• Title/Summary/Keyword: information security education

Search Result 910, Processing Time 0.029 seconds

Design and Implementation of Walking Activity Prediction Service for Exercise Motive (운동 동기 부여를 위한 걷기 활동량 예측 서비스 설계 및 구현)

  • Kim, Bogyeong;Lee, Cheolhyo;Kim, DoHyeun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.5
    • /
    • pp.99-104
    • /
    • 2016
  • The walking exercise can alleviate stress and also it can improve health fortheir lifetime. Recent development in Information and Communication Technologies (ICT) has laid the foundation for Internet of Things (IoT) to become the future technology. IoT has many applications in industry automation, security, smart homes and cities, education, health etc. In personal health-care domain, IoT is mainly used for monitoring fitness condition by observing current activity of individual. In this paper, we have proposed a novel IoT based personal wellness care system. Proposed system not only keep track of current fitness level but also provide future activity prediction based on history data along with standard recommendations. Predicted activity helps in motivating the individual to achieve the desired fitness level. Initially, we consider only walking activity for testing purpose and later, other types of activities/exercise will be captured for improved health care support.

Development of an Assistant Model for Child Care Accreditation (보육시설 평가인증 조력 현황분석 및 조력체계 개발)

  • Hwang, Ock Kyeung
    • Korean Journal of Childcare and Education
    • /
    • v.3 no.2
    • /
    • pp.123-146
    • /
    • 2007
  • This study has attempted to suggest an assistant model for systematic child care accreditation. This has been carried out from the current consciousness of such needs for child care accreditation as large regional disparity in assistant level, no indication to definite contents and method of assistance, demand for assistant professionals with intensified capacity and requirement for the support of financial and human resources. Six stages of assistant process: the stage of establishment and management of preparation class, the stage of application for assistance and consultation, the stage of assistant meeting, the stage of workshop and observation to exemplary institutions, and the stage of practical application and evaluation of visiting assistance have been suggested. Particularly in order to improve the efficiency of assistance, organization of a committee of expert advisors in each area has been indicated. For the guideline of assistant management, operation of preparation class for accreditation, security of assistant committee members, provision of systematic training and assistant manual, development of supervision program and financial support have been suggested. This assistant manual will contribute to systematic and efficient conduct of assistance program of child care accreditation.

  • PDF

Life of the Institutionalized Elderly (시설노인의 삶)

  • Lee, Ga-Eon
    • Research in Community and Public Health Nursing
    • /
    • v.12 no.1
    • /
    • pp.32-38
    • /
    • 2001
  • This study focused on the understanding the life of the elderly in the institution by phenomenological method. The participants were seven. who were 4 men and 3 women living in the elderly institution in Taegu. The data were collected through the indepth interviews and participant observation from June 20. 1999 to January 10. 2000 and analyzed by phenomenological analytic method by Giorgi. The structure of the meaning were as follows: Unhappy life: irresponsibility. self-centered thought. hardness. Irresistible life: misfortune. unhealthiness. Reading their son's intention. Bitter life: unfair treatment from their sons and daughters, betrayed feeling for their being thrown away. Outside oriented life: a fear of others' attention, wrong information about institutionalized life, maladjustment. Self-consolation life: comfortableness, convenience, economic merit of low cost. Dissatisfied life: discomfort from communal living. unkindness of the institution staffs, depreciated tendency to the elder people, irrational social security system. economic distress, physical pain, restrained feeling. Tenacity to their sons and daughters longingness for their sons and daughters, regretableness, waiting, Regretable life: remorse for their past life. agony, guilty, loneliness, grief, self-abandonment, self-depreciation, other residents' death in common. Inharmonious life with other residents complaint, conflict, ignorance, selfishness. Yearning life for opposite sex: sexual interest. Preparing for their life: control over their body and mind, consideration for others. A life with hope: blessing death, forever healthfulness, affiliation to their family. From the results of this study an education and consultation should be done as soon as possible to remove the negative recognition of the institutional life to the facility residents. the family and the future consumers of elderly institution. To minimize the maladjustment to facility life of residents, a new program and interventions for the new comer's are needed. The thesis with above results will widen the understandings of institutional residents and an important guidance for a better nursing care in elderly institutions of korea.

  • PDF

A Study on Utilization of Drone for Public Sector by Analysis of Drone Industry (국내외 드론산업 동향 분석을 통한 공공분야에서의 드론 활용방안에 대한 연구)

  • Sim, Seungbae;Kwon, Hunyeong;Jung, Hosang
    • Journal of Information Technology Services
    • /
    • v.15 no.4
    • /
    • pp.25-39
    • /
    • 2016
  • The drone is an unmanned aerial vehicle which has no human pilot. Drones can be classified into military drones, commercial drones, and personal drones by usage. Also, drones can be classified from large-sized to nano-sized drone by size and autonomous, remote controlled drone by control type. Especially, military drones can be classified into low-altitude drones, medium-altitude, and high-altitude drones by altitude. Recently, the drone industry is one of the fast growing industries in the world. As drone technologies have become more advanced and cost-effective, Korean government has set its goal to become a top-level country in drone business. However, the government's strict regulation for drone operations is one of the biggest hurdles for the development of the related technologies in Korea and other countries. For example, critical problems for drone delivery can be classified into technical issues and institutional issues. Technical issues include durability, conditional awareness, grasp and release mechanisms, collision avoidance systems, drone operating system. Institutional issues include pilot and operator licensing, privacy rules, noise guidelines, security rules, education for drone police. This study analyzes the trends of the drone industry from the viewpoint of technology and regulation. Also, we define the business areas of drone utilization. Especially, the drone business types or models for public sector are proposed. Drone services or functions promoting public interests need to be aligned with the business reference model of Korean government. To define ten types of drone uses for public sector, we combine the business types of government with the future uses of drones that are proposed by futurists and business analysts. Future uses of drones can be divided into three sectors or services. First, drone services for public or military sectors include early warning systems, emergency services, news reporting, police drones, library drones, healthcare drones, travel drones. Second, drone services for commercial or industrial services include parcel delivery drones, gaming drones, sporting drones, farming and agriculture drones, ranching drones, robotic arm drones. Third, drone services for household sector include smart home drones.

Review of Qualitative Approaches for the Construction Industry: Designing a Risk Management Toolbox

  • Zalk, David M.;Spee, Ton;Gillen, Matt;Lentz, Thomas J.;Garrod, Andrew;Evans, Paul;Swuste, Paul
    • Safety and Health at Work
    • /
    • v.2 no.2
    • /
    • pp.105-121
    • /
    • 2011
  • Objectives: This paper presents the framework and protocol design for a construction industry risk management toolbox. The construction industry needs a comprehensive, systematic approach to assess and control occupational risks. These risks span several professional health and safety disciplines, emphasized by multiple international occupational research agenda projects including: falls, electrocution, noise, silica, welding fumes, and musculoskeletal disorders. Yet, the International Social Security Association says, "whereas progress has been made in safety and health, the construction industry is still a high risk sector." Methods: Small- and medium-sized enterprises (SMEs) employ about 80% of the world's construction workers. In recent years a strategy for qualitative occupational risk management, known as Control Banding (CB) has gained international attention as a simplified approach for reducing work-related risks. CB groups hazards into stratified risk 'bands', identifying commensurate controls to reduce the level of risk and promote worker health and safety. We review these qualitative solutions-based approaches and identify strengths and weaknesses toward designing a simplified CB 'toolbox' approach for use by SMEs in construction trades. Results: This toolbox design proposal includes international input on multidisciplinary approaches for performing a qualitative risk assessment determining a risk 'band' for a given project. Risk bands are used to identify the appropriate level of training to oversee construction work, leading to commensurate and appropriate control methods to perform the work safely. Conclusion: The Construction Toolbox presents a review-generated format to harness multiple solutions-based national programs and publications for controlling construction-related risks with simplified approaches across the occupational safety, health and hygiene professions.

Exhaustion of Social Workers for Organizational Effectiveness for the Fusion Age: Mediation Effectiveness of Empowerment (융합시대를 위한 사회복지사의 소진이 조직효과성에 미치는 융합연구 : 임파워먼트의 매개효과)

  • Kim, San Yong
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.361-366
    • /
    • 2018
  • In this study, 200 social workers in Seoul and Gyeonggi area were surveyed using convenience extraction method. Data were analyzed by frequency, reliability, correlation, and regression analysis using IBM SPSS Statistics 20, and Sobel test was performed. The purpose of this study was to investigate the effects of empowerment on the relationship between exhaustion and organizational effectiveness of social workers and to provide basic data for improving organizational effectiveness. The results of the study are as follows. Empowerment was found to be mediated in the relationship between exhaustion and job satisfaction, which is a sub - area of organizational effectiveness. Empowerment was found to be mediated in the relationship between exhaustion and turnover intention, which is a sub - domain of organizational effectiveness. Therefore, it is necessary to have a resting place that gives a sense of security to the exhausted social worker rather than granting authority for the social welfare organization.

A Study on the Support Policy for the Realization of Right to Learn of Youth Migrants in Korea: Focusing on Parents, Teachers and Experts (중도입국 청소년의 학습권 실현을 위한 지원방안 연구: 학부모, 교사 등 관계자를 중심으로)

  • Kim, HyunJin;Noh, Giseop
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.533-538
    • /
    • 2021
  • The purpose of this study is to consider the perception, which education-related workers and parents have, associated with guaranteeing the right to learn for youth migrants in Korea. The study was especially intended to analyze the opportunities and adaptions of youth migrants and make policy suggestions accordingly. To this purpose, this study implemented one-on-one in-depth interviews with research participants to collect and analyze data. This research yielded four categories: initial settlement, social security support as a fundamental right, learning rights guarantees, and psychological support. Also, seven subcategories were elicited. The suggestions based on results are followings: first, the legal basis for learning support for middle-aged adolescents; second, curriculum composition for school maladjusted middle-aged adolescents; third, individualized support system; fourth, the active promotion of support systems such as information provision; fifth, the diversification of policy for psychological stability.

Analysis of the Global Data Law & Policy and its Implications: Focusing on the cases of the United States, the United Kingdom, and the European Union (국내외 데이터법·정책 분석 및 시사점: 미국, 영국, EU의 사례를 중심으로)

  • Yoon, Sang-Pil;Kwon, Hun-Yeong
    • Informatization Policy
    • /
    • v.28 no.2
    • /
    • pp.98-113
    • /
    • 2021
  • This study presents implications of the Global Data Law & Policy by comparing national data strategies, data regulations and policies, and governance in South Korea, the United States, the United Kingdom, and the European Union. According to the result of the comparative analysis, the biggest difference is in data governance, in other words, the management and coordination of policies at the pan-government level and data ethics. Therefore, this study proposes the establishment of a presidential special committee on data policy or the creation of a 'National Digital Innovation Office' at the Presidential Secretariat as a national CDO for the governance of data policies. Furthermore, this paper suggests a) to enact 'the Framework Act on the Development of Data Industry' that can regulate data practices in the private sector, b) to institutionalize the data-centric security and data protection, c) to settle the public ethics and personnel management based on data expertise and professional ethics, including explainability and responsibility, and d) the education and training systems.

Design and Implementation of a Smart Attendance Integrated Management System (스마트 출결 통합 관리 시스템 설계 및 구현)

  • Kang, Se-Hyeon;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.5
    • /
    • pp.136-144
    • /
    • 2022
  • Due to the lack of attendance management system, the training conducted by each existing institution was handwritten at the site and managed in writing about the attendance of participants. It not only takes a lot of manpower and time to store and search, but also has a lot of difficulty in storing. In this paper, we design and implement an integrated smart attendance management system using barcodes. Through this, the attendance system of training applicants is developed, security related to attendance is strengthened, and training attendance data is computerized and collected. In addition, standards for necessary data are selected so that each institution can efficiently manage and utilize training information data. The proposed system can add various institutions in a single construction, making it easy to expand institutional management and can expect additional cost reduction effects. In addition, it is expected that the quality of education will be improved by increasing the convenience of training managers who use the management system provided and controlling/managing attendance data of users.

A Study on the Data Pseudonymization Methodology for Defense Training Data as Artificial Intelligence Technology is applied to the Defense Field (국방 분야 인공지능 기술 접목에 따른 교육훈련 데이터 가명처리 방법론에 관한 연구)

  • Hyunsuk Cho;Sujin Kang;Dongrae Cho;Yeongseop Shin
    • Journal of The Korean Institute of Defense Technology
    • /
    • v.5 no.3
    • /
    • pp.1-7
    • /
    • 2023
  • Recently, in the defense field, efforts are being made to collect data by building data centers to incorporate artificial intelligence technology. Weapon system training data can be used as input data for artificial intelligence models and can be used as high-quality data to maximize training performance and develop military strategies. However, training data contains personal information such as the names and military numbers of the personnel who operated the equipment, and training records that reveal the characteristics of the weapon system. If such data is passed on to the enemy, not only the specifications and performance of the weapon system but also the proficiency of each operator may be exposed. In this paper, we propose a pseudonym processing methodology for education and training data security and also suggest a direction for revising related laws.

  • PDF