• Title/Summary/Keyword: Web sites

Search Result 1,239, Processing Time 0.028 seconds

The Effects of Volunteering on Life Satisfaction and Depression among the Korean Elderly: A Systematic Review and Meta-Analysis (한국 노인의 자원봉사활동이 생활만족도와 우울에 미치는 효과: 체계적 리뷰 및 메타분석)

  • Yang, Jihoon;Hwang, Sung-Dong
    • 한국노년학
    • /
    • v.38 no.3
    • /
    • pp.435-452
    • /
    • 2018
  • The purpose of this research is to provide synthesized findings on the effect of volunteering among the elderly on their life satisfaction and depression. In order to do that, we conducted a systematic review and meta-analysis from selected studies which were published in Korea. From five databases and three government web sites, 47 research papers were selected based on the eligible criteria and the 53 effect size data were extracted. The results are: The effect size of elderly volunteering on life satisfaction was 0.348 with 95% confidence interval of 0.286 to 0.408. The summary effect of elderly volunteering on depression was -0.310 with 95% confidence interval of -0.439 to -0.169. These findings suggest that elderly volunteering is an effective intervention for their psychosocial health, providing some evidence in the area of volunteering policies and practices.

Survey on Fake Review Detection of E-commerce Sites (전자 상거래 사이트의 가짜 리뷰 판별 기법 조사)

  • Ji, Chengzhang;Zhang, Jinhong;Kang, Dae-Ki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.79-81
    • /
    • 2014
  • People increasingly rely on sources of information from E-commerce reviews. Product reviews is an important determinant of potential customers' buying choices. They are also utilized by product manufacturers to find problems of their products and to collect competitive intelligence information about their competitors. Unfortunately, it is well-known that many online product reviews are not made by genuine costumers of products. Reviewers could write some undeserving positive reviews to promote or fake negative reviews to defame some certain product, and we call them fake product reviews. Fake product review detection makes an attempt to detect fake reviews and removes them to restore the truthful ones for readers. To the best of our knowledge, there is still less published study on this problem. In this paper, we make a survey and an attempt to give a brief overview on fake product review detection. The related work of fake product review detection is presented including web spam and spam email. Then some methods to detect fake reviews are introduced and summarized. The trend of fake product review detection is concluded finally.

  • PDF

A Malware Detection Method using Analysis of Malicious Script Patterns (악성 스크립트 패턴 분석을 통한 악성코드 탐지 기법)

  • Lee, Yong-Joon;Lee, Chang-Beom
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.7
    • /
    • pp.613-621
    • /
    • 2019
  • Recently, with the development of the Internet of Things (IoT) and cloud computing technologies, security threats have increased as malicious codes infect IoT devices, and new malware spreads ransomware to cloud servers. In this study, we propose a threat-detection technique that checks obfuscated script patterns to compensate for the shortcomings of conventional signature-based and behavior-based detection methods. Proposed is a malicious code-detection technique that is based on malicious script-pattern analysis that can detect zero-day attacks while maintaining the existing detection rate by registering and checking derived distribution patterns after analyzing the types of malicious scripts distributed through websites. To verify the performance of the proposed technique, a prototype system was developed to collect a total of 390 malicious websites and experiment with 10 major malicious script-distribution patterns derived from analysis. The technique showed an average detection rate of about 86% of all items, while maintaining the existing detection speed based on the detection rule and also detecting zero-day attacks.

A Protection Profile for E-Document Issuing System (온라인증명서 발급시스템 보호프로파일에 관한 연구)

  • Lee, Hyun-Jung;Won, Dong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.6
    • /
    • pp.109-117
    • /
    • 2011
  • We can use document issuance services provided by a school, bank, hospital, company, etc. either by visiting those facilities or by simply visiting their Web sites. Services available through the Internet allow us to use the same services as we do by actually going to those facilities at home or office any time. As much as it saves us time and money, there also arises a problem of information being forged on the Internet or on a printed document. There has to be security functions to deal with the problem. This paper intends to think of the possible security threats and draw out the necessary security functions that an on-line document issuance system should have based on the CC v3.1, so that anyone can use it as reference when they evaluate or introduce the system.

A Study on the Detection of Malware That Extracts Account IDs and Passwords on Game Sites and Possible Countermeasures Through Analysis (게임 사이트의 계정과 비밀번호 유출 악성코드 분석을 통한 탐지 및 대응방안 연구)

  • Lee, Seung-Won;Roh, Young-Sup;Kim, Woo-Suk;Lee, Mi-Hwa;Han, Kook-Il
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.2
    • /
    • pp.283-293
    • /
    • 2012
  • A new type of malware that extracts personal and account data over an extended period of time and that apparently is resistant to detection by vaccines has been identified. Generally, a malware is installed on a computer through network-to-network connections by utilizing Web vulnerabilities that contain injection, XSS, broken authentication and session management, or insecure direct-object references, among others. After the malware executes registration of an arbitrary service and an arbitrary process on a computer, it then periodically communicates the collected confidential information to a hacker. This paper is a systematic approach to analyzing a new type of malware called "winweng," a kind of worm that frequently made appearances during the first half of 2011. The research describes how the malware came to be in circulation, how it infects computers, how its operations expose its existence and suggests improvements in responses and countermeasures. Keywords: Malware, Worm, Winweng, SNORT.

COVID-19 and Korean Family Life on Social Media: A Topic Model Approach (소셜 빅데이터로 알아본 코로나19와 가족생활: 토픽모델 접근)

  • Park, Sunyoung;Lee, Jaerim
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.282-300
    • /
    • 2021
  • The purpose of this study was to explore what social media posts tell us about family life during the COVID-19 pandemic by examining the keywords and topics underlying posts on blogs and online forums. Our criteria for web crawling were (a) blog and forum posts on Naver and Daum, the top portal sites in Korea, (b) posts between February 23 and April 19, 2020, the period of the first heightened social distancing orders, and (c) inclusion of "COVID" and "family" or "COVID" and "home." We analyzed 351,734 posts using TF-IDF values and topic modeling based on latent Dirichlet allocation. We identified and named 22 topics including COVID-19 prevention, family infection, family health, dietary life and changes, religious life, stuck at home, postponed school year, family events, travel and vacations, concerns about family and friends, anxiety and stress, disaster and damage, COVID-19 warning text messages, family support policies, Shin-cheon-ji and Daegu. The results show that COVID-19 impacted various domains of family life including health, food, housing, religion, child care, education, rituals, and leisure as well as relationships and emotions.

Leadership Roles, Academic Appointments, and Scholarly Activity-Does a Fellowship after Plastic Surgery Training Make a Difference?

  • Christopher, Adrienne N.;Patel, Viren;Mellia, Joseph A.;Morris, Martin P.;Diatta, Fortunay;Murphy, Alexander I.;Fischer, John P.
    • Archives of Plastic Surgery
    • /
    • v.49 no.2
    • /
    • pp.207-214
    • /
    • 2022
  • Background Fellowship training is becoming more popular in plastic surgery, with over half of residents pursuing advanced training. Here, we investigate how clinical and research fellowship training impacts career trajectory and scholastic achievement in academic plastic surgery. Methods Plastic surgery faculty members, from programs recognized by the American Council of Academic Plastic Surgeons, were identified using institutional Web sites. Data extracted included faculty demographics, training history, academic positions, and research productivity. Continuous and categorical variables were compared using t-tests and chi-square, respectively. Results In total, 949 faculty members were included, with 657 (69%) having completed fellowship training. Integrated program residents were more likely to complete a fellowship when compared with independent residents (p < 0.0001). Fellowship trained faculty were more likely to have graduated from a higher ranked residency program, in terms of both overall and research reputation (p = 0.005 and p = 0.016, respectively). When controlling for years in practice, there was no difference found in number of publications, Hirsch index (h-index), or National Institutes of Health funding between faculty between the two cohorts (p > 0.05). In a subanalysis comparing hand, craniofacial, microsurgery, and research fellowships, those who completed a research fellowship had higher h-indices and were more likely to reach full professor status (p < 0.001 and p = 0.001, respectively). Fellowship training had no effect on being promoted to Chief/Chair of departments (p = 0.16). Conclusion Fellowship training is common among academic plastic surgeons. In this study, both clinical and research fellowships were associated with various aspects of academic success. However, fellowship training alone did not affect attainment of leadership positions.

Oblique Axis Hypothenar Free Flaps: Tips for Harvesting Larger Flaps with Minimal Donor Site Morbidity

  • Sang Ho Oh;Jae In Chung
    • Archives of Plastic Surgery
    • /
    • v.50 no.3
    • /
    • pp.279-287
    • /
    • 2023
  • Background Hypothenar free flaps (HTFFs) have been widely used for reconstructing palmar defects. Although previous anatomical and clinical studies of HTFF have been conducted, this technique still has some limitations. In this study, we describe some tips for large flap design that allows for easy harvesting of HTFFs with minimal donor site morbidity. Methods A total of 14 HTFF for hand defect reconstruction were recorded. The oblique flap was designed in the proximal HT area following relaxed skin tension line along the axis between fourth web space and 10 mm ulnar side of pisiform. A flap pedicle includes one or two perforators with ulnar digital artery and HT branch of basilic vein. In addition, innervated HTFF can be harvested with a branch of ulnar digital nerve. Electronic medical records were reviewed to obtain data on patients' information, operative details, and follow-up period. In addition, surgical outcome score was obtained from the patient, up to 10 points, at the last follow-up. Results Mean harvest time was 46 minutes, and two perforators were included in 10 cases. The mean flap area was 10.84 cm2. There were no problems such as donor site depression, scar contracture, keloids, wound dehiscence, numbness or neuroma pain at donor sites, and hypersensitivity or cold intolerance at flap site, either functionally or aesthetically. Conclusion Palmar defect reconstruction is challenging for hand surgeons. However, large HTFF can be harvested without complications using the oblique axis HTFF technique. We believe our surgical tips increase utility of HTFF for palmar defect reconstruction.

Intelligent Retrieval System for finding important travel information (중요 여행 정보를 찾기 위한 지능 검색 시스템)

  • Yun, Un-Il;Shin, Hyeon-Il;Ryu, Keun-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.11
    • /
    • pp.113-121
    • /
    • 2009
  • The increasing interest in leisure activities of a five-day work per week has been recently prevailed. Additionally, as internet and mobile infrastructures have been becoming widespread, the user can get specific information using a search engine. However, it is difficult for the user to get accurate information they really want as shared information has been rapidly increased and the information has been searched. For example, users can retrieve required travel information, but they also must see a huge number of travel advertisements. In this paper, we design and implement a retrieval system using travel information collecting agent. The information gathering agent regularly visits travel-related category pages of the portal sites and major media travel-article pages to collect information related to travel, and the agent stores the gathered information to a database. Then, users can search the travel information conveniently without the need to view advertisements.

Analysis of Convention Tourism Destination Brand Slogans: Focusing on International Convention Cities (컨벤션 관광 목적지 브랜드 슬로건 분석 - 국제 컨벤션 도시를 중심으로 -)

  • Lee, Hey Ryon;Ban, Seo Yeon;Yoon, Yoo Shik
    • Korea Science and Art Forum
    • /
    • v.26
    • /
    • pp.339-351
    • /
    • 2016
  • This study analyzes convention tourism destination brand slogans focusing on the international convention cities. Data were collected from official tourism web sites of 190 cities which hosts more than ten international meetings in 2013. One hundred and six destination brand slogans were identified. Specifically, the researchers attempt to carry out content analysis of the linguistic and visual expressions of the slogans. Results indicated that in terms of linguistic expressions, most of slogans adopted word or phrase patterns pursuing brevity. In the brand slogan spectrum, nearly half of slogans are common type which didn't express destinations' specific attributes and benefits properly. And the most frequently used key words in the slogans are 'visit' and 'city'. While in terms of visual expressions, about 70% of slogans adopted typography for explicitness and 60% of them utilized human and natural resources as visual signs for building up unique images. Based on the results, implications for creating effective convention tourism destination brand slogans were also discussed.