• Title/Summary/Keyword: cyber electronic

Search Result 305, Processing Time 0.024 seconds

Legal Measures for Handling Internet Health Information (법을 통한 인터넷 건강정보 관리 방안)

  • Suh, Mee-Kyung
    • Korean Journal of Health Education and Promotion
    • /
    • v.20 no.1
    • /
    • pp.61-76
    • /
    • 2003
  • As people get broader access to health information through the internet, there is a greater need for measure to maximize the social advantages of the internet and to minimize negative side-effects. With this concern, this paper classifies internet health information services sites into : on-line supply of health information, on-line consultation, on-line diagnosis, and on-line sales. As well this paper analyzes domestic laws supporting and/or regulating these services. The efficient provision of internet health services requires comprehensive laws on individual privacy protection, prevention and handling of medical accidents, an electronic prescription form for internet diagnosis, electronic signing, payment for medical expenses, qualifications for internet medical practitioners. Additional laws are required to establish internet pharmacies and internet health goods stores. These new laws can be prepared either separately or through revision of existing laws governing medical practice, pharmacies, and public health promotion. However, as the legal control by the government on cyber processes and entities has a fairly minimal effect, consumers should be encouraged to improve their own capacity for wisely using internet health services and health-service providers should be encouraged to promote voluntary supervision and control of their own services and practices.

Study on Hybrid Type Cloud System (하이브리드형 클라우드 시스템에 관한 연구)

  • Jang, Jae-Youl;Kim, Do-Moon;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.6
    • /
    • pp.611-618
    • /
    • 2016
  • The suggested paper studies communications network and system technology, designing data to sync to both USB memories and cloud storages at the same time, which would allow users to safely keep and manage data even in case of network troubles, affecting cloud storages, and/or loss of physical USB memories, resulting in lost data in the physical memory. The need of secure data management policy for cloud storage users form the basis of this study, offering solutions to network failures and loss of physical storage by creating hybrid cloud system. To provide convenience to windows users, the UI design should integrate that of windows explorer to maximize security and convenience.

Design of Rehabilitation Program Contents using Motion Detection Sensors (동작인식센서를 이용한 재활 프로그램 콘텐츠 설계)

  • Jang, Jae-Youl;Lee, Young-Sik;Kim, Do-Moon;Lee, Tae-Hee;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.903-910
    • /
    • 2018
  • The necessary rehabilitation training for patients with disability currently does not match the actual amount of training conducted, which requires interest in rehabilitation treatment, continued investment and infrastructure for rehabilitation contents, while the most common forms of rehabilitation treatment comprises of art, music, and play treatments. In this paper, we provide a game-style rehabilitation program including audio and visual elements through motion detection process on the patient and design a digital game rehabilitation program that allows different level of management for various categories of disabled people.

Development of Loss Prevention System WatchDog for Safe Saving and Management of Edited E-mail Attachment (전자 메일첨부 편집파일의 안전한 저장과 관리를 위한 분실 방지 시스템 WatchDog 개발)

  • Hong, Jun-Hu;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.5
    • /
    • pp.1059-1064
    • /
    • 2018
  • Many users feel a great pain owing to losing edited files. It is very serious loss in time and money. This problem occurs because email attachments are edited in 'Inbox' and the compute immediately shuts down with 'Save'. This is caused by the illusion that the 'save' in a temporary folder is saved to a secure hard disk. Our thesis proposes a loss-prevention system WatchDog for safe storage and folder management of the e-mail attachments. The proposed system operates a warning window pop-up when we 'Open(O)' and 'Save' the attachment. In addition, convenient folder management plans for safe copying and movement are shown through example programs.

The Effects of Quality Attributes on Customers' Satisfaction and Revisit Intention in the Ethnic Restaurant (에스닉 레스토랑의 품질속성이 소비자의 만족 및 재방문의도에 미치는 영향에 관한 연구)

  • Choi, Soo Ji
    • Korean journal of food and cookery science
    • /
    • v.32 no.3
    • /
    • pp.353-362
    • /
    • 2016
  • Purpose: This study examined the influence of restaurant quality attributes on customers' satisfaction and their intention to revisit by investigating the moderating effects of customers' electronic word of mouth evaluation about ethnic restaurants. The study was based on a total of 215 samples obtained from social networking service users in a metropolitan area from July 10 to 25, 2015. The major findings are as follows. Methods: The data were analysed using frequency, factor analysis, regression analysis and hierarchical regression analysis. Results: According to the results of factor analysis, quality attributes were separated into three factors: food, service, and atmosphere. According to the results, food attributes, service attributes and atmosphere attributes had an affect on customers' satisfaction, between quality attributes and revisit intention, only food attribute had an affect on revisit intention. It showed also that customers' satisfaction had an affect on revisit intention. Customers' electronic word of mouth (eWOM) evaluation was found to moderate the relationships between service quality attributes and satisfaction. Conclusion: Implications and future research were also discussed.

Feature Point Extraction of Sea Cucumbers using Canny Edge Detection (캐니 에지 검출을 이용한 해삼의 특징점 추출)

  • Lee, Keon-Ik;Woo, Young-Bae;Min, Jun-Sik;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.6
    • /
    • pp.1281-1286
    • /
    • 2018
  • The sea cucumber, which is distributed over 1,500 species worldwide, is a highly value-added variety that has been considered an important source of marine resources in many countries for a long period of time. Most of the research on sea cucumbers involves the effectiveness of food and its extractions; however, there was no research on the extraction of sea cucumbers. In response, this research suggested a boundary detection algorithm to extract the special spot of sea cucumbers Therefore, in order to capture a large quantity of high value-added in sea cucumbers and we believe that they will be a great help to the sea cucumber recognition program in the future.

Interaction Patterns in Distance Only Mode e-Learning

  • SUNG, Eunmo
    • Educational Technology International
    • /
    • v.10 no.2
    • /
    • pp.127-143
    • /
    • 2009
  • The purpose of this study was to identify the interaction patterns in distance only mode e-Learning. In order to investigate this study, messages shown in the electronic notice board were analyzed to see how interaction occurs between teacher and learner or learner and learner under the e-learning of cyber university. To analyze messages was applied according to the framework by Henri's contents analysis model. As a result of contents analysis on electronic board, the participative dimension was 399 messages. A learner put on 7~8 messages a day. The number of messages was low compared to the number of learners, but the number of inquiries was about 140. That means that each learner contacts and checks messages at least once a day. The meaning dimension was 600 units. The main interaction patterns were Interactive-social-cognitive-metacognitive. This means that e-Learning in distance only mode leads a positive attitude of learners as a self-directed learning, and needs teacher's well-structured instructional strategies for increasing interaction. In conclusion, social dimension and interactive dimension of messages support learners psychologically in the process of learning though they directly guide learning under the circumstances of e-learning lacking face-to-face element. It can be interpreted that the teacher's role is significantly important in order to attract learners' positive participation and cognitive and meta-cognitive dimension of messages and activities

Intrusion Detection Approach using Feature Learning and Hierarchical Classification (특징학습과 계층분류를 이용한 침입탐지 방법 연구)

  • Han-Sung Lee;Yun-Hee Jeong;Se-Hoon Jung
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.249-256
    • /
    • 2024
  • Machine learning-based intrusion detection methodologies require a large amount of uniform learning data for each class to be classified, and have the problem of having to retrain the entire system when adding an attack type to be detected or classified. In this paper, we use feature learning and hierarchical classification methods to solve classification problems and data imbalance problems using relatively little training data, and propose an intrusion detection methodology that makes it easy to add new attack types. The feasibility of the proposed system was verified through experiments using KDD IDS data..

A Study on the Securing Technological Safety of Mobile Electronic Notification Service in Public and Administrative Agencies (공공·행정기관 모바일전자고지서비스의 기술적인 안전성 확보 방안에 대한 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.4
    • /
    • pp.7-16
    • /
    • 2020
  • The mobile electronic notification service delivers notifications through mobile phone text or app-based message push to solve various problems of the paper-based mail service. And it is a service that an electronic document relay company proves to prove delivery. In order for public and administrative agencies to provide mobile electronic notification service, the user's identification information of the mobile phone number or the subscribed app is required. To overcome these limitations, ICT-regulated sandbox system was used to allow collective conversion of users' resident registration numbers into connecting information (CI). Therefore, in this paper, we propose a technical method for safe management of user CI in mobile electronic notice service, identity verification of electronic notice readers, and prevention of forgery and forgery of electronic notices. Through the proposed method, it is confirmed that the service can be activated by minimizing the adverse function of the mobile electronic notification service by securing the user's convenience and technical safety for the CI.

A Study on the Actual Use of Mobile Electronic Notification Service (모바일 전자고지서비스의 사용실태에 대한 조사 연구)

  • Kim, Jong-Bae
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.167-180
    • /
    • 2021
  • Due to the development of IT technology and the spread of infectious diseases, online non-face-to-face services are rapidly expanding. In particular, the information delivery process is also changing from the past postal branch-based to an information delivery system using mobile devices. This change is due to the change from the information delivery using the telephone line to the information delivery system using the Internet. Mobile notification service is a service that sends electronic notices to mobile devices held by users to deliver information and is validated for delivery, which has the advantage of reducing the benefits of unnecessary mail production, exposure to personal information, and misdelivery. However, user identification information must be provided to operators that provide mobile electronic notification services. In this paper, the current state of use of the mobile electronic notice service, which has been in effect since 2019, is investigated and analyzed, and the current mobile electronic notice service is to be safely provided and to take appropriate protection measures for personal information. In providing the mobile electronic notification service to users, it is possible to identify the service standards required by the sending agency, and based on this, prepare the technical standards for the mobile electronic notification service that the sending agency must comply with in advance and use it for the mobile electronic notification service.