• Title/Summary/Keyword: 신뢰적 정책

Search Result 1,271, Processing Time 0.031 seconds

The Effect of Corporate Competency on Smart Factory Acceptance Intention and Management Performance -moderating effect of regional characteristics- (기업역량이 스마트 팩토리 수용의도 및 경영성과에 미치는 영향 -지역특성을 조절변수로-)

  • Kim, Sang-Moon;You, Yen-Yoo
    • Journal of Digital Convergence
    • /
    • v.18 no.9
    • /
    • pp.125-133
    • /
    • 2020
  • This study confirms the impact relationship between the president and employee competency related to smart factory construction of manufacturing SMEs, the acceptance intention and management performance in smart factory construction. The 310 data collected through a questionnaire were tested for research hypotheses through SEM. As a result, the president and employee competency affects the smart factory acceptance intention and the employee competency affects the management performance. Acceptance intention has a positive impact on management performance. Regional characteristics have a moderating effect on the relationship between president competency, acceptance intention, and management performance. Through this study, it was confirmed that the president and employee competency was an important factor in smart factory built.

How Consumers Perceive Online Behavioral Advertising: Consumer Typology and Determining Factors (온라인 맞춤형 광고 인식에 따른 소비자유형 연구: 효용과 비용을 중심으로)

  • Lee, Jin-Myong;Rha, Jong-Youn
    • Journal of Digital Convergence
    • /
    • v.13 no.9
    • /
    • pp.105-114
    • /
    • 2015
  • This study aims 1) to identify distinctive consumer groups according to their perception of benefits and costs of Online Behavioral Advertising(OBA), 2) to explore differences among them, and 3) to investigate antecedent variables that affect the consumers' perception of OBA. Online survey data collected from 1,000 online users. The findings of this study are as follows. First, the result of cluster analysis identified four distinctive consumer groups according to the levels of perceived benefits and costs of OBA: 'Indifferent group', 'cost-centered group', 'benefit-centered group', and 'Benefit-cost balanced group'. Second, four consumer groups showed differences in their demographics, advertising related variables, privacy related variables, and technology related variables. Third, according to multinomial logistic analysis, it was found that there were different factors affecting consumers' perception of benefits and costs of OBA.

A Comparison Study of Korean and Japanese Cloud Service Certification Systems (한국과 일본의 클라우드 서비스 인증제도 비교연구)

  • Seo, Kwang-Kyu
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.53-58
    • /
    • 2013
  • Due to the wide spread of the perception of cloud computing, the usage of cloud computing is increasing globally. Cloud computing is able to converge the various industrial domains based on ICT and it is more and more popular because it has a lot of benefits such as cost savings etc. in global economic recession. However, if cloud computing service is to achieve its potential, it is necessary to clearly understand the critical issues such as service security, performance and availability and so on from the perspectives of the providers and the consumers of the cloud service. In addition, customers focus on how to get and use the safe and reliable cloud service. In order to meet these problems, Korea cloud service certification system and Japanese ASP-SaaS-Cloud certification system were performed in each country. This paper aims at comparing and analyzing between them and describing the difference. Eventually, we propose the improvement strategy of Korea cloud service certification system based on the comparison results between them.

Learning Distribution Graphs Using a Neuro-Fuzzy Network for Naive Bayesian Classifier (퍼지신경망을 사용한 네이브 베이지안 분류기의 분산 그래프 학습)

  • Tian, Xue-Wei;Lim, Joon S.
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.409-414
    • /
    • 2013
  • Naive Bayesian classifiers are a powerful and well-known type of classifiers that can be easily induced from a dataset of sample cases. However, the strong conditional independence assumptions can sometimes lead to weak classification performance. Normally, naive Bayesian classifiers use Gaussian distributions to handle continuous attributes and to represent the likelihood of the features conditioned on the classes. The probability density of attributes, however, is not always well fitted by a Gaussian distribution. Another eminent type of classifier is the neuro-fuzzy classifier, which can learn fuzzy rules and fuzzy sets using supervised learning. Since there are specific structural similarities between a neuro-fuzzy classifier and a naive Bayesian classifier, the purpose of this study is to apply learning distribution graphs constructed by a neuro-fuzzy network to naive Bayesian classifiers. We compare the Gaussian distribution graphs with the fuzzy distribution graphs for the naive Bayesian classifier. We applied these two types of distribution graphs to classify leukemia and colon DNA microarray data sets. The results demonstrate that a naive Bayesian classifier with fuzzy distribution graphs is more reliable than that with Gaussian distribution graphs.

Analysis on Acceptance Intention of Augmented Reality System - Using Logit Model (증강현실시스템의 수용 의도 분석 - 로짓모형 이용)

  • Kim, Mincheol
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.373-380
    • /
    • 2013
  • Recently, AR(Augmented Reality) system as an information technology for the increased access of information has a potential possibility of next generation's system for tourism guide. In this regard, the objective of this study is to explore the technology acceptance factors of AR system on tourism destination. To achieve the objective of this study, logit regression model was used to analyze the influential level of the factors. This study was analyzed with the final 224 respondents and the results showed that if there will be assured with high trust and easy access via mobility device as smartphone, the AR system has the possibility of high acceptance level. The result of this study will be expected to be utilized as fundamental data from the viewpoint of the service providers and system developers that want to launch the appropriate service to users' needs of AR system.

OpenID Based User Authentication Scheme for Multi-clouds Environment (멀티 클라우드 환경을 위한 OpenID 기반의 사용자 인증 기법)

  • Wi, Yukyeong;Kwak, Jin
    • Journal of Digital Convergence
    • /
    • v.11 no.7
    • /
    • pp.215-223
    • /
    • 2013
  • As cloud computing is activated, a variety of cloud services are being distributed. However, to use each different cloud service, you must perform a individual user authentication process to service. Therefore, not only the procedure is cumbersome but also due to repeated authentication process performance, it can cause password exposure or database overload that needs to have user's authentication information each cloud server. Moreover, there is high probability of security problem that being occurred by phishing attacks that result from different authentication schemes and input scheme for each service. Thus, when you want to use a variety of cloud service, we proposed OpenID based user authentication scheme that can be applied to a multi-cloud environment by the trusted user's verify ID provider.

Research on a New Approach to Enhance IoT Security Using Blockchain Technology (블록체인 기술을 이용하여 IoT 보안 강화를 위한 새로운 접근방법 연구)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.235-241
    • /
    • 2019
  • The structure of the IoT can be divided into devices, gateways, and servers. First, the gateway collects data from the device, and the gateway sends data to the server through HTTP protocol, Websocket protocol, and MQTT protocol. The processing server then processes, analyzes, and transforms the data, and the database makes it easy to store and use this data. These IoT services are basically centralized structures with servers, so attacks on the entire platform are concentrated only on the central server, which makes hacking more successful than distributed structures. One way to solve this problem is to develop IoT that combines blockchain. Therefore, the proposed research suggests that the blockchain is a distributed structure, in which blocks containing small data are connected in a chain form, so that each node agrees and verifies the data with each other, thereby increasing reliability and lowering the probability of data forgery.

Senior Citizen Centers Utilization: Role of Socio-Demographic Factors, Life Satisfaction and Health Condition in Korea (경로당 이용과 인구사회학적 요인, 삶의 만족도, 건강상태에 관한 연구)

  • Song, Geurum;Sharma, Bimala;Nam, Eun Woo
    • Journal of agricultural medicine and community health
    • /
    • v.45 no.3
    • /
    • pp.141-153
    • /
    • 2020
  • 목적: 한국은 지역사회 기반 통합 돌봄(커뮤니티케어)을 통해 노인들을 위한 보건 및 사회복지 서비스의 확대를 추진하고 있다. 본 연구는 노인의 경로당 이용에 대한 인구사회인적 요인, 삶의 만족도, 건강상태 등이 미치는 영향을 파악하고자 한다. 연구방법: 2017년 노인실태조사 자료를 이용하여, 횡단 분석 연구가 실시하였다. 이용패턴을 파악하기 위해 기술통계를 하였고, 경로당 이용과 관련된 요소들을 결정하기 위해서는 다변량 로지스틱 회귀분석을 실시하였다. 연구결과: 지난 12개월간 노인 1만299명 중 22.7%가 경로당을 이용하였다. 경로당을 이용하는 이유 중 가장 많은 응답은 경로당 동료들과 여가를 보내기 위함이었으며, 대상자의 95% 이상이 제공되는 서비스에 만족하고 있었다. 사회인구학적 특성에 대해서는 여성(AOR=1.20; 95% 신뢰 구간(CI), 1.05-1.38), 80세 이상 노인(AOR= 3.94, 95% CI, 3.30-4.71), 문맹자(AOR=5.27; 95% CI 3.80-7.30), 교육 수준이 낮거나 읍면 지역 출신(AOR=6.42; 95 % CI, 5.72-7.20)이 경로당을 이용할 가능성이 가장 높았다. 생활 만족도 부분에서는 재정적 만족도(AOR=1.21; 95% CI, 1.06-1.37), 문화에 대한 만족도(AOR=1.49; 95% CI, 1.24-1.79) 및 친구들과 사회에 대한 만족도(AOR=4.24; 95% CI, 3.17-5.66)가 높은 사람이 경로당을 더 많이 이용하는 것으로 나타났다. 질병이 없다는 응답자에 비해 만성 질환을 2개 이상 보유한자(AOR= 2.01; 95 % CI, 1.60-2.53)의 경로당 이용률이 2 배 더 높았다. 결론: 정부의 지역사회 기반 통합돌봄 정책 수립을 위하여 경로당 이용에 영향을 미치는 인구사회학적요인, 삶의 만족도, 건강상태와 관련된 요인들을 고려하여, 이용률을 높이고, 건강관리를 위한 통합 돌봄 시설이 될 수 있도록 하여야 할 것이다.

A Study on the Development of Digital Contents for Land Estimation (토지평가 디지털컨텐츠 개발에 관한 연구)

  • Song Eun-Jee
    • Journal of Digital Contents Society
    • /
    • v.4 no.2
    • /
    • pp.147-155
    • /
    • 2003
  • The problem of the objective adequacy on land estimation has been seriously discussed with the Issue of paradigm conversion on land policy as the economy situation has been worse enough to be confused due to the sale price which could not be predicted in Korea. Especially as the data of the government land value is not recognized as the official one, the separate alternation has been adopted to calculate the value of land compensation or development allotment. Rather it has raised a question in argument that the system of the declared value does not accomplish its basic function properly on the contrary of the original purpose to unify the computation of the government land value. To reconsider the adequacy of government land value, the most crucial factor is to select the items of land estimation reasonably. In addition, it is urgently required to develop the system of digital contents to provide the data of land evaluation which most of people could trust, who are facing of the flood of information through internet.

  • PDF

Design and Implementation of Security System for Wargame Simulation System (워게임 시뮬레이션 시스템을 위한 보안시스템 설계 및 구현)

  • Song Jong Seok;Kim Jin Soo;Shin Moon Sun;Ryu Keun Ho
    • The KIPS Transactions:PartC
    • /
    • v.12C no.3 s.99
    • /
    • pp.369-378
    • /
    • 2005
  • War simulation system is a virtual space that my tactical simulation exercise is held. The data used in this system are considered sensitive and needs to be protected. But suity vulnerabilities and possible security loopholes were not considered when designing the war game simulation system. So currently the systemis highly vulnerable against hackers and data leakages. This paper proposed a security system for war game simulation system based on considering the currently vulunerabilities and possible suity leakages. The proposed security system supports security patches. In this paper, we analyze vulunerabilities of the running environment of current system and we design and implement the security system that is consisted of three components : Authentication System, Encryption System and Network Security System. The security patches are safe and there are no negative effects on the system's performance. The patches are proved to be effective and very reliable towards solving the security vulnerabilities.