• Title/Summary/Keyword: 행위주

Search Result 1,310, Processing Time 0.028 seconds

A Study on Public Library User's Word-of-Mouth Behavior & Content (공공도서관 이용자의 구전 행위 및 내용 연구)

  • Song, Min-Sun;Kim, Mi-Rae
    • Proceedings of the Korean Society for Information Management Conference
    • /
    • 2013.08a
    • /
    • pp.163-166
    • /
    • 2013
  • 본 연구는 공공도서관 이용자들을 대상으로 실제 도서관 이용과 관련한 구전행위가 어떤 내용으로 어떻게 이루어지고 있는지 대해 알아보고자 하였다. 이를 위해 서울 소재 공공도서관 한 곳을 주 1회 이상 정기적으로 이용하는 20-40대 이용자들을 대상으로 심층 면접을 통해 자료를 수집하고, 근거 이론 방법을 적용해 데이터를 분석하였다. 그 결과, 총 130개 개념과 58개의 하위범주, 그리고 17개의 범주가 도출되었고, 도서관 서비스 이용에서 구전으로 이어지는 일련의 과정은 '도서관 인지-도서관 서비스 이용 및 경험-도서관에 대한 구전 행위-구전 행위에 따른 결과'의 네 단계로 정리해 볼 수 있었다. 본 연구에서 도출된 핵심범주는 '나에게는 가깝지만 같이 소통하기에는 어려운 도서관'으로써, 평소 도서관과 관련된 것들에 관심이 많은 이용자들에게는 도서관이 가깝고 친근한 시설이지만 대다수의 일반인들에게는 구전을 통한 소통과 이해가 어려운 장소로 인식되는 것으로 나타났다.

  • PDF

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering Weighted Feature Values (가중 특징 값을 고려한 러프 집합 기반 비정상 행위 탐지방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju;Lee, Kyung-Sook
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.8
    • /
    • pp.1030-1036
    • /
    • 2006
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function considering weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the method that assigns different weighted values to feature attributes depending on importance.

  • PDF

Mediating Effect of Self-esteem between Children's Perceived Parenting Style and Health Promoting Behavior of School-Aged Children (학령후기 아동이 지각한 부모의 양육태도와 건강증진행위 관계에서 자아존중감의 매개효과 연구)

  • Min, Hae Young;Kang, Sook Jung
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.11
    • /
    • pp.165-176
    • /
    • 2015
  • The purpose of this study was to identify the relationships among school-aged children's perceived parenting style, children's self-esteem, health promoting behavior and to determine whether self-esteem was a the mediator of the relationship between parenting style and health promoting behavior. Participants were 425 school-aged children of 5th and 6th grade. Data were analyzed using t-tests, Pearson correlation, and hierarchical multiple regression. The child's health promoting behavior was positively associated with receptive parenting style and positively associated with self-esteem. Also, the results showed that the effect of receptive parenting style on health promoting behavior was significantly partially mediated by self-esteem. Therefore, parenting style and children's self-esteem need to be factored in when designing and applying health education program for school-aged children. Also, the program need to be designed to enhance receptive parenting style that can lead to children's increase self-esteem.

A study on Scenario Design Methodology for Prevention of Information Leak by Using Modeling of User Behavior (사용자 행위 Modeling을 이용한 내부정보유출 방지 시나리오 설계방안에 관한 연구)

  • Park, JangSu;Park, Jung Hyun;Kang, Yong Suk;Lee, ImYeong
    • Annual Conference of KIPS
    • /
    • 2013.11a
    • /
    • pp.747-750
    • /
    • 2013
  • 정보통신기술의 발달로 인해 기업 및 기관의 주요 정보들이 전자화 되어, E-mail, 메신저, 보조기억장치 및 출력물 등 다양한 매체를 통해 손쉽게 유출될 수 있는 문제점이 발생하게 되었다. 이러한 문제점을 해결하기 위해 기업 및 기관에서는 매체제어, DRM, DLP, 출입보안 등 다양한 내부정보유출 방지 기술을 도입하여 운영하고 있다. 그러나 이는 각각 독립적으로 운영 및 관리되기 때문에 개별 정보유출방지 기술의 취약점을 이용한 공격에 대한 탐지 및 통합적인 내부정보유출 모니터링이 불가능하다. 또한 개별 정보유출방지 기술에서 발생하는 수많은 이벤트로 인해 보안 담당자가 이를 모니터링하여 내부정보유출을 탐지하고 관리하기는 어렵다. 따라서, 본 논문에서는 내부정보유출 사용자 행위를 분석하여 다양한 환경에서 적용 가능한 시나리오 설계방안에 대해 연구하고자 한다.

A Study on Management of Security Logs of Secure OS (보안운영체제의 보안 로그 관리에 관한 연구)

  • Jung, Chang-Sung;Park, Tae-Kyou;Jo, In-Gu;Im, Yeon-Ho
    • Annual Conference of KIPS
    • /
    • 2007.11a
    • /
    • pp.1214-1217
    • /
    • 2007
  • 대부분의 기관들은 악의적인 행위들을 포착하거나 시스템과 데이터를 보호하고 사고에 대응하기 위한 시도들을 지원하기 위해 몇 가지 형태의 네트워크 기반 보안솔루션을 사용하고 있다. 하지만 기존 네트워크 레벨 보안의 한계로 인하여 시스템 상에서 일어나는 행위를 제어하기 위한 차세대 보안솔루션으로 보안운영체제를 도입하고 있다. 최근에는 전자금융거래법 등의 세칙에 의해 정보처리 시스템 내의 정보의 유출, 변조 및 파괴 등을 보호하는 것은 물론 세부 작업 내역의 로깅에 대한 요구가 지속적으로 증가하고 있다. 이에 본 논문에서는 보안레이블에 의한 시스템 보안 강화 기술을 소개하고 강제적 접근 제어 결과에 의해 생성되는 보안 로그에 대한 구체적인 관리 전략을 제시한다.

Effect of Motion-beat and Rhythm exercise on Health promoting behaviors of Obese Women Through Convergence (융복합을 활용한 모션비트와 리듬운동이 비만여성들의 건강증진행위에 미치는 영향)

  • Shin, Hye-Sun;Seo, Su-Yeun
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.457-466
    • /
    • 2017
  • The present study is to observe changes of health promoting behaviors of obese women by applying 8 weeks of motion-beat on rhythm exercise program. The effects of the obese women's motion-beat in rhythm exercise were summarized in the following conclusions: For changes in their health promoting behaviors, according to the application of motion-beat to the eight-week rhythm exercise, it was noted that the application of motion-beat was effective in the factor of stress management. Therefore, since the exercise applying motion-beat maximizes fun and interest, it has been developed as a program on sports for all, appropriate and efficient for obese women, and it is expected that positive changes in health promoting behaviors can be suggested as a measure for the facilitation of their continuous participation in the exercise.

Impacts of Hotel Service Quality and Voluntary Behavior upon Behavioral Intentions (호텔 서비스품질과 고객의 자발적 행위가 행동의도에 미치는 영향)

  • Shin, Chul-Ho;Lee, Jung-Chul;Jang, Hyun-Jong
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.3
    • /
    • pp.440-448
    • /
    • 2011
  • This study is to investigate the impact of hotel service quality and voluntary behavior upon behavior intentions by the actual analysis of four deluxe hotels in Seoul and Incheon. As a research methodology, a statistical package of SPSS 15.0 for window & Path Analysis 7.0 were used with 124 respondents. The empathy of service quality affects the voluntary behavior of the customers composed of three factors. Cooperation out of the voluntary behavior has an effect on the behavioral intentions and the rest of voluntary behavior only influences revisit. Accordingly it suggests that hotel employees should serve the customers with individual care and concern. In addition, it reveals significantly that the empathy is the main factor resulting in voluntary behavior and behavior intentions of the hotel customers.

Examining Factors Affecting the Binge-Watching Behaviors of OTT Services (OTT(Over-the-Top) 서비스의 몰아보기 시청행위 영향 요인 탐색)

  • Hwang, Kyung-Ho;Kim, Kyung-Ae
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.3
    • /
    • pp.181-186
    • /
    • 2020
  • The purpose of this study is to empirically examine the factors affecting the binge-watching behaviors of OTT service users by using a multi-layer perceptron (MLP) artificial neural network. All samples (n=1,000) were collected from 'A survey on user awareness in OTT service' published by a Media Research Center of the Korea Press Foundation in 2018. Our research model includes one dependent variable which is binge-watching behaviors on OTT service and five independent variables such as gender, age, frequency of service usage, users' satisfaction with content recommendation algorithm, and content types mainly consumed. Our findings demonstrate that age, frequency of service usage, users' satisfaction with content recommendation algorithms, and certain types of contents (e.g., Korean dramas, Korean films, and foreign dramas) were found to be highly related to binge-watching behavior on OTT services.

The Analysis of Structural Relationships among School Parents' Family Resilience, Experience of Child Abuse Prevention Education, and Awareness of Abuse Behaviors (학부모의 가족탄력성, 아동학대예방교육경험, 학대행위인식의 구조적 관계 분석)

  • Hwang, Hwan;Lee, Byoung-Rock
    • Journal of Digital Convergence
    • /
    • v.17 no.10
    • /
    • pp.519-526
    • /
    • 2019
  • This study aimed to analyse the structural relationships among family resilience, experience of child abuse prevention education, and awareness of abuse behaviors. Data were collected from 389 school parents residing A metropolitan area. The results of this study are as follows : 1) the variable of the family resilience and the experience of child abuse prevention education among school parents had positive statistic association with the awareness of abuse behaviors. 2) the experience of child abuse prevention education was found to mediate between the family resilience and the awareness of abuse behaviors. Based on these study results, several suggestions were made to improve the awareness of school parents' abuse behaviors in terms of the enhancement of their family resilience and service delivery system for child abuse prevention.

A Reflection on Social Perspective of Information Behavior: Around the Theory of Information Worlds (사회적 관점에서의 정보행동 연구에 관한 일 고찰 - 정보세계이론을 중심으로 -)

  • Park, Sungjae
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.56 no.1
    • /
    • pp.425-447
    • /
    • 2022
  • The purpose of this study is to introduce the Theory of Information Worlds which analyzes information behaviors in the social perspective. This study analyzed dissertations using the theory to provide the understanding of the theory and suggest theoretical implications. The theory was developed by Burnett and Jeager in 2008, and since then it was applied in 14 dissertations. Key concepts of the theory include social norms, social types, information value, information behavior, and boundaries. These concepts are intervened in the process of creation and control of behavior through interaction each other. Qualitative research was adopted in more research rather than quantitative research; especially interview and content analysis were applied. It is expected that the spectrum of information behavior research in Korea is broaden and deeper through this study.