• Title/Summary/Keyword: User data

Search Result 8,933, Processing Time 0.035 seconds

Transponder and Ground Station Systems for Drones

  • Kim, Ki-Su;Ha, Heon-Seong;Lee, Jong-Chan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.6
    • /
    • pp.9-15
    • /
    • 2020
  • In this paper, we propose a case that drone (unmanned aerial vehicle), one of the representative technologies of the 4th Industrial Revolution, threatens airport safety and privacy infringement, and describes a drone control system proposal to solve the problem. Unmanned aerial vehicle (Drone) is creating a serious problem recently, In Korea, on May 21, 19, according to the Jeju Regional Aviation Administration, drones flew over Jeju Jeongseok Airfield twice in the same month, causing problems in aircraft operation. In overseas cases, two drones near the runway of Gatwick International Airport in the UK There has been a disturbance in which the takeoff and landing of the aircraft flies for a while, and various problems have occurred, such as voyeuring the private life of an individual using a drone. This paper is equipped with an Acess Point transponder mounted on a drone (unmanned aerial vehicle), and unspecified many who want to receive flight information (coordinates, altitude, and obstacles) of the drone access the drone AP, receive and receive the flight information of the drone, and receive unspecified multiple Drone AP flight information is collected and collected to provide the information of the drone currently floating on one user interface screen. In addition, an AP transponder is proposed to operate a safe drone (unmanned aerial vehicle) and the drone's flight information is transmitted., To receive and collect and collect data.

A Study on the Factors Affecting the Acceptance of the Safety Speed 5030 Policy (안전속도 5030 정책수용도에 영향을 미치는 요인에 관한 연구)

  • Lee, Hwan Jin;Jung, Hun Young
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.41 no.5
    • /
    • pp.559-569
    • /
    • 2021
  • In this study, using structural equation modeling, a policy acceptance evaluation model was developed to evaluate the service items of roadsthat affect the acceptance of the Safety Speed 5030 policy. The relationship of influence on policy acceptance was found to be as follows: In the driver group, satisfaction with mobility (0.411), economy (0.217), safety (0.181), and environment (0.089) are in the order of top priority; and in the non-driver group, satisfaction with safety (0.466), mobility (0.223), environment (0.194), and economy (0.111) are in the order of top priority. From these results, in order to increase acceptance of the Safety Speed 5030 policy, it is necessary to differentiate the provision of services according to the characteristics of each road user type. This infers it is important to improve mobility for roads with a high hierarchy mainly used by driver groups, and to improve safety for roads with low hierarchy mainly used by non-driver groups. Therefore, the evaluation model for acceptance of the Safety Speed 5030 policy suggested in this study can be used as basic data for activating the Safety Speed 5030 policy in the future by reflecting the qualitative evaluation of users.

A Study on the Current State and Improvement Plans for the Information Disclosure System of Metropolitan Police Agencies : Focusing on Busan Metropolitan Police Agency (지방경찰청의 정보공개제도 운영 현황 및 개선 방안 연구 부산지방경찰청을 중심으로)

  • Kim, Hyunjung;Kim, Soojung
    • The Korean Journal of Archival Studies
    • /
    • no.68
    • /
    • pp.73-105
    • /
    • 2021
  • The aim of this study was to investigate the current state of operation of information disclosure system in Busan Metropolitan Police Agency and to suggest recommendations for improvement. To achieve this goal, this study quantitatively analyzed the data on information disclosure claims (2010~2020.6), appeal cases (2010~2020.6), the disclosure rate of original documents (2014~2019) and so on. Furthermore, it examined how and how much information is announced in advance through the agency's homepage and the information disclosure portal site. Results show that the agency has various problems regarding information disclosure including the high rate of transferring information to other institutions, the low disclosure rate of original documents, the high rate of information released publicly only after an administrative appeal, a small number of information announced in advance, and a not user-friendly website. To solve these problems, this study proposes providing accurate information about the scope of information the agency and other related institutions own, expanding the disclosure of original documents, discovering more information to announce in advance, and enhancing the usability of the website.

Development of Authentication Service Model Based Context-Awareness for Accessing Patient's Medical Information (환자 의료정보 접근을 위한 상황인식 기반의 인증서비스 모델 개발)

  • Ham, Gyu-Sung;Joo, Su-Chong
    • Journal of Internet Computing and Services
    • /
    • v.22 no.1
    • /
    • pp.99-107
    • /
    • 2021
  • With the recent establishment of a ubiquitous-based medical and healthcare environment, the medical information system for obtaining situation information from various sensors is increasing. In the medical information system environment based on context-awareness, the patient situation can be determined as normal or emergency using situational information. In addition, medical staff can easily access patient information after simple user authentication using ID and Password through applications on smart devices. However, these services of authentication and patient information access are staff-oriented systems and do not fully consider the ubiquitous-based healthcare information system environment. In this paper, we present a authentication service model based context-awareness system for providing situational information-driven authentication services to users who access medical information, and implemented proposed system. The authentication service model based context-awareness system is a service that recognizes patient situations through sensors and the authentication and authorization of medical staff proceed differently according to patient situations. It was implemented using wearables, biometric data measurement modules, camera sensors, etc. to configure various situational information measurement environments. If the patient situation was emergency situation, the medical information server sent an emergency message to the smart device of the medical staff, and the medical staff that received the emergency message tried to authenticate using the application of the smart device to access the patient information. Once all authentication was completed, medical staff will be given access to high-level medical information and can even checked patient medical information that could not be seen under normal situation. The authentication service model based context-awareness system not only fully considered the ubiquitous medical information system environment, but also enhanced patient-centered systematic security and access transparency.

Librarians' Intention and Behaviors for Providing Podcasts and YouTube Services: An Application of Extended Technology Acceptance Model (도서관 팟캐스트와 유튜브 서비스에 대한 사서의 제공 의도와 제공 행위 연구 - 확장된 기술수용모델의 적용 -)

  • Ahn, EunJi;Oh, Sanghee
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.55 no.4
    • /
    • pp.187-217
    • /
    • 2021
  • This study investigated the perceptions of librarians about Podcast and YouTube services in libraries. The study was designed by applying the Extended Technology Acceptance Model. Librarian's personal, organizational, and social awareness of library Podcast or YouTube services and the degree of understanding of users and their needs on services were mediated by perceived usefulness or ease of services= and influenced to having intentions and providing the services. First, we investigated the types of Podcast and YouTueb services provided by 39 libraries in Korea. Also, we collected data using an online survey method from 181 librarians and conducted hierarchical multiple regression analysis. Findings showed that libraries are using Podcast and YouTube appropriately considering features and functions of media, mainly for library event information/promotion, library programs, book recommendations, and author (librarian) lectures or interviews. Organizational or social awareness of librarians, i.e., library educational support, human resource supports, librarian recognition, job-related features, and understanding of user perceptions and needs, influenced the intention to provide library services. Also, there was a difference in perceived usefulness and ease of services between librarians who provided Podcast and YouTube services and those who did not. We expect that findings could be used as references to understand and support various aspects of librarians in charge of developing and providing Podcast or YouTube services in libraries.

Secure File Transfer Method and Forensic Readiness by converting file format in Network Segmentation Environment (망분리 환경에서 파일형식 변환을 통한 안전한 파일 전송 및 포렌식 준비도 구축 연구)

  • Han, Jaehyeok;Yoon, Youngin;Hur, Gimin;Lee, Jaeyeon;Choi, Jeongin;Hong, SeokJun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.859-866
    • /
    • 2019
  • Cybersecurity attack targeting a specific user is rising in number, even enterprises are trying to strengthen their cybersecurity. Network segmentation environment where public network and private network are separated could block information coming from the outside, however, it is unable to control outside information for business efficiency and productivity. Even if enterprises try to enhance security policies and introduce the network segmentation system and a solution incorporating CDR technology to remove unnecessary data contained in files, it is still exposed to security threats. Therefore, we suggest a system that uses file format conversion to transmit a secure file in the network separation environment. The secure file is converted into an image file from a document, as it reflects attack patterns of inserting malicious code into the document file. Additionally, this paper proposes a system in the environment which functions that a document file can keep information for incident response, considering forensic readiness.

Research on the Applicability of Experientially Emotional Measurement Method in Product Design - Centred on Self-report Taking Seaside Seat Users- (경험적 감성 측정 방법의 제품 디자인 적용성에 관한 연구 -해변 벤치 이용자 대상의 자기-보고법을 중심으로-)

  • Huang, Chao;Go, Jung-Wook
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.9
    • /
    • pp.658-665
    • /
    • 2019
  • In the era of the rapid development of a tremendous number of new technologies and products, the emotional communication between products and users has become an important research topic. However, the user's emotional measurement methods have not been widely used in the field of product design. Besides, as an important space that can improve people's life quality and urban entertainment at the emotional level, seaside space also creates an atmosphere of frequent emotional communication among tourists, landscape and environmental facilities. To deduce the applicability and advantages and disadvantages of the experiential emotional measurement method in product design, this paper took the seaside seat users of Haeundae as the object and carried out the Self-report of the experiential emotional measurement method. Specifically, the experiment of Self-report was divided into two stages: prior survey and subsequent main investigation. Then the hypothesis was verified by using Bivariate Regression and Multiple Regression through SPSS. Furthermore, through the experiment of the Self-report, the applicability and advantages and disadvantages of experiential emotional measurement method in product design were derived. In the future, based on the applicability, advantages and disadvantages of the experiential emotional measurement method derived in this study, it is expected to become the fundamental and reliable data for the development of emotional measurement methods that can be suitable for product design.

A Study on the Research Trends for Smart City using Topic Modeling (토픽 모델링을 활용한 스마트시티 연구동향 분석)

  • Park, Keon Chul;Lee, Chi Hyung
    • Journal of Internet Computing and Services
    • /
    • v.20 no.3
    • /
    • pp.119-128
    • /
    • 2019
  • This study aims to analyze the research trends on Smart City and to present implications to policy maker, industry professional, and researcher. Cities around globe have undergone the rapid progress in urbanization and the consequent dramatic increase in urban dwellings over the past few decades, and faced many urban problems in such areas as transportation, environment and housing. Cities around the globe are in a hurry to introduce Smart City to pursue a common goal of solving these urban problems and improving the quality of their lives. However, various conceptual approaches to smart city are causing uncertainty in setting policy goals and establishing direction for implementation. The study collected 11,527 papers titled "Smart City(cities)" from the Scopus DB and Springer DB, and then analyze research status, topic, trends based on abstracts and publication date(year) information using the LDA based Topic Modeling approaches. Research topics are classified into three categories(Services, Technologies, and User Perspective) and eight regarding topics. Out of eight topics, citizen-driven innovation is the most frequently referred. Additional topic network analysis reveals that data and privacy/security are the most prevailing topics affecting others. This study is expected to helps understand the trends of Smart City researches and predict the future researches.

A Study on the Users' Recognition of the ISA Based Specialized Library Operation (ISA 기반 특화도서관 운영에 대한 이용자의 인식조사 연구)

  • Noh, Younghee;Shin, Youngji;Kwak, Woojung
    • Journal of the Korean Society for information Management
    • /
    • v.36 no.2
    • /
    • pp.7-29
    • /
    • 2019
  • The purpose of this study is to investigate the status of specialized services, user experience, and the overall satisfaction for the specialized library users, and based on the ISA method, compare the specialized theme data, specialized service place, specialized program, specialized theme area facilities and environment, and derive issues of the specialized library operation and improvement measures. Consequently, first, when selecting the theme of the specialized library, the theme ought to be selected to reflect the regional characteristics, history and demographics of the library, and the demand survey of the local residents and library users would need to be considered. Second, when planning the specialized program, the specialized library ought to consider operating differentiated programs based on the program operator who has the expertise to improve the quality of the program. Furthermore, sufficient theme related books and space must be secured, and moreover, the program must be planned in connection with the book collection. Third, the specialized library should be so structured as to ensure that the space may serve specialized themes provided by the library in order to provide specialized collections, services, and information services for the users. In addition, reflecting the needs of the users in designing the space must be considered.

Efficient Patient Information Transmission and Receiving Scheme Using Cloud Hospital IoT System (클라우드 병원 IoT 시스템을 활용한 효율적인 환자 정보 송·수신 기법)

  • Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.4
    • /
    • pp.1-7
    • /
    • 2019
  • The medical environment, combined with IT technology, is changing the paradigm for medical services from treatment to prevention. In particular, as ICT convergence digital healthcare technology is applied to hospital medical systems, infrastructure technologies such as big data, Internet of Things, and artificial intelligence are being used in conjunction with the cloud. In particular, as medical services are used with IT devices, the quality of medical services is increasingly improving to make them easier for users to access. Medical institutions seeking to incorporate IoT services into cloud health care environment services are trying to reduce hospital operating costs and improve service quality, but have not yet been fully supported. In this paper, a patient information collection model from hospital IoT system, which has established a cloud environment, is proposed. The proposed model prevents third parties from illegally eavesdropping and interfering with patients' biometric information through IoT devices attached to the patient's body at hospitals in cloud environments that have established hospital IoT systems. The proposed model allows clinicians to analyze patients' disease information so that they can collect and treat diseases associated with their eating habits through IoT devices. The analyzed disease information minimizes hospital work to facilitate the handling of prescriptions and care according to the patient's degree of illness.