• Title/Summary/Keyword: Open World

Search Result 876, Processing Time 0.024 seconds

A Study on the Readaptation of the Women Who have Engaged in Prostitution - A Grounded Theory Approach - (탈성매매여성들의 사회적응에 대한 연구 - 근거이론 방법 접근 -)

  • Kim, Young-sook;Lee, Keun-moo;An, Jun-ri
    • Korean Journal of Social Welfare Studies
    • /
    • no.37
    • /
    • pp.429-455
    • /
    • 2008
  • The purpose of this study is to generate a substantive theory that accounts for the social readaptation of the women who have engaged in prostitution and propose a practical program for them. We used the grounded theory developed by Strauss and Corbin(1990). Raw data were collected through the in-depth interview, documents and observation. We used constant comparative method for the data analysis. The nine women who had the exprience of prostitution have participated in this study. As a result of the data analysis, in open coding were generated 116 concepts, 29 subcategories and 12 categories, In axial coding the outcomes of a paradigm model were as follows. The causal conditions were named 'hostile environment' and 'the self endowed stigma'. The phenomenon turned out to be 'living as an anonymous being'. The contextual conditions were named 'cohesion of family', 'being pushed' and 'shrinked emotion'. The intervening conditions were presented to be 'desire of self restoration as a social being', 'reactionary reconstruction'. The action/interaction strategies turned out to be 'shifting of social status', 'neighbor alliance'. The consequences were presented to be 'psychological wayfarer' and 'tentacular living'. In selective coding we found a core category, 'repetition of leaving and returning from the life world'. Based on the phenomenon, two types of participants life attitudes were found as follows : present hesitating type, self concealing type. Following the adove results, We finally suggested the need to develope a community oriented case management model.

Usability Evaluation of Knitting Customizing Website Using Knitting Machine (니팅머신을 이용한 니트 커스터마이징 웹 사이트 사용성 평가)

  • Jeong, Je-Yoon;Seo, Ji-Young;Lee, Saem;Nam, Won-Suk
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.10
    • /
    • pp.19-25
    • /
    • 2021
  • This study contains the results obtained after two and a half years of developing a knitting customization website using a knitting machine. Recently in the fashion world, various services using customization are being provided, and devices that users can design directly using knitting machines are being developed. However the existing website for knitting machine does not provide a certain usability or layout, so it is difficult for users to use open source and custom design. Therefore, this study was conducted for the purpose of developing a website that provides ease of use to users who will use the knitting customizing service using a knitting machine. As a research method, the first usability evaluation was conducted by synthesizing the studies conducted for the knit customization website development work. As a result of the study, found the problems of the initial custom screen and the initial output screen were found, and convenience, intuition, and readability were improved. Secondary usability evaluation was conducted on the modified website and it was confirmed that the problem was corrected. Through the website finally derived from this study, it is expected that the new platform in the domestic knit market will be popularized and the usability of the custom website will be improved.

Mime Elements in Court Hagmu ; focusing on literature and expression of current practice (궁중 학무에 나타난 마임적 요소 - 문헌과 현행의 표출 현상을 중심으로 -)

  • Son, Sun Sook
    • (The) Research of the performance art and culture
    • /
    • no.18
    • /
    • pp.47-72
    • /
    • 2009
  • This study explores mime elements of court Hagmu(鶴舞) in literature and what is expressed in the practice of current Hagmu and examines what has been changed while others are kept intact. The content of Hagmu is that "attracted by lotus flowers in a pond, cranes dance around and peck at them, when the blossoms open wide with a girl [dancer] inside, upon which the surprised cranes fly away." The dance consists of 4 steps: the first step is for the entrance of cranes; in the second step the cranes dance moving across jidang(池塘) and the north; in the third step the cranes are curious about the lotus calyces, yeontong(蓮筒); and the cranes withdraw in the fourth step. The literature suggests that the dancing courses on the stage are limited to the east, the west, the south, and the north. The movement is limited to naeson (內旋) only in mujin(舞進) and mutoe(舞退). Furthermore, the gaze is only allowed toward the north and jidang. Motions are limited to naejog(內足), oego (外顧), and naego(內顧). However, the mime elements of current Hagmu are attributed to the effort of translating crane's life into a realistic story. It relates the life of cranes to that of human beings and implies love in it. Finally, the court Hagmu has entered the real world out of the literature, enriched with new elements. Under the transition from literature to practice the diversity of expression is added while the elements related with court codes such as courses, movements, directions, and motions are kept intact. These limitations, however, are coupled with the sensitive 'love' and the exposure of dancing instruments intrigues audience and creates dramatic effect. In conclusion the significance of mime elements in court Hagmu is in enhancing communication with audience.

Between Dystopia and Utopia A Comparative Study on Cormac MacCarthy's The Road and J.M. Coetzee's The Childhood of Jesus (디스토피아와 유토피아 사이 - 코멕 매카시의 『더 로드』와 존 쿳시의 『예수의 어린시절』 비교연구)

  • Jeon, So-Young
    • Cross-Cultural Studies
    • /
    • v.40
    • /
    • pp.91-110
    • /
    • 2015
  • Both Plato and More imagined alternative ways of organizing society. What is common to both authors, then, is the fact that they resorted to fiction to discuss other options. They differed, however, in the way they presented that fiction. The concept of utopia is no doubt an attribute of modern thought, and one of its most visible consequences. But one of the main features of utopia as a literary genre is its relationship with reality. Utopists depart from the observation of the society they live in, note down the aspects that need to be changed and imagine a place where those problems have been solved. After the two World Wars, the twentieth century was predominantly characterized by man's disappointment at the perception of his own nature. In this context, utopian ideals seemed absurd and the floor was inevitably left to dystopian discourse. Both The Road by Cormac MacCarthy and The Childhood of Jesus by J. M. Coetzee can be called critical dystopia and critical utopia as they represent the imaginary place and time that author intended a contemporaneous reader to view as better or worse than contemporary society but with difficult problems that the described society may or may not be able to solve. As a changed adventure narrative, they have something in common like open ending, father and son relationship and religious allegory. But the most important thing is that they express the utopian impulse that is still energetic and transforming in the post-modern society.

Disaster risk predicted by the Topographic Position and Landforms Analysis of Mountainous Watersheds (산지유역의 지형위치 및 지형분석을 통한 재해 위험도 예측)

  • Oh, Chae-Yeon;Jun, Kye-Won
    • Journal of Korean Society of Disaster and Security
    • /
    • v.11 no.2
    • /
    • pp.1-8
    • /
    • 2018
  • Extreme climate phenomena are occurring around the world caused by global climate change. The heavy rains exceeds the previous record of highest rainfall. In particular, as flash floods generate heavy rainfall on the mountains over a relatively a short period of time, the likelihood of landslides increases. Gangwon region is especially suffered by landslide damages, because the most of the part is mountainous, steep, and having shallow soil. Therefore, in this study, is to predict the risk of disasters by applying topographic classification techniques and landslide risk prediction techniques to mountain watersheds. Classify the hazardous area by calculating the topographic position index (TPI) as a topographic classification technique. The SINMAP method, one of the earth rock predictors, was used to predict possible areas of a landslide. Using the SINMAP method, we predicted the area where the mountainous disaster can occur. As a result, the topographic classification technique classified more than 63% of the total watershed into open slope and upper slope. In the SINMAP analysis, about 58% of the total watershed was analyzed as a hazard area. Due to recent developments, measures to reduce mountain disasters are urgently needed. Stability measures should be established for hazard zone.

A Case study analysing the users of archives through web analytics (웹애널리틱스를 이용한 아카이브 이용자 분석 사례 연구)

  • Lee, Hyoeun;Yim, Jin Hee
    • The Korean Journal of Archival Studies
    • /
    • no.45
    • /
    • pp.83-120
    • /
    • 2015
  • Record Information Services is an aggressive action of connecting documentaries focusing on the information needs of user. However, recent studies on the parliament's written information service recognize the necessity that it should segment the user's information requests, and provide personalized service, but have not discussed for specific cases or measures. While the importance of Web services written with the proliferation of information and popularization of the Web is emerging right to know but, it is not being performed properly by lack of sufficient manpower and budget along with lack of recognition in hands-on sites upon the user analysis. So, while increasing the efficiency of the hands-on workers of Record Information Services, the introduction of analytical tools that can be utilized in low budget agencies is needed. Web analytics is to analyze the behavior by analyzing Web logs which web users have left you visit the site. To estimate the behavior they want to request information of the analyzed Web user aims to provide a Web service, the Web service further continued improvement. There are several types that include among them Google Analytics offering a variety of analysis items for free and all over the world, many people are already using. This study introduces a Google Analytics web analytics focused and proposes a service improvement plan with specific web user segmentation analyzes the cases of Korea Democracy Foundation of Open Archives introduces them to the actual institutions.

A Study on the Changes of Literary Thought in the Middle of the Yi Dynasty through Seo Kyung Duk (서경덕(徐敬德)을 통해 본 조선 중기 근기(近畿) 문학 사상의 변화)

  • Kim, Seong-ryong
    • Journal of Korean Classical Literature and Education
    • /
    • no.39
    • /
    • pp.181-220
    • /
    • 2018
  • I analyze Seo Kyung Duk's (徐敬德, 1489-1546) phonetic essay and deduce whether it is related to the Tang poetry style [唐詩風], which was popular in the 16th century. Seo Kyung Duk was known as a Ki[氣]-oriented scholar and a kind of numerologist. He taught people regardless of their status differences, which gave them an open-minded attitude. Most of them were active in the areas near Seoul. Around this time, the Tang poetry style began to be popular in the Yi dynasty. Most of the leading writers of this literary trend were his students. He thought that the universe was made up of the movement of Ki[氣] and that the movement followed the correct order of numbers. Ki[氣] is active, automatic, and inevitably creates the universe in the order of numbers. The reasons for their existence are clear. All present existences, including human beings, fit together and collectively harmonize by themselves. Beyond the present discrimination, the Great Body [本體] returns to a clean and transparent unity. As such, the school presented the political stance of taking the differences of the present world into harmony and the literary position of trying to experience the clean and transparent unity of the Great Body through an aesthetic experience.

Research on the ethical implication of the principle of "Faithfulness" and "Benevolence" and application schemes in the ethics course of the elementary education - centering around the synthetic approach to the individual morality and the ethics of social community ('충서지도(忠恕之道)'의 윤리학적 함의와 초등 도덕과 교육에서의 적용 방안 연구 - 개인윤리와 사회공동체윤리의 통합적 접근을 중심으로 -)

  • Chi, Chun-Ho
    • (The)Study of the Eastern Classic
    • /
    • no.34
    • /
    • pp.311-338
    • /
    • 2009
  • The moral corruption or the reality of absence of humanity derived from the development of science and society is very serious. Especially the moral education which should provide new breakthroughs facing such issue will be the initial concern in the educational world and the key point that judges our future. This study, as a part of efforts made for such demands of the times, is an attempt to approach the field of the present elementary education specifically by deducing the abundant meaning that the Confucianism's Chungseojidoh(忠恕之道: the principle of "Faithfulness" and "Benevolence") stands for. To build an ethical social community also means to draw voluntary moral practices into this society and this is possible with our (the moral subject) struggling the problems within but not remaining in the limitations of physical norms. Chungseojidoh as universal ethics contains a virtue ethical meaning as Jenlogy, a meaning of identity recognition and self-esteem inspiration, a meaning of social community ethics as ethics of good offices, etc. Such meanings, in particular, can be discussed more profoundly in terms of educational prevention from violence or cliquish issues in school that are largely related to education of humanity if 'applying schemes for elementary education' is seen as the center of the issue. And furthermore, they will be able to open a discussion over problems of the situation which the Korean society is in - especially the insistence, egoism or conflicts between social communities - can be answered in actuality.

Secure Key Exchange Protocols against Leakage of Long-tenn Private Keys for Financial Security Servers (금융 보안 서버의 개인키 유출 사고에 안전한 키 교환 프로토콜)

  • Kim, Seon-Jong;Kwon, Jeong-Ok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.3
    • /
    • pp.119-131
    • /
    • 2009
  • The world's widely used key exchange protocols are open cryptographic communication protocols, such as TLS/SSL, whereas in the financial field in Korea, key exchange protocols developed by industrial classification group have been used that are based on PKI(Public Key Infrastructure) which is suitable for the financial environments of Korea. However, the key exchange protocols are not only vulnerable to client impersonation attacks and known-key attacks, but also do not provide forward secrecy. Especially, an attacker with the private keys of the financial security server can easily get an old session-key that can decrypt the encrypted messages between the clients and the server. The exposure of the server's private keys by internal management problems, etc, results in a huge problem, such as exposure of a lot of private information and financial information of clients. In this paper, we analyze the weaknesses of the cryptographic communication protocols in use in Korea. We then propose two key exchange protocols which reduce the replacement cost of protocols and are also secure against client impersonation attacks and session-key and private key reveal attacks. The forward secrecy of the second protocol is reduced to the HDH(Hash Diffie-Hellman) problem.

Implementation of A Security Token System using Fingerprint Verification (지문 인증을 이용한 보안 토큰 시스템 구현)

  • 문대성;길연희;안도성;반성범;정용화;정교일
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.63-70
    • /
    • 2003
  • In the modern electronic world, the authentication of a person is an important task in many areas of online-transactions. Using biometrics to authenticate a person's identity has several advantages over the present practices of Personal Identification Numbers(PINs) and passwords. To gain maximum security in the verification system using biometrics, the computation of the verification as well as the store of the biometric pattern has to be taken place in the security token(smart card, USB token). However, there is an open issue of integrating biometrics into the security token because of its limited resources(memory space, processing power). In this paper, we describe our implementation of the USB security token system having 206MHz StrongARM CPU, 16MBytes flash memory, and 1MBytes RAM. Also, we evaluate the performance of a light-weighted In-gerprint verification algorithm that can be executed in the restricted environments. Based on experimental results, we confirmed that the RAM requirement of the proposed algorithm was about 6.8 KBytes and the Equal Error Rate(EER) was 1.7%.