• Title/Summary/Keyword: 금전

Search Result 508, Processing Time 0.053 seconds

Resource Exchanges Between Mothers and Adolescent Children (청소년 자녀와 어머니의 교환관계 분석)

  • Lee, Su-Ni;Kim, Hyun-Ju;Lee, Yeo-Bong
    • Korea journal of population studies
    • /
    • v.29 no.1
    • /
    • pp.97-131
    • /
    • 2006
  • This study analyses the relationship between mothers and adolescent children in current Korean society from an exchange perspective. Utilizing the 6 types of resources, I. e., service, goods, money, information, status, and affection, suggested by Foa et. al. and the distinction between positive exchange (rewards) and negative exchange (punishments), it explores what resources are exchanged, how the resources exchanged are valued by each party, whether the exchange is symmetrical or asymmetrical, and if gender and age of the child affects the exchange. A survey was conducted to 150 children--from middle school aged to college going, and their cohabiting mothers in the metropolitan Seoul. The overall findings are as follows: Positive exchanges are dominant over negative exchanges. The exchange of positive exchanges occur asymmetrically within each resource type, with the exception of affection which is exchanged in a more equal term. In general, children receive positive resources more often, but mothers value the resources given by their children more highly. Negative resources are exchanged in more symmetrical terms. Negative resources exchanged more frequently tend to have weaker negative valence. Daughters maintain a more intensive exchange relation with their mothers than sons do, and this pattern is especially prominent in the exchanges of information and affection. The age of the child has a weak effect on the exchange.

A Study on the Factors of Individual Acceptance for Online Game (온라인게임의 개인적 수용 요인에 관한 연구)

  • Yoon, Gun-Woo;Kim, Won-Joon;Ryu, Seoung-Ho
    • Journal of Korea Game Society
    • /
    • v.9 no.3
    • /
    • pp.107-119
    • /
    • 2009
  • Online games belong to a technology-oriented service industry that has emerged from the assimilation of game contents and communication networks in the respective realms of culture technology (CT) and information technology (IT). This study examines the individual acceptance of online games as entertainment-oriented technology based on the belief-attitude-intention paradigm and the underlying hedonic and utilitarian motivations. To measure the latent variables influencing the acceptance process, a structured questionnaire was developed based on the existing Technology Acceptance Model. Research model analysis and hypothesis testing were carried out using a structural equation model. Results indicated that latent variables reflecting hedonic and utilitarian characteristics had a significant influence on user behavior in the acceptance of online games. By uncovering the core factors in! fluencing the acceptance of online games and thereby theoretically verifying the latent variables influencing the acceptance of entertainment-oriented technology, this study provides strategic implications for business models by game companies aimed at attracting a large user base and dominating the market.

  • PDF

A Key Management Technique Based on Topographic Information Considering IoT Information Errors in Cloud Environment (클라우드 환경에서 IoT 정보 오류를 고려한 지형 정보 기반의 키 관리 기법)

  • Jeong, Yoon-Su;Choi, Jeong-hee
    • Journal of Digital Convergence
    • /
    • v.18 no.10
    • /
    • pp.233-238
    • /
    • 2020
  • In the cloud environment, IoT devices using sensors and wearable devices are being applied in various environments, and technologies that accurately determine the information generated by IoT devices are being actively studied. However, due to limitations in the IoT environment such as power and security, information generated by IoT devices is very weak, so financial damage and human casualties are increasing. To accurately collect and analyze IoT information, this paper proposes a topographic information-based key management technique that considers IoT information errors. The proposed technique allows IoT layout errors and groups topographic information into groups of dogs in order to secure connectivity of IoT devices in the event of arbitrary deployment of IoT devices in the cloud environment. In particular, each grouped terrain information is assigned random selected keys from the entire key pool, and the key of the terrain information contained in the IoT information and the probability-high key values are secured with the connectivity of the IoT device. In particular, the proposed technique can reduce information errors about IoT devices because the key of IoT terrain information is extracted by seed using probabilistic deep learning.

A Study on the Measurement Method of Personal Information Protection Investment Performance (개인정보보호투자의 성과측정방안에 관한 연구)

  • Kim, Young-Il;Lee, Jae-Hoon
    • Journal of Digital Convergence
    • /
    • v.11 no.1
    • /
    • pp.99-106
    • /
    • 2013
  • Personal information protection has become one of the most impending business issues because leakage of personal information can cause tremendous financial losses and image degradation. Consequently, personal information protection initiatives have been recognized widely in business. To invigorate personal information protection investments, performance measurement method such as cost benefits analysis or qualitative analyses are needed, which have not been studied enough in the previous studies. This study proposes a performance measurement model which can include quantitative and qualitative analyses in the context of personal information protection investments. A comparative analysis has been performed on security investment and IT investment performance measurements, which leads to choose the WiBe method (developed by the German Interior Ministry), considering the privacy characteristics and the method's applicability. In particular, the quantitative effect measured how proactive threat assessment based on the way according to the nature of the businesses and organizations of privacy and possible investment decisions. This study proposes the 16 performance indicators, which turn out to be meaningful in terms of their materiality and feasibility by conducting focus group interviews of 25 experts on personal information protection.

Effects of Service Quality and Perceived Value of Regional Festivals on Intention of Word-of-Mouth in the trend of Convergence (융복합트렌드에 따른 지역문화축제의 서비스품질과 지각된 가치가 구전의도에 미치는 영향)

  • Cho, Bong-Seok;Heo, Chul-Moo
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.99-113
    • /
    • 2017
  • The purpose of study was to test the effects of service quality of regional festivals showing the characteristics of convergence service and perceived value of visitors on intention of word-of-mouth, and the moderating role of perceived value between service quality and intention of word-of-mouth. For this empirical study, the data were collected and selected from 320 residents in Wonju province and visitors for Wonju Hanji Cultural Festival from all around from the South Korea by using structured questionnaires. The data were analyzed by hierarchical regression technique. The results showed that both of 7 factors of service quality of regional festivals and 2 factors of perceived value had a positive effect on visitors' intention of word-of-mouth. And also found out the only one out of two perceived value factors, namely 'non-monetary value' had the moderate roles between service reliability out of 7 service quality factors and intention of word-of-mouth. The results of study was summarized and theoretical implications of the findings with practical applications were discussed. After then, the directions for further study were presented based on the limitation of this one.

Empirical Analysis of the Relationship between a Market and Technological Characteristics and Performance of the Activities of Technology Security (시장특성과 기술특성이 기술보호성과에 미치는 영향)

  • Kim, Kyung Sun;Cho, Kuen Tae
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.97-105
    • /
    • 2015
  • Technology Security, especially in knowledge-intensive society, is becoming the most important organizational activity for the long-term success of a firm. However, there is not sufficient empirical research of activities of technology securities and business performance. This is one of the reason why Korean firms are reluctant to invest their resources to the technology security. We have tried to empirically analyze the relationship between a market and technological characteristics, which is one of the important business environmental characteristics and the activities of technology securities of Korean business firm by taking three hypotheses related to this research and investigating 209 Korean firms. According to the statistical research, results of the analyses suggest that the market and technological characteristics have positive impact on the activities of technology securities. Also the activities of technology securities have positive impact on the performance of technology security. More specifically, the results suggest that the relationship between the competitiveness of market and technological excellency and the activities of technology securities is supported statistically. But, the reverse relationship between the easiness of market entrance and the activities of technology securities is supported statistically. Also, there is no moderating effect of firm size between the relationship between a market and technological characteristics and the activities of technology securities. Finally, the relationship between the activities of technology securities and the risk of technology leakage is supported statistically.

Nepotism or Networking?: The Effectiveness of Social Networks in the Labor Market ('연줄'인가, '연결'인가?: 인적 네트워크의 노동시장 효과 분석)

  • KIM, Young Chul
    • KDI Journal of Economic Policy
    • /
    • v.34 no.3
    • /
    • pp.133-186
    • /
    • 2012
  • This paper analyzes the effectiveness of social networks in finding jobs and estimates the value of job search network using the Korean Laber and Income Panel Study (KLIPS) dataset and utilizing the Difference-in-Difference Propensity Score Matching (PSM) methodology (Heckman et al., 1997). While the wide use of social networks in the Korean labor market is often perceived as 'nepotism,' this study confirms that social networks, by serving as an effective information transmitter between job search and recruitment, make a significant contribution to improving the adequacy of job matching in the domestic labor market. In order to verify the effectiveness of using social networks for getting jobs, this study looks into the cases of labor turnover using social networks and also not using it. In the aspect of individual satisfaction improvement relating to workplace and job duties, both cases of turnover turn out to experience an increased satisfaction by 2~3 points (on a 100-score scale). Meanwhile, as for the educational and technical adequacy improvement, no positive effects are found in the case of turnover without social networks, whereas the educational and technical adequacy improvement turns out to increase by 2.13 and 2.52 points, respectively, in the case of turnover using social networks. The effect of income increase through turnover using social networks registered 40,074 Korean won per month (as of 2010), which can be considered as the result from the improved educational and technical adequacy. Of all things being considered, the value of job search network per wage worker in the Korean society is estimated to be 18.72 million won in terms of life-cycle wage improvement, and 758.2 scores in terms of the improvement of working life satisfaction. Provided that the cash value of satisfaction score 1 is equivalent to 'n' times 10,000 won, the aggregate value of job search network is estimated to be 18.72+7.582n million won, which means the total amount of costs that a wage worker in the Korean society willingly pays to maintain and manage job networks for lifetime.

  • PDF

Implementation and Design of motorcar consumption management iOS based software with OBD-II and WiFi network (OBD-II WiFi를 이용한 iOS 기반의 자동차 소모품관리 소프트웨어 설계 및 구현)

  • Jeong, Da-Woon;Nam, Jae-Hyun;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.475-478
    • /
    • 2011
  • driver for safety always check the status of their vehicle, and it is essential to understand. But if you want to know the status of the driver of the vehicle in specialist referral time and money because it costs the operator shall be paid. Today's rapidly changing IT technology with the development of the various features of your phone to check the status of the vehicle was able to do. However, the car's existing phone system, car diagnostic expertise must be learned because it will reveal the status of the vehicle do not have the expertise to not highlight the need for diagnostic. To reflect these points in smartphone users to easily use their own vehicles at a time to determine the status of a system that is required. In this paper, OBD-II protocol conversion WiFi OBD-II connector, retrieving information from the driver of the vehicle replacement cycle of consumables required vehicle inspection, vehicle problems in real-time diagnostic information to the user ease of use shows the IOS implementation in the automotive supply was implemented based on the smartphone.

  • PDF

Relationship Analysis between Malware and Sybil for Android Apps Recommender System (안드로이드 앱 추천 시스템을 위한 Sybil공격과 Malware의 관계 분석)

  • Oh, Hayoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.5
    • /
    • pp.1235-1241
    • /
    • 2016
  • Personalized App recommendation system is recently famous since the number of various apps that can be used in smart phones that increases exponentially. However, the site users using google play site with malwares have experienced severe damages of privacy exposure and extortion as well as a simple damage of satisfaction descent at the same time. In addition, Sybil attack (Sybil) manipulating the score (rating) of each app with falmay also present because of the social networks development. Up until now, the sybil detection studies and malicious apps studies have been conducted independently. But it is important to determine finally the existence of intelligent attack with Sybil and malware simultaneously when we consider the intelligent attack types in real-time. Therefore, in this paper we experimentally evaluate the relationship between malware and sybils based on real cralwed dataset of goodlplay. Through the extensive evaluations, the correlation between malware and sybils is low for malware providers to hide themselves from Anti-Virus (AV).

Android Malware Analysis Technology Research Based on Naive Bayes (Naive Bayes 기반 안드로이드 악성코드 분석 기술 연구)

  • Hwang, Jun-ho;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.5
    • /
    • pp.1087-1097
    • /
    • 2017
  • As the penetration rate of smartphones increases, the number of malicious codes targeting smartphones is increasing. I 360 Security 's smartphone malware statistics show that malicious code increased 437 percent in the first quarter of 2016 compared to the fourth quarter of 2015. In particular, malicious applications, which are the main means of distributing malicious code on smartphones, are aimed at leakage of user information, data destruction, and money withdrawal. Often, it is operated by an API, which is an interface that allows you to control the functions provided by the operating system or programming language. In this paper, we propose a mechanism to detect malicious application based on the similarity of API pattern in normal application and malicious application by learning pattern of API in application derived from static analysis. In addition, we show a technique for improving the detection rate and detection rate for each label derived by using the corresponding mechanism for the sample data. In particular, in the case of the proposed mechanism, it is possible to detect when the API pattern of the new malicious application is similar to the previously learned patterns at a certain level. Future researches of various features of the application and applying them to this mechanism are expected to be able to detect new malicious applications of anti-malware system.