• Title/Summary/Keyword: Internet activity

Search Result 651, Processing Time 0.021 seconds

A Study on Invasion of Privacy and Right to be forgotten by Internet Cookie Technology (인터넷 쿠키로 인한 프라이버시 침해와 잊혀질 권리에 관한 연구)

  • Choi, Younsung;Kwon, Oh-Geol;Won, Dongho
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.77-85
    • /
    • 2016
  • Internet cookie technology is designed for solving unreliable problem of HTTP's inherent property and notifying user's previous activity to web site's server, so it is useful to provide suitable service for individual user. However, the cookie techniques are becoming more sophisticated such as the third cookie and super cookie. And its included information is applied for advertisement and target marketing strategy, so the problem occurs that user's personal information is collected excessively. However, our law does not recognize the internet cookie as personal information so user cannot know where own internet cookie is stored and applicable. Therefore, in this paper, we explain the internet cookie technology, the privacy invasion and right to be forgotten for solving problem due to the internet cookie. And we analysis the relationship between the information of internet cookie and personal information, and then present the improvement requirement on the law and technology to use internet cookie securely and conveniently.

Internet customer life analysis by membership pattern using life table (생명표를 이용한 회원유형별 인터넷 고객 수명 분석)

  • Park, Hee-Chang
    • Journal of the Korean Data and Information Science Society
    • /
    • v.20 no.1
    • /
    • pp.109-115
    • /
    • 2009
  • Many internet companies are holding marketing activity through customer relationship management to satisfy complicated and diversified consumer demands. Use of customer lifetime value as a marketing metric tends to place greater emphasis on customer service and long-term customer satisfaction, rather than on maximizing short term sales. And so many internet companies have been interested in customer lifetime value, which is a primary key for discovery customer values to promote the competitive power in their business fields. In this paper, we apply a life table technique to lifetime analysis of internet site customers by membership pattern and provide the opportunity using revised life tables in several kinds of internet companies.

  • PDF

The Effects of an Internet Based Coaching Program for Obesity Management in Hypertensive Patients (고혈압 환자의 비만관리를 위한 인터넷 기반 코칭 프로그램의 효과)

  • Jeon, Hae-Ok;Kim, Ok-Soo
    • Korean Journal of Adult Nursing
    • /
    • v.23 no.2
    • /
    • pp.146-159
    • /
    • 2011
  • Purpose: The purpose of this study was to investigate the effects of the internet based coaching program for obesity management on weight control related knowledge, self-efficacy, eating habits, physical activity and obesity related physiological indexes in hypertensive patients. Methods: The study design was non-equivalent control group pre-test-post-test design. A total of 43 subjects were overweight or obese hypertensive patients aged 30 or older, who were divided into experimental group (n=23) and control group (n=20). This program lasting 12 weeks consisted of a weight control related education, internet based individual coaching for diet, exercise and behavior modification, offering internet community and health counseling. The variables were measured three times (before the treatment, after 6 weeks, and after 12 weeks) and the collected data were analyzed by SPSS/WIN 17.0 program. Results: The experimental group had significantly improved weight control related knowledge, self efficacy, eating habits, body composition, and systolic blood pressure with time. Conclusion: The internet based coaching program was effective in improving obesity management, also this program will help to prevent cardiovascular disease of obese hypertensive patients.

Logical Activity Recognition Model for Smart Home Environment

  • Choi, Jung-In;Lim, Sung-Ju;Yong, Hwan-Seung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.9
    • /
    • pp.67-72
    • /
    • 2015
  • Recently, studies that interact with human and things through motion recognition are increasing due to the expansion of IoT(Internet of Things). This paper proposed the system that recognizes the user's logical activity in home environment by attaching some sensors to various objects. We employ Arduino sensors and appreciate the logical activity by using the physical activitymodel that we processed in the previous researches. In this System, we can cognize the activities such as watching TV, listening music, talking, eating, cooking, sleeping and using computer. After we produce experimental data through setting virtual scenario, then the average result of recognition rate was 95% but depending on experiment sensor situation and physical activity errors the consequence could be changed. To provide the recognized results to user, we visualized diverse graphs.

Minimal Workflow Model for Workflow Mining (워크플로우 마이닝을 위한 워크플로우 최적 축소 모델)

  • Park Min Jae;Won Jae Kang;Kim Chang Min;Kim KwangHoon
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.57-69
    • /
    • 2005
  • This paper proposes a minimal workflow model as a feasible solution to the workflow process rediscovery problem. The minimal workflow model can be represented by the minimal workflow net. The process model is represented by ICN(Information Control Net) Modeling method, ICN can configure activity dependent net applying proper algorithm according to activity dependency among activities which configure the ICN, The proposed model is possible to develop with the application of minimal workflow net and with the application of the algorithm related to activity dependent net properties, Hence, it can solve the process rediscovery problem and can also be helpful on process improvement.

  • PDF

Active Contours Level Set Based Still Human Body Segmentation from Depth Images For Video-based Activity Recognition

  • Siddiqi, Muhammad Hameed;Khan, Adil Mehmood;Lee, Seok-Won
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2839-2852
    • /
    • 2013
  • Context-awareness is an essential part of ubiquitous computing, and over the past decade video based activity recognition (VAR) has emerged as an important component to identify user's context for automatic service delivery in context-aware applications. The accuracy of VAR significantly depends on the performance of the employed human body segmentation algorithm. Previous human body segmentation algorithms often engage modeling of the human body that normally requires bulky amount of training data and cannot competently handle changes over time. Recently, active contours have emerged as a successful segmentation technique in still images. In this paper, an active contour model with the integration of Chan Vese (CV) energy and Bhattacharya distance functions are adapted for automatic human body segmentation using depth cameras for VAR. The proposed technique not only outperforms existing segmentation methods in normal scenarios but it is also more robust to noise. Moreover, it is unsupervised, i.e., no prior human body model is needed. The performance of the proposed segmentation technique is compared against conventional CV Active Contour (AC) model using a depth-camera and obtained much better performance over it.

A Workcase Mining Mechanism using Activity Dependency (액티비티 의존성을 이용한 워크케이스 마이닝 메커니즘)

  • Kim Sang-Bae;Kim Hak-Seong;Paik Su-Ki
    • Journal of Internet Computing and Services
    • /
    • v.4 no.6
    • /
    • pp.43-55
    • /
    • 2003
  • Workflow mining is a newly emerging research issue for rediscovering and reengineering workflow models from workflow logs containing information about workflows being executed on the workflow engine. In this paper, we proposed workcase mining which was used dependency among activities. Main purpose of this paper is to minimize discrepancies between the modeled workflow process and the enacted workflow process as it is actually being executed. That is, we can get a complete set of activity firing sequences on buildtime. Besides, we can discover from workflow logs that which path out of all reachable paths a workcase has actually followed through on runtime. For this purpose we proposed two algorithm, the one is 'Activily-Dependent Net Algorithm' and the other is 'E-Walk Series Analysis Algorithm'.

  • PDF

A SCORM-based e-Learning Process Control Model and Its Modeling System

  • Kim, Hyun-Ah;Lee, Eun-Jung;Chun, Jun-Chul;Kim, Kwang-Hoon Pio
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2121-2142
    • /
    • 2011
  • In this paper, we propose an e-Learning process control model that aims to graphically describe and automatically generate the manifest of sequencing prerequisites in packaging SCORM's content aggregation models. In specifying the e-Learning activity sequencing, SCORM provides the concept of sequencing prerequisites to be manifested on each e-Learning activity of the corresponding tree-structured content organization model. However, the course developer is required to completely understand the SCORM's complicated sequencing prerequisites and other extensions. So, it is necessary to achieve an efficient way of packaging for the e-Learning content organization models. The e-Learning process control model proposed in this paper ought to be an impeccable solution for this problem. Consequently, this paper aims to realize a new concept of process-driven e-Learning content aggregating approach supporting the e-Learning process control model and to implement its e-Learning process modeling system graphically describing and automatically generating the SCORM's sequencing prerequisites. Eventually, the proposed model becomes a theoretical basis for implementing a SCORM-based e-Learning process management system satisfying the SCORM's sequencing prerequisite specifications. We strongly believe that the e-Learning process control model and its modeling system achieve convenient packaging in SCORM's content organization models and in implementing an e-Learning management system as well.

A Cost-Effective Pigsty Monitoring System Based on a Video Sensor

  • Chung, Yongwha;Kim, Haelyeon;Lee, Hansung;Park, Daihee;Jeon, Taewoong;Chang, Hong-Hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1481-1498
    • /
    • 2014
  • Automated activity monitoring has become important in many applications. In particular, automated monitoring is an important issue in large-scale management of group-housed livestock because it can save a significant part of farm workers' time or minimize the damage caused by livestock problems. In this paper, we propose an automated solution for measuring the daily-life activities of pigs by using video data in order to manage the group-housed pigs. Especially, we focus on the circadian rhythm of group-housed pigs under windowless and 24-hour light-on conditions. Also, we derive a cost-effective solution within the acceptable range of quality for the activity monitoring application. From the experimental results with the video monitoring data obtained from two pig farms, we believe our method based on circadian rhythm can be applied for detecting management problems of group-housed pigs in a cost-effective way.

Are Online and Offline Delinquency Mutually Exclusive? Blurred Boundaries between Cyber Space and the Real-World

  • Ko, Nayoung;Hong, Myeonggi;Hwang, Jeeseon;Chang, Jeonghyeon;Hwang, EuiGab
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.3048-3067
    • /
    • 2021
  • This study examines the similarities and differences between the causes of juvenile delinquency in online and offline environments and in personal characteristics. The study utilizes data from the '2014 Survey on Juvenile Victimization in Korea'. The population of this survey is students attending middle and high schools across the country. While this paper is based on the Self-Control theory, opportunity factors based on the Routine Activity theory and the Situational Action theory are also applied. Results show that the causes of offline delinquency are low self-control, routine activity and frequent gaming and SNS use. The causes of online delinquency are high self-control, existence of communication with unknown persons and the spectrum of personal information online. The common element of offline and online delinquency was the presence of delinquent peers. These results show that while online and offline delinquency cannot be explained with the same methodology, at the same time they are not mutually exclusive.