• Title/Summary/Keyword: Use of Communication Media

Search Result 818, Processing Time 0.023 seconds

COVID-19 News Analysis Using News Big Data : Focusing on Topic Modeling Analysis (뉴스 빅데이터를 활용한 코로나19 언론보도 분석 :토픽모델링 분석을 중심으로)

  • Kim, Tae-Jong
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.5
    • /
    • pp.457-466
    • /
    • 2020
  • The purpose of this study is to find out what the main agenda of social formation is and how it changes through the media by utilizing the news big data of COVID-19 which is spreading recently, and to suggest the direction of future reporting. In order to achieve the purpose of the research, 47,816 cases of news big data reported from December 31, 2019 to March 11, 2020 were divided into four periods based on the fourth stage of the crisis warning for infectious diseases, and a total of 20 topics were derived. Based on the results of the Topic Modeling analysis, this study proposed the following. First, it is necessary to refrain from provocative expressions such as "anxiety" and "fear" and use neutral and objective reporting terms. Second, more in-depth and contextual news production is required, breaking away from simple event news production. Third, it is necessary to prepare detailed crisis communication manuals for each situation related to infectious diseases. Fourth, we need reports that focus on citizens-led efforts to overcome the crisis. This research has the academic significance that it is the first paper to analyze news big data on COVID-19 using the Topic Modeling Analysis method, and the policy significance that can be used as the basis for developing national crisis communication policy.

An Application and Educational Outcomes of e-PBL (e-Project-based Learning) to University Forest Education (대학 산림교육의 웹기반 프로젝트 학습법(e-PBL) 적용 사례와 학습성과)

  • Lee, Songhee;Lee, Jaeeun;Kang, Hoduck;Yoon, Tae Kyung
    • Journal of Korean Society of Forest Science
    • /
    • v.110 no.2
    • /
    • pp.266-279
    • /
    • 2021
  • This study applied the e-PBL (e-Project-based learning) method for "Urban Forest Management" courses in the Department of Forest Science at S University to progress in university forest education. e-PBL effectively motivates self-directed learning, problem-solving, communication skills, and learners' responsibility by enabling them to choose, design, and perform their projects. Due to the COVID-19 pandemic in 2020, learners were encouraged to use online media to carry out projects and submit presentations for the campus forest. Learners' educational effects were subsequently investigated through a five-point Likert scale. This study discovered a positive effect on learners' motivation and interest (4.17) through e-PBL. Learners responded that e-PBL also helped their understanding regarding the subject (4.17). In addition, this study provided evidence that the e-PBL method was helpful in problem-solving (4.25), communication (4.33), and decision-making skills (4.21). According to learners' responses, there are positive indications that learners were satisfied with e-PBL. Learners responded that interactions and communications with team members could improve their understanding of the subject. Hence, there is scope for improving an efficient and successful e-PBL model suitable for university forest education by providing more efficient instructional time management, e-PBL method guidelines, and institutional support.

Analysis on Security Vulnerabilities of a Biometric-based User Authentication Scheme for Wireless Sensor Networks (무선 센서 네트워크를 위한 생체 정보 기반 사용자 인증 스킴의 보안 취약점 분석)

  • Joo, Young-Do
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.1
    • /
    • pp.147-153
    • /
    • 2014
  • The numerous improved schemes of remote user authentication based on password have been proposed in order to overcome the security weakness in user authentication process. Recently, some of biometric-based user authentication schemes to use personal biometric information have been introduced and they have shown the relatively higher security and the enhanced convenience as compared to traditional password-based schemes. These days wireless sensor network is a fundamental technology in face of the ubiquitous era. The wireless sensor networks to collect and process the data from sensor nodes in increasing high-tech applications require important security issues to prevent the data access from the unauthorized person. Accordingly, the research to apply to the user authentication to the wireless sensor networks has been under the progress. In 2010, Yuan et al. proposed a biometric-based user authentication scheme to be applicable for wireless sensor networks. Yuan et al. claimed that their scheme is effectively secure against the various security flaws including the stolen verifier attack. In this paper, author will prove that Yuan et al.'s scheme is still vulnerable to the password guessing attack, user impersonation attack and the replay attack, by analyzing their security weakness.

The Role of Content Services Within a Firm's Internet Service Portfolio: Case Studies of Naver Webtoon and Google YouTube (기업의 인터넷 서비스 포트폴리오 내 콘텐츠 서비스의 역할: 네이버 웹툰과 구글 유튜브의 사례 연구)

  • Choi, Jiwon;Cho, Wooje;Jung, Yoonhyuk;Kwon, YoungOk
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.1-28
    • /
    • 2022
  • In recent years, many Internet giants have begun providing their own content services, which attract online users by offering personalized services based on artificial intelligence technologies. This study investigates the role of two firms' content services within the firms' online service network. We examine the role of Naver Webtoon, which can be characterized as a professional-generated content, within Naver's service portfolio, and that of Google YouTube, which can be characterized as a user-generated content, within Google's service portfolio. Using survey data on viewers' use of the two services, we analyze a valued directed service network, where a node denotes an online service and a relationship between two nodes denotes a sequential use of two services. We found that both Webtoon and YouTube show higher out-degree centrality than in-degree centrality, which implies these content services are more likely to be starting services rather than arriving services within the firms' interactive network. The gap between the out-degree and in-degree centrality of YouTube is much smaller than that of Webtoon. The high centrality of YouTube, a user-generated content service, within the Google service network shows that YouTube's initial role of providing specific-content videos (e.g., entertainment) has expanded into a general search service for users.

A Study on the Interaction Factors Influencing Use Intention of Interactive Video Services: focusing on Timing Flexibility (인터랙티브 비디오 서비스 사용 의도에 영향을 미치는 상호 작용성 요인에 관한 연구: 시간 유연성 개념을 중심으로)

  • Yang, Seung-Hwa;Lim, Seong-Taek;Lee, Su-Jin;Lee, In-Seong;Kim, Jin-Woo
    • Information Systems Review
    • /
    • v.10 no.2
    • /
    • pp.71-96
    • /
    • 2008
  • Interactive Video Service(IVS) is a new type of media service that enables users to interact with others in the process of casting and watching videos in a system. 'Timing flexibility', which divides IVS into real-time IVS and non-real-time IVS, is one of the significant factors of interactivity. The objective of this study is to identify critical factors of interactivity in IVS and to compare their effects in terms of timing flexibility. To achieve the objective, prior literature has been reviewed to establish a theoretical framework, and twelve active users of IVS have been interviewed to develop research model of IVS. Finally, an online survey has been conducted to verify the research model. The results indicate that Technical Factor, Communication Factor, and Contents Factor of IVS are found to be the important interaction factors in IVS; and their impacts on the intention to use IVS were found to be affected by timing flexibility. This paper ends with theoretical and practical implications of study results.

Potential Exposure of Nanoparticles from Laboratory to Office (실험실에서 사무실로의 나노입자의 잠재적 노출)

  • Shin, Hyeokjin;Kim, Younghun
    • Clean Technology
    • /
    • v.28 no.2
    • /
    • pp.123-130
    • /
    • 2022
  • Nanoparticles are used in various fields such as chemistry, medicine, the environment, and information and communication. With the increasing use of engineered nanomaterials, exposure to nanoparticles is expected to increase in the workplace and the environmental media. However, while nanotechnology industries are expanding, research on the exposure assessment of nanomaterials to humans and the environment is only at a beginning stage. Especially, if nanoparticles with a size of 100 nm or less that are contained in nano-products are released unintentionally, they may pose potential risks to the human body through breathing or skin exposure. Therefore, in this work, the possibility of potential exposure of nanoparticles moving from the laboratory to the office was confirmed, and nanoparticle safety guidelines are proposed. A nano-collector was used to detect nanoparticles in the atmosphere, and through use of a scanning mobility particle sizer it was found that nanoparticle concentrations in the laboratory and the office tended to be similar. On the assumption that nanoparticles attached to a lab-coat move out of the laboratory, a lab-coat to which nanocarbon black was attached was shaken and the concentration of the remaining particles on the lab-coat determined. The results confirmed that sufficient amounts of nanoparticles attached to the lab-coat could move from the laboratory to the office along the path of a researcher; thus, safety guidelines for the handling of lab-coat nanoparticles are required.

Study on Indoor Wireless Environment of mmWave WLAN Communication (초고주파 근거리 통신의 실내 무선 환경 연구)

  • Shin, Dong-Il;Kim, Woo-Seong;Park, Yang-Jae
    • Journal of Digital Convergence
    • /
    • v.16 no.1
    • /
    • pp.147-152
    • /
    • 2018
  • Recently, as the demand for transmission of ultra-high quality media data such as UHD, AR, and VR increases, various technologies for this have been actively developed and IEEE 802.11ad standard have been commercialized. In this paper, a test bed is constructed to analyze the indoor wireless environment using the IEEE 802.11ad standard based on mmWave, and the experimental results of various indoor wireless environments are introduced and analyzed. We compared the data from the module by data transmission, such as signal to noise ratio(SNR) and throughput. And we measured the beam pattern and width of the module and compared the effects on the indoor environment of the corridor and the office. This shows that the signal reflection of the wall shows higher SNR values and is more suitable to use for indoor than outdoor. It is confirmed that the loss when not in line of sight(LoS) is not enough to compensate the wall reflected signal. As a result, it is judged to be suitable for the indoor use of the mmWave LAN and can be usefully used for further experiments.

QR-Code Based Mutual Authentication System for Web Service (웹 서비스를 위한 QR 코드 기반 상호 인증 시스템)

  • Park, Ji-Ye;Kim, Jung-In;Shin, Min-Su;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.4
    • /
    • pp.207-215
    • /
    • 2014
  • Password based authentication systems are most widely used for user convenience in web services. However such authentication systems are known to be vulnerable to various attacks such as password guessing attack, dictionary attack and key logging attack. Besides, many of the web systems just provide user authentication in a one-way fashion such that web clients cannot verify the authenticity of the web server to which they set access and give passwords. Therefore, it is too difficult to protect against DNS spoofing, phishing and pharming attacks. To cope with the security threats, web system adopts several enhanced schemes utilizing one time password (OTP) or long and strong passwords including special characters. However there are still practical issues. Users are required to buy OTP devices and strong passwords are less convenient to use. Above all, one-way authentication schemes generate several vulnerabilities. To solve the problems, we propose a multi-channel, multi-factor authentication scheme by utilizing QR-Code. The proposed scheme supports both user and server authentications mutually, thereby protecting against attacks such as phishing and pharming attacks. Also, the proposed scheme makes use of a portable smart device as a OTP generator so that the system is convenient and secure against traditional password attacks.

A study on improving the usability of AR Shopping in the Mobile Duty-free App: Focusing on the Lotte Duty-free App (모바일 면세점 앱에서 AR 쇼핑 사용성 향상에 관한 연구: 롯데 면세점 앱을 중심으로)

  • Liu Chunli;Nam Inyong;Ding Meijun;Wang Xiuhong;Xue Yuanyuan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.1
    • /
    • pp.143-152
    • /
    • 2024
  • Due to COVID-19, domestic Duty-free shops have been severely impacted, and with the expansion of the untact market, the proportion of mobile shopping has increased. So far, mobile duty-free shop AR shopping is not active, and related research is scarce. Therefore, we aims to enhance Duty-free Shopping APPs with AR technology by researching the needs of foreign users. First, in the mobile duty-free shop app, the AR shopping interface must be in a prominent position to be open and easy to use. Second, there should be an explanation or help for location and function so that all users can easily recognize the AR shopping interface. Third, when wearing duty-free items in the AR shopping interface or adding them to the storage and shopping cart of interest, the interface must be simple and flexible, making it convenient to use and operate. Fourth, technical improvements must be made to prevent errors. We expect that the research will help develop AR shopping technology and domestic duty-free shop AR shopping technology and revitalize online and offline duty-free shops.

A Study on IP Camera Security Issues and Mitigation Strategies (IP 카메라 보안의 문제점 분석 및 보완 방안 연구)

  • Seungjin Shin;Jungheum Park;Sangjin Lee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.3
    • /
    • pp.111-118
    • /
    • 2023
  • Cyber attacks are increasing worldwide, and attacks on personal privacy such as CCTV and IP camera hacking are also increasing. If you search for IP camera hacking methods in spaces such as YouTube, SNS, and the dark web, you can easily get data and hacking programs are also on sale. If you use an IP camera that has vulnerabilities used by hacking programs, you easily get hacked even if you change your password regularly or use a complex password including special characters, uppercase and lowercase letters, and numbers. Although news and media have raised concerns about the security of IP cameras and suggested measures to prevent damage, hacking incidents continue to occur. In order to prevent such hacking damage, it is necessary to identify the cause of the hacking incident and take concrete measures. First, we analyzed weak account settings and web server vulnerabilities of IP cameras, which are the causes of IP camera hacking, and suggested solutions. In addition, as a specific countermeasure against hacking, it is proposed to add a function to receive a notification when an IP camera is connected and a function to save the connection history. If there is such a function, the fact of damage can be recognized immediately, and important data can be left in arresting criminals. Therefore, in this paper, we propose a method to increase the safety from hacking by using the connection notification function and logging function of the IP camera.