database access security with Remote Method Invocation (RMI). This research still has tasks to be done such as complementing and refining and also establishing management procedures for registered data. However, it will be effectively used to reduce the time and expenses to generate terms in each of the medical institutions and improve the quality of medicine by providing consistent concepts and representative terms for the terminologies used for medical records and inducing proper selection of the terms according to their meaning.

A Grounded Theory Study on the Recovering Gambling Addicts' Overcoming Process of Their Hardships of Life (단도박자의 생활고 극복과정에 관한 근거이론 연구)

  • Kang, Jun Hyeok;Um, Da Won;Lee, Hyuk Koo
    • Korean Journal of Social Welfare Studies
    • /
    • v.48 no.4
    • /
    • pp.121-156
    • /
    • 2017
  • The purpose of this study is to examine the recovering gambling addicts' overcoming process on their hardships of life which hamper their recovery. For this study, we had one to one depth interview with 10 participants who had overcome their hardships of life after stopping gambling. The data gathered from the interviews were analysed following the grounded theory process suggested by Strauss and Corbin. As a result, 131 concepts were constructed, and they were classified into 32 subcategories and 14 category. We presented "overcoming of the hardships of life through the acceptance of reality and re-determination" as a core subject which connects the whole concepts. Based on the research outcomes, we proposed some policy and practice intervention methods such as economic self-support program, social security service, and triangle support system by counselor-family-peer recovering addicts.

Conceptual Approaches to Training Specialists Using Multimedia Technologies

  • Shchyrbul, Oleksandr;Babalich, Viktoriya;Mishyn, Sergii;Novikova, Viktoriia;Zinchenko, Lina;Haidamashko, Iryna;Kuchai, Oleksandr
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.9
    • /
    • pp.123-130
    • /
    • 2022
  • Modernization of the educational sector requires globalization, democratization, and the transition to an information technology society. The main goal of education at the present stage is to solve the problem of ensuring the priority of the development of education and science. In modern conditions, the quality of training of qualified specialists is becoming particularly relevant. The great role of teacher education is emphasized by its main goal, which is to train specialists who can ensure the versatile and innovative development of a person as a person and the highest value of society, its mental, physical and aesthetic abilities, high moral qualities, and, consequently, the enrichment on this basis of the intellectual, creative and cultural potential of the people. Among the strategic tasks of modernizing higher education is to ensure informatization of the educational process and access to International Information Systems. The essence of the concept of multimedia is clarified. In the context of media education, multimedia lists a number of functions: informational, interpretive, cultural, entertainment, and educational. The need to meet the needs outlined in the article in the conditions of informatization of the educational process requires the teacher to have knowledge and skills in the field of multimedia pedagogical technologies, knowledge of advanced methods and means of modern science. It is considered what relevant concepts of media education have been developed and are being developed in Ukraine and form an important basis for the modernization of education, which will contribute to the construction of an information society in the country and the formation of civil society. Distance learning is considered - the most democratic form of education that allows broad segments of society to get an education. Distance learning methods are used in higher education institutions, in school education, in the system of advanced training of teachers, in the system of training managerial personnel.

Factors Influencing the Introduction of Mobile Security Technology (기업 모바일 보안기술 도입에 영향을 미치는 특성요인)

  • Choi, Woong-Gyu;Lee, Young-Jai
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.4
    • /
    • pp.215-240
    • /
    • 2013
  • This research has reviewed the major composition concepts and the positive research results in the selected studies which were theoretically based on IDT (Innovation Diffusion Theory), IRM (Model of Innovation Resistance), TAM(Technology Acceptance Model), and IAPA(Information Asset Protection Activity) in order to improve the theoretical explanation of major characterized factors influencing on the introduction of MST (Mobile Security Technology). The characterized factors for the adaptation of MST and 17 hypotheses on the MST study models in order to test the effects on the intention to use are empirically verified by utilizing the analysis method of structure equation model. As a result of a study, First, the most influential characterized factors of IRM are shown as compatibility, complexity, relative advantage, information asset protection in order. Second, the characterized factors affecting intention to use are shown as relative advantage, compatibility, innovation resistance, performance expectancy. The results of this study are relevantly significant to establish the theoretical foundation of the study on the adaptation of MST and The verification of the characterized factors provide strategic implication for the introduction of MST and policy direction which alleviates informational gap between new MST and previous Security Technology to diffusion agency.

Security Analysis and Implementation of Fast Inter-LMA domain Handover Scheme in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 LMA도메인 간 핸드오버 기법의 보안성 분석 및 구현)

  • Chai, Hyun-Suk;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.2
    • /
    • pp.99-118
    • /
    • 2012
  • In PMIPv6-based network, mobile nodes can be made smaller and lighter because the network nodes perform the mobility management-related functions on behalf of the mobile nodes. The one of the protocols, Fast Handovers for Proxy Mobile IPv6(FPMIPv6)[1] has studied by the Internet Engineering Task Force(IETF). Since FPMIPv6 adopts the entities and the concepts of Fast Handovers for Mobile IPv6(FMIPv6) in Proxy Mobile IPv6(PMIPv6), it reduces the packet loss. Conventional scheme has proposed that it cooperated with an Authentication, Authorization and Accounting(AAA) infrastructure for authentication of a mobile node in PMIPv6, Despite the best efficiency, without begin secured of signaling messages, PMIPv6 is vulnerable to various security threats such as the DoS or redirect attAcks and it can not support global mobility between PMIPv. In this paper, we analyze Kang-Park & ESS-FH scheme, and then propose an Enhanced Security scheme for FPMIPv6(ESS-FP). Based on the CGA method and the pubilc key Cryptography, ESS-FP provides the strong key exchange and the key independence in addition to improving the weaknesses for FPMIPv6. The proposed scheme is formally verified based on Ban-logic, and its handover latency is analyzed and compared with that of Kang-Park scheme[3] & ESS-FH and this paper propose inter-domain fast handover sheme for PMIPv6 using proxy-based FMIPv6(FPMIPv6).

A Study on the Development of the Korean Army's International Peace Operation :Based on the analysis of African regional conflicts (한국군의 국제평화활동 발전방안 : 아프리카 지역분쟁 분석을 기반으로)

  • Lee, Kang Kyong;Seol, Hyeon Ju
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.117-126
    • /
    • 2019
  • Historically, the United Nations supported the establishment of the government of the Republic of Korea after liberation and played a decisive role in defending liberal democracy and peace by sending peacekeepers during the Korean War. With the political and military support of the United Nations, the Republic of Korea was able to grow into the world's 10th largest economy today, and now it is time to fulfill its responsibilities and roles to contribute to peace and prosperity in the international community as a middle power. The international peace operations of the United Nations are comprehensive concepts encompassing conflict prevention, peacemaking, peace enforcement, peacekeeping, and peace building, and are implemented in accordance with the Security Council resolutions based on the UN Charter. In order to effectively respond to changes in the international security environment and conflict factors after the post-Cold War, the UN promoted a paradigm shift in international peace operations through the 2000 Brahim Report and the 2015 High-Level Panel Report on UN Peace Activities. Therefore, this study aims to assess the Korean military's international peace operations at a limited level, such as reconstruction assistance and humanitarian assistance, and to present development measures for more active participation as a middle power in the future. To this end, we reviewed the history and specificities of conflict, the conflicting factors after the post-Cold War, and the new paradigm of UN peace operations, focusing on the African region where a number of UN peacekeeping missions are stationed. And it also suggested ways to develop international peace operations that the Korean military should pursue in the future.

A Study on the Concept of Operations and Improvement of the Design Methodology for the Physical Protection System of the National Infrastructure - Focused on Nuclear Power Plants - (국가기반시설 물리적 방호체계 운영개념 및 설계방법 개선방안 연구: 원자력발전소를 중심으로)

  • Na, Seog-Jong;Sung, Ha-Yan;Choi, Sun-Hee
    • Korean Security Journal
    • /
    • no.61
    • /
    • pp.9-38
    • /
    • 2019
  • As the scales & density of the Korean national infrastructures have been increased, they will be identified as rich and attractive potential targets for intensified North Korea's attack in the rear region and terrorism attack. In addition, due to changes in security environment such as drone threats and lack of security forces under the 52-hour workweek law, I think that it is the proper time point to reevaluate the effectiveness and appropriateness of the current physical protection system and its shift to a new system. In this study, the direction and improvement of the perimeter physical protection systems of the national infrastructures are to be studied from the viewpoints of its concepts of operations and design methodology, focusing on the nuclear power plant. The reason why we focus on nuclear power plants is because they cause wide-range and long-term damages caused by radioactive materials disperal and pollution, along with short-term damage caused by the interruption of electricity generation in the event of damage to nuclear power plants. With the aim of extracting improvement directions, as we will comprehensively review domestic research trends and domestic·overseas related laws, and consider Korea's specificity, we try to reframe the concept of operation - systematization, mobilization and flexibility -, and establish criteria on system change. In order to improve the technical performance of the new perimeter physical protection system, we study on high-fidelity·multi-methodology based integrated design methodology, breaking from individual silo-type design methods, and I suggest improvement of government procurement, its expansion to export business and other national infrastructure.

A Study on the Algorithms for One-way Transmission in IPv6 Environment (IPv6 환경에서의 일방향 통신 알고리즘에 대한 연구)

  • Koh, Keun Ho;Ahn, Seong Jin
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.63-69
    • /
    • 2017
  • In the early 1990s, IETF(Internet Engineering TaskForce) had started the discussion on new address protocol that can modify and supplement various drawbacks of existing IPv4 address protocol with the introduction of CIDR(Classless Inter-Domain Routing) which is a temporary solution for IPv4 address depletion, NAT, private IP address. While various standards related to new address protocol has been proposed, the SIPP(Simple Internet Protocol Plus) was adopted among them because it is regarded as the most promising solution. And this protocol has been developed into current IPv6. The new concepts are introduced with modifying a lot of deficiencies in the exisitng IPv4 such as real-time data processing, performance on QoS, security and the efficiency of routing. Since many security threats in IPv6 environment still exist, the necessity of stable data communication environment has been brought up continuously. This paper deveopled one-way communication algorithm in IPv6 based on the high possibility of protecting the system from uncertain and potential risk factors if the data is transmitted in one way. After the analysis of existing IPv6 and ICMPv6, this paper suggests one-way communication algorithm as a solution for existing IPv6 and ICMPv6 environment.