• Title/Summary/Keyword: Social media security

Search Result 176, Processing Time 0.023 seconds

Beauty in White Make-up Powder (白粉) Advertisements in the 1920s and 1930s -Aesthetic Expression in the Era of Modern Cosmetics Advertisement- (1920~1930년대의 백분(白粉)광고에 나타난 미(美) -근대 화장광고시대의 미적 표현-)

  • Baek, Ju Hyun;Chae, Keum Seok
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.43 no.2
    • /
    • pp.255-273
    • /
    • 2019
  • Perceptions of beauty change and are shared with others in the media of emotional words. In the modern age, a mix of traditional and modern make-up cultures has changed the standards of beauty. Therefore, an analysis using emotional words (an image that consumers have for certain subjects) and an image scale that intuitively shows them can be an important means for understanding changes in the "beauty of the time". This paper considered changes in typical aesthetic characteristics that women pursued through make-up by analyzing emotional words in white make-up powder advertisement texts from the 1920s through the 1930s. Imported modern technologies changed cosmetic manufacturing techniques and advertising methods to create a momentum that changed women's make-up culture from light to heavy make-up or from white to color make-up. Such changes have led to changes in the perception of beauty and were expressed through sensitive vocabularies such as pure, new, fresh, lofty, lively, healthy, and cheery. Such changes reflect social aspects such as women's aspirations for high status, pursuit of security, or women's roles under the wartime regime to show a change from beauty with an attribute of [+cool] to that of [+soft].

Safe clinical photography: best practice guidelines for risk management and mitigation

  • Chandawarkar, Rajiv;Nadkarni, Prakash
    • Archives of Plastic Surgery
    • /
    • v.48 no.3
    • /
    • pp.295-304
    • /
    • 2021
  • Clinical photography is an essential component of patient care in plastic surgery. The use of unsecured smartphone cameras, digital cameras, social media, instant messaging, and commercially available cloud-based storage devices threatens patients' data safety. This paper Identifies potential risks of clinical photography and heightens awareness of safe clinical photography. Specifically, we evaluated existing risk-mitigation strategies globally, comparing them to industry standards in similar settings, and formulated a framework for developing a risk-mitigation plan for avoiding data breaches by identifying the safest methods of picture taking, transfer to storage, retrieval, and use, both within and outside the organization. Since threats evolve constantly, the framework must evolve too. Based on a literature search of both PubMed and the web (via Google) with key phrases and child terms (for PubMed), the risks and consequences of data breaches in individual processes in clinical photography are identified. Current clinical-photography practices are described. Lastly, we evaluate current risk mitigation strategies for clinical photography by examining guidelines from professional organizations, governmental agencies, and non-healthcare industries. Combining lessons learned from the steps above into a comprehensive framework that could contribute to national/international guidelines on safe clinical photography, we provide recommendations for best practice guidelines. It is imperative that best practice guidelines for the simple, safe, and secure capture, transfer, storage, and retrieval of clinical photographs be co-developed through cooperative efforts between providers, hospital administrators, clinical informaticians, IT governance structures, and national professional organizations. This would significantly safeguard patient data security and provide the privacy that patients deserve and expect.

Welfare Policy Visualization Analysis using Big Data -Chungcheong- (빅데이터를 활용한 복지정책 시각화분석 -충청도 중심으로-)

  • Dae-Yu Kim;Won-Shik Na
    • Advanced Industrial SCIence
    • /
    • v.2 no.1
    • /
    • pp.15-20
    • /
    • 2023
  • The purpose of this study is to analyze the changes and importance of welfare policies in Chungcheong Province using big data analysis technology in the era of the Fourth Industrial Revolution, and to propose stable welfare policies for all generations, including the socially underprivileged. Chungcheong-do policy-related big data is coded in Python, and stable government policies are proposed based on the results of visualization analysis. As a result of the study, the keywords of Chungcheong-do government policy were confirmed in the order of region, society, government and support, education, and women, and welfare policy should be strengthened with a focus on improving local health policy and social welfare. For future research direction, it will be necessary to compare overseas cases and make policy proposals on the stable impact of national welfare policies.

Construction of a Digitally Represented Person by Personal Data: A Multidimensional Framework from an Inforg Perspective

  • Jinyoung Min;HanByeol Stella Choi;Chanhee Kwak;Junyeong Lee
    • Asia pacific journal of information systems
    • /
    • v.34 no.1
    • /
    • pp.292-320
    • /
    • 2024
  • The amount of data a related to a person is so substantial that it appears that a digital version of them can be built thereon. They are usually handled as personal information, and the attempts made to understand personal information have led to bundling and unbundling of various data, yielding numerous fragmented categories of personal information. Therefore, we attempt to construct a generalizable lens for a deeper understanding of person-related data. We develop a theoretical framework that provides a fundamental method to understand these data as an entity of a digitally represented person based on literature review as well as the concepts of inforg and infosphere. The proposed framework suggests person-related data consist of three informational inforg dimensions that can preserve the archetype of a person, form, content, and interaction. Subsequently, the framework is examined and tested through several analyses in two different contexts: social media and online shopping mall. This framework demonstrates the suggested dimensions are interrelated with certain patterns, the prominent dimension can determine the data characteristics, and the dimensional composition of data types can imply the characteristics of the digitally represented person in certain contexts.

The Study on Implementation of Crime Terms Classification System for Crime Issues Response

  • Jeong, Inkyu;Yoon, Cheolhee;Kang, Jang Mook
    • International Journal of Advanced Culture Technology
    • /
    • v.8 no.3
    • /
    • pp.61-72
    • /
    • 2020
  • The fear of crime, discussed in the early 1960s in the United States, is a psychological response, such as anxiety or concern about crime, the potential victim of a crime. These anxiety factors lead to the burden of the individual in securing the psychological stability and indirect costs of the crime against the society. Fear of crime is not a good thing, and it is a part that needs to be adjusted so that it cannot be exaggerated and distorted by the policy together with the crime coping and resolution. This is because fear of crime has as much harm as damage caused by criminal act. Eric Pawson has argued that the popular impression of violent crime is not formed because of media reports, but by official statistics. Therefore, the police should watch and analyze news related to fear of crime to reduce the social cost of fear of crime and prepare a preemptive response policy before the people have 'fear of crime'. In this paper, we propose a deep - based news classification system that helps police cope with crimes related to crimes reported in the media efficiently and quickly and precisely. The goal is to establish a system that can quickly identify changes in security issues that are rapidly increasing by categorizing news related to crime among news articles. To construct the system, crime data was learned so that news could be classified according to the type of crime. Deep learning was applied by using Google tensor flow. In the future, it is necessary to continue research on the importance of keyword according to early detection of issues that are rapidly increasing by crime type and the power of the press, and it is also necessary to constantly supplement crime related corpus.

MapReduce-Based Partitioner Big Data Analysis Scheme for Processing Rate of Log Analysis (로그 분석 처리율 향상을 위한 맵리듀스 기반 분할 빅데이터 분석 기법)

  • Lee, Hyeopgeon;Kim, Young-Woon;Park, Jiyong;Lee, Jin-Woo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.593-600
    • /
    • 2018
  • Owing to the advancement of Internet and smart devices, access to various media such as social media became easy; thus, a large amount of big data is being produced. Particularly, the companies that provide various Internet services are analyzing the big data by using the MapReduce-based big data analysis techniques to investigate the customer preferences and patterns and strengthen the security. However, with MapReduce, when the big data is analyzed by defining the number of reducer objects generated in the reduce stage as one, the processing rate of big data analysis decreases. Therefore, in this paper, a MapReduce-based split big data analysis method is proposed to improve the log analysis processing rate. The proposed method separates the reducer partitioning stage and the analysis result combining stage and improves the big data processing rate by decreasing the bottleneck phenomenon by generating the number of reducer objects dynamically.

Information Needs and Behavior of North Korean Refugees (북한이탈주민의 정보요구와 정보행태에 관한 연구 - 부산지역 거주자를 중심으로 -)

  • Cho Yong-Wan
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.40 no.3
    • /
    • pp.121-149
    • /
    • 2006
  • In recent days North Korean refugees. who hope to move into and settle in South Korea, have been rapidly increasing. However their adaptation to South Korea is reported to have not been so much successful as they expected. Considering such situations, this study attempts to investigate their information needs and behavior. North Korean refugees have various and strong information needs for settlement and daily life. The strongest were information needs related to economic Problem, specifically job and business related information needs. It was followed by information needs related to social welfare, health and security child care and education, and North Korean situation In order to meet their information needs. North Korean refugees were heavily dependent on informal interpersonal information sources such as their family members. friends. and their own neighborhoods. as compared to such formal interpersonal information sources as Public officers. social welfare agents, and NGOs members. Meanwhile. their usage of mass media such as TV. newspapers, and internet as information sources was also heavy However the overall information environment surrounding them appeared to be relatively inferior to that of average South Koreans.

Topic and Survey Methodological Trends in 'The Journal of Information Systems' ('정보시스템연구'의 연구주제와 서베이 방법론 동향분석)

  • Ryoo, Sung-Yul;Park, Sang-Cheol
    • The Journal of Information Systems
    • /
    • v.27 no.4
    • /
    • pp.1-33
    • /
    • 2018
  • Purpose The purpose of this study is to review topic and survey methodological trends in 'The Journal of Information Systems' in order to present the practical guidelines for the future IS research. By attempting to conduct a meta-analysis on both topic and survey methodological trends, this study could provide researchers wishing to pursue this line of work further with what can be done to improve IS disciplines. Design/methodology/approach In this study, we have reviewed 185 papers that were published in 'The Journal of Information Systems' from 2010 to 2018 and classified them based on topics studied and survey methodologies used. The classification guidelines, which was developed by Palvia et al.(2015), has been used to capture the topic trends. We have also employed Struab et al.(2004)s' guidelines for securing rigor of validation issues. By using two guidelines, this study could also present topic and rigor trends in 'The Journal of Information Systems' and compare them to those trends in International Journals. Findings Our findings have identified dominant research topics in 'The Journal of Information Systems'; 1) social media and social computing, 2) IS usage and adoption, 3) mobile computing, 4) electronic commerce/business, 5) security and privacy, 6) supply chain management, 7) innovation, 8) knowledge management, and 9) IS management and planning. This study also could offer researchers who pursue this line of work further practical guidelines on mandatory (convergent and discriminant validity, reliability, and statistical conclusion validity), highly recommended (common method bias testing), and optional validations (measurement invariance testing for subgroup analysis, bootstrapping methods for testing mediating effects).

Exploratory Analysis of Consumer Responses to Korea-China Mobile Payment Service using Keyword Analysis -Focus on Kakao Pay and Alipay- (키워드 분석을 활용한 한·중 모바일 결제 서비스에 대한 소비자 반응 탐색적 분석 -카카오페이와 알리페이를 중심으로-)

  • Ke, Jung;Yoon, Donghwa;Ahn, Jinhyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.514-523
    • /
    • 2021
  • Recently, the proliferation of mobile simple payment services has been increasingly affecting people's lives. In addition, the increase in research from both China and Korea shows that the continuous development of simple mobile payment services will be very important in the future. The blog posts mentioning Kakao Pay and Alipay were collected, and keyword analysis was performed to investigate differences in consumers' responses to Kakao Pay and Alipay on social media. The frequency of keywords for each part of speech and the frequency of co-occurred words mentioned in one sentence were analyzed. Specifically, common words that appear in both Kakao Pay and Alipay blogs were extracted. The cooccurred words were analyzed to examine how different reactions were made on the same subject. As a result of the analysis, there were concerns among consumers about the trust of Kakao Pay and Alipay's benefits. For a mobile payment service to become competitive, it is necessary to add various additional services or solve security problems.

Study on the Aging Transformation Scheme of Baima Tibetan Community Environment Based on ERG theory (ERG 이론을 바탕으로 한 바이마장족(白馬藏族)지역사회 환경의 고령친화적 개선 방안 연구)

  • Liu Jing Yun;Wang Lu Ming
    • Smart Media Journal
    • /
    • v.12 no.11
    • /
    • pp.175-184
    • /
    • 2023
  • The elderly in rural areas are faced with the dilemma of poor community environment, weak social communication ability and insufficient pension knowledge reserve. In addition, due to the serious shortage of social security facilities in rural areas and medical resources, the elderly are struggling, and the suicide rate is far higher than that in urban areas. In order to make the elderly have a comfortable pension environment and face the increasingly serious aging problem with a positive attitude, this paper takes the community environment of the Baima Tibetan elderly in Tielou Township, Gansu Province as the research object of aging transformation. First of all, literature data were used to carry out research on the aging transformation in rural areas. On the basis of sorting out previous research topics, ERG theory was determined as the guide. Secondly, the research methods of on-site investigation, interview and other research methods are adopted to investigate the number of left-behind elderly people in this area, and classify them according to the national standards. At the same time, the image of the current situation of the community environment of the elderly. Finally, combined with the ERG theory, the transformation design of the elderly living environment is implemented, mainly from the three aspects of survival, mutual relationship and growth.