• Title/Summary/Keyword: event information sharing

Search Result 66, Processing Time 0.023 seconds

Analysis of Differences in the Perceived Ease of Use, Service Value and Online Mouth-to-mouth Intention according to the Catering Companies Use SNS Features (외식기업 SNS 사용 특성에 따른 지각된 사용 용이성, 서비스가치 및 온라인 구전의도의 차이 분석)

  • Oh, Wang-Kyu;Lim, Hyun-Cheol
    • The Korean Journal of Food And Nutrition
    • /
    • v.28 no.3
    • /
    • pp.358-368
    • /
    • 2015
  • The study is focused on analyzing the SNS using characteristics of the people surveyed, as for the SNS acceptance channel of the food service corporations, accounted voluntarily for 71%. The SNS food service information regarding information of menu, location of store, price, coupon, taste evaluation, event, promotion, reservation and store atmosphere was researched. The most preferred information sharing for SNS food service were researched and found Facebook, blog and others in increasing order. The most preferred media to obtain SNS food service information were smart phone, desktop computer and others. The result of verifying differences in the perceived ease of use were also evaluated according to the food service corporation of SNS using characteristics of the people and was found: the longer period of SNS use, longer was access time: more number of visiting times, higher perceived ease of use. As for the difference in the perceived service value: longer the period of SNS use, more preferred was the blog: the more number of visiting times, the higher perceived service value. As for the difference in the online mouth-to-mouth intention: longer the period of SNS use, longer was access time: the more number of visiting times, the higher online mouth-to-mouth intention. Therefore, these research results provide useful implications in the working-level aspects such as providing basic data and the academic approach of the study, when the food service corporations establish marketing strategies through SNS.

A Security Monitoring System for Security Information Sharing and Cooperative Countermeasure (협력대응기반 전역네트워크 보안정보공유 시스템)

  • Kim, Ki-Young;Lee, Sung-Won;Kim, Jong-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.60-69
    • /
    • 2013
  • Highlighted by recent security breaches including Google, Western Energy Company, and the Stuxnet infiltration of Iranian nuclear sites, Cyber warfare attacks pose a threat to national and global security. In particular, targeted attacks such as APT exploiting a high degree of stealthiness over a long period, has extended their victims from PCs and enterprise servers to government organizations and critical national infrastructure whereas the existing security measures exhibited limited capabilities in detecting and countermeasuring them. As a solution to fight against such attacks, we designed and implemented a security monitoring system, which shares security information and helps cooperative countermeasure. The proposed security monitoring system collects security event logs from heterogeneous security devices, analyses them, and visualizes the security status using 3D technology. The capability of the proposed system was evaluated and demonstrated throughly by deploying it under real network in a ISP for a week.

A Study on Implementation of a Disaster Crisis Alert System based on National Disaster Management System

  • Hyong-Seop, Shim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.1
    • /
    • pp.55-63
    • /
    • 2023
  • In this paper, we propose a function and service of the Disaster Crisis Alert Management System that automatically analyzes the situation judgment criteria to issue a disaster crisis alert and a plan to operate in the National Disaster Management System(NDMS). In the event of a disaster, a crisis alert(interest-caution-alert-serious) is issued according to the crisis alert level. In order to automatically analyze and determine the crisis alert level, first, data collection, crisis alert level analysis, crisis alert level judgment, and disaster crisis alert management system that expresses the crisis alert level by spatial scale(province, city, district) were implemented. The crisis alert level was analyzed and expressed in two ways by applying the intelligent crisis alert level(determination of regional sensitivity, risk level, and crisis alert level) and the crisis alert standard of the crisis management manual(province-level standard setting). Second, standard metadata, linkage of situation information of target) and API standards for data provision are presented to jointly utilize data linkage and crisis alert data of the disaster and safety data sharing platform so that it can be operated within the NDMS.

A Study of the Plan for Library Operation and Curation Provision as a Community Memory Preservation Center (공동체 기억보존센터로서의 도서관 운영 및 큐레이션 제공 방안 연구)

  • Kwak, Woojung;Noh, Younghee
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.31 no.2
    • /
    • pp.53-70
    • /
    • 2020
  • This study was intended to present the need for building the library as a hub of the community memory preservation which provides the collection, sharing, and curation services of the locality specific historical and local data based on the policy task, namely supporting the collection, preservation, and management system of the community's life memory. To this end, the current status of data collection, management, and operation of institutions serving regional-based materials such as cultural centers and regional archives was grasped, and the cases and status of curation services in libraries were investigated and analyzed. The discussion proposed via the results of the study are as follows. First, to the culture center, external demand has been increased from the aspect of social education including festivals, cultural and art event, cultural and art educational business, art activities business of local residents and managerial business is to be carried out, which makes it difficult for the culture center to manage its businesses. Accordingly, it is necessary to collect and preserve regional various data at the pubic libraries playing various roles including provision of informative services, cultural programs and information sharing places to local residents and provision of services to vulnerable social group. As the existing libraries have a plan to collect data systematically, it is considered that those libraries will smoothly operate the data management through cooperation with existing culture centers and various cultural organizations. Second, it appears that a plan will be needed to set up all the data including the ones owned by libraries, local administrative agencies, individuals and other competent agencies in online database so that they are easily available to the public and always available in the libraries because there are a lot of data which cannot be moved to other place and it is actually difficult to concentrate and set up all the data to those libraries.

Establishment of a Process for Collecting Video Scripts on a Disaster Site based on Public-private Partnerships: Focus on 2019 Practical Activities during Typhoon in the Korean Peninsula (민관협력 기반 재난현장 영상정보 수집 및 활용체계 구축: 2019년 한반도 태풍 내습 시 실전활동 사례 중심)

  • Lee, Sohee;Lee, Junwoo;Cho, Sibum
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.5_4
    • /
    • pp.1167-1177
    • /
    • 2020
  • In this study, we established the process for collecting and utilizing video scripts of disaster site based on public-private partnerships. It is for the purpose of actively utilizing private capabilities in disaster management, and quickly sharing video scripts to identify field conditions. Based on the experience of actual operation of public-private partnerships system in the event of typhoon in 2019, we also derived implications for continuous operation of the process. Results are meaningful in that the government established the process for collecting and utilizing video scripts through public-private partnerships during the initial disaster response phase. And we also confirmed the possibility of spreading positive perception of disaster management organizations. However, there is a limit to the actualization and practical use of performance as an experimental pilot operation in the R&D stage. In addition, for continuous operation of the system, it is necessary to prepare institutional support measures such as organization, infrastructure for operating, programs of education and training, and policy making.

Research on Archive Opening and Sharing Projects of Korean Terrestrial Broadcasters and External Users of Shared Archives : Focusing on the Case of the 5.18 Footage Video Sharing Project 〈May Story(Owol-Iyagi)〉 Contest Organized by KBS (국내 지상파 방송사의 아카이브 개방·공유 사업과 아카이브 이용자 연구 KBS 5.18 아카이브 시민공유 프로젝트 <5월이야기> 공모전 사례를 중심으로)

  • Choi, Hyojin
    • The Korean Journal of Archival Studies
    • /
    • no.78
    • /
    • pp.197-249
    • /
    • 2023
  • This paper focus on the demand for broadcast and video archive contents by users outside broadcasters as the archive openness and sharing projects of terrestrial broadcasters have become more active in recent years. In the process of creating works using broadcasters' released video footage, the study examined the criteria by which video footage is selected and the methods and processes utilized for editing. To this end, the study analyzed the the case of the 5.18 footage video sharing project 〈May Story(Owol-Iyagi)〉 contest organized by KBS in 2022, in which KBS released its footage about the May 18 Democratic Uprising and invited external users to create new content using them. Analyzing the works that were selected as the winners of the contest, the research conducts in-depth interviews with the creators of each work. As a result, the following points are identified. Among the submitted works, many works deal with the direct or indirect experience of the May 18 Democratic Uprising and focus on the impact of this historical event on individuals and our current society. The study also examined the ways in which broadcasters' footage is used in secondary works. We found ways to use video as a means to share historical events, or to present video as evidence or metaphor. It is found that the need for broadcasters to provide a wider range of public video materials such as the May 18 Democratic Uprising, describing more metadata including copyright information before releasing selected footage, ensuring high-definition and high-fidelity videos that can be used for editing, and strengthening streaming or downloading functions for user friendliness. Through this, the study explores the future direction of broadcasters' video data openness and sharing business, and confirms that broadcasters' archival projects can be an alternative to fulfill public responsibilities such as strengthening social integration between regions, generations, and classes through moving images.

Processing of Sensor Data Stream for OSGi Frameworks (OSGi를 위한 실시간 센서 데이터스트림 처리 방법)

  • Cha, Ji-Yun;Byun, Yung-Cheol;Lee, Dong-Cheal
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.5
    • /
    • pp.1014-1021
    • /
    • 2009
  • In an environment of home network where a number of technologies including heterogeneous hardware platforms, networking and protocols, middleware systems, and etc, exist, OSGi provides a platform for deployment and sharing of services managed in hardware and guarantees compatibility among applications. However, only simple control and processing of event data are considered in a home network using OSGi, and the consideration about real time processing of data stream generated by sensors is not enough. Therefore, researches allowing users to effectively develop OSGi applications by using various kinds of sensors generating data streams in the home network environment using OSGi are needed. In this paper, we propose an effective method of processing various types of real time data streams supplied to OSGi applications, including filtering, grouping, and counting, etc.

Late Comer and Error Recovery Process for Home Network Environment with Session Management (세션 관리 기능을 포함한 홈 네트워크 환경에서의 지각자 및 오류 복구 처리)

  • Kim, Hak-Joon;Ko, Eung-Nam
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.6
    • /
    • pp.666-672
    • /
    • 2008
  • This paper explains late comer and error recovery process for home network environment with session management. This system consists of an ED, ES, and ER. ED is an agent that detects an error by hooking techniques for multimedia distance education based on home network environment with session management. ES is an agent that is an error sharing system for multimedia distance education based on home network environment with session management. ER is a system that is suitable for recovering software error for multimedia distance education based on home network environment with session management. This paper explains a performance analysis of an error recovery system running on distributed multimedia environment using the rule-based DEVS modeling and simulation techniques. The proposed method is more efficient than the other method in comparison with error ration and processing time.

  • PDF

Design and Implementation of a Distributed Object Programming Language supporting Peer Replicated Object Model (대등관계 복제객체 모델을 지원하는 분산 객체 프로그래밍 언어의 설계 및 구현)

  • Sin, Beom-Ju;Lee, Dong-Hyeon
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.449-456
    • /
    • 1999
  • 본 논문은 C++에 분산 객체 프로그래밍 기능을 추가한 D++ 언어를 제안한다. 대등관계 복제객체 모델을 지원하는 D++는 분산 클래스의 정의, 멤버 함수의 일치성 제어 정의 기능, 그리고 영구 객체 이름에 기반한 분산 객체를 정의할 수 있는 언어 구조를 제공한다. D++ 프로그램에서 새로이 생성되는 분산 객체는 생성 시에 제공되는 객체의 영구 이름과 동일한 영구 이름을 갖는 분산 객체가 존재할 경우 해당 객체들과 복제 관계를 유지함으로써 정보를 공유한다. 각 복제 객체들은 서로 간에 대등한 관계를 가지며, 멤버 함수 정의 시에 기술되는 특성에 따라 일치성이 유지된다. 이 같은 D++의 분산 객체 모델은 실시간 그룹웨어의 기본 요구 사항인 분산 환경에서의 정보 공유 및 사건 공지 기능을 자연스럽게 해결해 주기 때문에 실시간 그룹웨어의 개발을 효율적으로 지원할 수 있을 것으로 기대한다. Abstract This paper proposes D++ programming language that is an extension of C++ for distributed object oriented programming. The D++, which supports peer-to-peer object model, provides new language constructs for the definition of distributed classes, the definition of the consistency control of the member function and the definition of distributed object variables with the persistent name. In D++, when the persistent name of a newly created distributed object is same as that of an existing distributed object, the new distributed object replicates object state of the existing distributed object and thus they share the object state. The replicas have peer relation and the consistency among them is maintained according to the characteristic described on the definition of designated member functions. It is expected that D++ language increases efficiency in development of real-time groupware because the distributed object model of D++ naturally supports the information sharing and event notification that are the basic functions required when building real-time groupware.

SIEM OWASP-ZAP and ANGRY-IP Vulnerability Analysis Module and Interlocking (SIEM과 OWASP-ZAP및ANGRY-IP취약점분석모듈과 연동구현)

  • Yoon, Jong Moon
    • Convergence Security Journal
    • /
    • v.19 no.2
    • /
    • pp.83-89
    • /
    • 2019
  • In accordance with information security compliance and security regulations, there is a need to develop regular and real-time concepts for cyber-infringement attacks against network system vulnerabilities in branch and periodic forms. Vulnerability Analysis Analysis It is judged that it will be a countermeasure against new hacking attack in case of concept validation by interworking with TOOL. Vulnerability check module is standardized in event attribute management and ease of operation. Opening in terms of global sharing of vulnerability data, owasp zap / Angry ip Etc. were investigated in the SIEM system with interlocking design implementation method. As a result, it was proved that the inspection events were monitored and transmitted to the SIEM console by the vulnerability module of web and network target. In consideration of this, ESM And SIEM system In this paper, we propose a new vulnerability analysis method based on the existing information security consultation and the results of applying this study. Refer to the integrated interrelationship analysis and reference Vulnerability target Goal Hacking It is judged to be a new active concept against invasion attack.