• Title/Summary/Keyword: ICT 접근성

Search Result 172, Processing Time 0.025 seconds

The Qualitative Study on Youth Experiences of Anger Expression and Management -Focus Group Interview with Youth and Youth Experts- (청소년의 분노 표현 및 대처 경험에 관한 질적 연구 -청소년과 청소년 전문가 포커스 그룹 인터뷰-)

  • Ko, Ki-Sook;Lee, Jee-Sook;You, Dong-hwan;Yoon, Yong-hee
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.1
    • /
    • pp.445-462
    • /
    • 2019
  • This paper illustrated the use of focus groups with adolescents and youth experts to enhance knowledge of anger, anger expression, and its coping strategies. Nine youth experts and 9 adolescents participated in the study. Analysis of the findings identified 12 meaningful elements, 34 sub-elements, and 138 descriptions. The meaningful elements were as follow: the lack of stable care, anger-provoking situations, a relationship between distorted thoughts and anger, physical and psychological symptoms, different types of anger expression, suppressed anger, difficulty of anger control, youth efforts to control anger, needs to implement appropriate anger expression, psychological mechanism of anger, effective ways to cope with anger, suggested by youth experts, needs of alternative anger management programs. Based on these findings, the study suggests various anger management alternatives, including ICT based cognitive-behavior anger management programs.

A Study on Data Model Conversion Method for the Application of Autonomous Driving of Various Kinds of HD Map (다양한 정밀도로지도의 자율주행 적용을 위한 데이터 모델 변환 방안 연구)

  • Lee, Min-Hee;Jang, In-Sung;Kim, Min-Soo
    • Journal of Cadastre & Land InformatiX
    • /
    • v.51 no.1
    • /
    • pp.39-51
    • /
    • 2021
  • Recently, there has been much interest in practical use of standardized HD map that can effectively define roads, lanes, junctions, road signs, and road facilities in autonomous driving. Various kinds of de jure or de facto standards such as ISO 22726-1, ISO 14296, HERE HD Live map, NDS open lane model, OpenDRIVE, and NGII HD map are currently being used. However, there are lots of differences in data modeling among these standards, it makes difficult to use them together in autonomous driving. Therefore, we propose a data model conversion method to enable an efficient use of various kinds of HD map standards in autonomous driving in this study. Specifically, we propose a conversion method between the NGII HD map model, which is easily accessible in the country, and the OpenDRIVE model, which is commonly used in the autonomous driving industry. The proposed method consists of simple conversion of NGII HD map layers into OpenDRIVE objects, new OpenDRIVE objects creation corresponding to NGII HD map layers, and linear transformation of NGII HD map layers for OpenDRIVE objects creation. Finally, we converted some test data of NGII HD map into OpenDRIVE objects, and checked the conversion results through Carla simulator. We expect that the proposed method will greatly contribute to improving the use of NGII HD map in autonomous driving.

Relative Importance Analysis of Management Level Diagnosis for Consignee's Personal Information Protection (수탁사 개인정보 관리 수준 점검 항목의 상대적 중요도 분석)

  • Im, DongSung;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.2
    • /
    • pp.1-11
    • /
    • 2018
  • Recently ICT, new technologies such as IoT, Cloud, and Artificial Intelligence are changing the information society explosively. But personal information leakage incidents of consignee's company are increasing more and more because of the expansion of consignment business and the latest threats such as Ransomware and APT. Therefore, in order to strengthen the security of consignee's company, this study derived the checklists through the analysis of the status such as the feature of consignment and the security standard management system and precedent research. It also analyzed laws related to consignment. Finally we found out the relative importance of checklists after it was applied to proposed AHP(Analytic Hierarchy Process) Model. Relative importance was ranked as establishment of an internal administration plan, privacy cryptography, life cycle, access authority management and so on. The purpose of this study is to reduce the risk of leakage of customer information and improve the level of personal information protection management of the consignee by deriving the check items required in handling personal information of consignee and demonstrating the model. If the inspection activities are performed considering the relative importance of the checklist items, the effectiveness of the input time and cost will be enhanced.

Analysis of E-Waste Disposal Trends in a Security Perspective (보안관점의 전자폐기물 처리동향 분석 연구)

  • Juno Lee;Yuna Han;Yeji Choi;Yurim Choi;Hangbae Chang
    • Journal of Platform Technology
    • /
    • v.11 no.6
    • /
    • pp.56-67
    • /
    • 2023
  • The increased demand for electronic components, spurred by the Fourth Industrial Revolution and the COVID-19 pandemic, has facilitated human life but also escalated the production of e-waste. Discussions on the impact of e-waste have primarily revolved around environmental, health, and social issues, with global legislations focusing on addressing these concerns. However, e-waste poses unique security risks, such as potential technological and personal information leaks, unlike conventional waste. Current discourse on e-waste security is notably insufficient. This study aims to empirically analyze the relatively overlooked trends in e-waste security, employing three methodologies. Firstly, it assesses the general trend in discussions on e-waste by analyzing year-wise documents and media reports. Secondly, it identifies key trends in e-waste security by examining documents on the subject. Thirdly, the study reviews national security guidelines related to e-waste disposal to assess the necessity of designing security strategies for e-waste management. This research is significant as it is one of the first in korea to address e-waste from a security perspective and offers a multi-dimensional analysis of e-waste security trends. The findings are expected to enhance domestic awareness of e-waste and its security issues, providing an opportunity for proactive response to these security risks.

  • PDF

Improving Security Awareness about Smishing through Experiment on the Optimistic Bias on Risk Perception (위험인식의 낙관적 편향 실험을 통한 스미싱 보안인식 개선)

  • Kang, Ji Won;Lee, Ae Ri;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.475-487
    • /
    • 2016
  • Recently, various risks of smartphone hacking are emerging. Smishing crime techniques become more cunning and its damage has been increasing, thereby requiring effective ways of preventing and coping with smishing. Especially, it is emphasized the need for smartphone users' security awareness and training besides technological approach. This study investigates the effective method for providing news messages in order to improve the perception of risk from smishing. This research empirically examines that the degree of optimistic bias on risk perception can vary depending on news frame, topic type, and involvement regarding smishing. Based on the findings, it identifies the factors influencing risk perception and verifies effective ways of promoting individual security awareness on smishing. The results of this study provide implications that assist in educating, campaigning and promoting information security awareness for smart device users.

Research on a New Approach to Enhance IoT Security Using Blockchain Technology (블록체인 기술을 이용하여 IoT 보안 강화를 위한 새로운 접근방법 연구)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.12
    • /
    • pp.235-241
    • /
    • 2019
  • The structure of the IoT can be divided into devices, gateways, and servers. First, the gateway collects data from the device, and the gateway sends data to the server through HTTP protocol, Websocket protocol, and MQTT protocol. The processing server then processes, analyzes, and transforms the data, and the database makes it easy to store and use this data. These IoT services are basically centralized structures with servers, so attacks on the entire platform are concentrated only on the central server, which makes hacking more successful than distributed structures. One way to solve this problem is to develop IoT that combines blockchain. Therefore, the proposed research suggests that the blockchain is a distributed structure, in which blocks containing small data are connected in a chain form, so that each node agrees and verifies the data with each other, thereby increasing reliability and lowering the probability of data forgery.

Development of Community-based Digital Health Care (지역사회기반 디지털 헬스케어 발전방향)

  • Han, Jeong-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.12
    • /
    • pp.1826-1831
    • /
    • 2022
  • Rapid Aging Society demands the transformation of medical paradigm of diagnosis and treatment towards prevention and management. This paper explores the norm and development of digital health care, focusing on Busan Metropolitan City. Digital health care which combines new ICT technology and medical technology is predictive, preventive, personalized and participatory; and suggests alternative to solve the problem of demographic changes and increasing social cost of medical welfare. Community Health Center in Busan is unique one based in the minimum community of collecting data from self-leading health management. Digital transformation using basic health data and social information can build preventive care system in the community. Easy access leads community center to test bed of developing new technology, as a living lab. In order to use the newly developed goods and service effectively, user-participatory test is nicessary. Finally community nurse and activists can specify health-welfare converged service through digital transformation empowerment training.

Machine Learning for Predicting Entrepreneurial Innovativeness (기계학습을 이용한 기업가적 혁신성 예측 모델에 관한 연구)

  • Chung, Doo Hee;Yun, Jin Seop;Yang, Sung Min
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.3
    • /
    • pp.73-86
    • /
    • 2021
  • The primary purpose of this paper is to explore the advanced models that predict entrepreneurial innovativeness most accurately. For the first time in the field of entrepreneurship research, it presents a model that predicts entrepreneurial innovativeness based on machine learning corresponding to data scientific approaches. It uses 22,099 the Global Entrepreneurship Monitor (GEM) data from 62 countries to build predictive models. Based on the data set consisting of 27 explanatory variables, it builds predictive models that are traditional statistical methods such as multiple regression analysis and machine learning models such as regression tree, random forest, XG boost, and artificial neural networks. Then, it compares the performance of each model. It uses indicators such as root mean square error (RMSE), mean analysis error (MAE) and correlation to evaluate the performance of the model. The analysis of result is that all five machine learning models perform better than traditional methods, while the best predictive performance model was XG boost. In predicting it through XG boost, the variables with high contribution are entrepreneurial opportunities and cross-term variables of market expansion, which indicates that the type of entrepreneur who wants to acquire opportunities in new markets exhibits high innovativeness.

An art exhibition needs assessment survey of persons with visual impairment (시각장애인의 전시예술품 관람 욕구조사)

  • Lee, Yanghee;Kim, Sangwon;Eom, Munseol;An, Sae mi;Cho, Jun Dong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.9 no.1
    • /
    • pp.457-466
    • /
    • 2019
  • The study was to improve the right to the enjoyment of culture of persons with visual impairment by increasing the accessibility to art exhibitions and exploring assistive measures through needs assessment survey of persons with visual impairment on arts exhibition. We used total 83 responses collected through an online survey. The result are as follows. First, watching movies at a teather was the most frequent leisure activity among persons with visual impairment, while respondents reported attending art exhibitions as the least frequent activity. Yet, 71.1% included attending art exhibitions as one of their top 5 culture and leisure activities. Most of the respondents reported the purpose of attending art exhibitions as fun. However, a primarily visual atmosphere prevented them from visiting the exhibition. Second, persons with visual impairment preferred approaching the art to have a closer look. More than about 50% of the respondents used their residual vision. Most of the respondents reported to use more than two senses when appreciating the exhibits. Moreover, respondents reported that devices/services for multi-sensory experiences would be helpful to appreciate the art. The findings imply that the consideration of the characteristics and needs of persons with visual impairment is required for establishing the environment of art exhibitions. This could further contribute to the improvement of the right to the enjoyment of leisure and culture of persons with visual impairment and lead to the realization of social integration.

Design and Implementation of a Project Work Unit-based Scheduling Application (프로젝트 작업 단위 기반 일정 관리 애플리케이션의 설계 및 구현)

  • Bomin Kim;Minyoung Kim
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.1173-1178
    • /
    • 2023
  • In modern society, there is a tendency to emphasize efficiency and lead to detailed planning of team projects and individual tasks within organizations. In a 24-hour routine, the ability to use time effectively is considered an indicator of conscientiousness, and people try to imitate planned and organized people and utilize various systems to manage their daily lives. The reason why you want to perform a given task efficiently is because it affects the success or failure of the project by completing the task within a set period of time. Neglecting the project schedule is considered a major risk that threatens a successful outcome. This applies not only to large-scale organizational projects but also to individual life, and utilizes a variety of schedule management tools that emphasize time-based efficient management. In project management, it is necessary to carefully understand the detailed work progress rather than simply based on Today. In this paper, we propose an Android application that can manage schedules by accessing the user's project in units of tasks rather than dates, and introduce its implementation. The application we implemented in this paper can manage the project's goals and schedule by registering the project to which the user belongs. In addition, it provides the ability to approach work efficiently by visualizing the progress of the entire project or individual goals. As a result, users can use the application we propose in this paper to focus on their projects and manage schedules by task, thereby improving the overall efficiency of the project.