• Title/Summary/Keyword: Service identity

Search Result 520, Processing Time 0.034 seconds

A Study on the Technology Development of User-based Home Automation Service (사용자 위치기반 홈오토메이션 서비스 기술 개발에 관한 연구)

  • Lee, Jung-Gi;Lee, Yeong-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.3
    • /
    • pp.327-332
    • /
    • 2017
  • As Internet of Things (IoT) technology advances, there is a growing demand for location-based services (LBSs) to identify users' mobility and identity. The initial LBS system was mainly used to measure position information by measuring the phase of a signal transmitted from a global positioning system (GPS) satellite or by measuring distance to a satellite by tracking the code of a carrier signal. However, the use of GPS satellites is ineffective, because it is difficult to receive satellite signals indoors. Therefore, research on wireless communications systems like ultra-wide band (UWB), radio frequency identification (RFID), and ZigBee are being actively pursued for location recognition technology that can be utilized in an indoor environment. In this paper, we propose an LBS system that includes the 2.45GHz band for chirp spread spectrum (CSS), and the 3.1-10.6GHz band and the 250-750MHz bands for UWB using the IEEE 802.15.4a standard for low power-based location recognition. As a result, we confirmed that the 2.45GHz Industrial, Scientific and Medical (ISM) band RF transceiver and the ranging function can be realized in the hardware and has 0dBm output power.

Five Newly Collected Turnip Mosaic Virus (TuMV) Isolates from Jeju Island, Korea are Closely Related to Previously Reported Korean TuMV Isolates but Show Distinctive Symptom Development

  • Hu, Wen-Xing;Kim, Byoung-Jo;Kwak, Younghwan;Seo, Eun-Young;Kim, Jung-Kyu;Han, Jae-Yeong;Kim, Ik-Hyun;Lim, Yong Pyo;Cho, In-Sook;Domier, Leslie L;Hammond, John;Lim, Hyoun-Sub
    • The Plant Pathology Journal
    • /
    • v.35 no.4
    • /
    • pp.381-388
    • /
    • 2019
  • For several years, temperatures in the Korean peninsula have gradually increased due to climate change, resulting in a changing environment for growth of crops and vegetables. An associated consequence is that emerging species of insect vector have caused increased viral transmission. In Jeju Island, Korea, occurrences of viral disease have increased. Here, we report characterization of five newly collected turnip mosaic virus (TuMV) isolates named KBJ1, KBJ2, KBJ3, KBJ4 and KBJ5 from a survey on Jeju Island in 2017. Full-length cDNAs of each isolate were cloned into the pJY vector downstream of cauliflower mosaic virus 35S and bacteriophage T7 RNA polymerase promoters. Their fulllength sequences share 98.9-99.9% nucleotide sequence identity and were most closely related to previously reported Korean TuMV isolates. All isolates belonged to the BR group and infected both Chinese cabbage and radish. Four isolates induced very mild symptoms in Nicotiana benthamiana but KBJ5 induced a hypersensitive response. Symptom differences may result from three amino acid differences uniquely present in KBJ5; Gly(382)Asp, Ile(891)Val, and Lys(2522)Glu in P1, P3, and NIb, respectively.

The Characteristics and Maintenance of Assemblypersons' Activity Records (국회의원 활동기록의 특성과 관리방향)

  • Han, Eun-Jeong;Yim, Jin-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.21
    • /
    • pp.117-167
    • /
    • 2009
  • Assemblypersons' activities have organizational and individual nature. The activities of assemblypersons and their assistant staffs become a motive for major work performance of Korean legislature, and are also critical public services affecting contemporary political history, history of political parties and history of assemblyperson's hometown. Moreover, their activities are also characterized by work performance in favor of assemblyperson's personal interests to effectively communicate his or her achievements during term of office to electors with a view to winning reelection after the end of 4-year term of office. Assemblyperson's organization produces various types of record in the performance of these works. From the viewpoint of public archive as a product of assemblypersons' public service performance and from their own personal viewpoints, they can create their own identity by arranging their personal records that can demonstrate their own political philosophy, policy orientation, achievements during term of office, and personal features. In addition, their personal records can have much more values and significance in the sense that those records are available to electors to make it possible to highlight their own images in objective and reliable manner. Conclusively, this study underlined that the efforts for assemblypersons and their assistant staffs to keep their records well could be helpful to streamline their internal works and be also helpful for personal interests of assemblypersons. And this study proposed procedures and methods for deducing and screening a list of production archives to meet a viewpoint of streamlined internal works and needs for keeping personal records, ultimately with a view to giving practical helps for these works.

Characteristics of Images in Image-based SNS and User Satisfaction - Focusing on Instagram and Pinterest - (이미지 기반 SNS에 나타난 이미지의 속성과 사용자 만족 인스타그램과 핀터레스트를 중심으로)

  • Yoon, Jisun;Ryoo, Han Young
    • Journal of the HCI Society of Korea
    • /
    • v.14 no.1
    • /
    • pp.5-13
    • /
    • 2019
  • SNS has been advanced from first to third generation by changing its service format in various ways. Nowadays, image-based SNS such as instagram and pinterest where users communicate via images has become popular as third generation service. Due to the fact that users communicate especially through images, image-based SNS utilizes images in different ways compared to other SNS. This study derived various characteristics of images in image-based SNS, and observed how users perceive each of them differently. Also, relationship between the characteristics and user satisfaction on image-based SNS is analyzed. The characteristics include 6 items; 'implicity', 'recordability', 'expressing identity', 'indirect experience', 'temporary amusement', and 'stimulating desire.' As a result of comparing user perception regarding those 6 characteristics, recordability and indirect experience were highly recognized than other characteristics. Also, according to users' age, motivation of using image-based SNS, and number of followers they have, users perceived each characteristic in different level. Finally, relationship between the characteristics and user satisfaction was analyzed, and the result showed that indirect experience had positive influence to user satisfaction. Regarding indirect experience, it was highly perceived by users and also had positive influence to their satisfaction, which means it is the most typical characteristic of image-based SNS.

Exploration, Conflicts, Challenges, and Changes: A Teacher Educator's Self-Study for Secondary School Physics Instruction Course (탐색, 갈등, 도전, 그리고 변화 -물리교과교육 수업을 위한 한 교사교육자의 셀프스터디-)

  • Choi, Jaehyeok;Jo, Kwanghee;Joung, Yong Jae;Kim, Heekyong
    • Journal of The Korean Association For Science Education
    • /
    • v.36 no.5
    • /
    • pp.739-756
    • /
    • 2016
  • The purpose of the study is to reflect on 'myself' as a teacher educator of college of education in depth and to improve my instruction through self-study with three critical collaborators. 17 pre-service science teachers and I have participated in this study of a teacher educator's course since March 2016 after the preliminary practice in 2015. The video recorded the course for 11 weeks with about 40 hours of lessons. The data source also included teacher educator's reflective journals, lecture evaluations, online boards and so on. Questionnaires were distributed and answered both at the beginning and at the end of the course and pre-service teachers wrote their reflective journals. Four of them were in the focus group interviews. During the course, the weekly group meeting of critical collaborators analyzed the emerging issues based on the lesson clips and teacher educator's reflective journals with discussion for the course innovation. Four phases were revealed in the process and for the purpose of the course such as exploration, conflicts, challenges, and changes. The results showed that first, we identified tensions among the teacher educator's multiple identities as a lecturer, a faculty member, and a researcher. Second, there were differences between goals of teacher educator and pre-service teachers in the course, and this obstructed the success of the course sometimes. Third, these practices led to explore balanced alternative views and interpretations of the problem by critical views and to expand and improve our teaching practice and thinking. In addition, the self-study with critical collaborators helped to bring conflicts and issues below my practice to light for collaborative reflection and it gave a chance to understand ourselves as teacher educators in different ways.

Public welfare services and the needs of the Haenyeo and a comparative analysis (해녀의 공공복지서비스 실태와 욕구 비교 분석)

  • Kim, Sang-Mi;Hwang, Kyung-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.10
    • /
    • pp.4557-4563
    • /
    • 2012
  • The purpose of this study is to suggest the criteria to public welfare service support for improving life quality of the haenyeo (female divers) through analyzing public welfare services and desires of the haenyeo in Jeju, Busan, and Tongyeong. Accordingly, research period was set from May 11 to June 21, 2010. The haenyeo in each region of Jeju, Yeongdo-gu (Busan), Tongyeong-si were selected as subjects. Recording of interviewing methods was used to recognize current status of public welfare. We analyzed by comparing desires of the haenyeo to public welfare services by dividing them economically, medically, educationally, and culturally. As a result of researching public welfare services to the haenyeo in each region, supports for protection of diving, growing area, public welfare service for aged diving haenyeo, and medical service were conducted. Tewak protecting net, Seonjinji visiting, and welfare facilities are supported in Busan-si but there is no support in Tongyeong-si. Therefore, desires of the haenyeo to such public welfare services are as followings: First, the desires of the haenyeo in Jeju to economic supports are indicated as supports for haenyeo experience spot, diving suit, and overseas visiting. To educational supports, it is indicated as supports for identity education, diving disease prevention education, and foreign language education. To cultural supports, it is indicated as supports for installation of welfare hall and exchange visit to foreign haenyeo culture. Second, in Busan, there were desires to establish changing room and fishery sales lot and to support diving suit as for economic supports, desires to support diving disease and medical benefits as for medical supports, desires to education of diving skill as for educational supports, and desires to establish welfare hall and haenyeo museum as for cultural supports. Third, in Tongyeong where public welfare services to the haenyeo are very poor, there were desires to support diving suit and to support changing room as for economic supports, as same as in Busan, desires to support diving disease and medical benefits as for medical supports.

Factors Influencing the Adoption of Location-Based Smartphone Applications: An Application of the Privacy Calculus Model (스마트폰 위치기반 어플리케이션의 이용의도에 영향을 미치는 요인: 프라이버시 계산 모형의 적용)

  • Cha, Hoon S.
    • Asia pacific journal of information systems
    • /
    • v.22 no.4
    • /
    • pp.7-29
    • /
    • 2012
  • Smartphone and its applications (i.e. apps) are increasingly penetrating consumer markets. According to a recent report from Korea Communications Commission, nearly 50% of mobile subscribers in South Korea are smartphone users that accounts for over 25 million people. In particular, the importance of smartphone has risen as a geospatially-aware device that provides various location-based services (LBS) equipped with GPS capability. The popular LBS include map and navigation, traffic and transportation updates, shopping and coupon services, and location-sensitive social network services. Overall, the emerging location-based smartphone apps (LBA) offer significant value by providing greater connectivity, personalization, and information and entertainment in a location-specific context. Conversely, the rapid growth of LBA and their benefits have been accompanied by concerns over the collection and dissemination of individual users' personal information through ongoing tracking of their location, identity, preferences, and social behaviors. The majority of LBA users tend to agree and consent to the LBA provider's terms and privacy policy on use of location data to get the immediate services. This tendency further increases the potential risks of unprotected exposure of personal information and serious invasion and breaches of individual privacy. To address the complex issues surrounding LBA particularly from the user's behavioral perspective, this study applied the privacy calculus model (PCM) to explore the factors that influence the adoption of LBA. According to PCM, consumers are engaged in a dynamic adjustment process in which privacy risks are weighted against benefits of information disclosure. Consistent with the principal notion of PCM, we investigated how individual users make a risk-benefit assessment under which personalized service and locatability act as benefit-side factors and information privacy risks act as a risk-side factor accompanying LBA adoption. In addition, we consider the moderating role of trust on the service providers in the prohibiting effects of privacy risks on user intention to adopt LBA. Further we include perceived ease of use and usefulness as additional constructs to examine whether the technology acceptance model (TAM) can be applied in the context of LBA adoption. The research model with ten (10) hypotheses was tested using data gathered from 98 respondents through a quasi-experimental survey method. During the survey, each participant was asked to navigate the website where the experimental simulation of a LBA allows the participant to purchase time-and-location sensitive discounted tickets for nearby stores. Structural equations modeling using partial least square validated the instrument and the proposed model. The results showed that six (6) out of ten (10) hypotheses were supported. On the subject of the core PCM, H2 (locatability ${\rightarrow}$ intention to use LBA) and H3 (privacy risks ${\rightarrow}$ intention to use LBA) were supported, while H1 (personalization ${\rightarrow}$ intention to use LBA) was not supported. Further, we could not any interaction effects (personalization X privacy risks, H4 & locatability X privacy risks, H5) on the intention to use LBA. In terms of privacy risks and trust, as mentioned above we found the significant negative influence from privacy risks on intention to use (H3), but positive influence from trust, which supported H6 (trust ${\rightarrow}$ intention to use LBA). The moderating effect of trust on the negative relationship between privacy risks and intention to use LBA was tested and confirmed by supporting H7 (privacy risks X trust ${\rightarrow}$ intention to use LBA). The two hypotheses regarding to the TAM, including H8 (perceived ease of use ${\rightarrow}$ perceived usefulness) and H9 (perceived ease of use ${\rightarrow}$ intention to use LBA) were supported; however, H10 (perceived effectiveness ${\rightarrow}$ intention to use LBA) was not supported. Results of this study offer the following key findings and implications. First the application of PCM was found to be a good analysis framework in the context of LBA adoption. Many of the hypotheses in the model were confirmed and the high value of $R^2$ (i.,e., 51%) indicated a good fit of the model. In particular, locatability and privacy risks are found to be the appropriate PCM-based antecedent variables. Second, the existence of moderating effect of trust on service provider suggests that the same marginal change in the level of privacy risks may differentially influence the intention to use LBA. That is, while the privacy risks increasingly become important social issues and will negatively influence the intention to use LBA, it is critical for LBA providers to build consumer trust and confidence to successfully mitigate this negative impact. Lastly, we could not find sufficient evidence that the intention to use LBA is influenced by perceived usefulness, which has been very well supported in most previous TAM research. This may suggest that more future research should examine the validity of applying TAM and further extend or modify it in the context of LBA or other similar smartphone apps.

  • PDF

A Study about the Direction and Responsibility of the National Intelligence Agency to the Cyber Security Issues (사이버 안보에 대한 국가정보기구의 책무와 방향성에 대한 고찰)

  • Han, Hee-Won
    • Korean Security Journal
    • /
    • no.39
    • /
    • pp.319-353
    • /
    • 2014
  • Cyber-based technologies are now ubiquitous around the glob and are emerging as an "instrument of power" in societies, and are becoming more available to a country's opponents, who may use it to attack, degrade, and disrupt communications and the flow of information. The globe-spanning range of cyberspace and no national borders will challenge legal systems and complicate a nation's ability to deter threats and respond to contingencies. Through cyberspace, competitive powers will target industry, academia, government, as well as the military in the air, land, maritime, and space domains of our nations. Enemies in cyberspace will include both states and non-states and will range from the unsophisticated amateur to highly trained professional hackers. In much the same way that airpower transformed the battlefield of World War II, cyberspace has fractured the physical barriers that shield a nation from attacks on its commerce and communication. Cyberthreats to the infrastructure and other assets are a growing concern to policymakers. In 2013 Cyberwarfare was, for the first time, considered a larger threat than Al Qaeda or terrorism, by many U.S. intelligence officials. The new United States military strategy makes explicit that a cyberattack is casus belli just as a traditional act of war. The Economist describes cyberspace as "the fifth domain of warfare and writes that China, Russia, Israel and North Korea. Iran are boasting of having the world's second-largest cyber-army. Entities posing a significant threat to the cybersecurity of critical infrastructure assets include cyberterrorists, cyberspies, cyberthieves, cyberwarriors, and cyberhacktivists. These malefactors may access cyber-based technologies in order to deny service, steal or manipulate data, or use a device to launch an attack against itself or another piece of equipment. However because the Internet offers near-total anonymity, it is difficult to discern the identity, the motives, and the location of an intruder. The scope and enormity of the threats are not just focused to private industry but also to the country's heavily networked critical infrastructure. There are many ongoing efforts in government and industry that focus on making computers, the Internet, and related technologies more secure. As the national intelligence institution's effort, cyber counter-intelligence is measures to identify, penetrate, or neutralize foreign operations that use cyber means as the primary tradecraft methodology, as well as foreign intelligence service collection efforts that use traditional methods to gauge cyber capabilities and intentions. However one of the hardest issues in cyber counterintelligence is the problem of "Attribution". Unlike conventional warfare, figuring out who is behind an attack can be very difficult, even though the Defense Secretary Leon Panetta has claimed that the United States has the capability to trace attacks back to their sources and hold the attackers "accountable". Considering all these cyber security problems, this paper examines closely cyber security issues through the lessons from that of U.S experience. For that purpose I review the arising cyber security issues considering changing global security environments in the 21st century and their implications to the reshaping the government system. For that purpose this study mainly deals with and emphasis the cyber security issues as one of the growing national security threats. This article also reviews what our intelligence and security Agencies should do among the transforming cyber space. At any rate, despite of all hot debates about the various legality and human rights issues derived from the cyber space and intelligence service activity, the national security should be secured. Therefore, this paper suggests that one of the most important and immediate step is to understanding the legal ideology of national security and national intelligence.

  • PDF

Paragon of people circling the pagoda of Woljeongsa Temple and performance of its cultural inheritance (월정사 탑돌이의 전형과 공연문화)

  • Lee, Chang-sik
    • (The) Research of the performance art and culture
    • /
    • no.36
    • /
    • pp.751-781
    • /
    • 2018
  • Task of circling the pagoda of Waljeongsa(Woljeongsa Tabdori) is the major intangible cultural heritage with representativeness and historical meaning as a Buddhism culture, one of the Buddhism folk plays, which was firstly played after the liberation. Woljeongsa Tabdori holds significant designation importance in terms of Buddhism folklore heritage with Korean unique tradition and identity of Gangwon-do province. Temples are demonstrating Tabdori nationwide but Woljeongsa Tabdori is the unique case that systematically inherits the culture based on the designation of being intangible cultural heritage. That is why it is needed to focus on the cultural and internal value of Woljeongsa Tabdori. Tabdori is the integrated symbol of Buddhism respect and worship to the Buddha and pagoda. It is hard to presume the originality of Woljeongsa Tabdori: given the history of Woljeonsa temple, it lies into Goguryeo traditional play and Bokhui(Pagoda circling folk play) in Silla era. It fits into the courtesy of Circumambulating Stupa considering Moon in Goguryo mural, background of Odaesan Hwaeom thought/tripitaka and essence of Octagonal 9-story stone pagoda. At the first stage of Tabdori, Buddhist musical instruments such as Buddhism temple bell, singing bowl, cloud-shaped gong and wooden-fish. However, later, Samhyeon Yukgak has been added and then, Boyeom and Bakpaljeongjinga were singing: it could be interpreted that it was a pure Buddhist ceremony but it has become to have traditional aspect and been spread to the public. The origin of Woljeongsa Tabdori is related to the explanation of Circumambulating Stupa that experiences the glory of the ending ceremony. When a temple has a rite, the Buddhists make an offering to the Buddha. At that time, Buddhist prayer, sermon and chant are followed. After the rite, the Buddhists are circling the pagoda with the monks while praying for Buddhist charity and making their own wishes. It prays not only going after death to Nirvana of the one but also national prosperity and the welfare of the people for peaceful reign. As the temple holds bigger rites, many Buddhists gather and the Tabdori was a success. The scene of circling the pagoda and making own wishes in line with the Buddhist sermon was solemn. The idea on changes and convergence of Woljeongsa Tabdori requires strategic inheritance to promote the transmission while maintaining the paragon and purpose of designating the cultural heritage and reviving its identity. Korean Tabdori was held in Buddha's birthday in April and the mid-autumn day. Tabdori is a memorial service type Buddhist ceremony that once the monk holds the Buddhist rosary, circles the pagoda and sings the great mind and charity of the Buddha, Buddhists follow the step, lighting the lantern, circling the pagoda and praying for the gentle and easy death. Transmission education of the successor, diversified approach of the expert's advice and discourse on the revival of the origin should be reinforced in phases.

Social Philosophical Analysis of Critical Discourses on the Cultural Competence (문화적 역량 비판 담론에 관한 사회철학적 분석)

  • Kim, Gi-Duk
    • Korean Journal of Social Welfare
    • /
    • v.63 no.3
    • /
    • pp.239-260
    • /
    • 2011
  • It is very interesting phenomenon that despite a broad consensus on the need for social worker to take cultural aspects into professional practice, thus to be a culturally competent, a number of materials criticising the concept of cultural competence have emerged in these days simultaneously. The main purpose of the study is to clarify such phenomenon, which means that this article is trying to analyze the contents of such critical discourse on cultural competence and the validity of those contents. The result of the study finds out that most of the arguments can be categorized into three aspects: epistemological, ethical, ontological, and that most of the main ideas of the critical discourses have been borrowed from a branch of critical social work theories, especially highly influenced from Foucault and Derrida. This article argues that critical discourses have some significant problems which make a conflict with traditional values and tenets in social work as a human service profession. First, epistemologically, the critical discourse fails to differentiate the matter of discovery from that of justification, which brings the cultural competence to the brink of agnosticism. Second, ethically, insisting that there should be no foundational criteria for cultural hierarchy in term of rightness or goodness, the critical discourses reveal their intrinsic limitations in solving ethical dilemmas and conflict in real world, which can be considered as a kind of evasion of responsibility in disguise of cultural relativism. Third, in practical vein, critical discourses are largely in effective in specifying the concrete model to realize their own ideas, and furthermore they unintentionally promote context-blind perspectives that eclipses the significance of structural and systematical impacts on the cultural identity.

  • PDF