• Title/Summary/Keyword: Users' behaviors

Search Result 666, Processing Time 0.045 seconds

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.

COMPUTER GAME PLAYING PATTERNS, PARENTAL REARING PATTERNS AND INDIVIDUAL PSYCHOPATHOLOGY IN ADOLESCENTS (청소년의 컴퓨터게임 이용실태, 부모양육방식, 개인의 정신병리)

  • Ryu, Jeoung-Whan;Kim, Young-Mi;Jeong, Hong-Kyung;Jo, A-Ra;Lee, Jung-Ho;Choi, Young-Min;Lee, Gi-Chul;Jeon, Seong-Ill
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.11 no.1
    • /
    • pp.27-41
    • /
    • 2000
  • Objects:This study was designed for studying of current Korean adolescents computer game playing habits and exploring associations with parental rearing patterns and individual psychopathology. Methods:One hundred twenty four adolescents(age 13-15) who reside in urban area completed self-report questionnaires containing Questionnaires designed by authors, Symptom Checklist-90-Revision of Korean Version(SCL-90-R) and Parental Bonding Instrument(PBI). Results:1) Computer game playing appears to be one of the social and leisure phenomena in these days. Although Adolescents spend a lot of times on computer game, Many of them perceive not problematic. 2) Compared with females, Male play computer games more regularly, more longer, spent more times in gamebang. 3) There was positive relationship between anxiety subscale in SCL-90-R and detrimental effects of computer game. 4) There was positive relationship between game frequency and maternal overprotection. 5) The main reasons for playing are 'for an avoidance of stressful life events', academic burden was the most troublesome issues in korean adolescents. 6) Many adolescents use gamebang as a social place, but they thought that gamebang is not good places to have a good time. Conclusion:This papers shows that computer game playing is a popular social leisure activity in Korean adolescents. And, Most of korean adolescents reported that they are suffered from pressure of academic achievements. They use computer game mainly by means of relieving academic pressures. In a heavy game users who have many conflicts with parents, teacher and who has frequent truancy and social withdrawal show significant anxiety. Maternal overprotection was observed in heavy game users. Authors recommended that clinicians should be careful in examining heavy computer game behaviors. Both underlying affective states and environmental influences, including family situations should be vicariously examined.

  • PDF

Dietary Behavioral Correlates of Nutrition Label Use in Korean Women (한국 성인 여성에서 영양표시 사용과 식행동 요인과의 관계)

  • Lee, Hye-Young;Kim, Mi-Kyung
    • Journal of Nutrition and Health
    • /
    • v.41 no.8
    • /
    • pp.839-850
    • /
    • 2008
  • This study describes the demographic and diet-related psychosocial correlates of nutrition label use, and examines the relationship between label use and diet. Self-reported dada from a population-based cross-sectional survey of 2073 Korean women aged 20 to 60 years were collected to identify demographic and health-related characteristics, belief on diet-disease relationship, awareness on importance of healthy eating practice and diet quality associated with label use. Label users, who are in the stage of action and maintenance (31.6%), were more likely to have belief on nutrient-disease relationship (in sodium, cholesterol, sugar and trans fat) and were more likely to have higher awareness of the importance of healthy eating practice compared with label nonusers, who are in the stage of precontemplation, contemplation and preparation. Label users were more likely to have higher dietary quality compared with label nonusers [odds ratio (OR) = 2.01; 95% confidence interval (CI): 1.66, 2.44](P < 0.001). Also, label use appeared to be associated with the consumption of diets that were higher vegetables and fruits, and lower in cholesterol. The findings of this study suggests that reading nutrition labels on food packages may improve food choices and enable healthful dietary practices.

Study on Personal Information Protection Behavior in Social Network Service Using Health Belief Model (건강신념모델을 이용한 소셜네트워크서비스에서의 개인정보보호행위에 관한 연구)

  • Shin, Se-mi;Kim, Seong-jun;Kwon, Do-soon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1619-1637
    • /
    • 2016
  • With wide distribution of smart phones and development of mobile network, social network service (SNS) is displaying remarkable growth rates. Users build new social relations by sharing their interests, which brings surging growth to the SNS based on the combination between the strength of expanding the place for communication and distribution of smart phones featured with easy portability. This study is designed to understand impact factors of SNS on users in Korea and to conduct empirical research on casual relationship between the factors above and the factors affecting personal information behavior through the privacy protection and self-efficacy. In order to accomplish the objective above, the study presented a research model applied with key variables of the Health Belief Model (HBM) predicting behaviors capable of recognizing and preventing individual diseases in the field of health communication. To perform empirical verification on the research model of this study, a survey was conducted upon college students at N university located in Chungcheongnam-do and K university in rural area, who have experiences using the SNS. Through this survey, a total of 186 samples were collected, and path analysis was performed in order to analyze the relationship between the factors. Based on the findings from the survey, first, variables Perceived probability, Perceived severity, Perceived impairment of the HBM, key factors of personal information protection behavior on the SNS, were found to exhibit negative relationship with self-efficacy, and Perceived probability, Perceived benefit, Perceived impairment were found to exhibit negative relationship with privacy protection. But the above, Perceived severity showed positive relationship with privacy protection, and Perceived benefit and self-efficacy also displayed positive relationship. Second, although self-efficacy, a parameter, showed positive relationship with privacy protection, it demonstrated negative relationship with personal information protection behavior. Lastly, privacy protection exhibited positive relationship with personal information protection behavior. By presenting theoretical model reflected with characteristics of prevention based on these findings above unlike previous studies on personal information protection using technologies threatening personal information, this study is to provide theoretical and operational foundation capable of offering explanations how to predict personal information protection behavior on the SNS in the future.

A Case Study on the Design of Pickup Truck Tuning Equipment according to the Lifestyle of Modern People (현대인의 라이프스타일에 따른 픽업트럭 튜닝 용품 디자인 사례 연구)

  • Lee, Dong-Hun;Park, Hae-Lim;Lee, Sang-Ki
    • Journal of Service Research and Studies
    • /
    • v.13 no.4
    • /
    • pp.131-141
    • /
    • 2023
  • Changes in consumer needs and behaviors according to lifestyle changes lead to consumption culture, affecting the automobile market. However, research and research to provide options tailored to the lifestyle of consumers in related markets are still insufficient. Focusing on pickup truck accessories applied to pickup trucks that reflect lifestyle the most among vehicle types, this study first examined the theoretical background of the aftermarket market and lifestyle of pickup trucks. Second, through image mapping, the market possibilities and opportunity factors of pickup trucks were discovered through market size analysis and possibilities, and through this, user types could be classified. Third, interviews were conducted with those representing user types, the contents were organized, and interviews were conducted centering on related groups to create a persona of a user group, and what needs each group's persona wanted. Finally, a design concept suitable for the issue keywords and insights derived for each user lifestyle type was presented. In this study, the user type was divided into ① outdoor activity type, ② hobby activity type, and ③ small-scale work type, and a design case study was conducted by applying the concept suitable for the keyword for each group. For the outdoor activity type, a variable storage structure and a living space-type accessory design were presented, and for the hobby type, a modular decktop design and a sports coupe-type hardtop design were presented. For the small business type, a partition that is easy to fix the load and a stepper design that is easy to board the cargo box were presented. It is expected that the size of the pickup truck aftermarket will be expanded by diversifying the option designs that users want by lifestyle by applying them to the development of pickup truck accessories that fit the lifestyle of pickup truck users in the automobile market, which is currently mass customized.

A Store Recommendation Procedure in Ubiquitous Market for User Privacy (U-마켓에서의 사용자 정보보호를 위한 매장 추천방법)

  • Kim, Jae-Kyeong;Chae, Kyung-Hee;Gu, Ja-Chul
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.123-145
    • /
    • 2008
  • Recently, as the information communication technology develops, the discussion regarding the ubiquitous environment is occurring in diverse perspectives. Ubiquitous environment is an environment that could transfer data through networks regardless of the physical space, virtual space, time or location. In order to realize the ubiquitous environment, the Pervasive Sensing technology that enables the recognition of users' data without the border between physical and virtual space is required. In addition, the latest and diversified technologies such as Context-Awareness technology are necessary to construct the context around the user by sharing the data accessed through the Pervasive Sensing technology and linkage technology that is to prevent information loss through the wired, wireless networking and database. Especially, Pervasive Sensing technology is taken as an essential technology that enables user oriented services by recognizing the needs of the users even before the users inquire. There are lots of characteristics of ubiquitous environment through the technologies mentioned above such as ubiquity, abundance of data, mutuality, high information density, individualization and customization. Among them, information density directs the accessible amount and quality of the information and it is stored in bulk with ensured quality through Pervasive Sensing technology. Using this, in the companies, the personalized contents(or information) providing became possible for a target customer. Most of all, there are an increasing number of researches with respect to recommender systems that provide what customers need even when the customers do not explicitly ask something for their needs. Recommender systems are well renowned for its affirmative effect that enlarges the selling opportunities and reduces the searching cost of customers since it finds and provides information according to the customers' traits and preference in advance, in a commerce environment. Recommender systems have proved its usability through several methodologies and experiments conducted upon many different fields from the mid-1990s. Most of the researches related with the recommender systems until now take the products or information of internet or mobile context as its object, but there is not enough research concerned with recommending adequate store to customers in a ubiquitous environment. It is possible to track customers' behaviors in a ubiquitous environment, the same way it is implemented in an online market space even when customers are purchasing in an offline marketplace. Unlike existing internet space, in ubiquitous environment, the interest toward the stores is increasing that provides information according to the traffic line of the customers. In other words, the same product can be purchased in several different stores and the preferred store can be different from the customers by personal preference such as traffic line between stores, location, atmosphere, quality, and price. Krulwich(1997) has developed Lifestyle Finder which recommends a product and a store by using the demographical information and purchasing information generated in the internet commerce. Also, Fano(1998) has created a Shopper's Eye which is an information proving system. The information regarding the closest store from the customers' present location is shown when the customer has sent a to-buy list, Sadeh(2003) developed MyCampus that recommends appropriate information and a store in accordance with the schedule saved in a customers' mobile. Moreover, Keegan and O'Hare(2004) came up with EasiShop that provides the suitable tore information including price, after service, and accessibility after analyzing the to-buy list and the current location of customers. However, Krulwich(1997) does not indicate the characteristics of physical space based on the online commerce context and Keegan and O'Hare(2004) only provides information about store related to a product, while Fano(1998) does not fully consider the relationship between the preference toward the stores and the store itself. The most recent research by Sedah(2003), experimented on campus by suggesting recommender systems that reflect situation and preference information besides the characteristics of the physical space. Yet, there is a potential problem since the researches are based on location and preference information of customers which is connected to the invasion of privacy. The primary beginning point of controversy is an invasion of privacy and individual information in a ubiquitous environment according to researches conducted by Al-Muhtadi(2002), Beresford and Stajano(2003), and Ren(2006). Additionally, individuals want to be left anonymous to protect their own personal information, mentioned in Srivastava(2000). Therefore, in this paper, we suggest a methodology to recommend stores in U-market on the basis of ubiquitous environment not using personal information in order to protect individual information and privacy. The main idea behind our suggested methodology is based on Feature Matrices model (FM model, Shahabi and Banaei-Kashani, 2003) that uses clusters of customers' similar transaction data, which is similar to the Collaborative Filtering. However unlike Collaborative Filtering, this methodology overcomes the problems of personal information and privacy since it is not aware of the customer, exactly who they are, The methodology is compared with single trait model(vector model) such as visitor logs, while looking at the actual improvements of the recommendation when the context information is used. It is not easy to find real U-market data, so we experimented with factual data from a real department store with context information. The recommendation procedure of U-market proposed in this paper is divided into four major phases. First phase is collecting and preprocessing data for analysis of shopping patterns of customers. The traits of shopping patterns are expressed as feature matrices of N dimension. On second phase, the similar shopping patterns are grouped into clusters and the representative pattern of each cluster is derived. The distance between shopping patterns is calculated by Projected Pure Euclidean Distance (Shahabi and Banaei-Kashani, 2003). Third phase finds a representative pattern that is similar to a target customer, and at the same time, the shopping information of the customer is traced and saved dynamically. Fourth, the next store is recommended based on the physical distance between stores of representative patterns and the present location of target customer. In this research, we have evaluated the accuracy of recommendation method based on a factual data derived from a department store. There are technological difficulties of tracking on a real-time basis so we extracted purchasing related information and we added on context information on each transaction. As a result, recommendation based on FM model that applies purchasing and context information is more stable and accurate compared to that of vector model. Additionally, we could find more precise recommendation result as more shopping information is accumulated. Realistically, because of the limitation of ubiquitous environment realization, we were not able to reflect on all different kinds of context but more explicit analysis is expected to be attainable in the future after practical system is embodied.

A Hybrid Recommender System based on Collaborative Filtering with Selective Use of Overall and Multicriteria Ratings (종합 평점과 다기준 평점을 선택적으로 활용하는 협업필터링 기반 하이브리드 추천 시스템)

  • Ku, Min Jung;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.85-109
    • /
    • 2018
  • Recommender system recommends the items expected to be purchased by a customer in the future according to his or her previous purchase behaviors. It has been served as a tool for realizing one-to-one personalization for an e-commerce service company. Traditional recommender systems, especially the recommender systems based on collaborative filtering (CF), which is the most popular recommendation algorithm in both academy and industry, are designed to generate the items list for recommendation by using 'overall rating' - a single criterion. However, it has critical limitations in understanding the customers' preferences in detail. Recently, to mitigate these limitations, some leading e-commerce companies have begun to get feedback from their customers in a form of 'multicritera ratings'. Multicriteria ratings enable the companies to understand their customers' preferences from the multidimensional viewpoints. Moreover, it is easy to handle and analyze the multidimensional ratings because they are quantitative. But, the recommendation using multicritera ratings also has limitation that it may omit detail information on a user's preference because it only considers three-to-five predetermined criteria in most cases. Under this background, this study proposes a novel hybrid recommendation system, which selectively uses the results from 'traditional CF' and 'CF using multicriteria ratings'. Our proposed system is based on the premise that some people have holistic preference scheme, whereas others have composite preference scheme. Thus, our system is designed to use traditional CF using overall rating for the users with holistic preference, and to use CF using multicriteria ratings for the users with composite preference. To validate the usefulness of the proposed system, we applied it to a real-world dataset regarding the recommendation for POI (point-of-interests). Providing personalized POI recommendation is getting more attentions as the popularity of the location-based services such as Yelp and Foursquare increases. The dataset was collected from university students via a Web-based online survey system. Using the survey system, we collected the overall ratings as well as the ratings for each criterion for 48 POIs that are located near K university in Seoul, South Korea. The criteria include 'food or taste', 'price' and 'service or mood'. As a result, we obtain 2,878 valid ratings from 112 users. Among 48 items, 38 items (80%) are used as training dataset, and the remaining 10 items (20%) are used as validation dataset. To examine the effectiveness of the proposed system (i.e. hybrid selective model), we compared its performance to the performances of two comparison models - the traditional CF and the CF with multicriteria ratings. The performances of recommender systems were evaluated by using two metrics - average MAE(mean absolute error) and precision-in-top-N. Precision-in-top-N represents the percentage of truly high overall ratings among those that the model predicted would be the N most relevant items for each user. The experimental system was developed using Microsoft Visual Basic for Applications (VBA). The experimental results showed that our proposed system (avg. MAE = 0.584) outperformed traditional CF (avg. MAE = 0.591) as well as multicriteria CF (avg. AVE = 0.608). We also found that multicriteria CF showed worse performance compared to traditional CF in our data set, which is contradictory to the results in the most previous studies. This result supports the premise of our study that people have two different types of preference schemes - holistic and composite. Besides MAE, the proposed system outperformed all the comparison models in precision-in-top-3, precision-in-top-5, and precision-in-top-7. The results from the paired samples t-test presented that our proposed system outperformed traditional CF with 10% statistical significance level, and multicriteria CF with 1% statistical significance level from the perspective of average MAE. The proposed system sheds light on how to understand and utilize user's preference schemes in recommender systems domain.

The Oral Health Perception and its Related Factor by the Patients in Metropolitan Area (수도권 거주환자의 구강건강인식과 그 연관요인)

  • Jung, Ui-Jung;Kim, Min-Young
    • Journal of dental hygiene science
    • /
    • v.7 no.4
    • /
    • pp.213-218
    • /
    • 2007
  • The purpose of this study was to analyze the effects of dentistry users' perception of concern about oral health on their perception of oral health and behaviors. For this purpose, the researcher sampled the outpatients who had used 2 dentistries in Kangnam, Seoul and another 2 dentistries in Kangbuk, Seoul and a hospital attached to a dental college in Bundang, Kyonggi-do and thereby, conducted a self-administered questionnaire survey from April 4 through 28, 2006. 291 responses from the survey were analyzed using the SPSS 12.0 statistical program. The results of this study can be summarized as follows; 1. 45.0% of the patients perceived that their oral conditions were not healthy, 32% thought normal for their oral conditions and 23% felt healthy for their oral conditions. 2. Less women (44.1%) felt healthy for their oral conditions than men (46.3%). 3. The more negative patients' perception of their oral health was, they were more likely (55.1%) to rely on relatives for choice of a dentistry. 45.0% of this group worried about their oral health always, 15.1% were more or less worried, and 11.9% of them felt that their oral health was good(P < 0.05). 4. 66.0% of the subjects worried about their oral health sometimes, and 27.8% of them worried always, and 6.2% worried little. There was no significant gender difference, but the older they were, they worried more always(P < 0.05). 5. 93.8% of the group who worried about their oral health always had ever had their teeth scaled, and 65.8% of them had regularly had their teeth scaled. Such ratios differed significantly from the group who worried about their oral health sometimes (49.7% and 46.2%, respectively). The three groups differed in terms of regular checks significantly: 56.6%, 45.3% and 33.3%, respectively. And the rate of visiting the dentistry without fail was significantly highest (71.6%) in the first group (P < 0.05).

  • PDF

Empirical Analysis of Consumer Behavior on the Internet Shopping Mall Choice from the Schema Perspective: Comparison Between Bricks & Clicks and Pure-Player Shopping Mall (스키마 관점에서 살펴본 인터넷 쇼핑몰 선택에 대한 소비자행동의 이해: Bricks & Clicks와 Pure-Player 인터넷 쇼핑몰 비교를 중심으로)

  • Chung, Nam-Ho;Lee, Kun-Chang
    • Asia pacific journal of information systems
    • /
    • v.17 no.4
    • /
    • pp.165-186
    • /
    • 2007
  • With the advent of a wide variety of Internet shopping malls, consumers can choose a best appealing shopping mall from among the Bricks-and-Clicks and Pure-Player malls. Pure-Players launched their operation grandiosely with the early stage of Internet use in 1995. However, after the burst of Dot-com company bubbles in 1997, Pure-Players introduce various types of business models to meet potential needs of consumers. While Pure-Players suffer skeptical views from market analysts as well as consumers, traditional offline companies learned important lessons from Dot-com companies collapse phenomena, and expanded their business channels into online in the name of Bricks-and-Clicks. Nowadays, Bricks-and-Clicks successfully establish in the market as one of reliable business partners among consumers. Therefore, it is no surprise that recent competitions between Bricks-and Clicks and Pure-Players become fiercer than ever to attract potential customers to their websites. In this situation, consumers can choose a shopping mall to their best satisfaction. Consumers can enjoy both offline and online options for shopping because Bricks-and Clicks provide both offline and online channels to consumers, which is compared with Pure-Players offering only online channel. Offline channel is unique in providing consumers with chances to touch and feel target products and services. Meanwhile, online channel is considered very viable and convenient shopping options for consumers. In this respect, it is easily assumed that consumers will show different online shopping behavior when they have to choose either Bricks-and-Clicks mall or Pure-Player mall for the sake of shopping. Remaining research issue in this case is how much consumers' schema would influence online shopping behavior between Bricks-and-Clicks and Pure-Players. Basically, schema is a framework for synthetic information recognition that individual consumers have and is very characteristic in that it focuses not on fragmentary facts but on the combination of various causes affecting results. Consumers' schema is closely represented by trust, structural assurance, and perceived relative advantage towards a specific type of shopping mall. In literature, there exist a lot of studies comparing Bricks-and-Clicks and Pure-Players. However, there is no study to pursue the analysis of consumer behaviors comparing Bricks-and Clicks and Pure-Players from the schema perspective. Therefore, this study aims to investigate this research gap. Empirical analysis is adopted by garnering valid questionnaires from 514 Internet shopping mall users. 237 were mainly using Bricks-and-Clicks for shopping, while 277 were found to visit Pure-Players for shopping. PLS was applied to analyze the survey data to verify the proposed research hypotheses. Findings from the empirical test results are as follows. First, consumers perceive more trust and relative advantage in Pure-Players, comparing with Bricks-and-Clicks. This result is against widely-accepted perception that Bricks-and-Clicks would be perceived by consumers as more trustworthy and relatively advantageous because they have offline reputation and stores. Therefore, it becomes more obvious that Internet is becoming daily necessaries, and consumers increasingly feel very comfortable in using the Internet for their own personal purposes. Second, consumers have firm faith in transaction safety, regardless Bricks-and-Clicks and Pure-Players. This seems due to the fact that most of shopping malls showing dubious transaction safety have no place in the market. In a nutshell, empirical results tell us that Pure-Players will grow very much in the future, to the extent that consumers perceive no difference in comparison with Bricks-and-Clicks. Besides, consumers' schema accumulated through trust and perceived relative advantage plays crucial role in determining consumer behavior.

Hydrochemistry of Groundwater at Natural Mineral Water Plants in the Okcheon Metamorphic Belt (옥천계변성암 지역의 먹는샘물 지하수의 수리지구화학적 특성)

  • 추창오;성익환;조병욱;이병대;김통권
    • Journal of Korea Soil Environment Society
    • /
    • v.3 no.3
    • /
    • pp.93-107
    • /
    • 1998
  • Because of its stable quantity and quality, groundwater has long been a reliable source of drinking water for domestic users. Rapid economic growth and rising standards of living have in recent years put severe demands on drinking water supplies in Korea. Groundwaters that are currently being used for natural mineral water were hydrochemically evaluated and investigated in order to maintain their quality to satisfy strict health standards. There exist 15 natural mineral water plants in the Okcheon metamorphic belt. Characteristics of groundwaters are different from those of other areas in that electrical conductivity, hardness, contents of Ca, Mg and $HCO_3$are relatively high. The content of major cations is in the order of Ca>Mg, Na>K, whereas that of major anions shows the order of $HCO_3$>$SO_4$>Cl>F. The fact that the Ca-Mg-HCO$_3$type is mostly predominant among water types reflects that dissolution of carbonates that are abundantly present in the metamorphic rocks plays an important part in groundwater chemistry. Representative correlation coefficients between chemical species show Mg-$HCO_3$(0.92), Ca-$HCO_3$(0.88), Ca-Mg(0.80), Ca-Cl(0.78), Mg-$SO_4$(0.78), Ca-$SO_4$(0.71), possibly due to the effect by dissolution of carbonates, gypsum or anhydrite. Determinative coefficients between some chemical species represent a good relationship, especially for EC-(K+Na+Ca), Ca-$HCO_3$, Ca-Mg, indiacting that they are similar in chemical behaviors. According to saturation index, most chemical species are undersaturated with respect to major minerals, except for some silica phases. Groundwater is slightly undersaturated with respect to calcite and dolomite, whereas it is still greatly undersaturated with respect to gypsum, anhydrite and fluorite, Based on the Phase equilibrium in the systems $NA_2$O-$Al_2$$O_3$-$SiO_2$-$H_2$O and $K_2$O-$Al_2$$O_3$-$SiO_2$-$H_2$O, it is clear that groundwater is in equilibrium with kaolinite, evolved from the stability area of gibbsite during water-rock interaction. It is expected that chemical evolution of groundwater continue to proceed with increasing pH by reaction of feldspars, with calcite much less reactive.

  • PDF