• Title/Summary/Keyword: personal computer

Search Result 2,617, Processing Time 0.034 seconds

Moderating Effect and Mediation Effect of Social Support in the Relationship between Art Therapist's Job Stress and Psychological Burnout

  • Song, Shin-Young;Moon, Kyung-Rye
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.2
    • /
    • pp.149-156
    • /
    • 2020
  • In this paper, we propose the moderating effects and mediation effects of social support on the relationship between art therapists' job stress and psychological burnout. Based on the previous studies, this study set up four types of variables: 1) independent variable, 2) moderating variable, 3) mediation variable, and 4) dependent variable. Job stress was identified as an independent variable, social support was identified as both a moderating variable and mediation variable, and psychological burnout was identified as a dependent variable. To empirically conduct this study, a total of 200 questionnaires were distributed to art therapists. Consequently, a total of 150 survey responses were collected. The survey results are as follows. First, there were not differences in job stress, psychological burnout, and social support due to personal environmental factors. This included career, employment type and working hours. Second, the result showed a high-level of correlation among job stress, psychological burnout, and social support. Third, social support was found to have a moderating effect on the relationship between the art therapists' job stress and psychological burnout. Forth, social support was found to have a moderating effect on the relationship between the art therapists' job stress and psychological burnout.

Multicultural Policy Implications Derived for the Multicultural Children's Cognitive Abilities and Autonomy about an Empirical Analysis (다문화정책의 시사점 도출을 위한 다문화가정아동의 능력지각과 자율성에 관한 실증적 분석)

  • Jeong, Mun-Gyung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.189-196
    • /
    • 2013
  • This study perceived multicultural children's ability to look at the impact of autonomy in the multicultural families to derive policy implications using SPSS 19.0 and AMOS 19.0 empirical analysis. To this end, in the area of A metrocity and Y city targeting elementary school autonomy on the final survey data were analyzed. The results of this study revealed the following: First, multicultural children's social skills and self-perceived ability to influence the psychological wellbeing of the two perceptual effects were. Second, multicultural children's psychological well affect its autonomy was found to be third, multicultural children's social skills and self-perceived ability to influence the perception of autonomy was the effect. As a result, the empirical analysis The results obtained by the analysis of the independent variable perceived social skills and personal skills perceived to affect the psychological wellbeing of the dependent variable autonomy also appeared to affect the result of these two effects through causal multicultural that is meaningful to the child's ability to assume that perception were found.

Key Determinants of Online Wine Purchasing Intention (와인의 온라인 구매의 주요 결정요인에 관한 연구)

  • Kang, Sora;Han, Su-Jin;Kim, Yoo-Jung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.12
    • /
    • pp.123-138
    • /
    • 2013
  • This paper was to figure out why online wine purchasing is not activated despite of the many advantages of having online transactions and to fine key determinants of online wine purchasing intention. Thus, the purpose of this study was to identify the determinants of online wine purchase intention, and examines the relationships between the determinants and online wine purchase intention. Data was collected from those who have experienced in using online wine store to purchase wine, and data was used to test the proposed research model. The findings showed that perceived usefulness and social influence(subjective norm, image) were key determinants of online wine site trust, but they were not related to online wine site trust. It also was found that perceived usefulness, perceived ease of use and subjective norm were positively and significantly related to online wine purchase intention whereas it had no relationship with image. In addition, online wine site trust was shown to influence on online wine purchase intention. Finally, the mediating effects were found in the relationships between perceived usefulness, subjective norm, and online wine purchase intention. Based on the results of the study, implications for future research are drawn.

Analysis of related words for each private security service through collection of unstructured data

  • Park, Su-Hyeon;Cho, Cheol-Kyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.219-224
    • /
    • 2020
  • The purpose of this study is mainly to provide theoretical basis of private security industry by analyzing the perception and flow of private security from the press-released materials according to periodic classification and duties through 'Big Kinds', a website of analyzing news big data. The research method has been changed to structured data to allow an analysis of various scattered unstructured data, and the keywords trend and related words by duties of private security were analyzed in growth period of private security. The perception of private security based on the results of the study was exposed a lot by the media through various crimes, accidents and incidents, and the issues related permanent position. Also, it tended to be perceived as a simple security guard, not recognized as the area of private security, and judging from the high correlation between private security and police, it was recognized not only as a role to assist the police force, but also as a common agent in charge of the public peace. Therefore, it should objectively judge the perception of private security, and through this, it is believed that it should be a foundation for recognizing private security as a main agent responsible for the safety of the nation and maintaining social orders.

An Interpretable Log Anomaly System Using Bayesian Probability and Closed Sequence Pattern Mining (베이지안 확률 및 폐쇄 순차패턴 마이닝 방식을 이용한 설명가능한 로그 이상탐지 시스템)

  • Yun, Jiyoung;Shin, Gun-Yoon;Kim, Dong-Wook;Kim, Sang-Soo;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.22 no.2
    • /
    • pp.77-87
    • /
    • 2021
  • With the development of the Internet and personal computers, various and complex attacks begin to emerge. As the attacks become more complex, signature-based detection become difficult. It leads to the research on behavior-based log anomaly detection. Recent work utilizes deep learning to learn the order and it shows good performance. Despite its good performance, it does not provide any explanation for prediction. The lack of explanation can occur difficulty of finding contamination of data or the vulnerability of the model itself. As a result, the users lose their reliability of the model. To address this problem, this work proposes an explainable log anomaly detection system. In this study, log parsing is the first to proceed. Afterward, sequential rules are extracted by Bayesian posterior probability. As a result, the "If condition then results, post-probability" type rule set is extracted. If the sample is matched to the ruleset, it is normal, otherwise, it is an anomaly. We utilize HDFS datasets for the experiment, resulting in F1score 92.7% in test dataset.

Prediction Model of User Physical Activity using Data Characteristics-based Long Short-term Memory Recurrent Neural Networks

  • Kim, Joo-Chang;Chung, Kyungyong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.2060-2077
    • /
    • 2019
  • Recently, mobile healthcare services have attracted significant attention because of the emerging development and supply of diverse wearable devices. Smartwatches and health bands are the most common type of mobile-based wearable devices and their market size is increasing considerably. However, simple value comparisons based on accumulated data have revealed certain problems, such as the standardized nature of health management and the lack of personalized health management service models. The convergence of information technology (IT) and biotechnology (BT) has shifted the medical paradigm from continuous health management and disease prevention to the development of a system that can be used to provide ground-based medical services regardless of the user's location. Moreover, the IT-BT convergence has necessitated the development of lifestyle improvement models and services that utilize big data analysis and machine learning to provide mobile healthcare-based personal health management and disease prevention information. Users' health data, which are specific as they change over time, are collected by different means according to the users' lifestyle and surrounding circumstances. In this paper, we propose a prediction model of user physical activity that uses data characteristics-based long short-term memory (DC-LSTM) recurrent neural networks (RNNs). To provide personalized services, the characteristics and surrounding circumstances of data collectable from mobile host devices were considered in the selection of variables for the model. The data characteristics considered were ease of collection, which represents whether or not variables are collectable, and frequency of occurrence, which represents whether or not changes made to input values constitute significant variables in terms of activity. The variables selected for providing personalized services were activity, weather, temperature, mean daily temperature, humidity, UV, fine dust, asthma and lung disease probability index, skin disease probability index, cadence, travel distance, mean heart rate, and sleep hours. The selected variables were classified according to the data characteristics. To predict activity, an LSTM RNN was built that uses the classified variables as input data and learns the dynamic characteristics of time series data. LSTM RNNs resolve the vanishing gradient problem that occurs in existing RNNs. They are classified into three different types according to data characteristics and constructed through connections among the LSTMs. The constructed neural network learns training data and predicts user activity. To evaluate the proposed model, the root mean square error (RMSE) was used in the performance evaluation of the user physical activity prediction method for which an autoregressive integrated moving average (ARIMA) model, a convolutional neural network (CNN), and an RNN were used. The results show that the proposed DC-LSTM RNN method yields an excellent mean RMSE value of 0.616. The proposed method is used for predicting significant activity considering the surrounding circumstances and user status utilizing the existing standardized activity prediction services. It can also be used to predict user physical activity and provide personalized healthcare based on the data collectable from mobile host devices.

Security issues and requirements for cloud-based u-Healthcare System (클라우드기반 u-헬스케어 시스템을 위한 보안 이슈 및 요구사항 분석)

  • Lee, Young Sil;Kim, TaeYong;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.299-302
    • /
    • 2014
  • Due to the convergence between digital devices and the development of wireless communication technology, bit-signal sensor miniaturization, building an Electronic Medical Record (EMR) which is a digital version of a paper chart that contains all of a patient's medical history and the information of Electronic Health Record (EHR), Ubiquitous healthcare (u-Healthcare) that can monitor their health status and provide personal healthcare service anytime and anywhere. Also, the appearance of cloud computing technology is one of the factors that accelerate the development of u-healthcare service. However, if the individual information to be used maliciously during the u-healthcare service utilization, leads to serious problems directly related to the individual's life because if it goes beyond the level of simple health screening and treatment, it may not provide accurate and reliable healthcare services. For this reason, we analyzed a variety of security issues related to u-healthcare service in cloud computing environment and described about directions of secure health information sharing system construction. In addition, we suggest the future developmental direction for th activation of u-healthcare industry.

  • PDF

A Study on the Type of Perception about the Emergency Car Driver Circulation Work of Female Fire Officials

  • Lee, Jae-Min;Jung, Ji-Yeon;Yun, Hyeong-Wan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.2
    • /
    • pp.99-108
    • /
    • 2021
  • This is a study on the type of perception about the transition of female firefighters to emergency car drivers. The purpose of this study is to identify the perception of the female firefighters on the circulation of emergency car drivers and to identify the characteristics of each type of firefighting officers and to provide basic data for the development and utilization of the emergency car drivers' work of female firefighters. The Q-sample of 27 statements was conducted on 31 subjects including 26 women and 5 men, and the data were analyzed using the QUANL program. As a result, the three types classified explained 60.8 % of the total variance, and the explanation power of each type was 50 % for type I, 5.6 % for type II, and 5.2% for type III. Type I was named 'feminist type', type II was named 'future-oriented type', and type III was named 'educational preparation type'. According to the perception of emergency cars by female firefighters, it was investigated that discrimination caused by gender should be eliminated and female firefighters can drive an emergency car if preparation and systematic education are made. Therefore, fire officials need to develop their personal abilities through gender equality and systematic education programs.

User authentication using touch positions in a touch-screen interface (터치스크린을 이용한 터치 위치기반 사용자 인증)

  • Kim, Jin-Bok;Lee, Mun-Kyu
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.1
    • /
    • pp.135-141
    • /
    • 2011
  • Recent advances in mobile devices and development of various mobile applications dealing with private information of users made user authentication in mobile devices a very important issue. This paper presents a new user authentication method based on touch screen interfaces. This method uses for authentication the PIN digits as well as the exact locations the user touches to input these digits. Our method is fully compatible with the regular PIN entry method which uses numeric keypads, and it provides better usability than the behavioral biometric schemes because its PIN registration process is much simpler. According to our experiments, our method guarantees EERs of 12.8%, 8.3%, and 9.3% for 4-digit PINs, 6-digit PINs, and 11-digit cell phone numbers, respectively, under the extremely conservative assumption that all users have the same PIN digits and cell phone numbers. Thus we can guarantee much higher performance in identification functionality by applying this result to a more practical situation where every user uses distinct PIN and sell phone number. Finally, our method is far more secure than the regular PIN entry method, which is verified by our experiments where attackers are required to recover a PIN after observing the PIN entry processes of the regular PIN and our method under the same level of security parameters.

New Approaches to Quality Monitoring of Higher Education in the Process of Distance Learning

  • Oseredchuk, Olga;Drachuk, Ihor;Teslenko, Valentyn;Ushnevych, Solomiia;Dushechkina, Nataliia;Kubitskyi, Serhii;Сhychuk, Antonina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.7
    • /
    • pp.35-42
    • /
    • 2022
  • The article identifies the problem of monitoring the quality of higher education in three main areas, which are comparative pedagogical systems of education. The first direction is determined by dissertation works, the second - monographs and textbooks, and the third reveals scientific periodicals. According to its internal structure, monitoring the quality of education combines important management components identified in the article (analysis, evaluation and forecasting of processes in education; a set of methods for tracking processes in education; collecting and processing information to prepare recommendations for research processes and make necessary adjustments). Depending on the objectives, three areas of monitoring are identified: informational (involves the accumulation, structuring and dissemination of information), basic (aimed at identifying new problems and threats before they are realized at the management level), problematic (clarification of patterns, processes, hazards, those problems that are known and significant from the point of view of management). According to its internal structure, monitoring the quality of education combines the following important management components: analysis, evaluation and forecasting of processes in education; a set of techniques for tracking processes in education; collection and processing of information in order to prepare recommendations for the development of the studied processes and make the necessary adjustments. One of the priorities of the higher education modernization program during the COVID-19 pandemic is distance learning, which is possible due to the existence of information and educational technologies and communication systems, especially for effective education and its monitoring in higher education. The conditions under which the effectiveness of pedagogical support of monitoring activities in the process of distance learning is achieved are highlighted. According to the results of the survey, the problems faced by higher education seekers are revealed. A survey of students was conducted, which had a certain level of subjectivity in personal assessments, but the sample was quite representative.