• Title/Summary/Keyword: 언어적 행위

Search Result 251, Processing Time 0.024 seconds

A Study on Typology and the Casual factors of Elderly-abuse (노인학대 유형화 및 유형결정요인 연구)

  • Lee, Yun-Kyung;Kim, Mee-Hye
    • 한국노년학
    • /
    • v.28 no.4
    • /
    • pp.1165-1178
    • /
    • 2008
  • The objectives of this study are developing the new types of elderly abuse and finding the variables affecting the new elderly abuse type. And This is at suggesting the intervention strategies preventing the elderly abuse. The 350 cases of elderly abuse reported in Elder Protection Agency was analysed. Data is analyzed by using statistical techniques including cluster analysis and logit-regression. New type of elderly abuse is "violent elderly abuse" and "avoiding elderly abuse". Violent elderly abuse is very connected with directly violence speech and behavior and avoiding elderly abuse is connected with neglect and abandonment, self-neglect. The elderly's instrumental activity of daily living and education, the offender's sex and education and living together type of the elderly - the offender, and the offender's care burden are the casual factors of the new type of elderly abuse. Based on the results, the various service programmes for the abused elderly is developed and implemented.

The Suggestion and Validation on the Structural Model of the Causes of Cyber-violence (사이버 폭력의 원인에 대한 구조모델의 제시와 검증)

  • Yoo, Sang-Mi;Kim, Mi-Ryang
    • The Journal of Korean Association of Computer Education
    • /
    • v.14 no.1
    • /
    • pp.23-33
    • /
    • 2011
  • The purpose of the study is to investigate the structural relations between variables which give influences on cyber-violence. On the basis of literal materials, those variables as self-control ability, social identity, and norm consciousness are selected as the variables of having influences on cyber-violence, and the analysis is focused on the influence that anonymity, the representative characteristic of Internet, gives them. The validation of the Model is to be done through AMOS 6.0, and the degree of Model validity is to be estimated through the values of ${\chi}^2$, RMSEA, CFI, NNFI. As the result of the analysis, it is found that social identity and norm consciousness are direct causes of cyber-violence. Anonymity does not have any direct relations with it, but it indirectly gives influences on cyber-violence, for it gives some influences on social identity and norm consciousness. That is, anonymity is a cause of weakening social identity and degrading norm consciousness, by which, it is assumed, cyber-violence is triggered.

  • PDF

A study on integration of semantic topic based Knowledge model (의미적 토픽 기반 지식모델의 통합에 관한 연구)

  • Chun, Seung-Su;Lee, Sang-Jin;Bae, Sang-Tea
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06b
    • /
    • pp.181-183
    • /
    • 2012
  • 최근 자연어 및 정형언어 처리, 인공지능 알고리즘 등을 활용한 효율적인 의미 기반 지식모델의 생성과 분석 방법이 제시되고 있다. 이러한 의미 기반 지식모델은 효율적 의사결정트리(Decision Making Tree)와 특정 상황에 대한 체계적인 문제해결(Problem Solving) 경로 분석에 활용된다. 특히 다양한 복잡계 및 사회 연계망 분석에 있어 정적 지표 생성과 회귀 분석, 행위적 모델을 통한 추이분석, 거시예측을 지원하는 모의실험(Simulation) 모형의 기반이 된다. 본 연구에서는 이러한 의미 기반 지식모델을 통합에 있어 텍스트 마이닝을 통해 도출된 토픽(Topic) 모델 간 통합 방법과 정형적 알고리즘을 제시한다. 이를 위해 먼저, 텍스트 마이닝을 통해 도출되는 키워드 맵을 동치적 지식맵으로 변환하고 이를 의미적 지식모델로 통합하는 방법을 설명한다. 또한 키워드 맵으로부터 유의미한 토픽 맵을 투영하는 방법과 의미적 동치 모델을 유도하는 알고리즘을 제안한다. 통합된 의미 기반 지식모델은 토픽 간의 구조적 규칙과 정도 중심성, 근접 중심성, 매개 중심성 등 관계적 의미분석이 가능하며 대규모 비정형 문서의 의미 분석과 활용에 실질적인 기반 연구가 될 수 있다.

Analysis of Social Issues and Media-specific Characteristics Related to Presidential Records based on Semantic Network (언어 네트워크 기반 대통령기록물 관련 이슈 및 매체별 특성 분석)

  • Jung, Sang Jun;Yun, Bo-Hyun;Oh, Hyo-Jung
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.30 no.1
    • /
    • pp.181-207
    • /
    • 2019
  • This study analyzed social issues related to presidential records in press releases using semantic network analysis method. For this purpose, we 1) selected five major news medias in Korea - Chosun Ilbo, JoongAng Ilbo, Dong-A Ilbo, Hankyoreh, and Kyunghyang Newspaper; 2) collected relevant articles including the subject word "Presidential Records", and 3) analyzed issue trends based on timeline using semantic network. According to medias, the issue related to the presidential records were analyzed by comparing the specific keywords in terms of persons, entities, actions. At the results, It is possible to identify the reporting patterns and components of the presidential records related issues. And the difference of media characteristics according to news media tendency was derived.

Clinical nurses' experiences of workplace verbal violence: a phenomenological study (병원 내 언어폭력에 노출된 임상 간호사의 경험: 현상학적 연구)

  • Woo, Min Soo;Kim, Hyoung Suk;Kim, Jeung-Im
    • Women's Health Nursing
    • /
    • v.28 no.2
    • /
    • pp.154-164
    • /
    • 2022
  • Purpose: This study aimed to describe clinical nurses' lived experiences of workplace verbal violence through qualitative research using descriptive phenomenology. Methods: Six female Korean nurses who had less than 5 years of clinical experience and had experienced verbal violence in the workplace within the past year participated in the study. Data were collected through one-on-one in-depth interviews with the participants and analyzed using Colaizzi's phenomenological method. Results: A total of 27 codes, eight themes, and four theme clusters were derived from the participants' statements. The four theme clusters of the clinical nurses' experiences of verbal violence in the workplace were as follows: "tip of the iceberg," "beyond me and my control," "fear and resignation," and "personal burden." The participants recognized that nurses experienced verbal violence daily, and that the causes of and responses to verbal violence were determined by external situational factors rather than nurses' individual problems. This suggests that nurses felt that they had no choice but to personally cope with verbal violence and bear the consequences due to systematic indifference and silence about verbal violence experienced by clinical nurses. Conclusion: The findings show that verbal violence was pervasive and unmerited, yet often endured at the cost of a personal burden to nurses. A clear definition of verbal violence and education for employees are needed, and a reporting system should be established to report all forms of violence regardless of the severity of the incident.

Inducing Harmful Speech in Large Language Models through Korean Malicious Prompt Injection Attacks (한국어 악성 프롬프트 주입 공격을 통한 거대 언어 모델의 유해 표현 유도)

  • Ji-Min Suh;Jin-Woo Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.3
    • /
    • pp.451-461
    • /
    • 2024
  • Recently, various AI chatbots based on large language models have been released. Chatbots have the advantage of providing users with quick and easy information through interactive prompts, making them useful in various fields such as question answering, writing, and programming. However, a vulnerability in chatbots called "prompt injection attacks" has been proposed. This attack involves injecting instructions into the chatbot to violate predefined guidelines. Such attacks can be critical as they may lead to the leakage of confidential information within large language models or trigger other malicious activities. However, the vulnerability of Korean prompts has not been adequately validated. Therefore, in this paper, we aim to generate malicious Korean prompts and perform attacks on the popular chatbot to analyze their feasibility. To achieve this, we propose a system that automatically generates malicious Korean prompts by analyzing existing prompt injection attacks. Specifically, we focus on generating malicious prompts that induce harmful expressions from large language models and validate their effectiveness in practice.

A Formal Specification of Role Graph Model Increasing Integrity (무결성이 강화된 역할 그래프 모델의 정형적 명세)

  • Choi EunBok;Lee HyeongOk
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.11
    • /
    • pp.1620-1629
    • /
    • 2004
  • The objectives of access control are to protect computing and communication resources from illegal use, alteration, disclosure and destruction by unauthorized users. Although Biba security model is well suited for protecting the integrity of information, it is considered too restrictive to be an access control model for commercial environments. And, Role-Based Access Control(RBAC) model, a flexible and policy-neutral security model that is being widely accepted in commercial areas, has a possibility for compromising integrity of information. In this paper, We present the role graph model which enhanced flexibility and integrity to management of many access permission. Also, In order to represent those rule and constraints clearly, formal descriptions of role assignment rule and constraints in Z language are also given.

  • PDF

Recognition of the Type and Cause of Trolling (<리그 오브 레전드> 트롤링의 유형과 발생 원인에 대한 인식 -사용자 심층인터뷰를 중심으로-)

  • Seo, Seong-Eun;Kim, Chi-Yo
    • Journal of Korea Game Society
    • /
    • v.15 no.4
    • /
    • pp.93-110
    • /
    • 2015
  • This study aimed at identifying user recognition of the types and causes of online game trolling through in-depth interview with users of . Online game trolling refers to anti-social behaviors to do acts provoking other users to anger intentionally so induce their actual reaction in online games. Types of online game trolling contained flaming, griefing, unskilled player and lack of understanding on user's rule. And users are recognizing as problems that anonymity is excessively high in the game, a single game has undue significance, team play is given too much emphasis in a situation lacking in social cohesivenessk as the structural causes of trolling in . Accordingly, in order to decrease online game trolling, it is urgent to improve the game-structured layer causing trolling rather than regulate trollers only.

A Study on Implementation of Model Checking Program for Verifying LTS Specification (LTS 명세 검증을 위한 모델 검증기 개발)

  • Park, Yong-Bum;Kim, Tae-Gyun;Kim, Sung-Un
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.4
    • /
    • pp.995-1004
    • /
    • 1998
  • This paper presents an implementation of model checking tool for LTS process specification, which checks deadlock, livelock and reachability for the state and action. The implemented formal checker using modal mu-calculus is able to verify whether properties expressed in modal logic are true on specifications. We prove experimentally that it is powerful to check, safety and liveness for the state and action on LTS. The tool is implemented by $C^{++}$ language and runs on IBM PC under Windows NT.

  • PDF

General Purpose Packet Capturing Tool (범용 패킷 포획 도구)

  • 이준원;심영철
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 1998.10a
    • /
    • pp.606-608
    • /
    • 1998
  • 컴퓨터 통신의 발달로 인하여 정부기관, 학교, 연구소, 기업체등의 사회의 모든 분야에 걸쳐 인터넷 환경이 널리 보급되고 있다. 이를 통하여 컴퓨터간의 단순한 정보와 자원의 공유에 국한되었던 범위를 넘어 점자 결제, 전자 상거래, 상용 서비스 등 많은 편리함이 제공되고 있다. 그러나 최근 들어 이러한 인터넷을 이용한 불법 침입자들의 정보 유출이나 파괴 혹은 금융사고와 같은 범죄가 더욱 많아지고 지능화 되고 있다. 이러한 문제점을 보안 하기위해 불법적인 침입자들이 네트워크를 통해 시스템에 접근하여 중요한 정보를 유출 혹은 파괴하는 행위를 감시할 수 있는 시스템이 필요하게 되었다. 본 논문에서는 이러한 목적을 위해 사용하는 네트워크 모니터링 혹은 칩입 탐지를 위한 도구를 제안하고 기술할 것이다. 이 도구는 현존하는 도구들이 톡정 패킷만을 모니터링할 수 있는 문제점을 강력한 명세언어를 사용하여서 응용프로그램에서 사용하는 패킷까지도 포획할 수 있는 기능을 제공한다.

  • PDF