• Title/Summary/Keyword: Mobile Government

Search Result 339, Processing Time 0.027 seconds

Comparison of Working Conditions among Non-regular Visiting Nurses in Public Health Centers based on Their Employment Types (전국 보건소 비정규직 방문간호사의 고용형태별 직무실태 비교)

  • Kim, Hee Girl;Lee, Ryoun-Sook;Jang, Soong-Nang;Kim, Kwang Byung;Chin, Young Ran
    • Research in Community and Public Health Nursing
    • /
    • v.29 no.3
    • /
    • pp.267-278
    • /
    • 2018
  • Purpose: This study is to investigate working conditions including job stress among visiting nurses in public health centers in Korea. Methods: An social network based mobile survey was conducted in May 2017 (N=936, response rate: 47.0%). Results: The visiting nurses in this study had their average total career as a nurse is 13.7 years. The 68.3% of them were employed in an indefinite term, 17.0% were hired in a fixed term, and 11.0% came from outsourcing. They responded as high job-stress level including inadequate compensation (71.22/100) and job demands (71.91/100). They experienced down-talk (63.4%), swearwords (32.9%), being made a dirty face (39.9%), sexual jokes (30.8%), or being likened or evaluated with their appearance sexually (14.3%). Among the causes of job related conflicts and discrimination, deprived salary level was the most frequent reason (83.4%). The conflicts and discrimination were incurred by government officers (52.4%). There were no significant differences in overall job stress, emotional labor, organizational commitment, violence, and discrimination experience based on their employment types. Conclusion: The differences in working conditions among the non-regular nurses were trivial, and their overall working conditions were poor. It is necessary to improve non-regular nurses' working conditions in order to make up the limitations of the Korean healthcare system which is centered on hospitals.

A Methodology for the Improvement of Accredited Digital Certificate Integrating FIDO Biometric Technology and TrustZone (FIDO 생체기술과 안전영역을 연계한 공인인증서 효율화 방법)

  • Cho, Hwa-Gun;Yang, Hae-Sool
    • Journal of Digital Convergence
    • /
    • v.15 no.8
    • /
    • pp.183-193
    • /
    • 2017
  • Digital accredited certificates issued under the Digital Signature Act provide essential functionalities for online service, so certificates are used for various services such as online banking, e-government. However, certificates can be stolen by hackers and users need to install separate software to use certificates. Recently FIDO, which aims to solve the problems of password-based authentication and the lack of interoperability between authentication methods, is used for biometric authentication and TrustZone, hardware-based secure environment, is used for safe smartphone usage. In this paper, the new service method is suggested which uses FIDO-based biometric authentication and stores certificates in TrustZone. This method can not only improve security and convenience but also be easily applied to the service because it uses built-in functionalities of new smartphones such as biometric sensors and TrustZone. It is expected that people can use certificates in a safe and convenient way with this method.

Implementation of Precise Drone Positioning System using Differential Global Positioning System (차등 위성항법 보정을 이용한 정밀 드론 위치추적 시스템 구현)

  • Chung, Jae-Young
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.1
    • /
    • pp.14-19
    • /
    • 2020
  • This paper proposes a precise drone-positioning technique using a differential global positioning system (DGPS). The proposed system consists of a reference station for error correction data production, and a mobile station (a drone), which is the target for real-time positioning. The precise coordinates of the reference station were acquired by post-processing of received satellite data together with the reference station location data provided by government infrastructure. For the system's implementation, low-cost commercial GPS receivers were used. Furthermore, a Zigbee transmitter/receiver pair was used to wirelessly send control signals and error correction data, making the whole system affordable for personal use. To validate the system, a drone-tracking experiment was conducted. The results show that the average real-time position error is less than 0.8 m.

Extraction of Forensic Evidence and Hacking Attacks about IP-PBX (IP-PBX에 대한 해킹공격과 포렌식 증거 추출)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.197-200
    • /
    • 2013
  • Internet phone, communication cost and easy-to-use low-cost compared to the PSTN is a mobile phone of a conventional, and use of the Internet phone is spreading. Construction as part of the broadband convergence network(BCN), Internet service provider(KT, SKT, LG) has converted to Internet phone telephone network to all government agencies. In addition, members of the public also have an Internet phone service that you are using. In this paper, we analyze the hacking attack on IP-PBX in the IETF SIP-based that are used in Internet telephony, to the study. The test bed is constructed in the same way as the Internet telephone system to perform studies carried hacking attacks on IP-PBX, analyze the results and to extract evidence forensics. When used in crime by hacking the Internet telephone, we propose a method which can be used as evidence in forensic having legal effect.

  • PDF

The Proposal of Direction for Introduction of Pin-Tech Services Based on Research of Cases (사례 연구를 통한 핀테크 도입 방향성 제안)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.1
    • /
    • pp.51-61
    • /
    • 2016
  • Because the Apple Pay which created by U.S's Apple Inc. and launch of Samsung pay in last August in domestic, people have high interest in Pin-Tech industries and new method of easy payment. In this paper, it will study newly introduced Pin-Tech industries and marketability of Pin-Tech industries. Also it will propose safe use of Pin-Tech services based on cases in domestic and overseas. This paper is organized as follows. In Chapter 2, it will study concept of Pin-Tech services and status of Pin-Tech services in domestic and overseas. In Chapter 3, it will look technical trends of Pin-Tech services. In Chapter 4, it will propose direction based on analysis of cases of Pin-Tech services. This paper will finish with conclusion in Chapter 5. Given the global trends, Korea is now just took the first steps in new Pin-Tech era. The Pin-Tech services are in situations that it is not yet activated in domestic due to the various financial regulations and procedures. In this paper, it will shows cases of concerns of Pin-Tech services and domestic authentication which relates to easy payment certification. If Pin-Tech services are develop with easy payment certification and adapt to domestic environment and develop based on stability and security as mentioned in this paper, domestic Pin-Tech services and security technology will grow to the world level. Also it requires unceasing research and efforts from relevant government officials, security companies and Pin-Tech ICT companies.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

CUSUM Chart Applied to Monitoring Areal Population Mobility (누적합 관리도를 활용한 생활인구 이상치 탐색)

  • Kim, Hyoung Jun;Sohn, So Young
    • Journal of Korean Society for Quality Management
    • /
    • v.48 no.2
    • /
    • pp.241-256
    • /
    • 2020
  • Purpose: Certain places in Seoul such as Shinchon, Hongdae, and Gangnam, often suffer from sudden overflow of mobile population which can cause serious safety problems. This study suggests the application of spatial CUSUM control chart in monitoring areal population mobility data which is recently provided by Seoul metropolitan government. Methods: Monitoring series of standardized local Moran's I enables one to detect spatio-temporal out-of-control status based on the accumulation of past patterns. Moreover, we visualize such pattern map for more intuitive comprehension of the phenomenon. As a case study, we have analyzed the female mobility population aged 25 to 29 appeared in 51 Jipgyegu near Hongik university on fridays from January, 2017 to June, 2018. They are validated by exploring related articles and through local due diligence. Results: The results of the analysis provide insights in figuring out if the change of the mobility population is short-term by particular incident or long-term by spatial alteration, which allows strategic approach in constructing response system. Specific case near popular downtown near Hongik University has shown that newly opened hotels, shops of global sports brand and franchise bookstores have attracted young female population. Conclusion: We expect that the results of our study contribute to planning effective distribution of administrative resources to prepare against drastic increase in floating population. Furthermore, it can be useful in commercial area analysis and age/gender specific marketing strategy for companies.

The SAFE Management System Model Based on Context Automatic Awareness

  • Han, Kook-Hee;Liu, Yiwen;Kwon, Young-Jik;Kang, Byeong-Do
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2007.02a
    • /
    • pp.87-96
    • /
    • 2007
  • Ubiquitous is a Latin-derived word meaning "to exist at any time and place" like water or air. In computing, the word "ubiquitous" indicates an environment in which users have access to networks without any limitation regarding computer networks or places. Important issues in building Ubiquitous Korea (U-Korea) are the social problems appearing with a rapid increase in the old age population. Nowadays, with the rise of the nuclear family, the increase in the number of elderly people living alone, and the change in the status of women, both wives and husbands are employed outside the home, and the relatives who would be responsible for supporting the elderly sometimes are on long or short business trips, and it happens that old people can't be looked after. Therefore the government developed a wireless paging system for the sick, disabled, old and weak so that when an emergency happens, by just simply dialing 119, an emergency aid center could take prompt action. However, the present wireless paging systems composing the under-layer of the emergency aid information system have some problems, such as, a lack of reliability, problems among terminals, mobile transmitters and receiving terminals, the users' refusal to admit the need for the system and poor operational skills, administrators' perfunctory management and checks, etc. On account of these problems, the system efficiency has degraded and therefore a system upgrade is necessary. In this paper, we attempt to evaluate the newly implemented SAFE119 system, a new wireless paging system seeking to correct the problems of the current system.

  • PDF

Movie Popularity Classification Based on Support Vector Machine Combined with Social Network Analysis

  • Dorjmaa, Tserendulam;Shin, Taeksoo
    • Journal of Information Technology Services
    • /
    • v.16 no.3
    • /
    • pp.167-183
    • /
    • 2017
  • The rapid growth of information technology and mobile service platforms, i.e., internet, google, and facebook, etc. has led the abundance of data. Due to this environment, the world is now facing a revolution in the process that data is searched, collected, stored, and shared. Abundance of data gives us several opportunities to knowledge discovery and data mining techniques. In recent years, data mining methods as a solution to discovery and extraction of available knowledge in database has been more popular in e-commerce service fields such as, in particular, movie recommendation. However, most of the classification approaches for predicting the movie popularity have used only several types of information of the movie such as actor, director, rating score, language and countries etc. In this study, we propose a classification-based support vector machine (SVM) model for predicting the movie popularity based on movie's genre data and social network data. Social network analysis (SNA) is used for improving the classification accuracy. This study builds the movies' network (one mode network) based on initial data which is a two mode network as user-to-movie network. For the proposed method we computed degree centrality, betweenness centrality, closeness centrality, and eigenvector centrality as centrality measures in movie's network. Those four centrality values and movies' genre data were used to classify the movie popularity in this study. The logistic regression, neural network, $na{\ddot{i}}ve$ Bayes classifier, and decision tree as benchmarking models for movie popularity classification were also used for comparison with the performance of our proposed model. To assess the classifier's performance accuracy this study used MovieLens data as an open database. Our empirical results indicate that our proposed model with movie's genre and centrality data has by approximately 0% higher accuracy than other classification models with only movie's genre data. The implications of our results show that our proposed model can be used for improving movie popularity classification accuracy.

University-Industry Cooperation for Creative Convergence Technology Fields (창의형 융합기술분야 산학협력방안)

  • Cho, Han-Jin;Kim, Geun-Chae;Kim, Ki-Bong
    • Journal of Digital Convergence
    • /
    • v.14 no.2
    • /
    • pp.271-278
    • /
    • 2016
  • University-industry cooperation is indispensable for a short-term problem solving, as well as sustainable growth in the economy of the Republic of Korea. In order to embody and implement that, the government has run a variety of financial assistance programs and policies for the promotion of the cooperation for the last 10 years, and Korea Sanhak Foundation has made progress in academic and research development support, creative personnel training and scholarships, International Support and other projects. In this paper, window-type university-industry convergence and practices, and analyzing the best practices of national and international IT-based fusion technology, corporate cooperation were established to support measures taken in conjunction type and model of the university. Industry utilizing the latest IT technology based on this model, academia, proposed a collaboration system between workers building measures.