• Title/Summary/Keyword: Information-giving

Search Result 855, Processing Time 0.026 seconds

Argument on the right to be forgotten and the freedom of expression-focused on the reforming the press arbitration system (잊혀질 권리와 표현의 자유를 둘러싼 논의 - 언론중재제도의 개선과 관련하여)

  • Hong, Sook-Yeong
    • Journal of Digital Convergence
    • /
    • v.12 no.6
    • /
    • pp.1-11
    • /
    • 2014
  • With the drastic development of technology for almost eternally saving digital information, cases for giving sufferings to a person who deserves to enjoy privacy have increased. So I study the right to be forgotten focusing on the collision between that right and freedom of expression. I also study the concept of the right to be forgotten and its legal basis for the protection of that right. That right can be protected mainly by the self-decision making right under the Article 10, and secondly the privacy right under the Article 17 of the Constitutional Law. The Press Arbitration Law can be applied to protect the right to be forgotten, but that Law needs the revision of time-limit clause for complain, protection clause for the right to ask to delete factual past article, and the clause of staleness doctrine for the consent of giving personal information.

The Impacts of Economic, Social, and Personal Benefits on Intention to Repurchase a Mobile Gift : Focusing on Exchange and Motivation Theories (경제적, 사회적, 개인적 효익이 모바일 선물 재구매 의도에 미치는 영향 : 교환이론과 동기이론을 중심으로)

  • Kim, Sun-Kyu;Jo, In-Jea;Yang, Sung-Byung
    • Journal of Information Technology Services
    • /
    • v.14 no.1
    • /
    • pp.1-21
    • /
    • 2015
  • Recently, many companies have launched a new business model related to the mobile gift service in order to achieve or sustain a competitive advantage in the fast-growing mobile market. Due to the well combination of mobile technology advantages and offline gift-giving motivations, a mobile gift service has been proliferating over recent years. Although the motivation of mobile gift purchasing behavior can be different from that of offline gift purchasing behavior, there is still a lack of research on what factors are influencing and how they are impacting mobile gift purchasing behavior under diverse gift-giving settings. Therefore, based on both exchange and motivation theories as well as literature review, this study identified three influencing factors-economic (immediate rewards, convenience), social (friendship needs, reputation), and personal (enjoyment, self-satisfaction) benefits-and validated their impacts on intention to repurchase a mobile gift. Moreover, the moderating roles of intimacy and gift price in the relationships between benefits and mobile gift repurchasing intention were examined. The results provide many implications for marketing managers on how to enhance consumers' intention to repurchase, which in turn leads to sales and increased profit.

Pain Management Knowledge and Attitude of Internal Medicine and Surgery Stream Nurses (내.외과계 간호사의 통증 관리에 대한 지식 및 태도)

  • Song, Seung-Sun;Park, Chai-Soon
    • Journal of Korean Academic Society of Home Health Care Nursing
    • /
    • v.17 no.1
    • /
    • pp.55-62
    • /
    • 2010
  • Purpose: This study investigated the sought to identify the pain management knowledge and attitude of nurses in internal medicine and surgery stream wards and intensive care units to obtain basic information needed for improved pain control. Method: Data was collected through self-reported questionnaires and analyzed by descriptive statistics, t-test and ANOVA using SPSS Win 12.0. Results: Pain management knowledge score averaged 51.1 out of 100, with significant differences evident depending on age, marital status, educational level, position, total work career, working department and cancer care-giving experience. Pain management attitude score averaged 2.9 out of 4, and significant differences were evident depending on age, marital status, educational level, position, total work career, working department, cancer care-giving experience, education experience and number of patients treated. Conclusion: Further studies are necessary to develop effective nursing knowledge and attitude education programs and evaluation such as discussion by cases, workshops, system of expert help for uncontrollable pain or a multi-disciplinary pain management task force. In addition, patient satisfaction level with pain management should be assessed and the responses reflected practically.

  • PDF

A Study on the Distributed Amplifier Using FET's with a Feedback Loop (귀환루우프를 가진 FET를 사용한 배분증폭기에 관한 연구)

  • 강영채;최갑석
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.21 no.6
    • /
    • pp.42-50
    • /
    • 1984
  • The method of increasing the bandwidth of distributed amplifier by the feedback loop is presented in this paper. In this method, it is tried to increase the gain of the amplifier in the high frequency range by giving a positive feedback on the device, while giving no influence in the low frequency range. For the simplicity of the amplifier design the transmission line theory of periodical structure with a unilateral divice is used in the design, and the 2-ports cascade network theory developed by K.B. Niclas is used in computer analysis for the purpose of precise results. In this simulation, the bandwidth of the amplifier is increased from 16 [GHz] without feedback loop to about 20 [GHz] with the feedback loop.

  • PDF

Analyses of Detection and Protection for Phishing on Web page (웹페이지의 피싱 차단 탐지 기술에 대한 분석)

  • Kim, Jung-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.607-610
    • /
    • 2008
  • Phishing is a form of online identity theft that aims to steal sensitive information such as online banking passwords and credit card information from users. Phishing scams have been receiving extensive press coverage because such attacks have been escalating in number and sophistication. According to a study by Gartner, Many Internet users have identified the receipt of e-mail linked to phishing scams and about 2 million of them are estimated to have been tricked into giving away sensitive information. This paper presents a novel browser extension, AntiPhish, that aims to protect users against spoofed web site-based phishing attack.

  • PDF

The Effect of Information and Communication Ethics Education on Students' Attitudes in the Cyberspace (정보윤리영역 학습이 정보통신 윤리의식에 미치는 영향)

  • Shin, Jeong-Aei;Park, Phan-Woo
    • 한국정보교육학회:학술대회논문집
    • /
    • 2010.08a
    • /
    • pp.101-109
    • /
    • 2010
  • Rapidly increasing Internet use has brought beneficial developments in many aspects, and it also stimulates elementary students' curiosity and is becoming an important part of entertainment. On the other hand, it is giving rise to some negative results such as violence and delinquent conduct in cyberspace. This study is to find the effects and problems of Information and Communication Ethics education before and after it is carried out by analysing the curriculum of Information texbooks, and to search for new teaching methods for Information and Communication Ethics education.

  • PDF

The Analysis of Satisfaction Degrees of Overseas e-health Web-sites by Assessment Criteria for Information Confidence (국외 e-health 웹사이트의 정보 신뢰성 평가 기준 만족도 현황 분석)

  • Woo, Young-Woon;Cho, Kyoung-Won
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.05a
    • /
    • pp.489-492
    • /
    • 2006
  • We analyzed twelve representative oversea's e-health related web-sites for assessing satisfaction degree for information confidence criteria. We find out that what criteria are important for giving confidence of information to medical consumers in these web-sites. In the results, we give guidance of criteria to domestic e-health information related web-sites for maintaining confidence of information.

  • PDF

A Study on Giving a Consistent XML View to Applications (응용 프로그램을 위한 일관된 XML 뷰 제공에 관한 연구)

  • Nam, Chul-Ki;Kim, Hye-Kyung;Bae, Jae-Hak
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.1105-1108
    • /
    • 2001
  • 점차로 이종의 데이터와 문서가 XML 로 통합되는 것이 요구된다. 현재 데이타베이스 기반의 응용프로그램들은 데이터들이 대부분 테이블에 저장되어 있기 때문에 SQL 을 이용하여 데이터처리를 하고 있다. 한편 현 정보기술 발전 추세는 응용 프로그램에서 처리하고자 하는 단위가 데이터(data-centric)에서 점차 문서(document-centric)로 바뀌어 가고 있다. XML 은 이런 패러다임에에 적합한 해결책이 될 수 있다. 본고에서는 일반적인 데이터에 대한 뷰(view)를 테이블 뷰가 아닌 XML 뷰를 응용 프로그램 개발자에게 제시하는 방법론을 보임으로써, 일관되고 유연한 문서처리 시스템 설계를 하는데 있어 대단히 유용한 또다른 한 방법론을 제공하고자 한다.

  • PDF

Parallel Algorithm for Determining Connectedness of Context Free Graph Languages (CFGL 연결성 결정에 대한 병렬 알고리듬)

  • 방혜자;이철희
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.30B no.1
    • /
    • pp.10-17
    • /
    • 1993
  • This paper analyzes succinct graph descriptions and its complexity of connectivity problems on context free graph languages under various restrictions. It defines SNLC(Simple Context Free Node Label Controlled) grammar and presents reduction method that solves graph problems without expanding the hierarchical description. It exemplifies the method by giving efficient solutions to connectivity problems on graphs and presents parallel algorithm for reduction and analyzes the complexity. Its results will help application of desing for NETWORK. CAD. VLSI and other engineering problems.

  • PDF

The S-Edge Numbering on Binomial trees (이항트리에서 S-에지번호 매김)

  • Kim Yong-Seok
    • Proceedings of the IEEK Conference
    • /
    • 2004.06a
    • /
    • pp.167-170
    • /
    • 2004
  • We present a novel graph labeling problem called S-edge labeling. The constraint in this labeling is placed on the allowable edge label which is the difference between the labels of endvertices of an edge. Each edge label should be ${ a_n / a_n = 4 a_{n-l}+l,\;a_{n-1}=0}$. We show that every binomial tree is possible S-edge labeling by giving labeling schems to them. The labelings on the binomial trees are applied to their embedings into interconnection networks.

  • PDF