• Title/Summary/Keyword: Security Environment Contents

Search Result 210, Processing Time 0.024 seconds

Case Study of User Interface Design for Spectrophotometer based on User Experience (사용자경험 기반의 인터페이스 디자인 사례연구 : 분광광도계)

  • Jeong, Seong-Won;Jeong, Sang-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.6
    • /
    • pp.32-40
    • /
    • 2012
  • This study is a case analysis for user interface(UI) design of spectrophotometer which is widely used in the field of chemistry, biology and environment, based on user experience(UX). Generally, experimental equipment developments are centered on functionality and technology, and the interface for interaction between the user and the machine is developed only by the engineers who do not have much consideration for the users. From this background, this study tried to find out how UX could melt into UI so that a kind of spectrophotometers can be designed to help the work process of researchers in the real context by examining and analyzing the real users' experiences and also considering the developer's perspective. As a result, it was possible to improve UI and was found that redefinition of the goal of UI, time-efficiency, security, and sufficient information delivery are essential to the design of user interface for spectrophotometers.

Design and Implementation of a Web-Based Toy Trading System (웹 기반 장난감 거래 시스템 설계 및 구현)

  • Lim, Jongtae;Lim, Yunsoo;Lee, Dong-Geun;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.10
    • /
    • pp.45-58
    • /
    • 2019
  • As modern people's daily lives are becoming more harsh in Korea, the so-called Kidults generation has appeared since a few years ago as adults have come back to their childhood sensibility and are exposed to various cultures online, and there are many people who have a hobby for collecting toys. However, as there is currently no formalized system for individual toy trade online, it is difficult to acquire expertise and share information with each other through a major portal site's $caf{\acute{e}}$, and is exposed to security or fraud while trading toys. In this paper, we design and implementation of a web-based toy trading system. Analyzing the advantages and disadvantages of the various trading and relay systems currently in use, it will provide opportunities for professional toy knowledge and information exchange to many users who have a hobby of collecting toys, and will greatly help vitalize the toy market through a secure and convenient trading environment between individuals.

Security Model Tracing User Activities using Private BlockChain in Cloud Environment (클라우드 환경에서 프라이빗 블록체인을 이용한 이상 행위 추적 보안 모델)

  • Kim, Young Soo;Kim, Young Chan;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.11
    • /
    • pp.475-483
    • /
    • 2018
  • Most of logistics system has difficulties in transportation logistics tracking due to problems in real world such as discordance between logistics information and logistics flow. For the solution to these problems, through case study about corporation, suppliers that transport order items in shopping mall, we retain traceability of order items through accordance between logistics and information flow and derive transportation logistics tracking model. Through literature review, we selected permissioned public block chain model as reference model which is suitable for transportation logistics tracking model. We compared, analyzed and evaluated using centralized model and block chain as application model for transportation logistics tracking model. In this paper we proposed transportation logistics tracking model which integrated with logistics system in real world. It can be utilized for tracking and detection model and also as a tool for marketing.

A Study on the Concept of Digital Environmental Rights and Reinforcement of Information Subject (디지털 환경권 개념 정립과 정보교과 교육 강화에 대한 연구)

  • Yoo, Jiyeon
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.2
    • /
    • pp.189-199
    • /
    • 2020
  • This study aims to emphasize the necessity of strengthening the information subject through the introduction of a new concept of rights called 'digital environmental rights' and proposes an improvement in the educational composition model of the information culture section in the information subject. Through the introduction of the concept of digital environmental rights, we intend to provide a logical basis for making the information subject a required subject. In addition, we intend to enhance the competencies required for living in a digital environment by improving the structure of the information culture section in the information subject. As a study on this, the logic of the concept of rights required in the digital environment is analyzed and the concept of digital environmental rights applied to it is established. Furthermore, by analyzing relevant curricula in major countries, including the United States, Australia, and Japan, which provide the main basis for digital environmental rights, an improvement plan for the educational composition in the information and culture education sector is formulated. The results of the study are as follows: First, digital environment rights are 'rights to enjoy a pleasant and safe digital environment'. Second, the components of digital environmental rights include rights for the environment (cyberethics), rights of the environment (cybersafety), and rights about the environment (cybersecurity). Third, in the major countries studied various educational structures are being implemented with regard to information-related education contents on the digital citizenship, code ethics, and new technology security.

Use Strategies of CPTED for the Safety of University Campus (대학 캠퍼스의 안전을 위한 CPTED 운용전략)

  • Park, Dong-Kyun
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.4
    • /
    • pp.340-347
    • /
    • 2010
  • Though there are many crimes on and out university campus in Korea, no one knows anything about the size or the types of campus crime. But, there are many theft crimes and sex assault in the library and one-room village near the university campus. This study suggested the establish ways and means needed to improve the campus security system, with the focus on the CPTED(Crime Prevention Through Environmental Design). Various types of crime prevention methods are being considered instead of conventional crime suppression measures. Among them, CPTED is drawing global attention. Crime prevention through environmental design is a multi-disciplinary approach to deterring criminal behavior through environmental design. CPTED strategies rely upon the ability to influence offender decisions that precede criminal acts. A truly safe campus can be achieved only through the cooperation of all students, faculty, staff and visitors. The cooperation and involvement of the entire campus community in campus crime prevention is absolutely necessary. University should adopt a series of policies and procedures designed to ensure that every possible precaution is taken to protect persons and property on campus.

A Study on Leisure Activities and Life Satisfaction of the Elderly in With COVID-19 Era (위드 코로나(With COVID-19)시대 노인의 여가활동과 삶의 만족도에 관한 연구)

  • Lee, Kyung A;Son, Hee Won
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.445-459
    • /
    • 2022
  • This study presented a plan to improve the life satisfaction and leisure status of the elderly in the With COVID-19 era, and the life satisfaction of the elderly. For this purpose, we investigated life satisfaction and leisure life for 107 senior citizens at the Gyeonggi Senior Welfare Center, and the following results were obtained. First, it can be seen that overall life satisfaction was relatively lower after Corona than before. Second, in the correlation between leisure activity and life satisfaction, there was no significant correlation between the level of leisure activity and life satisfaction before Corona, and a significant positive correlation was found between the level of leisure activity and life satisfaction after Corona. seemed If alternative measures are proposed according to these results, first, it is necessary to seek ways to improve and manage the environment for the elderly in the with Corona era in the local community. In particular, in order to reduce the adaptation gap among the elderly due to the many changes in digital technology, institutions related to the elderly are providing education on how to use smartphones and kiosks, but it needs to be expanded as a community-wide measure. Second, a systematic system for health care for the elderly in the era of With Corona must be provided. Third, the old-age income security system and support are required so that the minimum living security is guaranteed for the elderly who are experiencing economic difficulties due to the corona virus. Fourth, it is necessary to revitalize programs related to talking to the elderly and counseling for the improvement of relationships and location satisfaction due to social distance and relationship atrophy due to Corona.

A Survey of the Transmission-Power-Control Schemes in Wireless Body-Sensor Networks

  • Lee, Woosik;Kim, Heeyoul;Hong, Min;Kang, Min-Goo;Jeong, Seung Ryul;Kim, Namgi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.4
    • /
    • pp.1854-1868
    • /
    • 2018
  • A wireless body-sensor network (WBSN) refers to a network-configured environment in which sensors are placed on both the inside and outside of the human body. The sensors are much smaller and the energy is more constrained when compared to traditional wireless sensor network (WSN) environments. The critical nature of the energy-constraint issue in WBSN environments has led to numerous studies on the reduction of energy consumption of WBSN sensors. The transmission-power-control (TPC) technique adjusts the transmission-power level (TPL) of sensors in the WBSN and reduces the energy consumption that occurs during communications. To elaborate, when transmission sensors and reception sensors are placed in various parts of the human body, the transmission sensors regularly send sensor data to the reception sensors. As the reception sensors receive data from the transmission sensors, real-time measurements of the received signal-strength indication (RSSI), which is the value that indicates the channel status, are taken to determine the TPL that suits the current-channel status. This TPL information is then sent back to the transmission sensors. The transmission sensors adjust their current TPL based on the TPL that they receive from the reception sensors. The initial TPC algorithm made linear or binary adjustments using only the information of the current-channel status. However, because various data in the WBSN environment can be utilized to create a more efficient TPC algorithm, many different types of TPC algorithms that combine human movements or fuse TPC with other algorithms have emerged. This paper defines and discusses the design and development process of an efficient TPC algorithm for WBSNs. We will describe the WBSN characteristics, model, and closed-loop mechanism, followed by an examination of recent TPC studies.

A Study on Smart Network Utilizing the Data Localization for the Internet of Things (사물 인터넷을 위한 데이터 지역화를 제공하는 스마트 네트워크에 관한 연구)

  • Kang, Mi-Young;Nam, Ji-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.6
    • /
    • pp.336-342
    • /
    • 2017
  • Traffic can be localized by reducing the traffic load on the physical network by causing traffic to be generated at the end of the packet network. By localizing traffic, the IoT-based sensitive data-related security issues can be supported effectively. In addition, it can be applied effectively to the next-generation smart network environment without changing the existing network infrastructure. In this paper, a content priority scheme was applied to smart network-based IoT data. The IoT contents were localized to efficiently pinpoint the flow of traffic on the network to enable smart forwarding. In addition, research was conducted to determine the effective network traffic routes through content localization. Through this study, the network load was reduced. In addition, it is a network structure that can guarantee user quality. In addition, it proved that the IoT service can be accommodated effectively in a smart network-based environment.

A Study on IPTV Video Quality by Routing Protocols in Wireless LAN (무선 LAN 환경에서 경로 배정 프로토콜에 따른 IPTV 영상 서비스 품질에 관한 연구)

  • Jung, Jae-hoon;Park, Seung-seob
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.572-575
    • /
    • 2009
  • With the advent of integration environment of broadcasting and communication, IPTV has been widely used. It provides services such as information, movie contents and broadcasting through TV using super-high speed networks. Developments of Wireless LAN and IP network technology create various and fusional services such as IPTV, VoIP that are based on IP network. The development of Wireless LAN is very important in IPTV network field which requires the best quality of service on the security, QoS and bandwidth. In this Paper, We configure the experimental network in its RIP and OSPF environment to test the Video Quality of IPTV in Wireless LAN. We measure and evaluate broadcasting quality by using PSNR to show the corelation of Routing Protocols in Wireless LAN in which how they affect to the IPTV real-time Video Quality.

  • PDF

An Empirical Analysis on the Operating System Update Decision Factors according to Age and Gender (연령과 성별에 따른 운영체제 업데이트 실시여부 실증분석)

  • Kim, Sunok;Lee, Mina
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.3117-3126
    • /
    • 2018
  • The operating system update is a basic step to maintain a safe internet use environment. This study analyzed whether the implementation of the operating system update was related to gender and age group during the violation accident prevention act in relation to information protection on the internet, and tried to verify the validity of these factors by analyzing the influence of gender and age group. In this study, logistic regression analysis was conducted based on the information security survey data surveyed by the Korea Internet & Security Agency in 2016. As a result, gender and age were surveyed as factors related to the implementation of operating system updates. As a result of analyzing the impact on the implementation of operating system updates by gender, it is estimated that the odds are 0.419 times higher for women than for men. According to the analysis of the operating system update by age group based on the 50s, which is a vulnerable group of information, the result is that the odds are 13.266 times higher in the 20s than the 50s.