• Title/Summary/Keyword: 비인간 행위성

Search Result 634, Processing Time 0.037 seconds

Modelling for Improvement of Rational Consumption Decision Ability by Decision-Tree (Decision-Tree를 이용한 합리적 소비 의사결정능력 신장을 위한 모델 구안)

  • 김영록;마대성;김정랑
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2002.05d
    • /
    • pp.710-714
    • /
    • 2002
  • 학생은 미래뿐만 아니라 현재의 소비자로서 합리적인 의사결정을 통한 소비문화가 요구된다. 하지만 학생의 소비문화와 학교의 소비교육, 가정교육은 문제점을 안고 있다. 학생들은 물건의 필요성이나 용도, 금전상황, 가정상황 등을 전체적으로 고려하여 구매하기보다는 비계획적이고, 즉흥적이다. 학교에서는 교사들이 학생의 소비행위를 한 눈에 파악하여 교육적으로 피드백하기가 쉽지 않다. 가정에서는 학생들의 소비행위에 대한 의사소통의 길이 부족하다. 이에 본 연구는 소비의사결정 5단계와 Decision-Tree의 교육적인 면을 고려하여 합리적 소비 의사결정을 위한 6단계(문제정의, 정보탐색, 대안평가, 가치확립, 구매경험, 구매평가)를 새롭게 제안하고, 소비교실, 용돈 의사결정, 설문모듈을 통해 6단계를 체험하는 시스템을 설계하였다. 제안한 모델은 교사와 학생, 학부모 모두가 참여하여 학생의 계획적이고 합리적인 소비 의사결정 능력을 신장시키는데 도움을 줄 것이다.

  • PDF

A Design On the Intelligent Multi-Agent System for the Electronic Commerce of the National Defense Logistics Procurement (국방 군수조달 전자상거래용 지능형 멀티에이전트 시스템 설계에 관한 연구)

  • 이주덕;서형수;김화수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10c
    • /
    • pp.117-119
    • /
    • 1998
  • 현재 전자상거래는 관련기술의 발달로 인해 세계적으로 빠르게 확산되고 그 규모 또한 커지고 있는데 전자상거래는 단순히 구매행위만을 의미하는 것이 아니고 상거래와 관련된 문서교환, 교섭 등의 일련의 모든 행위를 포함하는 개념으로 최근 이 전자상거래를 CALS와 연관하여 CALS/EC라고 부르기도 한다. 우리군에서도 국방조달본부 등에서 CALS/EC 체계의 구축을 위한 사업이 추진되고 있는데, 이러한 체계가 이루어진다하더라도 많은 문서량과 관련업체로 인해 사용자가 업무를 수행하는데 많은 어려움이 있을 것이다. 따라서, 전자상거래의 여러 기술요소들에 부가하여, 최근 크게 주목을 받고 있는 에이전트기술을 이용해 사용자의 비전문성을 극복하고 편리성을 제공해줄 수 있도록 국방조달업무중 공고, 입찰, 계, 구매, 지불 업무를 위한 국방 군수 조달 전자상거래용 지능형 멀티에이전트 시스템 설계에 대해 연구하였다.

  • PDF

An Efficient Intrusion Detection Method by Tracing Anormal User in Cloud Computing (클라우드 컴퓨팅 환경에서 비정상 사용자 추적을 통한 효율적 침입 탐지 방안 연구)

  • Lee, Jun-Ho;Park, Min-Woo;Kang, Dong-Min;Chung, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.1194-1196
    • /
    • 2010
  • 클라우드 컴퓨팅 환경에서 가상머신에 침입 탐지 시스템을 사용하는 것은 중대한 트레이드-오프를 갖는다. 강력한 보안 서비스를 적용할 경우 시스템의 성능이 저하될 수 있으며, 시스템 성능을 위해 보안 서비스의 수준을 낮출 경우 시스템이 안전하지 못할 수 있다. 또한, 클라우드 컴퓨팅 시스템의 경우 짧은 시간 동안 엄청난 양의 보안 로그가 쌓이기 때문에 무작정 보안 로그를 작성하는 것은 비효율적이다. 본 논문에서는 사용자 행위를 기준으로 비정상 정도를 판단하고 이를 바탕으로 멀티-레벨의 보안 서비스를 제공할 수 있는 방안을 제안한다.

Vehicle Trust Evaluation for Sharing Data among Vehicles in Social Internet of Things (소셜 사물 인터넷 환경에서 차량 간 정보 공유를 위한 신뢰도 판별)

  • Baek, Yeon-Hee;Bok, Kyoung-Soo;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.3
    • /
    • pp.68-79
    • /
    • 2021
  • On the Social Internet of Things (SIoT), social activities occur through which the vehicle generates a variety of data, shares them with other vehicles, and sends and receives feedbacks. In order to share reliable information between vehicles, it is important to determine the reliability of a vehicle. In this paper, we propose a vehicle trust evaluation scheme to share reliable information among vehicles. The proposed scheme calculates vehicle trust by considering user reputation and network trust based on inter-vehicle social behaviors. The vehicle may choose to scoring, ignoring, redistributing, etc. in the social activities inter vehicles. Thereby, calculating the user's reputation. To calculate network trust, distance from other vehicles and packet transmission rate are used. Using user reputation and network trust, local trust is calculated. It also prevents redundant distribution of data delivered during social activities. Data from the Road Side Unit (RSU) can be used to overcome local data limitations and global data can be used to calculate a vehicle trust more accurately. It is shown through various performance evaluations that the proposed scheme outperforms the existing schemes.

Detecting Insider Threat Based on Machine Learning: Anomaly Detection Using RNN Autoencoder (기계학습 기반 내부자위협 탐지기술: RNN Autoencoder를 이용한 비정상행위 탐지)

  • Ha, Dong-wook;Kang, Ki-tae;Ryu, Yeonseung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.763-773
    • /
    • 2017
  • In recent years, personal information leakage and technology leakage accidents are frequently occurring. According to the survey, the most important part of this spill is the 'insider' within the organization, and the leakage of technology by insiders is considered to be an increasingly important issue because it causes huge damage to the organization. In this paper, we try to learn the normal behavior of employees using machine learning to prevent insider threats, and to investigate how to detect abnormal behavior. Experiments on the detection of abnormal behavior by implementing an Autoencoder composed of Recurrent Neural Network suitable for learning time series data among the neural network models were conducted and the validity of this method was verified.

Real-time Abnormal Behavior Detection System based on Fast Data (패스트 데이터 기반 실시간 비정상 행위 탐지 시스템)

  • Lee, Myungcheol;Moon, Daesung;Kim, Ikkyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.5
    • /
    • pp.1027-1041
    • /
    • 2015
  • Recently, there are rapidly increasing cases of APT (Advanced Persistent Threat) attacks such as Verizon(2010), Nonghyup(2011), SK Communications(2011), and 3.20 Cyber Terror(2013), which cause leak of confidential information and tremendous damage to valuable assets without being noticed. Several anomaly detection technologies were studied to defend the APT attacks, mostly focusing on detection of obvious anomalies based on known malicious codes' signature. However, they are limited in detecting APT attacks and suffering from high false-negative detection accuracy because APT attacks consistently use zero-day vulnerabilities and have long latent period. Detecting APT attacks requires long-term analysis of data from a diverse set of sources collected over the long time, real-time analysis of the ingested data, and correlation analysis of individual attacks. However, traditional security systems lack sophisticated analytic capabilities, compute power, and agility. In this paper, we propose a Fast Data based real-time abnormal behavior detection system to overcome the traditional systems' real-time processing and analysis limitation.

The Effect of the Health Education Program for Mothers with Developmental Disabled Children on Health Care Behavior and Parenting Stress (발달장애 아동을 위한 어머니 건강교육프로그램이 자녀 건강관리행위와 양육스트레스에 미치는 효과)

  • Kim, Hye-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.6
    • /
    • pp.338-346
    • /
    • 2016
  • This study was conducted to develop a health education program to help mother's cope with developmentally disabled children's health, and to test the effects of the program. The contents of the health education program were based on the results of a discussion with experts and previous studies. The program consisted of two parts, physical health and psychosocial health, which were measured over 4 weeks. The results of the study showed that the program helped mothers improve the level of health care and reduce parenting stress level. These findings suggest that studies for handicapped children's health should be conducted in the future using an interdisciplinary approach.

Re-understanding of Technoscience and Nature through Actor-Network Theory (행위자-연결망 이론을 통한 과학과 자연의 재해석)

  • Kim, Sook-Jin
    • Journal of the Korean Geographical Society
    • /
    • v.45 no.4
    • /
    • pp.461-477
    • /
    • 2010
  • Recent environmental issues such as genetically modified organisms, the loss of biodiversity, climate change, and nuclear waste cannot be reduced to a matter of science or society and explained through nature-society dualist approaches because of their complexity and heterogeneity. This paper examines how nature-society dualism has been embedded in science studies and geography and how this dualism can be overcome. Actor-Network Theory as an attempt to overcome this nature-society dualism is appropriate in analysing "strange imbriglio" of biology, politics, technoscience, market, value, ethics and facts that constitute our society by focusing on heterogeneous association, and can contribute to providing a useful framework to solve environmental problems.

Postcolonial Media Piracy Studies and Intellectual Property Regime as Global Control System

  • Yoon, Sangkil;Kim, Sanghyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.9
    • /
    • pp.91-100
    • /
    • 2022
  • The purpose of this study is to critically review the global intellectual property regime, which has been in full swing since the mid-1990s, from the perspective of postcolonialism. More specifically, by looking at issues which were raised by the Postcolonial Piracy Studies, it attempted to relativize the global IP system. This paper confirmed the postcolonialist view that universal concepts could never be completely universal or pure, and confirmed the non-state legalities view of media piracy as a conduit for participation in the global network through 'porous legalities' concept of Lawrence Liang. Finally, this paper raised the need to understand various relationships between the informal media economy and the formal media economy in a balanced perspective, rather than relying only on the neat dichotomy logic of illegality/legal.

Key Stages of a Research and Students' Epistemic Agency in a Student-Driven R&E (학생 주도의 R&E 활동에서 드러나는 연구 활동의 주요 단계 및 학생의 인식적 행위주체성)

  • Lee, Minjoo;Kim, Heui-Baik
    • Journal of The Korean Association For Science Education
    • /
    • v.39 no.4
    • /
    • pp.511-523
    • /
    • 2019
  • In this age of the $4^{th}$ industrial revolution, we, science educators, are giving more light on students' agentic behavior in the process of educating future scientist. This study, with the analytic lens of epistemic agency, explores the key stages of a student-driven R&E program rather than the scientist-led R&E program. It also examines to understand the emergence of students' epistemic agency in each stage of R&E. Data from participant observation for 18 months and in-depth interviews were collected and analyzed with the constant comparative method of grounded theory. This study identifies and describes five key stages of student-driven R&E: The stage of exploring research theme, designing research, performing lab activity, interpreting results, and communicating research. It also finds that (a) students' epistemic agency emerged with the constant interactions with the R&E structure; (b) students' epistemic agency has deep relations with the epistemic beliefs of the students; (c) students positioned themselves as decision-makers in the R&E practice; (d) the redistributed power and authority of the R&E contributed to the emergence of students' epistemic agency.