• Title/Summary/Keyword: 인터넷 사이트

Search Result 1,228, Processing Time 0.025 seconds

Impact of Social Networking Service on the Team Cooperation, Quality of Decision Making and Job Performance (SNS의 사용이 팀의 협력과 의사결정의 질 및 업무성과에 미치는 영향)

  • Kim, Yoon-Mi;Chung, Dong-Seop
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.2
    • /
    • pp.180-190
    • /
    • 2014
  • Social network services are increasingly being used in organizational settings to improve relationships among employees and enhance prospects for information exchange and cooperative work. Social Networking Service(SNS) has deeply penetrated organizational job settings, influencing multiple aspects of employee's life. This study is designed to explore the impact of SNS engagement on the job performance mediated as team cooperation and decision making quality effects. Data were collected from 146 employees who use organizational SNS in there company. Factor analysis and structural equation method are employed. Results from a survey accompanied by the substantial impacts of organizational employee's social networking engagement on social learning processes and outcomes. SNS engagement not only directly influences organizational employee's job performance, but also helps their team cooperation and decision making quality from others and adapt to organizational culture, both of which play prominent roles in improving their job performance.

Determinants of participation in UCC services (UCC 서비스 사용자의 참여수준 결정요인분석)

  • Kim, Yeon-Jeong;Jun, Bang-Gi;Kim, Yoo-Jung;Kang, So-Ra
    • Journal of Korea Technology Innovation Society
    • /
    • v.10 no.3
    • /
    • pp.486-508
    • /
    • 2007
  • This study identifies key determinants of participation in UCC services. Incorporating insights from the flow theory, we examine the effects of psychological factors of social presence, self expression, arousal, and challenge as well as web-site characteristics variables of media easiness, contents usability, and immediateness. We have done a sample survey of internet users and collected 260 responses. Using Windows SPSS/PC 12.0 Package, we have performed statistical analyses including a correlation analysis, a factor analysis, and a multiple regression analysis. The result of the study is as follows. Psychological variables of perceived social presence, self expression, arousal, and challenge all show positive significant effect on participation in UCC service. Among web site characteristics, media easiness, which consists of a web structure that is easy-to-use, user friendliness, and personalized service, demonstrates a positive significant effect on participation in UCC services. Immediateness also has a positive significant effect. Some of the practical implications of the result are follows. We should improve user access to platforms of UCC service by opening up platforms. This will heighten perceived challenge which has the strongest influence on participation in UCC services. We need to focus on multimedia services and adjust to the cultural code of netizen who crave for visual expressions and on the spot on-line activities. Also suggested is that contributions made by participants need to be acknowledged through such provisions as profit sharing. Needs for individualized service, which is an aspect of media easiness, should also be addressed. Participants tend to value individuality while at the same time accepting broader trends. Information services need to be customized for individuals. In UCC centered internet businesses, netizen consumers are presumer. They are consumers and producers at the same time, and consumer needs should also be explored for the success of internet businesses.

  • PDF

Predict ion-based Concurrency Control for A Large Scale Networked Virtual Environment Supporting Various Navigation Speed (다양한 이동속도를 지원하는 대규모 네트웍 가상 환경을 위한 예측 기반 동시성 제어)

  • 이은희;이동만;한승현;현순주
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.202-204
    • /
    • 2001
  • 가상 세계의 공유 개념은, 특히 사용자들이 인터넷 같이 대규모 네트웍을 통해 지역적으로 분산된 경우는 복제가 수용할 수 있는 상호작용 성능을 제공하기 때문에 각 사용자의 사이트에 정보를 복제함으로써 확장된다. 그러나, 다수의 동시 갱신은 replicas간의 일관되지 않은 뷰를 일으키게 될 것이다. 따라서, 동시성 제어가 복제자들간에 일관된 상태를 유지하도록 하기 위한 중요한 요소가 된다. 우리는 단지 대상 객체의 주변에 있는 사용자들만이 소유권 요청을 다중 전송하게 하는 확장성 있는 예측기반 동시성 제어 스킴을 제안했었다. 이 작업에서, 우리는 모든 사용자들이 동일한 속도론 가지고 가상 세계를 이동한다고 가정했다. 이것은, 그러나, 좀더 사실성을 더하기 위해 사용자가 가상 세계와 상호작용을 할 매 그들의 이동속도를 변경하도록 하는 네트웍 게임같은 네트웍 가상 환경에서는 너무 common 하다. 본 논문은 다양한 속도를 가진 사자를 지원하기 위한 확장을 제안한다. 확장된 스킴은 다른 속도의 수만큼의 다중 Entity Radii를 가지며 각 속도를 가진 사용자에게 분리된 큐를 할당한다. 각 큐는 다음 소유자 후보를 예측하기 위해 동시에 예측을 수행하고 선택된 후보들간에서 최소의 Predicted Collision Time을 가지는 최종 후보자가 선택된다. 이는 사용자의 속도에 기반을 둔 적절한 Entity Radius를 사용함으로써 소유권의 timely advanced transfer과, 다른 이돔 속도와 latency를 가지는 사용자들 간의 간섭을 줄임으로써 공정(공평)한 소유권 양도, 그리고 불필요한 소유권 전송을 줄임으로써 놓은 예측 정확도를 제공한다.성을 지닌 AMMQL 학습법은 로봇축구와 같이 끊임없이 실시간적으로 변화가 일어나는 다중 에이전트 환경에서 특히 높은 효과를 볼 수 있다. 본 논문에서는 AMMQL 학습방법의 개념을 소개하고, 로봇축구 에이전트의 동적 위치 결정을 위한 학습에 어떻게 이 학습방법을 적용할 수 있는지 세부 설계를 제시한다.다.으로서 hemicellulose구조가 polyuronic acid의 형태인 것으로 사료된다. 추출획분의 구성단당은 여러 곡물연구의 보고와 유사하게 glucose, arabinose, xylose 함량이 대체로 높게 나타났다. 점미가 수가용성분에서 goucose대비 용출함량이 고르게 나타나는 경향을 보였고 흑미는 알칼리가용분에서 glucose가 상당량(0.68%) 포함되고 있음을 보여주었고 arabinose(0.68%), xylose(0.05%)도 다른 종류에 비해서 다량 함유한 것으로 나타났다. 흑미는 총식이섬유 함량이 높고 pectic substances, hemicellulose, uronic acid 함량이 높아서 콜레스테롤 저하 등의 효과가 기대되며 고섬유식품으로서 조리 특성 연구가 필요한 것으로 사료된다.리하였다. 얻어진 소견(所見)은 다음과 같았다. 1. 모년령(母年齡), 임신회수(姙娠回數), 임신기간(姙娠其間), 출산시체중등(出産時體重等)의 제요인(諸要因)은 주산기사망(周産基死亡)에 대(對)하여 통계적(統計的)으로 유의(有意)한 영향을 미치고 있어 $25{\sim}29$세(歲)의 연령군에서, 2번째 임신과 2번째의 출산에서 그리고 만삭의 임신 기간에, 출산시체중(出産時體重) $3.50{\sim}3.99kg$사이의 아

  • PDF

A Mobile Payment System Based-on an Automatic Random-Number Generation in the Virtual Machine (VM의 자동 변수 생성 방식 기반 모바일 지급결제 시스템)

  • Kang, Kyoung-Suk;Min, Sang-Won;Shim, Sang-Beom
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.12 no.6
    • /
    • pp.367-378
    • /
    • 2006
  • A mobile phone has became as a payment tool in e-commerce and on-line banking areas. This trend of a payment system using various types of mobile devices is rapidly growing, especially in the Internet transaction and small-money payment. Hence, there will be a need to define its standard for secure and safe payment technology. In this thesis, we consider the service types of the current mobile payments and the authentication method, investigate the disadvantages, problems and their solutions for smart and secure payment. Also, we propose a novel authentication method which is easily adopted without modification and addition of the existed mobile hardware platform. Also, we present a simple implementation as a demonstration version. Based on virtual machine (VM) approach, the proposed model is to use a pseudo-random number which is confirmed by the VM in a user's mobile phone and then is sent to the authentication site. This is more secure and safe rather than use of a random number received by the previous SMS. For this payment operation, a user should register the serial number at the first step after downloading the VM software, by which can prevent the illegal payment use by a mobile copy-phone. Compared with the previous SMS approach, the proposed method can reduce the amount of packet size to 30% as well as the time. Therefore, the VM-based method is superior to the previous approaches in the viewpoint of security, packet size and transaction time.

A Study on Single Sign-On Authentication Model using Multi Agent (멀티 에이전트를 이용한 Single Sign-On 인증 모델에 관한 연구)

  • 서대희;이임영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.7C
    • /
    • pp.997-1006
    • /
    • 2004
  • The rapid expansion of the Internet has provided users with a diverse range of services. Most Internet users create many different IDs and passwords to subscribe to various Internet services. Thus, the SSO system has been proposed to supplement vulnerable security that may arise from inefficient management system where administrators and users manage a number of ms. The SSO system can provide heightened efficiency and security to users and administrators. Recently commercialized SSO systems integrate a single agent with the broker authentication model. However, this hybrid authentication system cannot resolve problems such as those involving user pre-registration and anonymous users. It likewise cannot provide non-repudiation service between joining objects. Consequently, the hybrid system causes considerable security vulnerability. Since it cannot provide security service for the agent itself, the user's private information and SSO system may have significant security vulnerability. This paper proposed an authentication model that integrates a broker authentication model, out of various authentication models of the SSO system, with a multi-agent system. The proposed method adopts a secure multi-agent system that supplements the security vulnerability of an agent applied to the existing hybrid authentication system. The method proposes an SSO authentication model that satisfies various security requirements not provided by existing broker authentication models and hybrid authentication systems.

Management Method for Private Key File of PKI using Container ID of USB memory (USB 메모리의 컨테이너ID를 이용한 PKI 기반의 개인키 파일의 안전한 관리 방안)

  • Kim, Seon-Joo;Joe, In-June
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.607-615
    • /
    • 2015
  • Mosts user of internet and smart phone has certificate, and uses it when money transfer, stock trading, on-line shopping, etc. Mosts user stores certificate in a hard disk drive of PC, or the external storage medium. In particular, the certification agencies are encouraged for user to store certificate in external storage media such as USB memory rather than a hard disk drive. User think that the external storage medium is safe, but when it is connect to a PC, certificate may be copied easily, and can be exposed to hackers through malware or pharming site. Moreover, if a hacker knows the user's password, he can use user's certificate without restrictions. In this paper, we suggest secure management scheme of the private key file using a password of the encrypted private key file, and a USB Memory's hardware information. The private key file is protected safely even if the encrypted private key file is copied or exposed by a hacker. Also, if the password of the private key file is exposed, USB Memory's container ID, additional authentication factor keeps the private key file safe. Therefore, suggested scheme can improve the security of the external storage media for certificate.

Cyber-Lecture Management System based on XML (XML 기반의 사이버 강좌관리 시스템)

  • Kim, Hye-Young;Kim, Hwa-Sun;Kim, Heung-Sik;Kim, Sang-Gyun;Choi, Heung-Kook
    • The KIPS Transactions:PartA
    • /
    • v.10A no.5
    • /
    • pp.529-538
    • /
    • 2003
  • The speedy development of the world-wide web is rapidly growing the internet-based tools for the remote instruction. In interchanging and expressing the information of one another on the web, it is produced through the form of HTML(Hyoertext Text Markup Language). However, the structural disadvantage of the HTML is becoming to require a powerful XML(eXtensible Markup Language) which can store all the sphere of data, and transform them into another form. Nevertheless, because the powerful XML(eXtensible Markup Language). However necessary that XML standard should be applied appropriately. Because existing lecture data of cyber education sites cannot be shared, the users should passively use only the functions offered by cyber school. To solve the problem of this limit, in this study, the standardized data structure for XML is defined, and system model for processing between the server and the client is provided. By storing the lecture data of cyber education sites as XML on the web, stored data came to be reused without changing on any site. In the view of Users, they could used the Internet service with equipment that they want at any place and any time. To control any kinds of CK\LMS(Cyber Lecture Management System) for Administrator and Users, we offered a variety of Multimedia applications and an easy interface and built a new style of CLMS. Therefore, by strong and extracting the data related with the virtual education of the secondary school through the form of XML, for the effective interchange and sharing of the information, maximum utilization of the information can be achieved.

The Development and Performance Measurements of Consumer Health Information(CHI) Educational Programs to Improve Health Literacy among Public Library Users (공공도서관 이용자의 소비자건강정보(CHI) 리터러시 향상을 위한 교육프로그램 개발 및 성과측정연구)

  • Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.4
    • /
    • pp.391-414
    • /
    • 2012
  • Despite the growth in public concern about health information, the ratio of users who can search for accurate and reliable health information sources has been found to be quite low. Public libraries, as the best contact point to general users, must provide training programs for improving health literacy so that users will have the ability to search and analyze health information, judge the accuracy and reliability of resources, and make informed health-related decisions. This study developed a health information literacy education program suitable for Korean public library users. The effectiveness of the training was measured after administering the program, and necessary improvements were identified. As a result, this study found the education program had the following effects: improved public library users' familiarity with CHI-related terms, improved users' ability to find CHI-related information resources on the Internet, and significantly improved knowledge about health-related websites and information sources. In addition, users expressed interest in seminars on a variety of health information sources in the public library and asked that CHI-related education be included in the library's regular programming. However, this research represented the first time CHI-related education for public library users was performed in Korea, and therefore many limitations were present in the education instructor, the diversity of subjects, and the methodology. Development of more advanced CHI-related education programs for users is still required.

An Analysis of Diffusion of Main Information and Peripheral Information: Focusing on Visibility and Connectivity of Word based on Network Analysis (핵심 정보와 주변 정보의 확산 과정 연구: 단어의 가시성(visibility)과 연결성(connectivity) 분석을 중심으로 본 언론의 프레임)

  • Hong, Ju-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.3
    • /
    • pp.269-287
    • /
    • 2016
  • This study explores of press report on the death of Beongen Yoo based on network analysis and how issue diffuses via Internet and SNS in mainstream news and conservative channels of comprehensive programming. Issue salience, word's visibility and word's connectivity are the main keyword and analysis criteria of this study. Conservative channel of comprehensive programming focused on the surrounding information rather than core information compared to Mainstream media, Conservative channels of comprehensive media was interested in Yu, Beongeon, an article left, brand, rumor of a body and Mainstream media focused on the results of DNA test. Mainstream media covers this case as the discovery of the Yu, Beongeon body, Mainstream media reported as 'the discovery of the body frame, conservative channels of comprehensive programming reports as blame of investigation at the first stage. The former focuses on the cause of death and the latter focuses on the raising of strong doubts frame at the second stage. In case of the third stage the latter covered on the emphasis of the surrounding information. They frames the issue differently based on network analysis. The view point of conservative channel of comprehensive programming is diffused via SNS. This study highlights the role of journalist of mainstream media in the process of agenda-setting

A Study on Information Users' Needs and Information Seeking Behavior of Doctoral Researchers in Digital Age (디지털 환경에서 학술연구자들의 정보요구 및 이용행태에 관한 연구 - 인문사회분야와 과학기술분야의 비교를 중심으로 -)

  • Kim, Jeong-Hwan;Kim, Jay-Hoon;Hwang, Jae-Young
    • Journal of Korean Library and Information Science Society
    • /
    • v.42 no.3
    • /
    • pp.189-208
    • /
    • 2011
  • In the digital environment where the Internet and IT change rapidly, researchers have utilized scientific information by relying on more complex and various media than before. This study performed a group interview with thirteen questions derived from five categories in order to understand information needs and information seeking behaviors of Korean doctoral researchers in this information environment. The five categories are (1) identifying information resource usage pattern, (2) attitude towards information resources and reasons for use, (3) IT skills and information literacy, (4) physical library use vs electronic access, and (5) attitudes toward the digital library. In particular, this study focused on analyzing similarities and differences of two groups of researchers selected equally in the humanities and social sciences and in science and technology by doing the interview. The research showed that there are no differences in the goal of using scientific information, information literacy, the ratio of using written materials to electronic resources, and routes of acquiring research ideas or knowledge, but there are differences in materials used for studies or researches and in favorite scientific portal sites.