• Title/Summary/Keyword: informational technology

Search Result 161, Processing Time 0.025 seconds

Roles and Discourse of Cryptocurrency's Online Community and YouTube : Using Focus Group Interviews (암호화폐 온라인 커뮤니티와 유튜브의 역할 및 담론분석 연구 : FGI 인터뷰를 중심으로)

  • Lim, Han Sol;Jung, Chang Won
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.10
    • /
    • pp.615-629
    • /
    • 2020
  • Conducting Focus Group Interview (FGI), this study examined the roles and discourses of cryptocurrency's online communities and media (legacy media and YouTube), and based on this, the study proposed the direction of cryptocurrency policy. By reviewing previous literature, this study analyzed the characteristics of investors, the online community, and YouTube, which is an investment environment factor. The study figured out the purpose of use and role of the community via interviews with cryptocurrency professional investors and online community members and analyzed main discussion themes of the five top-ranked YouTube channels related to cryptocurrency with the highest number of subscribers. The results suggested that cryptocurrency's investment was led by those who are in their 20s and 30s, the investors preferred and trusted information on new media than legacy media. The online community played the role of emotional homogeneity and empathy, and YouTube mainly performed the informational role. As a result of discourse analysis and interviews, this study argued that the legal stability of cryptocurrency's policy and protection of individual investors are needed. This study's significance indicates that it used various research methods such as literature research, interviews, content analysis of community/YouTube to analyze the informational role and emotional aspects of new media and suggested policy direction of the digital new deal blockchain technology and the fairness of financial industry.

Digital Stress of Consumers in Using Digital Goods (디지털 제품 관련 소비자 스트레스에 관한 연구)

  • Kim, Jung-Eun;Yeo, Jung-Sung
    • Journal of Families and Better Life
    • /
    • v.25 no.3 s.87
    • /
    • pp.119-135
    • /
    • 2007
  • The purpose of this study is to find out the level of digital stress that people experience and to investigate the effects of socio-economic variables on that. To collect data, structured questionnaire was developed and 1,200 questionnaires were distributed through internet. There were 2 dimensions in this study to examine digital stress. First dimension was about the devices themselves: computers and the other digital goods. Second dimension was about the time digital stress occurring in consumers' decision-making process: purchasing and using. Based on Yeo&Kim(2004), sub-dimensions of purchasing and using aspects were chosen. 5 sub-dimensions in purchasing side were new technology, cost, variety of alternatives, warranty service, and informational problem 6 sub-dimensions in using field were mal(or impaired)-functioning. physical aspects, immaturity in use, pressure to use, addiction to use, and informational problem. As independent variables, sex, age, educational level, digitalization acceptability and computer usability were used. The overall level of digital stress was around the average point which was not as high as expected. Digital stress of purchasing was higher than that of using. First, in purchasing aspects, the level of digital stress was relatively high in cost, variety of alternatives and warranty service. Hence, clear communications with consumers about the distinctive aspects and cost of digital devices in market are needed. Secondly, in using side, mal-functioning and physical aspects were relatively more powerful stressors. In the other words, the more serious problems were not from the characteristics of individual consumers but from those of products. Producers should put their best efforts to reduce imperfection (defectiveness) and develop user-friendly digital devices. Also, users' individual efforts to overcome the problems that can be solved privately are necessary. Finally, it was discovered that sex and computer usability were very important variables on digital stress. To extend computer usability of consumers and get over digital illiteracy, it is essential to expand the paths to give chances for people to contact with computers and other digital goods. Still there are lots of people whore computer-illiterate or low-skilled at computers. In policies or educational programs made by government, communities, or schools, more attention should be paid to the digitally vulnerable groups.

Estimation of Sediment Concentration Factor based on Entropy Theory (엔트로피 이론 기반의 유사농도 인자 산정)

  • Kim, Yeong-Sik;Nam, Yoon-Chang;Jeon, Hae-Sung;Jeon, Kun-Hak;Choo, Yeon-Moon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.325-333
    • /
    • 2020
  • Current methods of measuring the sediment concentration of natural streams can be affected by weather conditions and have lower reliability in bed-load sections due to mechanical limits. Theoretical methods have to be used to solve this problem, but they have low reliability compared to the measured values and diverse results for the bed-load sediment concentration. This study proposes a new way to reliably determine the bed-load sediment concentration from the relation with theoretical depth-integrated concentration based on the informational entropy concept. Sediment distribution shows a uniform probability distribution under maximized entropy conditions under some constraints, so a function can be calculated for the sediment distribution and depth-integrated concentration. The parameters of a stream were estimated by a nonlinear regression method using the concentration data from a past experiment. Equilibrium N (EN) was estimated using the relation between two different formulas proposed in this study, which can ease the estimation of both the total sediment distribution and depth-integrated sediment concentration with high reliable results with an average R2 of 0.924.

Personal Information Protection in Digital Era -Reviewing Personal information protection Act- (디지털시대의 개인정보보호 - 새로운 개인정보보호법을 중심으로)

  • Yoo, Jong-Lak
    • Journal of Digital Convergence
    • /
    • v.9 no.6
    • /
    • pp.81-90
    • /
    • 2011
  • Companies using internet as a kind of marketing means are increasing rapidly according to the expansion trend of e-commerce through internet and consumers also use internet as the common means of purchasing necessary articles. E-commerce using internet has advantages without limitation to temporal and spatial accessibility and general consumers and unspecified individuals also use internet to purchase their goods as well as general transactions such as advertisement, contract, payment and claim settlement. 'In the age of information, invasion of personal information resulted from the development of information and communication technology is one of the greatest problems all the countries in the world face. Therefore, Personal information protection Act is one of basic laws to protect personal information and rights and it is also an essential law in the age of information. In that sense, new Personal information protection Act is the advanced act containing various items to minimize the national damages from the leaking of private information and protect right to informational self-determination in the information society. It is expected that this legislation contributes to reduce the leaking of private information, enhance the level of privacy protection and develop privacy related industries. However, active participation of all members of our society and improvement of their recognition should be preceded for the rational and legal use of private information and the settlement of its protection culture. While the purpose of Personal information protection Act can protect privacy from collection, leaking, misuse and abuse of private information and enhance national interests and protect personal dignity and value, it also must perform the roles of balancing privacy protection with liberal information flow.

The Effect of Organizational Justice on Information Security-Related Role Stress and Negative Behaviors

  • Hwang, Inho;Ahn, SangJoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.87-98
    • /
    • 2019
  • In recent years, many organizations protect their information resources by investing in information security technology. However, information security threats from insiders have not been reduced. This study proposes a method for reducing information security threats within an organization by mitigating negative information security behaviors of employees. Specifically, the study finds a relationship between information security related role stress and negative behavior and suggests whether organizational justice mitigates role stress. That is, the purpose of the study is to suggest a mechanism between organizational justice, information security related role stress, and negative behavior. Negative behavior consist of avoidance behavior and deviant behavior, and security related role stress consist of role conflict and role ambiguity. Organizational justice consist of distributional justice, procedural justice, and informational justice. The research model is verified through structural equation modeling. After establishing a research model and hypothesis, we develop a survey questionnaire and collect data from 383 employees whose organizations have already implemented security policies. The findings appear that security related role stress increases negative behavior and that organizational justice mitigates role stress. The results of the analysis suggest the direction of organizational strategy for minimizing insider's security-related negative behaviors.

Factors Affecting the Intention to Adopt Self-Determination Rights of Personal Medical Information (개인의료정보 자기결정권 행사 의도에 영향을 미치는 요인)

  • Yunmo Koo;Sungwoo Hong;Beomsoo Kim
    • Information Systems Review
    • /
    • v.20 no.1
    • /
    • pp.159-177
    • /
    • 2018
  • With an extensive proliferation of information and communication technology, the volume and amount of digital information collected and utilized on the Internet have been increasing rapidly. Also on the rapid rise are side effects such as unintended breach of accumulated personal information and consequent invasion of personal privacy. Informational self-determination is rarely practiced, despite various states' legal efforts to redress data subjects' damage. Personal health information, in particular, is a subcategory of personal information where informational self-determination is hardly practiced enough. The observation is contrasted with the socio-economic inconvenience that may follow due to its sensitive nature containing individuals' physical and health conditions. This research, therefore, reviews factors of self-determination on personal health information while referring to the protection motivation theory (PMT), the long-time framework to understand personal information protection. Empirical analysis of 200 data surveyed reveals threat-appraisal (perceived vulnerability and perceived severity of threats) and coping-appraisal (perceived response effectiveness), in addition to individual levels of concern regarding provided personal health information, influence self-determination to protect personal health information. The research proposes theoretical findings and practical suggestions along with reference for future research topics.

The Effects of Emotional Intelligence on Self-Esteem of College Student Majoring Radiology (방사선과 대학생의 감성지능이 자아존중감에 미치는 영향)

  • Kim, Hyeong-Tae
    • Journal of radiological science and technology
    • /
    • v.34 no.3
    • /
    • pp.231-237
    • /
    • 2011
  • In informational confusion of complicated society, self-esteem is considered as important psychological and temperamental factors for self-recognition and self-realization of youths. In this study, we found factors that affect self-esteem by investigating general characteristics and emotional intelligence of college student majoring in Radiological Science. The results showed that, in terms of general characteristics, age affects overall self-esteem, sex and school record affect a social self-esteem, and health affects self-esteem within the family as well as overall and social self-esteem.

A Study on Family Family Communication Pattern Influencing adolescent TV use (가족의 커뮤니케이션 패턴이 아동의 TV 시청에 미치는 영향에 대한 연구)

  • Kim, Ae-Jung;Nam, Chong-Hoon
    • Journal of Advanced Navigation Technology
    • /
    • v.15 no.6
    • /
    • pp.1163-1172
    • /
    • 2011
  • This study attempted to analyze between TV and family. While almost research has focused on the TV influencing family, this study has tried to contemplate family type and family communication pattern influencing TV use. Especially, this research focused on adolescent TV use. The result and conclusion are as follow: There are different children's TV watching styles based on family communication pattern(conversation-orientation and conformity-orientation). The amount of TV watching is high in conformity-orientation family pattern, and the amount of TV watching is low in conversation-orientation family pattern. In addition, conformity-orientation family pattern more prefer entertainment program, while conversation-orientation family pattern prefer informational program.

The Impact of If Project Types and Ownerships on IT Value Evaluation (IT 프로젝트 유형과 오너쉽이 IT 가치평가에 미치는 영향)

  • 이국희;구본재
    • Journal of Information Technology Applications and Management
    • /
    • v.9 no.3
    • /
    • pp.79-95
    • /
    • 2002
  • As the budget size and complexity of 1T investment are growing, IT value measurement becomes more critical to the success of IT management In public organizations and private firms. It has been known that there are many factors such as IT costs, risks, qualify, and usage that should be taken Into consideration during the process of measuring IT value and making IT Investment decisions. However, little research has been done so far In order to analysis factors affecting the IT value and effectiveness. The purpose of this study Is to Investigate the impact of IT Project types and ownerships on IT value evaluation. The three research questions are as follows : (1) Does IT project type such as transactional, Informational, and infrastructure have any impact on 1T value measurement\ulcorner (2) Does the IT development ownership has any Impact on IT value\ulcorner (3) Does the IT operation ownership has any impact\ulcorner The empirical research was done at S-Electronics, world-wide known and the biggest manufacturing company in Korea, based on the method of structured interview. About 200 individual Information systems have been evaluated to calculate ROI measures, the dependent variable In this study. The results of statistical analysis show that two of three Independent variables, IT project types and IT development ownership, have statistically significant effects on IT value in terms of ROI measures.

  • PDF

Application of the Leak Before Break(LBB) Concept to a Heat Exchanger in a Nuclear Power Plant

  • Kwon, Jae-Do;Lee, Choon-Yeol;Lee, Yong-Son;Sul, Il-Chan
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.1
    • /
    • pp.10-20
    • /
    • 2001
  • The leak before break(LBB) concept is difficult to apply to a structure with a thin tube that is immersed in a water environment. A heat exchanger in a nuclear power plant is such a structure. The present paper addresses an application of the LBB concept to a heat exchanger in a nuclear power plant. The minimum leaked coolant amount(approximately 37.9 liters) containing the radioactive material which can activate the radiation detector device installed in near the heat exchanger is assumed. A postulated initial flaw size that can not grow to a critical flaw size within the time period to activate the radiation detector is justified. In this case, the radiation detector can activate the warning signal caused by coolant leakage from initially postulated flaws of the heat exchanger. The nuclear plant can safely shutdown when this occurs. Since the postulated initial flaw size can not grow to the critical flaw size, the structural integrity of the heat exchanger is not impeded. Particularly the informational scenario presented in this paper discusses an actual nuclear plant.

  • PDF