• Title/Summary/Keyword: Social ID

Search Result 76, Processing Time 0.027 seconds

Tweet Acquisition System by Considering Location Information and Tendency of Twitter User (트위터 사용자의 위치정보와 성향을 고려한 트윗 수집 시스템)

  • Choi, Woosung;Yim, Junyeob;Hwang, Byung-Yeon
    • Spatial Information Research
    • /
    • v.22 no.3
    • /
    • pp.1-8
    • /
    • 2014
  • While SNS services such as Twitter or Facebook are rapidly growing, research for the SNS analysis has been concerned. Especially, twitter reacts to social issues in real-time so that it is used to get useful experimental data for researchers of social science or information retrieval. However, it is still lack of research on the methodology to collect data. Therefore, this paper suggests the tweet acquisition system by considering tendency of twitter user oriented location-based event and political social event. First the system acquires tweets including information of location and keyword about event and secure IDs for acquisition of political social event. Then we plan ID-analyzer to classify the tendency of users. In addition for measuring reliability of ID-analyzer, it acquires and analyzes the tweet by using high-ranked ID. In analyses result, top-ranked ID shows 88.8% reliability, 2nd-ranked ID shows 76.05% and ID-analyzer shows 77.5%, it shortens collection time by using minority ID.

Design of Auto-growing FOAF Framework Using Social Network Service and OpenID (사회연결망 서비스와 OpenID를 이용한 자동 성장형 FOAF 프레임워크의 설계)

  • Lee, Dong-Hun;Lee, Seung-Hun;Kim, Geon-Su;Yun, Tae-Bok;Lee, Ji-Hyeong
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2008.04a
    • /
    • pp.190-193
    • /
    • 2008
  • 사용자의 '참여'를 지향하는 웹2.0 서비스들은 사람간이나 정보간의 '관계'에 대한 문제에 주목하고 있다. 대표적인 서비스인 블로그는 엮인글을 통해 사용자들의 참여를 이끌고 문서를 연결하고 있으나 이를 악용하는 사례들이 발생하고 있어 이에 대한 해결을 위해 연결에 대한 분석이 요구되고 있다. 사람의 개인 정보와 친구 관계 및 주변 사물과의 관계를 모델링하는 방식인 FOAF(Friend of a Friend)는 이러한 사회연결망 분석을 가능케 하는 수단으로써 연구되고 있다. FOAF는 단순화되고 이해하기 쉬운 용어를 사용하여, 복잡하고 이해하기 어려운 시맨틱 웹의 단점을 극복하기 위한 발판으로서 또한 주목 받고 있다. 본 연구에서는 여러 웹 사이트를 하나의 ID로 이용하기 위한 OpenID를 통해 FOAF에 정보 관리 능력을 부여하여 개인정보 유출 문제를 해결하기 위한 방안을 제시한다. 또한 실제 운영되는 관리 능력을 부여하여 개인정보 유출 문제를 해결하기 위한 방안을 제시한다. 또한 실제 운영되는 사회연결망 서비스의 분석을 통해 OpenID의 정보에 따라 자동으로 사회연결망 정보를 수집하는 성장형 FOAF 프레임워크를 설계하였으며, 쉬운 FOAF를 보급하기 위한 발판을 마련하였다.

  • PDF

A Fuzzy Approach to Social Worker's Turnover Intention

  • Jang, Yun-Jeong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.10 no.3
    • /
    • pp.165-169
    • /
    • 2010
  • This study seeks to find the factors associated with social workers' turnover intention and show us how to manage turnovers by looking for some rules affecting turnover intentions. Our investigation surveying 331 social workers reveals that social workers' turnover intentions are affected by organizational commitment, job satisfaction, and burnout. Our pattern analyses using fuzzy ID3 show that the higher their commitment, the higher their job satisfaction stemming from promotion opportunities, rewards, and personal relations with peers and bosses. In addition, turnover intentions decreases (even if burnouts--the job-related stress--are very serious) when organizational commitment increases. We come to understand that organizational commitment could be a more important variable than job satisfaction and burnouts. Such results suggest that it would be necessary to consider how to improve social workers' organization-wide commitment rather than satisfaction and burnout related to jobs and environments.

The Identity Web : Trend and Security Requirement (The Identity Web : 동향 및 보안 요구사항)

  • Cho, Sang-Rae;Jin, Seung-Hun
    • Proceedings of the IEEK Conference
    • /
    • 2006.06a
    • /
    • pp.163-164
    • /
    • 2006
  • 실생활에서 나타나는 Social Network 을 웹에서 실현하기 위해서 Social Web 이 등장하고 그 전 단계로 Identity Web 이 현재 연구되고 있다. 그리고 웹의 확장으로 도메인간의 자유로운 데이터를 공유하기 위해서는 XML, XRI, XDI 가 제공되고 있다.. 본 논문은 Identity Web 을 실현하기 위한 기반 기술에 대하여 조사한 내용을 기술하고 이러한 인프라에서 자유로운 데이터의 공유를 하기 위해서는 어떠한 보안 요구사항들이 필요한지 고려하여 본다.

  • PDF

Gender Differences in Problematic Online Behavior of Adolescent Users over Time (남녀 청소년 소비자의 온라인 문제행동 차이에 대한 종단 분석)

  • Kim, Jung Eun
    • Human Ecology Research
    • /
    • v.53 no.6
    • /
    • pp.641-654
    • /
    • 2015
  • This study identifies and tracks changes gender differences in adolescent users' problematic online behavior. This study used Korea Youth Panel Survey (KYPS), which has tracked respondents over 7 years, with self-control theory and social learning theory applied as a theoretical framework. The model included individual-level variables such as self-control and respondent's experience of problematic behavior (offline), as well as socialization variables such as the number close friends who engaged in problematic offline behavior, parent-child relationships, and parental monitoring. Dependent variables included problematic online behavior, unauthorized ID use (ID theft) and cyberbullying (cursing/insulting someone in a chat room or on a bulletin board). Control variables consisted of academic performance, time spent on a computer, monthly household income, and father's educational attainment. Random and fixed effects models were performed by gender. Results supported self-control theory even for the within-level analysis (fixed effects models) regardless of gender, while social learning theory was partially supported. Only peer effects were found significant (except for unauthorized ID use) among girls. Year dummy variables showed significant negative associations; however, academic performance and time spent using computers were significant in some models. Father's educational attainment and monthly household income were found insignificant, even in the random effects models. We also discuss implications and suggestions for future research and policy makers.

I2DM : An Improved Identity Management Protocol for Internet Applications in Mobile Networks (모바일 네트워크에서 인터넷 응용을 위한 향상된 ID관리 프로토콜)

  • Park, In-Shin;Jeong, Jong-Pil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to rapid spread of smart phones and SNS(Social Network Service), using of Internet applications has increased and taking up bandwidth more than 3G network's capacity recently. This caused reduction of speed and service quality, and occurred strong needs that backbone network company to increasing investment costs. Also a great rise of mobile network users causing identity management problems on mobile service provider through mobile network. This paper proposes advanced IDM3G[1] - to solve user ID management and security problems on mobile internet application services over 3G network and more - authentication management protocol. $I^2DM$ protocol breakup loads which made by existing IDM3G protocol's mutual authentication via mobile operator, via sending some parts to internet application service provider, enhancing mobile and ID management of service provider and network load and process load from information handling and numbers of transmitting packets, to suggest more optimized protocol against further demanding of 3G mobile network.

Use of the ID Migraine Questionnaire for Migraine in TMJ and Orofacial Pain Clinic (턱관절 및 안면통증 클리닉에서 편두통 진단을 위한 ID Migraine 설문지의 이용)

  • Kim, Seong-Taek
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.22 no.1
    • /
    • pp.29-36
    • /
    • 2006
  • As migraine pain represents a substantial personal and social burden worldwide, there has been a great deal of effort in developing a screening instrument for migraine. Lipton et al(2003) developed and validated the ID Migraine questionnaire, which is a self-administered screener for migraine in primary care, and it is brief and easy to use for a primary care provider. The aim of this study was to determine if the ID Migraine questionnaire could be applied successfully to assess the headache patients with temporomandibular disorders(TMD) and orofacial pain. This study found that nausea, photophobia and headache-related disability had the highest individual sensitivities and specificities, and the performance of the three-item screener was equivalent to that reported in a previous study. Although the sensitivity of the three-item screener in this study (0.58) was lower than in a previous study (0.81), the specificity (0.98) was higher and the positive predictive value was 93.9%. This suggest that the ID Migraine questionnaire is very efficient in this setting. In conclusion, the ID Migraine questionnaire, which is a three-item screener consisting of nausea, photophobia and headache-related disability, is effective as a self-administered report for detecting migraine headaches in patients with temporomandibular disorders(TMD) and orofacial pain.

A Study on The Utilization and Secure Plan of Security in Social Media (소셜 미디어 이용 현황과 보안대책에 관한 연구)

  • Cheon, Woo-Bong;Park, Won-Hyung;Chung, Tai-Myoung
    • Convergence Security Journal
    • /
    • v.10 no.3
    • /
    • pp.1-7
    • /
    • 2010
  • One of celebrities using Social media caught public's eye and interest in Korea. Thereby the number of the user has grown rapidly and by last year it had reached to about 770 million. But at the same time, it has brought us social issues such as invasion of privacy, spreading of malicious code, and stealing of ID. To solve these problems, first the government need to establish adequate law and policy. Second, Service provider should remove vulnerability in the security system and filter illegal information. Third, individual user should put more effort to protect their own privacy. This paper will suggest a solution of using the Social media more sound and secure.

A study on the Application of Distributed ID Technology based on Blockchain for Welfare Blind Spot Management (복지사각지대 관리를 위한 블록체인 분산 ID기술 적용 연구)

  • Min, Youn A
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.145-150
    • /
    • 2020
  • The importance of managing blind spots in the welfare crisis is increasing. Accordingly, in order to manage the blind spot of the welfare crisis, it is necessary to manage the social safety net with the contents of supporting income and self-reliance of low-income families, and actively discovering and supporting poor and crisis households. In this paper, we reviewed various problems related to blind spots for the management of welfare blind spots, and proposed the applicability of blockchain-based distributed ID and the possibility of distributed ID technology in stages by considering the range of blind spots.

iVisher: Real-Time Detection of Caller ID Spoofing

  • Song, Jaeseung;Kim, Hyoungshick;Gkelias, Athanasios
    • ETRI Journal
    • /
    • v.36 no.5
    • /
    • pp.865-875
    • /
    • 2014
  • Voice phishing (vishing) uses social engineering, based on people's trust in telephone services, to trick people into divulging financial data or transferring money to a scammer. In a vishing attack, a scammer often modifies the telephone number that appears on the victim's phone to mislead the victim into believing that the phone call is coming from a trusted source, since people typically judge a caller's legitimacy by the displayed phone number. We propose a system named iVisher for detecting a concealed incoming number (that is, caller ID) in Session Initiation Protocol-based Voice-over-Internet Protocol initiated phone calls. Our results demonstrate that iVisher is capable of detecting a concealed caller ID without significantly impacting upon the overall call setup time.