• Title/Summary/Keyword: Shared use

Search Result 686, Processing Time 0.024 seconds

Mitigating Contradictions: Elementary School Homeroom Teachers' Cooperation For Using Diversified Science Instructional Methods (모순 완화하기 -다양한 과학 수업 방법 사용을 위한 초등 담임교사들의 협력-)

  • Han, Moonhyun
    • Journal of The Korean Association For Science Education
    • /
    • v.39 no.2
    • /
    • pp.307-320
    • /
    • 2019
  • This study explores how an elementary school homeroom teacher who continued to lecture, can use diversified science teaching methods for learner-centered instruction. Using an auto-ethnographic approach over the course of a year, self-memory data, facebook diaries, class diaries, and interview data of an elementary teacher's day-to-day preparations and practice of elementary science, in the context of a Korean elementary school, were collected. The data was analyzed through cultural historical activity theory, examining how the interplay of key elements (i.e., the subject as a homeroom teacher with instructional expertise, norms, community, division of labor, tools, and goals) was characterized within and across distinct two-activity systems, and how these elements shaped the teacher's teaching methods into either lecture format or diversified teaching. The study revealed that a non-cooperative community, lack of division of labor, and norms that neglect preparation for science class were the elements that perpetuated the lecture format, and that a contradiction between goals and tools occurred in the activity system. However, these elements were able to be transformed into a cooperative community, shared labor, and norms that saved preparation time for both science class and diversified teaching methods, and those changed elements facilitated the teacher in using diversified teaching methods (e.g., experiments, subject-integrated classes, field work), thereby mitigating the contradiction. This study also discusses that diversified teaching methods can be facilitated when dealing with norms, community, and division of labor elements in an elementary school context as well as improving individual teachers' instructional expertise.

A Study on the Actual Condition of the Fourth Industrial Revolution and Application of Landscape Architecture (4차 산업혁명의 실태와 조경학 분야 적용방안 연구)

  • Lee, Jong-Sung
    • Journal of the Korean Institute of Traditional Landscape Architecture
    • /
    • v.37 no.1
    • /
    • pp.68-75
    • /
    • 2019
  • This study aims to look at the application methods of landscape architecture in response to the 4th Industrial Revolution. The results of the analysis of trends in the 4th Industrial Revolution and the subsequent search for application methods to the field of landscape architecture are as follows. First, the 4th Industrial Revolution means innovative change based on digital technology and seeks to create value based on intelligent information technology, and continuous growth is being made through innovation. This requires expertise to collect large amounts of information and creatively rework it, and a strategy to flexibly cope with changes in the times. Second, the status of technological use in response to the 4th Industrial Revolution in the field of landscape architecture is generalizing the establishment of precise analysis results such as survey technology and global mapping using drones, three-dimensional design simulation, and VR. In the field of traditional landscape architecture, efforts are made to obtain accurate fact-finding data on landscape site components. Third, the application methods in the field of landscape science according to the 4th Industrial Revolution in the future are required to supply precision technology and supply programs in the technology sector, and to provide a shared platform. In addition, a systemically standardized process will need to be established for this. In addition, educational efforts should be continued to professional manpower training and provide economic support for the development of technologies.

Study on the Analysis of Spatial Structure in Jeju Island Focusing on Parking Status (주차실태를 중심으로 한 제주도 공간구조 분석 연구)

  • Hwang, Kyung-Soo;Yang, Jeong-Cheol;Jo, Hang-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.2
    • /
    • pp.667-675
    • /
    • 2021
  • The purpose of this study is as follows: First, to analyze the spatial structure of Jeju by analyzing the rate of parking demand and supply; Second, to determine the parking service imbalance between regions; and third, to elucidate the causes of this spatial structural parking service imbalance and provide effective measures. Due to the rapid population and tourism growth, Jeju is suffering from traffic congestion and serious parking problems. For this, the ways to efficiently utilize the existing parking spaces were identified through spatial structure analysis based on the parking demand and supply in the Jeju area. As short-term policy, the following changes were proposed: switching to small-scale eup or myeon blocks of parking space, use of shared parking system, and repairing side streets in residential areas. As mid-to-long-term policy, it is linked to other means of transportation as follows: parking demand management policy through modal share by reorganizing public transportation routes or expanding traffic facilities; securing park-and-ride lots; and different parking pricing for different time periods. To implement these policies, each area of the public sector, private sector, and private-public partnership should develop the bond of sympathy by areas and participants.

Big Data Analysis of Social Media on Gangwon-do Tourism (강원도 관광에 대한 소셜 미디어 빅데이터 분석)

  • JIN, TIANCHENG;Jeong, Eun-Hee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.14 no.3
    • /
    • pp.193-200
    • /
    • 2021
  • Recently, posts and opinions on tourist attractions are actively shared on social media. These social big data provide meaningful information to identify objective images of tourist destinations recognized by consumers. Therefore, an in-depth understanding of the tourist image is possible by analyzing these big data on tourism. The study is to analyze destination images in Gangwon-do using big data from social media. It is wanted to understand destination images in Gangwon-do using semantic network analysis and then provided suggestions on how to enhance image to secure differentiated competitiveness as a destination for tourists. According to the frequency analysis results, as tourism in Gangwon-do, Sokcho, Gangneung, and Yangyang were mentioned at a high level in that order, and the purpose of travel was restaurant tour, gourmet food, family trip, vacation, and experience. In particular, it was found that they preferred day trips, weekends, and experiences. Four suggestions were made based on the results. First, it is necessary to develop various types of hotels, accommodation facilities and experience-oriented tour packages. Second, it is necessary to develop a day-to-day travel package that utilizes proximity to the Seoul metropolitan area. Third, it is necessary to promote traditional restaurants and local food. Finally, it is necessary to develop tourist package suitable for healing and family travel. Through this research, the destination image of Gangwon-do was identified and a tourism marketing strategy was presented to improve competitiveness. It also provided a theoretical basis for the use of the big data of tourism consumers in the field of tourism business.

Protecting Individuals from Secondary Privacy Loss using Breached Personal Data Information Center (개인정보 오.남용 방지 및 보호를 위한 정보공유센터 프레임워크)

  • Ko, Yu-Mi;Choi, Jae-Won;Kim, Beom-Soo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.391-400
    • /
    • 2012
  • This study focused on the role of the center for private information, which can manage and share the personal data from data breach incidents. Especially, this study addresses on the importance of establishing information management systems for preventing secondary misappropriation of breached personal data and private information. The database of breached personal data can be used for reducing privacy worries of potential victims of secondary misuse of personal data. Individuals who use the same IDs and passwords on multiple websites may find this service more effective and necessary. The effectiveness of this breached data center on reducing secondary privacy infringement may differ depending on the extend of data being shared and the conditions of data submission. When businesses experienced data breach and submission of data to this center is required by the law, the accuracy and effectiveness of this service can be enhanced. In addition, centralized database with high quality data set can increase matching for private information and control the secondary misappropriation of personal data or private information better.

The effects of PM driving direction and alert sound type on risk perception and awareness of PM driver of pedestrians (개인형 이동장치(PM)의 주행 방향과 경고방식의 차이가 보행자의 위험 지각과 주행자에 대한 인식에 미치는 영향)

  • Jung, Yoon-Hyun;Lee, Soo-Ji;Kang, Hyunmin
    • Journal of Digital Convergence
    • /
    • v.19 no.7
    • /
    • pp.217-226
    • /
    • 2021
  • The use of personal mobility(PM) is increasing because of preading shared mobility, but, it causes risk of accidents and fear to pedestrians because of lack of sound. The purpose of this study is to find out the effects of the alert sound in PM and driving direction on risk perception of pedestrians, awareness on PM driver, and allowance for driving on each road. The 8 videos were produced from a pedestrian perspective, depending on the alert sound type(silent, vess, bell, voice) and direction of driving(front, back). After watching each video, participants completed surveys. There was a non-effect on the driving direction. Regardless of the alert sound type, all of the sounds reduced the risk perception. Also, the awareness of PM drivers and allowance for driving on each road were positive. This study found that PM needed an alert sound for pedestrian safety. We expect the results of the study to help improve awareness of PM and make policies and regulations.

HFN-Based Right Management for IoT Health Data Sharing (IoT 헬스 데이터 공유를 위한 HFN 기반 권한 관리)

  • Kim, Mi-sun;Park, Yongsuk;Seo, Jae-Hyun
    • Smart Media Journal
    • /
    • v.10 no.1
    • /
    • pp.88-98
    • /
    • 2021
  • As blockchain technology has emerged as a security issue for IoT, technology which integrates block chain into IoT is being studied. In this paper is a research concerning token-based IoT service access control technology for data sharing, which propose a possessor focused data sharing technic by using the permissioned blockchain. To share IoT health data, a Hyperledger Fabric Network consisting of three organizations was designed to provide a way to share data by applying different access control policies centered on device owners for different services. In the proposed system, the device owner issues access control tokens with different security levels applied to the participants in the organization, and the token issue information is shared through the distributed ledger of the HFN. In IoT, it is possible to lightweight the access control processing of IoT devices by granting tokens to service requesters who request access to data. Furthmore, by sharing token issuance information among network participants using HFN, the integrity of the token is guaranteed and all network participants can trust the token. The device owners can trust that their data is being used within their authorized rights, and control the collection and use of data.

A Study on the Sharing and Utilizing the Domestic Aviation Safety Information Based on FAA Case (FAA 사례 기반 국내 항공안전정보 공유·활용 방안 연구)

  • Park, Yu-rim;Kim, Jun-hwan;Choi, Hyun-seon;Chung, Min-joo
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.2
    • /
    • pp.54-62
    • /
    • 2022
  • ICAO has recommended data-based aviation safety management and decision-making systems through Annex 19(Safety Management) and Doc 9859(Safety Management Manual), stressing that safety can be greatly improved by sharing aviation safety information throughout the industry. Accordingly, advanced aviation countries have built infrastructure to collect and analyze various aviation safety data in an integrated manner, and also tried to spread identified major safety issues across the industry. On the other hand, in Korea, each stakeholder collects, manages and analyzes safety data individually, so there is a limit to use them in integrative manner. In addition, the scope of using and sharing aviation safety information such as analysis result is also focused on safety management at the national government level, which is insufficient to be shared throughout the industry. Accordingly, the purpose of this study is to present a plan to share and utilize the domestic aviation safety information. To do this, we compare the current situation between FAA and domestic industry and suggest the improvement plans.

Use of the 20th Presidential Election Issues on YouTube: A Case Study of 'Daejang-dong Development Project' (유튜브 이용자의 제20대 대통령선거 이슈 이용: '대장동 개발 사업' 사례를 중심으로)

  • Kim, Chunsik;Hong, Juhyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.4
    • /
    • pp.435-444
    • /
    • 2022
  • There are three focuses in the paper. Firstly, the study identified what channels were most viewed by YouTube users to watch the 'Daejang-dong scandal,' which was the most powerful agenda to influence the candidate preference among voters during the 20th presidential election. Secondly, the study analyzed whether the political tone of the first videos was in line with that of the subsequent videos. Finally, we compared the sentiment of comments on the first and subsequent videos. The results showed that TBS 'News Factory' and 'TV Chosun News' represented liberal and conservative factions, respectively. Secondly, the political tone of channels that were viewed subsequently was neutral, but the conservative channel users left more negative comments and that was significant statistically. In addition, about 80% of the conservative and liberal channel users shared the same political tendency with the channel they watched first, and more than 90% of the comments left at the subsequent videos in line with that of at the first news. Based on these results, the study concluded that the voters tended to seek political news that was similar with their political ideology, and it was considered a sort of echo chamber phenomenon on the YouTube. The study suggests that the performance of high-quality journalism by traditional news outlet might contribute to decrease the negative influence of political contents on YouTube users.

A Study on Cell-Broadcasting Based Security Authentication System and Business Models (셀 브로드캐스팅 보안 인증시스템 및 비즈니스 모델에 관한 연구)

  • Choi, Jeong-Moon;Lee, Jungwoo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.5
    • /
    • pp.325-333
    • /
    • 2021
  • With the rapidly changing era of the fourth industrial revolution, the utilization of IT technology is increasing. In addition, the demand for security authentication is increasing as shared services or IoT technologies are being developed as new business models. Security authentication is becoming increasingly important for all intelligent devices such as self-driving cars. However, most location-based security authentication technologies are being developed mainly with technologies that utilize server proximity or satellite location tracking, which limits the scope of their physical use. Location-based security authentication technology has recently been developed as a complementary replacement technology. In this study, we introduce location-based security authentication technology using cell broadcasting technology, which has a wider range of applications and is more convenient and business-friendly than existing location-based security authentication technologies. We also introduced application cases and business models related to this. In addition to the current status of technology development, we analyzed current changes in business models being employed. Based on our analysis results, this study draws the implication that technology diversification is necessary to improve the performance of innovative technologies. It is meaningful that it has found and studied advanced technologies other than existing location authentication methods and systems.