• Title/Summary/Keyword: communication behaviors

Search Result 672, Processing Time 0.027 seconds

Analysis and Application of Power Consumption Patterns for Changing the Power Consumption Behaviors (전력소비행위 변화를 위한 전력소비패턴 분석 및 적용)

  • Jang, MinSeok;Nam, KwangWoo;Lee, YonSik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.4
    • /
    • pp.603-610
    • /
    • 2021
  • In this paper, we extract the user's power consumption patterns, and model the optimal consumption patterns by applying the user's environment and emotion. Based on the comparative analysis of these two patterns, we present an efficient power consumption method through changes in the user's power consumption behavior. To extract significant consumption patterns, vector standardization and binary data transformation methods are used, and learning about the ensemble's ensemble with k-means clustering is applied, and applying the support factor according to the value of k. The optimal power consumption pattern model is generated by applying forced and emotion-based control based on the learning results for ensemble aggregates with relatively low average consumption. Through experiments, we validate that it can be applied to a variety of windows through the number or size adjustment of clusters to enable forced and emotion-based control according to the user's intentions by identifying the correlation between the number of clusters and the consistency ratios.

The Effect of Empathy in Responses to Persuasive Health Communication Campaign Contents (건강캠페인 콘텐츠에 대한 공감 반응 효과 연구)

  • Shin, Kyung-Ah;Cha, Kyung-Sim;Kim, Ji-Yun
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.6
    • /
    • pp.128-137
    • /
    • 2021
  • The purpose of this study is to examine the effect of sympathetic reactions to public service advertisement video messages produced for health campaigns. To this end, based on the empathy response scale proposed by Campbell & Babrow (2004), the empathy response to the images of nine health campaigns with themes of smoking cessation, tuberculosis, and suicide triggered fear of health risks and health behaviors (information seeking, preventive actions). As a result of the analysis, among the factors of empathy reaction, the reality of the message creative, the match of emotions, and the identification of the characters in the video each played a role in raising fear, and it is rather fear that logically understanding the situation that causes health problems through the health campaign video It was found that it played a role in reducing health information seeking behavior. On the other hand, it was found that the higher the degree of interest, such as sympathy for the characters in the video, among the factors of the sympathetic response to the health campaign, the higher the intention of preventive action to reduce the health risk.

Analysis of User Experience and Usage Behavior of Consumers Using Artificial Intelligence(AI) Devices (인공지능(AI) 디바이스 이용 소비자의 사용행태 및 사용자 경험 분석)

  • Kim, Joon-Hwan
    • Journal of Digital Convergence
    • /
    • v.19 no.6
    • /
    • pp.1-9
    • /
    • 2021
  • Artificial intelligence (AI) devices are rapidly emerging as a core platform of next-generation information and communication technology (ICT), this study investigated consumer usage behavior and user experience through AI devices that are widely applied to consumers' daily lives. To this end, data was collected from 600 consumers with experience in using AI devices were derived to recognize the attributes and behavior of AI devices. The analysis results are as follows. First, music listening was the most used among various attributes and it was found that simple functions such as providing weather information were usefully recognized. Second, the main devices used by AI device users were identified as AI speakers, smartphone, PC and laptops. Third, associative images of AI devices appeared in the order of fun, useful, novel, smart, innovative, and friendly. Therefore, practical implications are suggested to contribute to provision of user services using AI devices in the future by analyzing usage behaviors that reflect the characteristics of AI devices.

A Qualitative Study on the Perceptions and Learning Behavior of Medical Students in Online Classes (의과대학 학생의 온라인 수업에 대한 인식 및 학습행동에 관한 질적 연구)

  • Kang, Yeji;Kim, Do-Hwan
    • Korean Medical Education Review
    • /
    • v.23 no.1
    • /
    • pp.46-55
    • /
    • 2021
  • Since the emergence of coronavirus disease 2019 (COVID-19), medical schools have experienced a sudden, full-scale transition to online classes. As the COVID-19 pandemic continues, it is important to evaluate current educational programs and to assess their implications. This study explored perceptions of online classes and learning behavior among medical students. Twenty preclinical medical students were interviewed in focus groups for 2 months. They generally expressed positive perceptions about online classes, and in particular, positively assessed the ability to lead their individual lifestyles and study in comfortable environments with fewer time and space constraints. Students thought that the online environment provided a fair chance of facilitating positive interactions with the professor and considered communication with the professor to be an important factor only when it was related to the class content or directly helped with their grades and careers. Students also had negative views, such as feeling uncertain when they could not see their peers' learning progress and assess themselves in comparison and feeling social isolation. Learning behaviors have also changed, as students explored their learning styles and adapted to the changed learning environment. Students expanded their learning by using online functions. However, students sometimes abused the online class format by "just playing" the lecture while not paying attention and relying on other students' lecture transcripts to study. The results of this study are hoped to provide a useful foundation for future research on online class-based teaching and learning.

GTS-Visual Logic: Visual Logic and Tool for Analysis and Verification of Secure Requirements in Smart IoT Systems (GTS-VL: 스마트 IoT에서 안전 요구사항 분석과 검증을 위한 시각화 논리 언어 및 도구)

  • Lee, SungHyeon;Lee, MoonKun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.9
    • /
    • pp.289-304
    • /
    • 2022
  • It is necessary to apply process algebra and logic in order to analyze and verify safety requirements for Smart IoT Systems due to distributivity and mobility of the systems over some predefined geo-temporal space. However the analysis and verification cannot be fully intuitive over the space due to the fact that the existing process algebra and logic are very limited to express the distributivity and the mobility. In order to overcome the limitations, the paper presents a new logic, namely for GTS-VL (Geo-Temporal Space-Visual Logic), visualization of the analysis and verification over the space. GTS-VL is the first order logic that deals with relations among the different types of blocks over the space, which is the graph that visualizes the system behaviors specified with the existing dTP-Calculus. A tool, called SAVE, was developed over the ADOxx Meta-Modeling Platform in order to demonstrate the feasibility of the approach, and the advantages and practicality of the approach was shown with the comparative analysis of PBC (Producer-Buffer-Consumer) example between the graphical analysis and verification method over the textual method with SAVE tool.

A Statistical Detection Method to Detect Abnormal Cluster Head Election Attacks in Clustered Wireless Sensor Networks (클러스터 기반 WSN에서 비정상적인 클러스터 헤드 선출 공격에 대한 통계적 탐지 기법)

  • Kim, Sumin;Cho, Youngho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1165-1170
    • /
    • 2022
  • In WSNs, a clustering algorithm groups sensor nodes on a unit called cluster and periodically selects a cluster head (CH) that acts as a communication relay on behalf of nodes in each cluster for the purpose of energy conservation and relay efficiency. Meanwhile, attack techniques also have emerged to intervene in the CH election process through compromised nodes (inside attackers) and have a fatal impact on network operation. However, existing countermeasures such as encryption key-based methods against outside attackers have a limitation to defend against such inside attackers. Therefore, we propose a statistical detection method that detects abnormal CH election behaviors occurs in a WSN cluster. We design two attack methods (Selfish and Greedy attacks) and our proposed defense method in WSNs with two clustering algorithms and conduct experiments to validate our proposed defense method works well against those attacks.

Factors Affecting Deviation Broadcasting Intentions of Internet Personal Broadcasting Jockey: From the Perspective of the Social Pressure of Viewers (인터넷 개인 방송 진행자들의 일탈 방송의도에 영향을 미치는 요인: 시청자의 사회적 압력 관점에서)

  • Chae, Seong Wook;Song, Hye Ji
    • Knowledge Management Research
    • /
    • v.23 no.2
    • /
    • pp.169-192
    • /
    • 2022
  • With the spread of Internet personal broadcasting service, the number of personal broadcasting hosts (BJs: Broadcasting Jockeys) and viewers is increasing, and immediate communication between them is also actively taking place. This study examines whether the mechanism to suppress deviant behavior of BJ works effectively and how viewers interacting with BJs affect the intentions of deviant behaviors of BJs. Through the structural equation model, the effect of formal and informal sanctions of deterrence theory on BJs' intention of deviant broadcasting through their policy compliance attitude was investigated. The moderating effect of social pressure on the relationship between BJs' policy compliance attitude and their deviant broadcasting intention was confirmed. A total of 234 data were analyzed by surveying Africa TV BJs. As a result of the analysis, it was found that informal as well as formal sanctions increased the BJs' attitude toward policy compliance. However, it was confirmed that the social pressure perceived by BJs from Internet personal broadcasting viewers reduced the effect of policy compliance attitudes on reducing deviant broadcasting intentions.

A Study on the Conception of Sexuality and Sexual Ethics (섹슈얼리티 개념 분석과 성윤리의 정립)

  • Kim, Eun-Hee
    • Journal of Korean Philosophical Society
    • /
    • no.89
    • /
    • pp.99-128
    • /
    • 2010
  • Alan Goldman criticizes "means-end analyses" in that they define the concept of sexuality in terms of extrinsic values to sexuality, such as reproduction, love, and communication. And he claims that sexual desire in itself is only "desire for contact with another person's body and for the pleasure which such contact produces." I suggest that his analysis of sexuality also fails to offer the exact definition of sexuality, and that it also produces the hierarchial conception of sexuality just as those analyses that he refuses do. I agree to Christopher Hamilton's suggestion of Wittgenstein's idea of "family resemblance" and suggest a new sexual ethics focusing on the sexual autonomy. New sexual ethics demands that each person should formulate, reflect, evaluate, and revise his or her sexuality according to his or her own conception of sexuality and teleology. And I claim that new sexual ethics does not formulate distinct domain, but belongs to general ethics which general behaviors are judged through.

Information Security Importance Perception: Protection Motivation Theory Perpectives (정보보안 중요성 인식에 관한 연구: 예방동기이론 관점에서)

  • Yim, Myung-Seong
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.1
    • /
    • pp.283-295
    • /
    • 2022
  • This study attempts to explore factors that influence the perception of importance of information security. Three possible exogenous variables including perceived certainty of punishment, perceived response cost, and acquiescense are suggested that are based on the protectiom motivation theory. As a result, we found followings. First, The perceived punishment certainty has a significant effect on the perceived importance of information security. Also, it influences a negative effect on acquiescence. Second, the response cost has a negative effect on the perceived importance of information security. In addition, the response cost positively effects on acquiescence. Finally, acquiescence negatively influences on the perceived importance of information security. The results show that, in order to increase the perceived importance of information security among employees, it is necessary to make them aware that a security violation can result in certain punishment. At the same time, organizations should also attempt to remove major obstacles accompanying security behaviors of employees. Finally, organizations encourage open communication relating to information security among employees.

The Media Pole Design Applying the Playfulness of Scribbling (낙서의 유희성을 반영한 '미디어 폴' 디자인)

  • Kim, Hee Eun;Ryoo, Han Young
    • Design Convergence Study
    • /
    • v.14 no.5
    • /
    • pp.103-115
    • /
    • 2015
  • This study sheds light on the entertaining aspects of Media Pole that is located in Gangnam U-Street and proposes design that considers the aspects of the form, experience, contents and communication of scribbling. Functioning as public digital media, Media Pole provides various convenient services related to the area. According to the research on user's behavior upon Media Pole, photo related services, which can be categorized as entertainment, were found to be the most frequently used services among various services. Taking user's behaviors into consideration, this study highlights the entertaining aspects of Media Pole and suggests design that applies the playfulness of scribbling. The playful characteristics of scribbling were applied to the Media Pole's user interface, interaction, application and interlocking functions. As a result, users are expected to increase as Media Pole becomes more playful than before. Since scribbling is an act of intrinsic human's desire, it will attract users to participate more voluntarily. It can be applied not only to Media Pole, but to any public digital media devices.