• Title/Summary/Keyword: Software-as-a-service

Search Result 1,344, Processing Time 0.029 seconds

A Study on the Influencing Factors of High Risk Drinking by Gender in Single Adult Households (성인 1인 가구의 성별에 따른 고위험 음주 영향요인에 관한 연구)

  • Lee, Jeong Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.321-331
    • /
    • 2021
  • This study sought to analyze factors influencing high-risk drinking in single-person households. For this, data from the 2018 community health survey were used. Subjects were 32,389 adults above the age of 19 in single-person households. For the data analysis, high-risk drinking groups were extracted according to the high-risk drinking rate index of the survey to arrive at influencing factors and differences in health-related and sociodemographic characteristics. The IBM SPSS 25.0 software was used for analysis and a complex sampling design was applied. The results showed that the high-risk drinking rate of Korea's single-person households was 15.0% (male: 25.8%, female: 5.8%) and age, education under high school level, service-industry employees, smokers, people with depression, high blood pressure, and irregular breakfast eaters appeared as common elements for both genders. Stress appeared to only affect males while being diabetic only affected females. High-risk drinking was higher for males in their 30~40s and women in their 20~30s. The younger generation showed the highest numbers in high-risk drinking and factors like stress or depression appeared to be influencing factors for high-risk drinking. Hence, mental health programs along with customized health policies through health forms and lifestyle changes will be required to lower the high-risk drinking rates of single-person households.

A Study on Operation Strategy by Multi-variate Regression of Deagu Arboretum Visitor's Satisfaction (대구수목원 이용객 만족모델을 통한 운영 방안 연구)

  • Kang, Kee-Rae
    • Journal of Korean Society of Forest Science
    • /
    • v.101 no.1
    • /
    • pp.36-45
    • /
    • 2012
  • Education on the environment and plants offered by arboretum for today's people not only contribute to foster a better natural environment in urban region but also provide visitors with decent refreshment environment and beyond. In the study, the author undertook the observation on usage behavior and satisfaction model of arboretum visitors expect and investigated the facilities and programs to be offered by arboretum in order to propose the opinion regarding the service. For observation size of variables in a multiple regression analysis of variables is influencing satisfaction rankings walks the line of flow, the educational effect on the environment, cleanliness of the facility, visits pay, natural beauty, diversity of trees, accessibility and friendliness of staff, expansion of facilities in the arboretum and appeared as a complement. In case of visitor attribute, the residents living near the facility showed the highest visit frequency of more than 5 times, especially as part of taking a walk. This proves that the visit to arboretum is considered as part of everyday life, and thus a new program and walk path as well as movement route are needed to be developed for the visitors. In the question relating to the facilities and operation programs in Daegu Arboretum, particularly the requests by visitors, they responded that the establishment of cultural event, beautiful natural scenery, refreshment and convenience facilities is the most critical issue. In addition, the management on withered trees and bare lands is an urgent issue as well. In this sense, the Operation and Management Strategies based upon the visitor behaviors and model of satisfaction are needed to deal with the adoption of diverse events and festivals joined by local residents, ombudsman program, environmental program development for students and teachers within the region, negligent bare lands and withered tree replacement, and cafeteria facility improvement and supplement as well as the bench marking of other facilities than arboretums located in other regions. These items are thought to be sufficiently dealt with by Daegu Arboretum having no more external resources. It is recognized that the visitor satisfaction begins from a minor thing, and a small difference determines a great satisfaction, and thus the software approach rather than hardware one is in need.

Real-time CRM Strategy of Big Data and Smart Offering System: KB Kookmin Card Case (KB국민카드의 빅데이터를 활용한 실시간 CRM 전략: 스마트 오퍼링 시스템)

  • Choi, Jaewon;Sohn, Bongjin;Lim, Hyuna
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.1-23
    • /
    • 2019
  • Big data refers to data that is difficult to store, manage, and analyze by existing software. As the lifestyle changes of consumers increase the size and types of needs that consumers desire, they are investing a lot of time and money to understand the needs of consumers. Companies in various industries utilize Big Data to improve their products and services to meet their needs, analyze unstructured data, and respond to real-time responses to products and services. The financial industry operates a decision support system that uses financial data to develop financial products and manage customer risks. The use of big data by financial institutions can effectively create added value of the value chain, and it is possible to develop a more advanced customer relationship management strategy. Financial institutions can utilize the purchase data and unstructured data generated by the credit card, and it becomes possible to confirm and satisfy the customer's desire. CRM has a granular process that can be measured in real time as it grows with information knowledge systems. With the development of information service and CRM, the platform has change and it has become possible to meet consumer needs in various environments. Recently, as the needs of consumers have diversified, more companies are providing systematic marketing services using data mining and advanced CRM (Customer Relationship Management) techniques. KB Kookmin Card, which started as a credit card business in 1980, introduced early stabilization of processes and computer systems, and actively participated in introducing new technologies and systems. In 2011, the bank and credit card companies separated, leading the 'Hye-dam Card' and 'One Card' markets, which were deviated from the existing concept. In 2017, the total use of domestic credit cards and check cards grew by 5.6% year-on-year to 886 trillion won. In 2018, we received a long-term rating of AA + as a result of our credit card evaluation. We confirmed that our credit rating was at the top of the list through effective marketing strategies and services. At present, Kookmin Card emphasizes strategies to meet the individual needs of customers and to maximize the lifetime value of consumers by utilizing payment data of customers. KB Kookmin Card combines internal and external big data and conducts marketing in real time or builds a system for monitoring. KB Kookmin Card has built a marketing system that detects realtime behavior using big data such as visiting the homepage and purchasing history by using the customer card information. It is designed to enable customers to capture action events in real time and execute marketing by utilizing the stores, locations, amounts, usage pattern, etc. of the card transactions. We have created more than 280 different scenarios based on the customer's life cycle and are conducting marketing plans to accommodate various customer groups in real time. We operate a smart offering system, which is a highly efficient marketing management system that detects customers' card usage, customer behavior, and location information in real time, and provides further refinement services by combining with various apps. This study aims to identify the traditional CRM to the current CRM strategy through the process of changing the CRM strategy. Finally, I will confirm the current CRM strategy through KB Kookmin card's big data utilization strategy and marketing activities and propose a marketing plan for KB Kookmin card's future CRM strategy. KB Kookmin Card should invest in securing ICT technology and human resources, which are becoming more sophisticated for the success and continuous growth of smart offering system. It is necessary to establish a strategy for securing profit from a long-term perspective and systematically proceed. Especially, in the current situation where privacy violation and personal information leakage issues are being addressed, efforts should be made to induce customers' recognition of marketing using customer information and to form corporate image emphasizing security.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

Study of Web Services Interoperabiliy for Multiple Applications (다중 Application을 위한 Web Services 상호 운용성에 관한 연구)

  • 유윤식;송종철;최일선;임산송;정회경
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.217-220
    • /
    • 2004
  • According as utilization for web increases rapidly, it is demanded that model about support interaction between web-based applications systematically and solutions can integrate new distributed platforms and existing environment effectively, accordingly, Web Services appeared by solution in reply. These days, a lot of software and hardware companies try to adoption of Web Services to their market, attenpt to construct their applications associationing components from various Web Services providers. However, to execute Web Services completely. it must have interoperability and need the standardization work that avoid thing which is subject to platform, application as well as service and programming language from other companies. WS-I (Web Services Interoperability organization) have established Basic Profile 1.0 based on XML, UDDI, WSDL and SOAP for web services interoperability and developed usage scenario Profile to apply Web Services in practice. In this paper, to verify suitability Web Services interoperability between heterogeneous two applications, have design and implements the Book Information Web Services that based on the Web Services Client of J2SE platform and the Web Services Server of .NET platform, so that analysis and verify the service by adaptation of WS-I Basic Profile.

  • PDF

Design and Implementation of IoT Chatting Service Based on Indoor Location (실내 위치기반 사물인터넷 채팅 서비스 설계 및 구현)

  • Lee, Sunghee;Jeong, Seol Young;Kang, Soon Ju;Lee, Woo Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.10
    • /
    • pp.920-929
    • /
    • 2014
  • Recently, embedded system which demand is explosively increasing in the fields of communication, traffic, medical and industry facilities, expands to cyber physical system (CPS) which monitors and controls the networked embedded systems. In addition, internet of things(IoT) technology using wearable devices such as Google Glass, Samsung Galaxy Gear and Sony Smart Watch are gaining attention. In this situation, Samsung Smart Home and LG Home Chat are released one after another. However, since these services can be available only between smart phones and home appliances, there is a disadvantage that information cannot be passed to other terminals without commercial global messaging server. In this paper, to solve above issues, we propose the structure of an indoor location network based on unit space, which prevents the information of the devices or each individual person from leaking to outside and can selectively communicate to all existent terminals in the network using IoT chatting. Also, it is possible to control general devices and prevent external leakage of private information.

Personal Health Record System for Efficient Monitoring of Cancer Therapy (효과적인 암환자 관리를 위한 개인건강기록 관리 시스템)

  • Song, Je-Min;Seo, Sung-Bo;Shin, Moon-Sun;Han, Hye-Sook;Park, Jeong-Seok;Ryu, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.12
    • /
    • pp.65-72
    • /
    • 2016
  • Personal Health Record(PHR) service can be helpful to patients with diseases requiring strict everyday care and medical treatment, such as diabetes or cancer. In this paper, we propose a PHR system specialized in collecting and analyzing health record data of cancer patients, and present the process of how the system can improve the efficiency of cancer treatment process. Through the smart device application, cancer PHR system obtains daily PHR data which is highly related and critical to cancer therapy. The analysis report is provided to the medical staff with an available format suited for Electronic Medical Record used at medical institution. With the final result of PHR analysis which is easily merged with medical chart, most efficient Chemotherapy treatment can be provided for the patients. Also it is possible for the patients to give the information of side-effect and other pain experience during therapy to their doctors without loss of information. The proposed PHR system has the effect of improving the quality of patient care by allowing the medical staff to acquire the main objective data necessary for drug prescription and medical care benefits.

Comparison of Effectiveness about Image Quality and Scan Time According to Reconstruction Method in Bone SPECT (영상 재구성 방법에 따른 Bone SPECT 영상의 질과 검사시간에 대한 실효성 비교)

  • Kim, Woo-Hyun;Jung, Woo-Young;Lee, Ju-Young;Ryu, Jae-Kwang
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.13 no.1
    • /
    • pp.9-14
    • /
    • 2009
  • Purpose: Nowadays in the nuclear medicine, many studies and efforts are being made to reduce the scan time, as well as the waiting time to be needed to execute exams after injection of radionuclide medicines. Several methods are being used in clinic, such as developing new radionuclide compounds that enable to be absorbed into target organs more quickly and reducing acquisition scan time by increase the number of Gamma Camera detectors to examine. Each medical equipment manufacturer has improved the imaging process techniques to reduce scan time. In this paper, we tried to analyze the difference of image quality between FBP, 3D OSEM reconstruction methods that commercialized and being clinically applied, and Astonish reconstruction method (A kind of Iterative fast reconstruction method of Philips), also difference of image quality on scan time. Material and Methods: We investigated in 32 patients that examined the Bone SPECT from June to July 2008 at department of nuclear medicine, ASAN Medical Center in Seoul. 40sec/frame and 20sec/frame images were acquired that using Philips‘ PRECEDENCE 16 Gamma Camera and then reconstructed those images by using the Astonish (Philips’ Reconstruction Method), 3D OSEM and FBP methods. The blinded test was performed to the clinical interpreting physicians with all images analyzed by each reconstruction method for qualitative analysis. And we analyzed target to non target ratio by draws lesions as the center of disease for quantitative analysis. At this time, each image was analyzed with same location and size of ROI. Results: In a qualitative analysis, there was no significant difference by acquisition time changes in image quality. In a quantitative analysis, the images reconstructed Astonish method showed good quality due to better sharpness and distinguish sharply between lesions and peripheral lesions. After measuring each mean value and standard deviation value of target to non target ratio with 40 sec/frame and 20sec/frame images, those values are Astonish (40 sec-$13.91{\pm}5.62$ : 20 sec-$13.88{\pm}5.92$), 3D OSEM (40 sec-$10.60{\pm}3.55$ : 20 sec-$10.55{\pm}3.64$), FBP (40 sec-$8.30{\pm}4.44$ : 20 sec-$8.19{\pm}4.20$). We analyzed target to non target ratio from 20 sec and 40 sec images. And we analyzed the result, In Astonish (t=0.16, p=0.872), 3D OSEM (t=0.51, p=0.610), FBP (t=0.73, p=0.469) methods, there was no significant difference statistically by acquisition time change in image quality. But FBP indicates no statistical differences while some images indicate difference between 40 sec/frame and 20 sec/frame images by various factors. Conclusions: In the circumstance, try to find a solution to reduce nuclear medicine scan time, the development of nuclear medicine equipment hardware has decreased while software has marched forward at a relentless. Due to development of computer hardware, the image reconstruction time was reduced and the expanded capacity to restore enables iterative methods that couldn't be performed before due to technical limits. As imaging process technique developed, it reduced scan time and we could observe that image quality keep similar level. While keeping exam quality and reducing scan time can induce the reduction of patient's pain and sensory waiting time, also accessibility of nuclear medicine exam will be improved and it provide better service to patients and clinical physician who order exams. Consequently, those things make the image of department of nuclear medicine be improved. Concurrent Imaging - A new function that setting up each image acquisition parameter and enables to acquire images simultaneously with various parameters to once examine.

  • PDF

Participant Characteristic and Educational Effects for Cyber Agricultural Technology Training Courses (사이버농업기술교육 참가자의 특성과 교육효과)

  • Kang, Dae-Koo
    • Journal of Agricultural Extension & Community Development
    • /
    • v.21 no.1
    • /
    • pp.35-82
    • /
    • 2014
  • It was main objectives to find the learners characteristics and educational effects of cyber agricultural technology courses in RDA. For the research, it was followed by literature reviews and internet based survey methods. In internet based survey, two staged stratified sampling method was adopted from cyber training members database in RDA along with some key word as open course or certificate course, and enrollment years. Instrument was composed through literature reviews about cyber education effects and educational effect factors. And learner characteristics items were added in survey documents. It was sent to sampled persons by e-mail and 316 data was returned via google survey systems. Through the data cleaning, 303 data were analysed by chi-square, t-test and F-test. It's significance level was .05. The results of the research were as followed; First, the respondent was composed of mainly man(77.9%), and monthly income group was mainly 2,000,000 or 3,000,000 won(24%), bachelor degree(48%), fifty or forty age group was shared to 75%, and their job was changed after learning(12.2%). So major respondents' job was not changed. Their major was not mainly agriculture. Learners' learning style were composed of two or more types as concrete-sequential, mixing, abstract-random, so e-learning course should be developed for the students' type. Second, it was attended at 3.2 days a week, 53.53 minutes a class, totally 172.63 minutes a week. They were very eager or generally eager to study, and attended two or more subjects. The cyber education motives was for farming knowledge, personal competency development, job performance enlarging. They selected subjects along with their interest. A subject person couldn't choose more subjects for little time, others, non interesting subject, but more subject persons were for job performance benefits and previous subjects effectiveness. Most learner was finished their subject, but a fourth was not finished for busy (26.7%). And their entrying behavior was not enough to learn e-course and computer or internet using ability was middle level as software using. And they thought RDA cyber course was comfort in non time or space limit, knowledge acquisition, and personal competency development. Cyber learning group was composed of open course only (12.5%), certificate only(25.7%), both(36.3%). Third, satisfaction and academic achievement of e-learning learners were good, and educational service offering for doing job in learning application category was good, but effect of cyber education was not good, especially, agricultural income increasing was not good because major learner group was not farmer, so they couldn't apply their knowledge to farming. And content structure and design, content comprehension, content amount were good. The more learning subject group responded to good in effects, and both open course and certificate course group satisfied more than open course only group. Based on the results, recommendation was offered as cyber course specialization before main course in RDA training system, support staff and faculty enlargement, building blended learning system with local RDA office, introducing cyber tutor system.

A Research on Effect of Corporate's Competitive Advantage to the R&D Investment in Small and Medium Enterprise (중소기업 유형별 연구개발투자의 영향요인에 관한 실증연구)

  • Choi, Su-Heyong;Choi, Chul-An
    • Management & Information Systems Review
    • /
    • v.33 no.1
    • /
    • pp.191-217
    • /
    • 2014
  • The Purpose of this study is to find the effect factors of R&D investment in SMEs which plays an important role in the national economy, and the differences of the effect factors by the type of SMEs. The subject of this study is about 3,400 SMEs mentioned in "The survey of technical statistics on SMEs in 2007" by Korea Federation of Small and Medium Business. The effect factors are related with the size of business, the infrastructure of R&D and the activities of R&D which have been studied by many researchers. The methods of analysis are regression analysis, moderating effect analysis and the software package used is SPSS 12.0. The results of the study are as fallow. First, it was found that unlike in previous studies which show the effect of the elements of business's size, research infrastructure, research activities on R&D investment, one element alone can't be considered for meaningful result but the various elements have effect on R&D investment at the same time. In other words, the number of employees and the sales as the elements of business's size, the ratio of researchers, the technical ability, the ratio of equipment possession and the intellectual properties as the elements of R&D infrastructure, the activity of ideas and joint research as the elements of R&D activities have positive(+) effect, whereas the participation of CEO in the activity of R&D as the elements of R&D activities activity has negative(-) one. The number of employees, the ratio of researchers, and the sales had relatively high influence whereas equipment possession, technical ability, intellectual properties, the participation of CEO in the research, the activity of idea, joint research had relatively low influence. Next, it was also found that there are differences of the effect factors over the types of SMEs. SMEs were classified into 19 types by eight criteria such as start-ups and existing business by business age; small business and medium business by size; manufacturing business and service business by product type;independent business and subcontractor business by dealing type; businesses in the entering, growing, maturing and restructuring stage by growth stage; businesses with low, medium and high technology by technological level; pioneering business and non-pioneering business by industrial type; and businesses with state-of-the-art technology and non-advanced business by the level of business activities. The meaning of this study lies in the fact that it found the various effect factors should be considered at the same time when conducting study on SMEs' R&D investment, and the differences by the type should be acknowledged. This study surpassed the limitations of the previous studies which focused on a couple of factors and types. This study result can also be considered for other studies on achievement, organization, marketing and others. Moreover, it shows that a differential policy by business type is needed when formulating SME policy.

  • PDF