• Title/Summary/Keyword: Internet Information

Search Result 20,636, Processing Time 0.047 seconds

Perceptions of social presence and aggressive behavior in cyberspace (사이버 공간에서 사회적 실재감의 지각과 공격행동)

  • Jae-Hwi Kim ;Yeon-Jung Kim
    • Korean Journal of Culture and Social Issue
    • /
    • v.10 no.3
    • /
    • pp.83-101
    • /
    • 2004
  • This study investigated the effects of social presence as means of self-awareness and interpersonal-awareness on the cyber-aggressive behavior. The cyber-aggressive behavior (flaming and direct aggression use of character) should be differ from existence of social presence and type of social presence of internet users. To test hypothesis, an experiment was executed a field study on cyberspace, an on-line game, "fortress 2 blue forever". I made a chat-room in the game site to conduct an experiment to 107 person who entered the chat-room and blinded ignorance of this situation made by researchers. As the subjects enter the chat-room, he chats with 3 researchers who were waiting before he gets in. The social presence was operated with 3 phases by the contents of the chat (①control group; nothing, ②experimental group 1; reaction about other people ③experimental group 2; reaction about other people + self-exposure by an exchange information of their home region). The studies show that, subjects of the control group behaved more aggressively than other subjects of the experimental groups(both flaming and direct aggression use of character). Meantime, I compared experimental group 1 with experimental group 2 to investigate difference between the type of social presence. As the result, subjects of the experimental group 1 behaved more aggressively than experimental group 2 (only flaming, there's no difference in direct aggression use of character).

  • PDF

A Design of Authentication Mechanism for Secure Communication in Smart Factory Environments (스마트 팩토리 환경에서 안전한 통신을 위한 인증 메커니즘 설계)

  • Joong-oh Park
    • Journal of Industrial Convergence
    • /
    • v.22 no.4
    • /
    • pp.1-9
    • /
    • 2024
  • Smart factories represent production facilities where cutting-edge information and communication technologies are fused with manufacturing processes, reflecting rapid advancements and changes in the global manufacturing sector. They capitalize on the integration of robotics and automation, the Internet of Things (IoT), and the convergence of artificial intelligence technologies to maximize production efficiency in various manufacturing environments. However, the smart factory environment is prone to security threats and vulnerabilities due to various attack techniques. When security threats occur in smart factories, they can lead to financial losses, damage to corporate reputation, and even human casualties, necessitating an appropriate security response. Therefore, this paper proposes a security authentication mechanism for safe communication in the smart factory environment. The components of the proposed authentication mechanism include smart devices, an internal operation management system, an authentication system, and a cloud storage server. The smart device registration process, authentication procedure, and the detailed design of anomaly detection and update procedures were meticulously developed. And the safety of the proposed authentication mechanism was analyzed, and through performance analysis with existing authentication mechanisms, we confirmed an efficiency improvement of approximately 8%. Additionally, this paper presents directions for future research on lightweight protocols and security strategies for the application of the proposed technology, aiming to enhance security.

Scientifically Gifted Students' Perception of the Learning Support System based on Korea Science Academy Survey (과학영재학교의 학습 지원 체제 유용성에 대한 학생들의 인식 : 한국과학영재학교를 중심으로)

  • Bae, Sae-Byok;Kim, Kyoung-Dae;Kang, Soon-Min;Yune, So-Jung
    • Journal of The Korean Association For Science Education
    • /
    • v.29 no.5
    • /
    • pp.552-563
    • /
    • 2009
  • The purpose of this study is to investigate the students' perception of the learning support system of Korea Science Academy and to propose improvements to it. The impact of the science learning support system on 129 gifted students in Korea Science Academy (KSA) was estimated by using Likert-type items and the multiple-choice method approach for more comprehensive evaluation. The results of our investigation are as follows: First, the learning support system of KSA appears globally useful to the students. The list of educational usefulness to the students comprises, in the decreasing order of utility, classroom work, Internet, lab activities, reading rooms, library, research meetings and clubs, academic advisors (AA), SAF (Science Academy Fair), e-learning system, and finally colloquia by invited lecturers. Second, what the gifted students hope for in the realm of learning support from KSA are learning guides by subject teachers, presentation skill program, the constructions of on/off-line learning communities, etc. It seems that the results of this study would be helpful in improving the learning support system, and will provide useful information for planning the direction of future science-gifted education programs at the high-school level.

With Corona Era, exploring policy measures to prevent non-face-to-face lonely deaths - Focusing on Daegu Metropolitan City's AI and IOT cases of lonely death prevention (With 코로나 시대 비대면 고독사 예방정책 방안 모색 - 대구광역시 AI, IOT 고독사 예방 사례를 중심으로)

  • Ha-Yoon Kim;Tai-Hyun Ha
    • Journal of Digital Convergence
    • /
    • v.21 no.3
    • /
    • pp.49-62
    • /
    • 2023
  • Due to social and cultural changes and the growth of aging people living as a single because of aging, lonely deaths are steadily increasing, and each local government has begun to define them as a social problem. The legal basis began to be established. In order to explore policy measures to prevent lonely deaths, this study examined cases of lonely death prevention policies using smart digital information technology (AI, IOT), which is being promoted by Daegu Metropolitan City to promote non-face-to-face policies to prevent lonely deaths. Policies related to lonely deaths are divided into two axes: lonely death prevention projects and post-excavation support projects. In order to operate these businesses efficiently, the provision of non-face-to-face services through artificial intelligence and the Internet of Things is recognized as a new service delivery system, so the importance and necessity of non-face-to-face services is increasing. It is time that multifaceted changes and preparations are needed, such as establishing a system to expand the non-face-to-face industry at the national level. In order to respond to another national disaster situation in the future, the non-face-to-face smart care system is being expanded in various welfare policies such as preventing lonely deaths. It will have to be activated.

The experience of novice teachers in the preparation and implementation of the 2019 revised Nuri curriculum (2019 개정 누리과정 준비 및 실행 과정에서의 초임교사의 경험)

  • Yu-Mi Park;Seon-Mi Park
    • Journal of the Health Care and Life Science
    • /
    • v.10 no.2
    • /
    • pp.329-339
    • /
    • 2022
  • The purpose of this study is to examine the experiences of new teachers in the process of preparing and implementing the 2019 revised Nuri curriculum, and to find ways to support novice teachers. For these, Data were collected through telephone interviews with 12 first-time teachers with less than 2 years of experience at private kindergartens and daycare centers in Chungnam and Daejeon, and the collected data was analyzed through text network analysis. The results are as follows. First, teachers were worried that they did not know the details of the curriculum while preparing for the 2019 revised Nuri curriculum. To supplement this, they were preparing to observe infants, share information with fellow teachers, and refer to the Nuri curriculum commentary. Also, teachers thought that they were getting help in terms of indirectly experiencing actual play cases through training. Second, the first-time teachers were providing various support by focusing on children's play while implementing the Nuri curriculum. The teachers emphasized that the good point of implementing the Nuri curriculum is that children's interests and thoughts are taken into consideration, and that children-centered play can be carried out, and that the teachers can support children's play while thinking about it. And teachers mentioned the difficulties of reading children's thoughts in children's play, grasping the topic and proceeding with the play, and the lack of time to play. In addition, starting teachers were referring to internet resources and sharing opinions with fellow teachers, and mentioned that direct experience helped them to implement the play. Lastly, teachers' interest in and observation of play, creative thinking, quickness, and willingness to support play were considered important as the competency required for teachers.

Branching Path Query Processing for XML Documents using the Prefix Match Join (프리픽스 매취 조인을 이용한 XML 문서에 대한 분기 경로 질의 처리)

  • Park Young-Ho;Han Wook-Shin;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.32 no.4
    • /
    • pp.452-472
    • /
    • 2005
  • We propose XIR-Branching, a novel method for processing partial match queries on heterogeneous XML documents using information retrieval(IR) techniques and novel instance join techniques. A partial match query is defined as the one having the descendent-or-self axis '//' in its path expression. In its general form, a partial match query has branch predicates forming branching paths. The objective of XIR-Branching is to efficiently support this type of queries for large-scale documents of heterogeneous schemas. XIR-Branching has its basis on the conventional schema-level methods using relational tables(e.g., XRel, XParent, XIR-Linear[21]) and significantly improves their efficiency and scalability using two techniques: an inverted index technique and a novel prefix match join. The former supports linear path expressions as the method used in XIR-Linear[21]. The latter supports branching path expressions, and allows for finding the result nodes more efficiently than containment joins used in the conventional methods. XIR-Linear shows the efficiency for linear path expressions, but does not handle branching path expressions. However, we have to handle branching path expressions for querying more in detail and general. The paper presents a novel method for handling branching path expressions. XIR-Branching reduces a candidate set for a query as a schema-level method and then, efficiently finds a final result set by using a novel prefix match join as an instance-level method. We compare the efficiency and scalability of XIR-Branching with those of XRel and XParent using XML documents crawled from the Internet. The results show that XIR-Branching is more efficient than both XRel and XParent by several orders of magnitude for linear path expressions, and by several factors for branching path expressions.

A Study on Brand Identity of TV Programs in the Digital Culture - Focusing on the comparative research of current issue programs, and development - (디지털 문화에서 TV 방송의 브랜드 아이덴티티 연구 -시사 교양 프로그램의 사례비교 및 개발을 중심으로-)

  • Jeong, Bong-Keum;Chang, Dong-Ryun
    • Archives of design research
    • /
    • v.18 no.4 s.62
    • /
    • pp.53-64
    • /
    • 2005
  • The emergence of new communication media, digital, is something of a wonder, as well as a cultural tension. The industrial technologies that dramatically expand human abilities are being developed much faster than the speed of adaptation by humans. Without an exception, it creates new contents and form of the culture by shaking the very foundation of the notion about human beings. Korean broadcasting environment has stepped into the era of multi-media, multi-channel as the digital technology separated the media into network, cable, satellite and internet. In this digital culture, broadcasting, as a medium of information delivering and communication, has bigger influence than ever. Such changes in broadcasting environment turned the TV viewers into new consumers who participate and play the main role in active communication by choosing and using the media. This study is trying to systemize the question about the core identity of broadcasting through brand as the consumers stand in the center of broadcasting with the power to select channel. The story schema theory can be applied as a cognitive psychological tool to approach the active consumers in order to explain the cognitive processes that are related to information processing. It is a design with stories, which comes up as a case of a brand's story telling. The range of this study covers the current issue and educational programs in network TV during the period of May and August of year 2005. The cases of Korean and foreign programs were compared by the station each program is broadcasted. This study concludes that it is important to take the channel identity into the consideration in the brand strategy of each program. Especially, the leading programs of a station must not be treated as a separate program that has nothing to do with the station's identity. They must be treated to include the contents and form that builds the identity of the channel. Also, this study reconfirmed that building a brand of the anchor person can play as an important factor in the identity of the program's brand.

  • PDF

A Study of Performance Analysis on Effective Multiple Buffering and Packetizing Method of Multimedia Data for User-Demand Oriented RTSP Based Transmissions Between the PoC Box and a Terminal (PoC Box 단말의 RTSP 운용을 위한 사용자 요구 중심의 효율적인 다중 수신 버퍼링 기법 및 패킷화 방법에 대한 성능 분석에 관한 연구)

  • Bang, Ji-Woong;Kim, Dae-Won
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.1
    • /
    • pp.54-75
    • /
    • 2011
  • PoC(Push-to-talk Over Cellular) is an integrated technology of group voice calls, video calls and internet based multimedia services. If a PoC user can not participate in the PoC session for various reasons such as an emergency situation, lack of battery capacity, then the user can use the PoC Box which has a similar functionality to the MM Box in the MMS(Multimedia Messaging Service). The RTSP(Real-Time Streaming Protocol) method is recommended to be used when there is a transmission session between the PoC box and a terminal. Since the existing VOD service uses a wired network, the packet size of RTSP-based VOD service is huge, however, the PoC service has wireless communication environments which have general characteristics to be used in RTSP method. Packet loss in a wired communication environments is relatively less than that in wireless communication environment, therefore, a buffering latency occurs in PoC service due to a play-out delay which means an asynchronous play of audio & video contents. Those problems make a user to be difficult to find the information they want when the media contents are played-out. In this paper, the following techniques and methods were proposed and their performance and superiority were verified through testing: cross-over dual reception buffering technique, advance partition multi-reception buffering technique, and on-demand multi-reception buffering technique, which are designed for effective picking up of information in media content being transmitted in short amount of time using RTSP when a user searches for media, as well as for reduction in playback delay; and same-priority packetization transmission method and priority-based packetization transmission method, which are media data packetization methods for transmission. From the simulation of functional evaluation, we could find that the proposed multiple receiving buffering and packetizing methods are superior, with respect to the media retrieval inclination, to the existing single receiving buffering method by 6-9 points from the viewpoint of effectiveness and excellence. Among them, especially, on-demand multiple receiving buffering technology with same-priority packetization transmission method is able to manage the media search inclination promptly to the requests of users by showing superiority of 3-24 points above compared to other combination methods. In addition, users could find the information they want much quickly since large amount of informations are received in a focused media retrieval period within a short time.

Development of a Remote Multi-Task Debugger for Qplus-T RTOS (Qplus-T RTOS를 위한 원격 멀티 태스크 디버거의 개발)

  • 이광용;김흥남
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.4
    • /
    • pp.393-409
    • /
    • 2003
  • In this paper, we present a multi-task debugging environment for Qplus-T embedded-system such as internet information appliances. We will propose the structure and functions of a remote multi-task debugging environment supporting environment effective ross-development. And, we are going enhance the communication architecture between the host and target system to provide more efficient cross-development environment. The remote development toolset called Q+Esto consists to several independent support tools: an interactive shell, a remote debugger, a resource monitor, a target manager and a debug agent. Excepting a debug agent, all these support tools reside on the host systems. Using the remote multi-task debugger on the host, the developer can spawn and debug tasks on the target run-time system. It can also be attached to already-running tasks spawned from the application or from interactive shell. Application code can be viewed as C/C++ source, or as assembly-level code. It incorporates a variety of display windows for source, registers, local/global variables, stack frame, memory, event traces and so on. The target manager implements common functions that are shared by Q+Esto tools, e.g., the host-target communication, object file loading, and management of target-resident host tool´s memory pool and target system´s symbol-table, and so on. These functions are called OPEn C APIs and they greatly improve the extensibility of the Q+Esto Toolset. The Q+Esto target manager is responsible for communicating between host and target system. Also, there exist a counterpart on the target system communicating with the host target manager, which is called debug agent. Debug agent is a daemon task on real-time operating systems in the target system. It gets debugging requests from the host tools including debugger via target manager, interprets the requests, executes them and sends the results to the host.

The Influence of Online Social Networking on Individual Virtual Competence and Task Performance in Organizations (온라인 네트워킹 활동이 가상협업 역량 및 업무성과에 미치는 영향)

  • Suh, A-Young;Shin, Kyung-Shik
    • Asia pacific journal of information systems
    • /
    • v.22 no.2
    • /
    • pp.39-69
    • /
    • 2012
  • With the advent of communication technologies including electronic collaborative tools and conferencing systems provided over the Internet, virtual collaboration is becoming increasingly common in organizations. Virtual collaboration refers to an environment in which the people working together are interdependent in their tasks, share responsibility for outcomes, are geographically dispersed, and rely on mediated rather than face-to face, communication to produce an outcome. Research suggests that new sets of individual skill, knowledge, and ability (SKAs) are required to perform effectively in today's virtualized workplace, which is labeled as individual virtual competence. It is also argued that use of online social networking sites may influence not only individuals' daily lives but also their capability to manage their work-related relationships in organizations, which in turn leads to better performance. The existing research regarding (1) the relationship between virtual competence and task performance and (2) the relationship between online networking and task performance has been conducted based on different theoretical perspectives so that little is known about how online social networking and virtual competence interplay to predict individuals' task performance. To fill this gap, this study raises the following research questions: (1) What is the individual virtual competence required for better adjustment to the virtual collaboration environment? (2) How does online networking via diverse social network service sites influence individuals' task performance in organizations? (3) How do the joint effects of individual virtual competence and online networking influence task performance? To address these research questions, we first draw on the prior literature and derive four dimensions of individual virtual competence that are related with an individual's self-concept, knowledge and ability. Computer self-efficacy is defined as the extent to which an individual beliefs in his or her ability to use computer technology broadly. Remotework self-efficacy is defined as the extent to which an individual beliefs in his or her ability to work and perform joint tasks with others in virtual settings. Virtual media skill is defined as the degree of confidence of individuals to function in their work role without face-to-face interactions. Virtual social skill is an individual's skill level in using technologies to communicate in virtual settings to their full potential. It should be noted that the concept of virtual social skill is different from the self-efficacy and captures an individual's cognition-based ability to build social relationships with others in virtual settings. Next, we discuss how online networking influences both individual virtual competence and task performance based on the social network theory and the social learning theory. We argue that online networking may enhance individuals' capability in expanding their social networks with low costs. We also argue that online networking may enable individuals to learn the necessary skills regarding how they use technological functions, communicate with others, and share information and make social relations using the technical functions provided by electronic media, consequently increasing individual virtual competence. To examine the relationships among online networking, virtual competence, and task performance, we developed research models (the mediation, interaction, and additive models, respectively) by integrating the social network theory and the social learning theory. Using data from 112 employees of a virtualized company, we tested the proposed research models. The results of analysis partly support the mediation model in that online social networking positively influences individuals' computer self-efficacy, virtual social skill, and virtual media skill, which are key predictors of individuals' task performance. Furthermore, the results of the analysis partly support the interaction model in that the level of remotework self-efficacy moderates the relationship between online social networking and task performance. The results paint a picture of people adjusting to virtual collaboration that constrains and enables their task performance. This study contributes to research and practice. First, we suggest a shift of research focus to the individual level when examining virtual phenomena and theorize that online social networking can enhance individual virtual competence in some aspects. Second, we replicate and advance the prior competence literature by linking each component of virtual competence and objective task performance. The results of this study provide useful insights into how human resource responsibilities assess employees' weakness and strength when they organize virtualized groups or projects. Furthermore, it provides managers with insights into the kinds of development or training programs that they can engage in with their employees to advance their ability to undertake virtual work.

  • PDF