• Title/Summary/Keyword: internet use characteristics

Search Result 725, Processing Time 0.023 seconds

A Study on the Exhibition through the Web with Open Source Software OMEKA (공개 소프트웨어 OMEKA를 이용한 기록 웹 전시 방안 연구)

  • Choi, Yun-Jin;Choi, Dong-Woon;Kim, Hyung-Hee;Yim, Jin-Hee
    • The Korean Journal of Archival Studies
    • /
    • no.42
    • /
    • pp.135-183
    • /
    • 2014
  • Korea has a high standard of IT environment to serve exhibit programs through the web with internet propagation and IT technology. However, the web exhibition of public institutions not only seem to introduce off-line exhibitions but also not to invigorate. It is caused by the lack of awareness, the cost of system installation and the lack of professional manpower. In this situation, OMEKA could suggest practical solutions to archives where need their own exhibition through the web. Especially, it would helpful for small record management organizations which are not enough budget and personal. OMEKA is an open source software program for digital collection and contents management. It has an affinity with users unlike traditional archives service programs. It also has been variously used by libraries, museums and schools because of exceptional exhibit functions. In this article, we introduce to the installation of a practical use about OMEKA. Regarding to OMEKA features, we consider it to raise exhibit effects. OMEKA would reduce the cost related to plans of exhibitions because it could display various contents and programs which reflecting characteristics of institutions. In addition, the availability of installation and widespread technological environment would lessen burden of public institutions. Using OMEKA, they would improve service level of public institutions and, make users satisfy. Therefore, they can change the social recognition of public institutions. OMEKA can contribute to various exercises of public records. It is not just the stereotypical system but, serves exhibition and collections with the strategy which each public institution would like to display. After all, it not only to connect to users with producers but also to improve the public image of institutions positively. Then, OMEKA would bring the great result through this interaction between public institutions and users.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

Implementation of integrated monitoring system for trace and path prediction of infectious disease (전염병의 경로 추적 및 예측을 위한 통합 정보 시스템 구현)

  • Kim, Eungyeong;Lee, Seok;Byun, Young Tae;Lee, Hyuk-Jae;Lee, Taikjin
    • Journal of Internet Computing and Services
    • /
    • v.14 no.5
    • /
    • pp.69-76
    • /
    • 2013
  • The incidence of globally infectious and pathogenic diseases such as H1N1 (swine flu) and Avian Influenza (AI) has recently increased. An infectious disease is a pathogen-caused disease, which can be passed from the infected person to the susceptible host. Pathogens of infectious diseases, which are bacillus, spirochaeta, rickettsia, virus, fungus, and parasite, etc., cause various symptoms such as respiratory disease, gastrointestinal disease, liver disease, and acute febrile illness. They can be spread through various means such as food, water, insect, breathing and contact with other persons. Recently, most countries around the world use a mathematical model to predict and prepare for the spread of infectious diseases. In a modern society, however, infectious diseases are spread in a fast and complicated manner because of rapid development of transportation (both ground and underground). Therefore, we do not have enough time to predict the fast spreading and complicated infectious diseases. Therefore, new system, which can prevent the spread of infectious diseases by predicting its pathway, needs to be developed. In this study, to solve this kind of problem, an integrated monitoring system, which can track and predict the pathway of infectious diseases for its realtime monitoring and control, is developed. This system is implemented based on the conventional mathematical model called by 'Susceptible-Infectious-Recovered (SIR) Model.' The proposed model has characteristics that both inter- and intra-city modes of transportation to express interpersonal contact (i.e., migration flow) are considered. They include the means of transportation such as bus, train, car and airplane. Also, modified real data according to the geographical characteristics of Korea are employed to reflect realistic circumstances of possible disease spreading in Korea. We can predict where and when vaccination needs to be performed by parameters control in this model. The simulation includes several assumptions and scenarios. Using the data of Statistics Korea, five major cities, which are assumed to have the most population migration have been chosen; Seoul, Incheon (Incheon International Airport), Gangneung, Pyeongchang and Wonju. It was assumed that the cities were connected in one network, and infectious disease was spread through denoted transportation methods only. In terms of traffic volume, daily traffic volume was obtained from Korean Statistical Information Service (KOSIS). In addition, the population of each city was acquired from Statistics Korea. Moreover, data on H1N1 (swine flu) were provided by Korea Centers for Disease Control and Prevention, and air transport statistics were obtained from Aeronautical Information Portal System. As mentioned above, daily traffic volume, population statistics, H1N1 (swine flu) and air transport statistics data have been adjusted in consideration of the current conditions in Korea and several realistic assumptions and scenarios. Three scenarios (occurrence of H1N1 in Incheon International Airport, not-vaccinated in all cities and vaccinated in Seoul and Pyeongchang respectively) were simulated, and the number of days taken for the number of the infected to reach its peak and proportion of Infectious (I) were compared. According to the simulation, the number of days was the fastest in Seoul with 37 days and the slowest in Pyeongchang with 43 days when vaccination was not considered. In terms of the proportion of I, Seoul was the highest while Pyeongchang was the lowest. When they were vaccinated in Seoul, the number of days taken for the number of the infected to reach at its peak was the fastest in Seoul with 37 days and the slowest in Pyeongchang with 43 days. In terms of the proportion of I, Gangneung was the highest while Pyeongchang was the lowest. When they were vaccinated in Pyeongchang, the number of days was the fastest in Seoul with 37 days and the slowest in Pyeongchang with 43 days. In terms of the proportion of I, Gangneung was the highest while Pyeongchang was the lowest. Based on the results above, it has been confirmed that H1N1, upon the first occurrence, is proportionally spread by the traffic volume in each city. Because the infection pathway is different by the traffic volume in each city, therefore, it is possible to come up with a preventive measurement against infectious disease by tracking and predicting its pathway through the analysis of traffic volume.

Motives for Writing After-Purchase Consumer Reviews in Online Stores and Classification of Online Store Shoppers (인터넷 점포에서의 구매후기 작성 동기 및 점포 고객 유형화)

  • Hong, Hee-Sook;Ryu, Sung-Min
    • Journal of Distribution Research
    • /
    • v.17 no.3
    • /
    • pp.25-57
    • /
    • 2012
  • This study identified motives for writing apparel product reviews in online stores, and determined what motives increase the behavior of writing reviews. It also classified store customers based on the type of writing motives, and clarified the characteristics of internet purchase behavior and of a demographic profile. Data were collected from 252 females aged 20s' and 30s' who have experience of reading and writing reviews on online shopping. The five types of writing motives were altruistic information sharing, remedying of a grievance and vengeance, economic incentives, helping new product development, and the expression of satisfaction feelings. Among five motives, altruistic information sharing, economic incentives, and helping new product development stimulate writing reviews. Store customers who write reviews were classified into three groups based on their writing motive types: Other consumer advocates(29.8%), self-interested shoppers(40.5%) and shoppers with moderate motives(29.8%). There were significant differences among three groups in writing behavior (the frequency of writing reviews, writing intent of reviews, duration of writing reviews, and frequency of online shopping) and age. Based on results, managerial implications were suggested. Long Abstract : The purpose of present study is to identify the types of writing motives on online shopping, and to clarify the motives affecting the behavior of writing reviews. This study also classifies online shoppers based on the motive types, and identifies the characteristics of the classified groups in terms of writing behavior, frequency of online shopping, and demographics. Use and Gratification Theory was adopted in this study. Qualitative research (focus group interview) and quantitative research were used. Korean women(20 to 39 years old) who reported experience with purchasing clothing online, and reading and writing reviews were selected as samples(n=252). Most of the respondents were relatively young (20-34yrs., 86.1%,), single (61.1%), employed(61.1%) and residents living in big cities(50.9%). About 69.8% of respondents read and 40.5% write apparel reviews frequently or very frequently. 24.6% of the respondents indicated an "average" in their writing frequency. Based on the qualitative result of focus group interviews and previous studies on motives for online community activities, measurement items of motives for writing after-purchase reviews were developed. All items were used a five-point Likert scale with endpoints 1 (strongly disagree) and 5 (strongly agree). The degree of writing behavior was measured by items concerning experience of writing reviews, frequency of writing reviews, amount of writing reviews, and intention of writing reviews. A five-point scale(strongly disagree-strongly agree) was employed. SPSS 18.0 was used for exploratory factor analysis, K-means cluster analysis, one-way ANOVA(Scheffe test) and ${\chi}^2$-test. Confirmatory factor analysis and path model analysis were conducted by AMOS 18.0. By conducting principal components factor analysis (varimax rotation, extracting factors with eigenvalues above 1.0) on the measurement items, five factors were identified: Altruistic information sharing, remedying of a grievance and vengeance, economic incentives, helping new product development, and expression of satisfaction feelings(see Table 1). The measurement model including these final items was analyzed by confirmatory factor analysis. The measurement model had good fit indices(GFI=.918, AGFI=.884, RMR=.070, RMSEA=.054, TLI=.941) except for the probability value associated with the ${\chi}^2$ test(${\chi}^2$=189.078, df=109, p=.00). Convergent validities of all variables were confirmed using composite reliability. All SMC values were found to be lower than AVEs confirming discriminant validity. The path model's goodness-of-fit was greater than the recommended limits based on several indices(GFI=.905, AGFI=.872, RMR=.070, RMSEA=.052, TLI=.935; ${\chi}^2$=260.433, df=155, p=.00). Table 2 shows that motives of altruistic information sharing, economic incentives and helping new product development significantly increased the degree of writing product reviews of online shopping. In particular, the effect of altruistic information sharing and pursuit of economic incentives on the behavior of writing reviews were larger than the effect of helping new product development. As shown in table 3, online store shoppers were classified into three groups: Other consumer advocates (29.8%), self-interested shoppers (40.5%), and moderate shoppers (29.8%). There were significant differences among the three groups in the degree of writing reviews (experience of writing reviews, frequency of writing reviews, amount of writing reviews, intention of writing reviews, and duration of writing reviews, frequency of online shopping) and age. For five aspects of writing behavior, the group of other consumer advocates who is mainly comprised of 20s had higher scores than the other two groups. There were not any significant differences between self-interested group and moderate group regarding writing behavior and demographics.

  • PDF

A Study on People Counting in Public Metro Service using Hybrid CNN-LSTM Algorithm (Hybrid CNN-LSTM 알고리즘을 활용한 도시철도 내 피플 카운팅 연구)

  • Choi, Ji-Hye;Kim, Min-Seung;Lee, Chan-Ho;Choi, Jung-Hwan;Lee, Jeong-Hee;Sung, Tae-Eung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.2
    • /
    • pp.131-145
    • /
    • 2020
  • In line with the trend of industrial innovation, IoT technology utilized in a variety of fields is emerging as a key element in creation of new business models and the provision of user-friendly services through the combination of big data. The accumulated data from devices with the Internet-of-Things (IoT) is being used in many ways to build a convenience-based smart system as it can provide customized intelligent systems through user environment and pattern analysis. Recently, it has been applied to innovation in the public domain and has been using it for smart city and smart transportation, such as solving traffic and crime problems using CCTV. In particular, it is necessary to comprehensively consider the easiness of securing real-time service data and the stability of security when planning underground services or establishing movement amount control information system to enhance citizens' or commuters' convenience in circumstances with the congestion of public transportation such as subways, urban railways, etc. However, previous studies that utilize image data have limitations in reducing the performance of object detection under private issue and abnormal conditions. The IoT device-based sensor data used in this study is free from private issue because it does not require identification for individuals, and can be effectively utilized to build intelligent public services for unspecified people. Especially, sensor data stored by the IoT device need not be identified to an individual, and can be effectively utilized for constructing intelligent public services for many and unspecified people as data free form private issue. We utilize the IoT-based infrared sensor devices for an intelligent pedestrian tracking system in metro service which many people use on a daily basis and temperature data measured by sensors are therein transmitted in real time. The experimental environment for collecting data detected in real time from sensors was established for the equally-spaced midpoints of 4×4 upper parts in the ceiling of subway entrances where the actual movement amount of passengers is high, and it measured the temperature change for objects entering and leaving the detection spots. The measured data have gone through a preprocessing in which the reference values for 16 different areas are set and the difference values between the temperatures in 16 distinct areas and their reference values per unit of time are calculated. This corresponds to the methodology that maximizes movement within the detection area. In addition, the size of the data was increased by 10 times in order to more sensitively reflect the difference in temperature by area. For example, if the temperature data collected from the sensor at a given time were 28.5℃, the data analysis was conducted by changing the value to 285. As above, the data collected from sensors have the characteristics of time series data and image data with 4×4 resolution. Reflecting the characteristics of the measured, preprocessed data, we finally propose a hybrid algorithm that combines CNN in superior performance for image classification and LSTM, especially suitable for analyzing time series data, as referred to CNN-LSTM (Convolutional Neural Network-Long Short Term Memory). In the study, the CNN-LSTM algorithm is used to predict the number of passing persons in one of 4×4 detection areas. We verified the validation of the proposed model by taking performance comparison with other artificial intelligence algorithms such as Multi-Layer Perceptron (MLP), Long Short Term Memory (LSTM) and RNN-LSTM (Recurrent Neural Network-Long Short Term Memory). As a result of the experiment, proposed CNN-LSTM hybrid model compared to MLP, LSTM and RNN-LSTM has the best predictive performance. By utilizing the proposed devices and models, it is expected various metro services will be provided with no illegal issue about the personal information such as real-time monitoring of public transport facilities and emergency situation response services on the basis of congestion. However, the data have been collected by selecting one side of the entrances as the subject of analysis, and the data collected for a short period of time have been applied to the prediction. There exists the limitation that the verification of application in other environments needs to be carried out. In the future, it is expected that more reliability will be provided for the proposed model if experimental data is sufficiently collected in various environments or if learning data is further configured by measuring data in other sensors.