• Title/Summary/Keyword: 재이용 IT서비스

Search Result 449, Processing Time 0.023 seconds

A study on Consumer's Reaction to User Context Characteristics in AR Advertisement (모바일 증강현실 광고의 맥락특성에 따른 수용자 반응)

  • Cho, Yong-Jae
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.7
    • /
    • pp.84-92
    • /
    • 2015
  • Advertisement market using the augmented reality has been rapidly increasing recently due to integration with LBS(location based services). This study was conducted to examine the effect and acceptance intention of mobile augmented reality advertisement through TAM(Technology Acceptance Model). 'Contextual feature,' which is a characteristic of augmented reality advertisement, was selected as an outside effective variable, and perceived usefulness and perceived ease of use, which are the core variables of TAM, and attitude of advertisement and advertisement acceptance intention were selected as important evidences of Technology Acceptance Process. Also, the relationship between each evidences were investigated. As a result of the investigation of the outside influence on the acceptance model of augmented reality advertisement, it was shown that the contextual feature of augmented reality advertisement had meaningful influence on perceived usefulness and perceived ease of use, and it was also shown that it has positive influence on the attitude of advertisement and acceptance intention of advertisement.

System Design for the Safe store and Issue Service Assurance of the E-Document (전자문서의 안전한 보관 및 발급 서비스 확보를 위한 시스템 설계)

  • Sung, Kyung-Sang;Kim, Jung-Jae;Oh, Hae-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.6
    • /
    • pp.173-180
    • /
    • 2008
  • Certified e-Document Authority keep it with protection legal as a system a guarantee and identifies originality of an e-Record, It presume to be authenticity e-Records and contents of an e-Record prove what was not changed. But, e-Records has high medium degree of dependence and loss danger of information has very high problems. In addition, Because correction(attachment and deletion) and a revision of information are easy, a problem for integrity and the originality of an e-Record is caused. Existing system show the following inefficient. For the originality guarantee, an existing e-Documents encryption method accomplishes a encrypted process of a whole document with a symmetric key, if the information revised midway, the whole documents content must accomplish re-scanning and re-encryption process again. To get over such inefficient, this paper maximize efficiency which occurred at the time of partial information revision request by encryption and managing using the link information based on the linkage characteristics of the each page on the registered requested e-Documents, It was able to increase security configuration by minimizing problems on an information exposure through increasing complicated of the key management.

  • PDF

A Study on the Trend and Meaning of Searching for Herbal Medicines in Online Portal Using Naver DataLab Search Trend Service (네이버 데이터랩 검색어 트렌드 서비스를 이용한 온라인 포털에서의 한약재 검색 트렌드와 의미에 대한 고찰)

  • Kim, Young-Sik;Lee, Seungho
    • The Korea Journal of Herbology
    • /
    • v.36 no.5
    • /
    • pp.1-14
    • /
    • 2021
  • Objectives : From January 2020, when the first confirmed case of COVID-19 in Korea, the use of health information using the Internet is expected to increase. It is expected that there will be a significant change in the general public's interest in Korean herbal medicines for health care. Therefore, in this study, we tried to confirm the change in the search trend of Korean herbal medicines after the COVID-19 epidemic. Methods : Using the "Naver DataLab (http://datalab.naver.com)" service of a Korean portal site Naver, search volume was investigated with 606 Korean herbal medicines as keywords. The search period was from January 2020, right after the onset of COVID-19, to June 2021. The search results were sorted by the peak search volume and the total search volume. Results : 'Cheonsangap (천산갑, 穿山甲, Manitis Squama)' was the most searched Korean herbal medicine in the peak search volume and total search volume with least bias. Conclusions : The problem of supply and demand of Korean herbal medicines of high public interest was identified. Broadcasting and media exposure were the factors that had a big impact on the search volume for Korean herbal medicines. As it was confirmed that the search volume for Korean herbal medicines increased rapidly due to media exposure, it is necessary to provide correct information about Korean herbal medicines, improve public awareness, and manage stable supply and demand based on continuous search trend monitoring.

A Study on the Public Interest of Collected Information (수집된 정보의 공익성에 관한 고찰)

  • Park, Kook-Heum
    • Informatization Policy
    • /
    • v.26 no.1
    • /
    • pp.25-45
    • /
    • 2019
  • With the advent of the data economy, interest in using big data has increased, but conflicts with protecting personal information have been also steadily raised. In this regard, major countries are accelerating use of big data by exempting de-identified, pseudonymous personal information from protection. However, these policies have been made without the understanding that the economic value of personal information has been actually changing slowly. This paper presents the concept of 'collected information' and defines it as having public interest and therefore, not the exclusive property of the collector of such information. The paper shows the collected information has public interest in terms of personal information protection, connectivity, and universal service and public goods. It also specifies that the 'data governance' cannot be applied to the current data utilization framework that depends upon the holder's consent; rather, it raises the need to improve the practices of information provision consent or provide the beneficiary right of information use to the information holder in order to ensure the proper 'data governance' that will turn market failure into success.

Current Trends for National Bibliography through Analyzing the Status of Representative National Bibliographies (주요국 국가서지 현황조사를 통한 국가서지의 최신 경향 분석)

  • Lee, Mihwa;Lee, Ji-Won
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.1
    • /
    • pp.35-57
    • /
    • 2021
  • This paper is to grasp the current trends of national bibliographies through analyzing representative national bibliographies using literature review, analysis of national bibliographies' web pages and survey. First, in order to conform to the definition of a national bibliography as a record of a national publication, it attempts to include a variety of materials from print to electronic resources, but in reality it cannot contain all the materials, so there are exceptions. It is impossible to create a general selection guide for national bibliography coverage, and a plan that reflects the national characteristics and prepares a valid and comprehensive coverage based on analysis is needed. Second, cooperation with publishers and libraries is being made to efficiently generate national bibliography. For the efficiency of national bibliography generation, changes should be sought such as the standardization and consistency, the collection level metadata description for digital resources, and the creation of national bibliography using linked data. Third, national bibliography is published through the national bibliographic online search system, linked data search, MARC download using PDF, OAI-PMH, SRU, Z39.50, and mass download in RDF/XML format, and is integrated with the online public access catalog or also built separately. Above all, national bibliographies and online public access catalogs need to be built in a way of data reuse through an integrated library system. Fourth, as a differentiated function for national bibliography, various services such as user tagging and national bibliographic statistics are provided along with various browsing functions. In addition, services of analysis of national bibliographic big data, links to electronic publications, and mass download of linked data should be provided, and it is necessary to identify users' needs and provide open services that reflect them in order to develop differentiated services. Through the current trends and considerations of the national bibliographies analyzed in this study, it will be possible to explore changes in national and international national bibliography.

Entity Authentication Scheme for Secure WEB of Things Applications (안전한 WEB of Things 응용을 위한 개체 인증 기술)

  • Park, Jiye;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.5
    • /
    • pp.394-400
    • /
    • 2013
  • WoT (Web of Things) was proposed to realize intelligent thing to thing communications using WEB standard technology. It is difficult to adapt security protocols suited for existing Internet communications into WoT directly because WoT includes LLN(Low-power, Lossy Network) and resource constrained sensor devices. Recently, IETF standard group propose to use DTLS protocol for supporting security services in WoT environments. However, DTLS protocol is not an efficient solution for supporting end to end security in WoT since it introduces complex handshaking procedures and high communication overheads. We, therefore, divide WoT environment into two areas- one is DTLS enabled area and the other is an area using lightweight security scheme in order to improve them. Then we propose a mutual authentication scheme and a session key distribution scheme for the second area. The proposed system utilizes a smart device as a mobile gateway and WoT proxy. In the proposed authentication scheme, we modify the ISO 9798 standard to reduce both communication overhead and computing time of cryptographic primitives. In addition, our scheme is able to defend against replay attacks, spoofing attacks, select plaintext/ciphertext attacks, and DoS attacks, etc.

Criminal Law Issues and Challenges Due to Changes in the Healthcare Paradigm (헬스케어 패러다임 변화에 따른 형사법적 쟁점과 과제)

  • Sun, JongSoo
    • The Korean Society of Law and Medicine
    • /
    • v.24 no.1
    • /
    • pp.43-65
    • /
    • 2023
  • The healthcare industry is a digital healthcare that combines technology based on the 4th Industrial Revolution, dealing with information on individual health and medical care, and is a fusion of health care services and medical science and technology. It is questionable whether digital healthcare according to the paradigm change can be discussed by the concept of medical practice under the existing Medical Act. There is no clear definition of the concept of medical practice in the Medical Service Act, but the concept is established through precedents. In addition, under the Medical Service Act, the subject of medical practice is limited to medical personnel. However, digital healthcare sometimes diagnoses and treats diseases using digital technology by medical personnel. On the other hand, what is possible by non-medical personnel is digital healthcare. This is because digital healthcare is understood as a concept that includes health care such as exercise, eating habits, and weight control. For this reason, if the concept of medical practice under the "Medical Act" on digital healthcare is included, it is subject to criminal punishment for "unlicensed medical practice" prescribed in Article 27 of the "Medical Act". In the health and medical industry, digital transformation and convergence with information and communication technology are rapidly progressing. As a result, there is a need to newly define it as 'digitalized medical practice' or 'information and communication technology (ICT)-based medical practice' separately from existing medical practices. The concept of medical practice has variability, not a fixed and invariable concept. However, in response to this demand, it is not an infinite expansion of the concept of medical practice, but a request to reset its scope. Therefore, the concept of medical practice should be legislated by reflecting the demand of consumers for the medical service system.

Relationship with the Phenology of Cherry Blossoms and Associated Festival : Case of Changwon Jinhae Gunhangje (벚나무의 계절현상과 이를 이용한 지역축제와의 관계 - 창원시 진해 군항제 사례 -)

  • Do, Yuno;Kim, Seong-Bo;Joo, Gea-Jae;Choi, Kee-Ryong
    • Journal of the Korean association of regional geographers
    • /
    • v.19 no.3
    • /
    • pp.446-453
    • /
    • 2013
  • Festivals using plant phenology is one of the examples can represent the ecosystem services. Changwon Jinhae Gunhangje is typical spring festival using cherry blossoms phenology. This research was done to define relationship between flowering of cherry blossoms and Gunhangje. Phenological data (Julian day) of cherry blossoms and visitor number of Gunhangje from 1987 to 2013 were collected. Differences of Phenological phase of cherry blossoms and duration of Gunhangje was analyzed. Trend analysis was performed to know changes of flowering and budding day of cherry blossoms. Correlations between visitor number of Gunhangje and environmental factors was defined by factor analysis and regression analysis. Results are showed that during the 26 years, periodicity of flowering and budding day was not identified or even identified it was not significant. Environmental factors effect on visitor numbers of Gunhangje were defined as temperature factor, day factor, and precipitation factor. Temperature factor was significantly correlated with visitor numbers of Gunhangje. Though Flowering day of cherry blossoms and festival duration was not matched, however, difference of visitor numbers was not showed. These results suggest that fixed duration of Gunhangje would be more effective to visitors than changing the festival duration following the phenological day changes of cherry blossoms.

  • PDF

Mean Response Delay Estimation for HTTP over SCTP in Wireless Internet (무선 인터넷 환경에서 HTTP over SCTP의 평군 응답 시간 추정)

  • Lee, Yong-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.6
    • /
    • pp.43-53
    • /
    • 2008
  • Hyper text transfer protocol (HTTP) over transmission control protocol (TCP) is currently used to transfer objects in the Internet. Stream control transmission protocol (SCTP), an alternative to TCP, which allows for independent delivery among streams, and can thus reduce the mean response delay of web object. We present an analytical model to find the mean response delay for HTTP over SCTP, therefore, estimate the effectiveness of SCTP over TCP. Typical TCP delay models assume the wired environment. On the contrary, the proposed model in this paper assumes the multiple packet losses and wireless environment where fast retransmission is not possible due to small window. The estimated mean response time can be used the benchmark to meet quality of service (QoS) at end-user. We validate the accuracy of our model using experiments. It is shown that the differences between the results from model and those from experimental are very small below 6 % on average. We also find that the mean response delay for HTTP over SCTP is less than that for HTTP over TCP.

A Design of KDPC(Key Distributed Protocol based on Cluster) using ECDH Algorithm on USN Environment (USN 환경에서 ECDH 알고리즘을 이용한 KDPC(Key Distribution Protocol based on Cluster) 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.856-858
    • /
    • 2013
  • The data which is sensed on USN(Ubiquitous Sensor Network) environment is concerned with personal privacy and the secret information of business, but it has more vulnerable characteristics, in contrast to common networks. In other words, USN has the vulnerabilities which is easily exposed to the attacks such as the eavesdropping of sensor information, the distribution of abnormal packets, the reuse of message, an forgery attack, and denial of service attacks. Therefore, the key is necessarily required for secure communication between sensor nodes. This paper proposes a KDPC(Key Distribution Protocol based on Cluster) using ECDH algorithm by considering the characteristics of sensor network. As a result, the KDPC can provide the safe USN environment by detecting the forgery data and preventing the exposure of sensing data.

  • PDF