• Title/Summary/Keyword: information behaviour

Search Result 427, Processing Time 0.027 seconds

EU FP6 Welfare Quality® Poultry Assessment Systems

  • Butterworth, A.
    • Korean Journal of Poultry Science
    • /
    • v.36 no.3
    • /
    • pp.239-246
    • /
    • 2009
  • Animal welfare is of considerable importance to European consumers and citizens, this being most recently confirmed in EU barometer studies. Researchers and others have long proposed that animal-based measures (measures taken on animals, e.g. their health and behaviour) can provide a valid indicator of animal welfare; since welfare is a characteristic of the individual animal. Therefore, a welfare assessment can be essentially based on animal-based measures, but with use of resource measures to provide the capacity to assess 'risk factors'. The first goal of this project was to develop a welfare monitoring system that enables assessment of welfare status through standardised conversion of welfare measures into accessible and understandable information. The acquired information on one hand provides feedback to animal unit managers about the welfare status of their animals, and on the other, information on the welfare status of animal-related products for consumers and retailers. The second goal of Welfare $Quality^{(R)}$ was to improve animal welfare by minimising the occurrence of harmful behavioural and physiological states, improving human-animal relationships, and providing animals with safe and stimulating environments. The different measurable aspects of welfare to be covered are turned into welfare criteria. The criteria reflect what is meaningful to animals as understood by animal welfare science. Once all the measures have been performed on an animal unit, a bottom-up approach is followed to produce an overall assessment of animal welfare on that particular unit: first the data collected (i.e. values obtained for the different measures on the animal unit) are combined to calculate criterion-scores; then criterion-scores are combined to calculate principle-scores; and finally the animal unit is assigned to a welfare category according to the principle-scores it obtained.

Analysis of Slope Fracturing using a Terrestrial LiDAR (지상라이다를 이용한 사면파괴 거동분석)

  • Yoo, Chang-Ho;Choi, Yun-Soo;Kim, Jae-Myeong
    • Spatial Information Research
    • /
    • v.16 no.3
    • /
    • pp.279-290
    • /
    • 2008
  • Landslide, one of the serious natural disasters, has Incurred a large loss of human and material resources. Recently, many forecasting or alarm systems based on various kinds of measuring equipment have been developed to reduce the damage of landslide. However, only a few of these equipments are guaranteed to evaluate the safety of whole side of land slope with their accessibility to the slope. In this study, we performed some experiments to evaluate the applicability of a terrestrial LiDAR as a surveying tool to measure the displacement of a land slope surface far a slope collapsing protection system. In the experiments, we had applied a slope stability method to a land slope and then forced to this slope with a load increasing step by step. In each step, we measured the slope surface with both a total station and a terrestrial LiDAR simultaneously. As the result of Slope Fracturing analysis using all targets, the LiDAR system showed that three was 1cm RMSE on X-axis, irregularity errors on Y-axis and few errors on Z-axis compare with Total Station. As the result of Slope Fracturing analysis using continuous targets, the pattern of Slope Fracturing was different according to the location of continuous targets and we could detect a continuous change which couldn't be found using Total station. The accuracy of the LiDAR data was evaluated to be comparable to that of the total station data. We found that a LiDAR system was appropriate to measuring the behaviour of land slope. The LiDAR data can cover the whole surface of the land slope, whereas the total station data are available on a small number of targets. Moreover, we extracted more detail information about the behavior of land slope such as the volume and profile changes using the LiDAR data.

  • PDF

Design of Tour Guide System using Bluetooth 4.0 and WiFi Sensor Technology (블루투스4.0과 WiFi 센서 기술을 이용한 관광안내 시스템 설계)

  • Kim, Hee-Sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.10
    • /
    • pp.6888-6894
    • /
    • 2015
  • Bluetooth 4.0 is the most appropriate technology for Internet of Things, which can be used to enhance and expand the existing areas and areas with a variety of applications. In this paper, an example of the services of the Internet of Things, we developed a tour guide system using the Bluetooth 4.0 and WiFi sensor technology. iBeacon-based push service have been limited to iOS smart phone series, non-iOS family and lower version of iOS 6 smart phones can not receive push-based services. This paper proposed in iBeacon and WiFi sensor is more than tourists, while maintaining the existing system (non-iOS smartphone users) can provide the service to you. Service tourist information as well as that can provide the advertising associated with the service. With 10 kinds of smart phones used in Korea was the experiment on the MAC information collected. This experiment is to track the behaviour of tourists in history can provide customized services can be based. Tourist destinations as well as amusement parks, resorts, etc. If you want to apply this system in a crowded place for user behavior information-gathering feature views over the a prevention of a missing child features such as notifications, risk, prevention is possible for a variety of applications.

Massive Surveillance by US-UK intelligence services : Crisis of the Internet and the Rule of Law (미국/영국 정보기관의 무차별 정보수집행위: 인터넷과 법치주의의 위기)

  • Kim, Keechang
    • Review of Korean Society for Internet Information
    • /
    • v.14 no.3
    • /
    • pp.78-85
    • /
    • 2013
  • The revelations made possible by Edward Snowden, a contractor of the US intelligence service NSA, are a sobering reminder that the Internet is not an 'anonymous' means of communication. In fact, the Internet has never been conceived with anonymity in mind. If anything, the Internet and networking technologies provide far more detailed and traceable information about where, when, with whom we communicate. The content of the communication can also be made available to third parties who obtain encryption keys or have the means of exploiting vulnerabilities (either by design or by oversight) of encryption software. Irrebuttable evidence has emerged that the US and the UK intelligence services have had an indiscriminate access to the meta-data of communications and, in some cases, the content of the communications in the name of security and protection of the public. The conventional means of judicial scrutiny of such an access turned out to be ineffectual. The most alarming attitude of the public and some politicians is "If you have nothing to hide, you need not be concerned." Where individuals have nothing to hide, intelligence services have no business in the first place to have a peek. If the public espouses the groundless assumption that State organs are benevolent "( they will have a look only to find out whether there are probable grounds to form a reasonable suspicion"), then the achievements of several hundred years of struggle to have the constitutional guarantees against invasion into privacy and liberty will quickly evaporate. This is an opportune moment to review some of the basic points about the protection of privacy and freedom of individuals. First, if one should hold a view that security can override liberty, one is most likely to lose both liberty and security. Civilized societies have developed the rule of law as the least damaging and most practicable arrangement to strike a balance between security and liberty. Whether we wish to give up the rule of law in the name of security requires a thorough scrutiny and an informed decision of the body politic. It is not a decision which can secretly be made in a closed chamber. Second, protection of privacy has always depended on human being's compliance with the rules rather than technical guarantees or robustness of technical means. It is easy to tear apart an envelope and have a look inside. It was, and still is, the normative prohibition (and our compliance) which provided us with protection of privacy. The same applies to electronic communications. With sufficient resources, surreptitiously undermining technical means of protecting privacy (such as encryption) is certainly 'possible'. But that does not mean that it is permissible. Third, although the Internet is clearly not an 'anonymous' means of communication, many users have a 'false sense of anonymity' which make them more vulnerable to prying eyes. More effort should be made to educate the general public about the technical nature of the Internet and encourage them to adopt user behaviour which is mindful of the possibilities of unwanted surveillance. Fourth, the US and the UK intelligence services have demonstrated that an international cooperation is possible and worked well in running the mechanism of massive surveillance and infiltration into data which travels globally. If that is possible, it should equally be possible to put in place a global mechanism of judicial scrutiny over a global attempt at surveillance.

  • PDF

Analysis of the Emergency Medical Service Area Using GIS: the Case of Seoul (GIS를 이용한 응급의료 진료권 분석: 서울시를 사례로 하여)

  • 이희연;박미영
    • Spatial Information Research
    • /
    • v.12 no.2
    • /
    • pp.193-209
    • /
    • 2004
  • The purpose of this study is to analyze the service area of emergency medical centers using GIS-based spatial analysis methods in Seoul, focusing on the behaviour of patients on the choosing of emergency centers. For this analysis, six emergency centers were selected to collect data for the information on the addresses of patients from September to November hi 2003. Analysis on the service area, which was carried out by measuring the distribution of patients in terms of distance from emergency medical centers, clearly reveals that the majority of patients was located within or adjacent districts at the emergency medical center. However, the size of the primary service area f3r six emergency medical centers was much different, implying that the decision to visit specific emergency medical center by patients was closely related to the size, perception, and preference of the emergency medical center. Based on the results of the spatial characteristics of emergency medical service area, this research tries to construct the surface map of the emergency medical service level supplied by 32 regional emergency medical centers located in Seoul. Considering the levels of infrastructure for emergency medical centers, the coverage for the degree of supply of emergency medical service by each emergency medical center was constructed in terms of a distance decaying in the distribution of patients from emergency medical center imposing different weights on distance bands. Spatial overlay utilizing map algebra function was performed in order to calculate total supply level of emergency service. The results clearly show that spatial inequality exists in the supply levels of the emergency medical service among local areas of Seoul.

  • PDF

Analysis of Seed Storage Data and Longevity for Agastache rugosa (배초향 (Agastache rugosa) 종자의 저장 반응과 수명 분석)

  • Lee, Mi Hyun;Hong, Sun Hee;Na, Chae Sun;Kim, Jeong Gyu;Kim, Tae Wan;Lee, Yong Ho
    • Korean Journal of Environmental Biology
    • /
    • v.35 no.2
    • /
    • pp.207-214
    • /
    • 2017
  • There is little information about the seed longevity of wild plants, although seed bank storage is an important tool for biodiversity conservation. This study was conducted to predict the seed viability equation of Agastache rugosa. The A. rugosa seeds were stored at moisture contents ranging from 2.7 to 12.5%, and temperatures between 10 and $50^{\circ}C$. Viability data were fitted to the seed viability equation in a one step and two step approach. The A. rugosa seeds showed orthodox seed storage behaviour. The viability constants were $K_E=6.9297$, $C_W=4.2551$ $C_H=0.0329$, and $C_Q=0.00048$. The P85 of A. rugosa seeds was predicted to 152 years under standard seed bank conditions. The P85 predicted by seed viability equation can be used as basic information for optimization of seed storage processes.

A Study on the Application of Social Network Analysis for Expanding the use of Spatial Data in Local Government (지방자치단체의 공간 Data 활용 확대를 위한 Social Network Analysis의 적용 방안 연구)

  • Kim, Ho-Yong;Lee, Sung-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.11 no.3
    • /
    • pp.80-91
    • /
    • 2008
  • The Purpose of this study is the applicaion of social network analysis for expanding the use of spatial data in local government. Spatial data generated from UIS projects play very important roles as a means of supporting decision making and solving complicated urban problems, but the utilization of the spatial data has not reach the expected level, considering to the huge amount of investment. Accordingly, there should be efforts in efficient management of spatial data, establishment of a sharing system, and expanded utilization of spatial data. Social network analysis applied to this research is a theory that explains the behaviors and patterns of units forming the system and measures distances between nodes, strength, etc. based on relations among nodes forming the network and the structural characteristics of the network. According to the results of surveying civil servants who were using spatial data on Busan Metropolitan City, obstacles to the sharing of spatial data were mostly non technical factors related to data users' attitude and their relations with circumstances. In order to expand the use of spatial data, this study performed social network analysis that applied the theory of planned behavior and examined the flow of spatial data, and by doing so, we analyzed related personnel's perception, identified obstacles to data sharing, and suggested a framework for promoting the expanded utilization of spatial data.

  • PDF

The Scale Development of Consumer's Charity Impulse : Focusing on Donation Behavior toward Non-profit Organization (소비자의 자선적 충동에 관한 측정도구의 개발 - 비영리단체에 대한 기부행위를 중심으로 -)

  • Ock, Jung-Won;Seo, Hae-Jin
    • Management & Information Systems Review
    • /
    • v.33 no.3
    • /
    • pp.1-19
    • /
    • 2014
  • Main research question of this study is based on situational gap between donation motivation and behaviour in non-profit organization. However, researches investigating the gap were limited. Therefore, this study examined components of psychological variables. Specially, we proposed the variables about consumer's impulsive motivation or behavior on impulse literature in donation toward non-profit organization. This study conducted a scale development to measure consumer's charity donation impulse based on non-conscious viewpoint. For the development of measurement tool for charity donation impulse, we conducted two stages of research process. First, the measurement items of charity donation impulse were developed through FGI and in-depth interview on experts. Secondly, the factor analysis was performed, and then some items were eliminated through this analysis. As a result, we found the final scale with 26 items, which were named as evaluation sensitivity charity impulse, reward sensitivity charity impulse, functional impulse, non-planning charity impulse. These results showed that the measurement items developed in this study were confirmed to be useful tools for measuring charity donation impulse.

  • PDF

An Exploratory Study on the Continuity of Consumer Empathy Response -Can Consumer Empathy Response expand on a Self-empathetic basis?- (소비자 공감반응의 연속성에 관한 연구 -소비자 공감반응은 자기 공감적으로 확장할 수 있는가?-)

  • Ock, Jung-Wo
    • Management & Information Systems Review
    • /
    • v.39 no.1
    • /
    • pp.75-91
    • /
    • 2020
  • The purpose of this study is to examine the application of in-depth interviews in terms of exploration on the basis of the theoretical basis of various aspects of consumer empathy, and the question of whether the consumer can expand to the process of self empathy. Most studies related to consumer empathy divide the responsive dimension of consumer empathy into rational and emotional dimension based on empathy theory, and look at the empathic response perceived by consumers to the stimulus presented from the current point of view. In this study, however, we want to go one step further and confirm that the consumers themselves can ultimately go to the self-empathy stage by forming a creative street of reproduction and redevelopment. As a result of exploratory research through in-depth interviews, it was indirectly confirmed that consumer's empathetic response to specific marketing stimulus exists at the level of creative and self-empathetic as well as the emphasis of previous studies. Based on these findings, this study confirmed that consumer empathetic responses could go beyond a single dimension to form a multidimensional structure and move toward an expanded structure of empathic self-creation. This suggests that consumers' empathic responses should be grasped in terms of continuity of empathic responses rather than explained in a specific dimension. Although this study is meaningful as an early research of exploratory nature, it is necessary to supplement various content validity and refine the research method through subsequent studies. This study is expected to expand the understanding that consumer's empathy can be extended to other people's empathy and to be self-empathy.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.