• Title/Summary/Keyword: user duty

Search Result 62, Processing Time 0.025 seconds

A study on lighting system for LED color temperature control using wireless communication and smartphone (무선 통신과 스마트폰을 이용한 LED 색온도 제어 조명 시스템에 관한 연구)

  • Hong, Young-Jin;Lim, Soon-Ja;Lee, Wan-Bum
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.11
    • /
    • pp.72-77
    • /
    • 2017
  • Lighting systems in modern society has been developed using a combination of IT technology and LED lighting for the purpose of bringing about changes in human-centered natural lighting and to take advantage of the efficient management and energy saving of LED lighting. In this paper, we propose an LED lighting control system that can control the color temperature and brightness of LED lighting composed of 3000K Warm LEDs and 6000K Cool LEDs by using an Arduino Due and wireless communication technology such as Bluetooth and Zigbee. The Arduino Due allows the color temperature of the lighting to be adjusted in several steps by controlling the duty rate and enables many lights to be controlled using Zigbee communication capable of 1: N multiple communication. By using Bluetooth communication, it is possible to easily control the LED lighting by means of a smartphone application, thereby enhancing the convenience for the user. The wireless communication based LED lighting control system implemented in this study cannot only provide human-centered lighting through its color temperature control from 3067K to 5960K and illumination control, but can also reduce the power consumption and be used as a natural-friendly lighting system.

A Study on a Trend of Human Error Types Observed in a Simulated Computerized Nuclear Power Plant Control Room

  • Lee, Dhong Ha
    • Journal of the Ergonomics Society of Korea
    • /
    • v.32 no.1
    • /
    • pp.9-16
    • /
    • 2013
  • Objective: The aim of this study is to investigate a trend of human error types observed in a series of verification and validation experiments for an Advanced Control Room(ACR) equipped with Lager Display Panel(LDP), Work Station Flat Panel Display(WS FPD), list type Alarm System(AS), Soft Control(SC) and Computerized Procedure System(CPS). Background: Operator behaviors in a fully computerized control room are quite different from those in a traditional hard-wired control room. Operators in an ACR all together monitor plant status and variables through their own interface system such as LDP and WS FPD, are notified of abnormal plant status through their own list type AS, control the plant through their own SC, and follow the structured procedure through their own CPS whereas operators in a traditional control room only separately do their duty directed by their supervisor. Especially the secondary task such as manipulating the user interface of ACR can be an extra burden to all the operators including the supervisor. Method: The Reason's human error classification method was applied to operators' behavioral data collected from a series of verification and validation experiments where operators showed their plant operational behaviors under a couple of harsh scenarios using the ACR simulator. Results: As operators accustomed to the new ACR system, knowledge or rule based mistakes appearing frequently in the early series of experiments decreased drastically in the latest stage of the series. Slip and lapse types of errors were observed throughout the series of experiments. Conclusion: Education and training can be one of the most important factors for the operators accustomed to the traditional control room to be adapted to the new system and to run the ACR successfully. Application: The results of this study implied that knowledge or rule based mistakes can be reduced by training and education but that lapse type errors might be reduced only through innovative improvement in human-system interface design or teamwork culture design including a new leadership style suitable for ACR.

Development of Web-based Network Diligence and Indolence Management System (웹 기반 네트워크 근태 관리 시스템 개발)

  • Choi, Woo-Sik;Kim, Byung-Joon;An, Beong-Ku
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.1
    • /
    • pp.151-158
    • /
    • 2011
  • In recent diligence and indolence management systems, server and client are not separated and data are not convert into data base. Therefore these recent systems have several weaknesses such as data modification and management. In this paper, we propose a new Web-based Network Diligence and Indolence Management system (WNDIM) to solve the weakness and improve the system performance of recent system. The main features and contributions of the proposed system are as follows. First, server and client are separated, and all data are converted into data base, Second, with the construction of APM server the data modification and management are efficiently operated. Third, a political decision of the system is defined. Fourth, the system can efficiently support user-oriented services such as the collection of diligence and indolence data and the sum of off-duty days. From the implementation and performance evaluation of the proposed WNDIM, we can see the system can efficiently support the diligence and indolence management, currently we are using the proposed WNDIM system in the real filed.

A Study on Transition Factor of Audit Opinion (감사의견(監査意見)의 추이요인(推移要因)에 관한 연구(硏究))

  • Chung Youn-Hae
    • Management & Information Systems Review
    • /
    • v.7
    • /
    • pp.141-168
    • /
    • 2001
  • The causes that the transparency of Korean accounting information was rated low, a short supply of faithful and transparent accounting information from the limitation of external audit environment must be pointed out. Purpose of the external audit is a expression of the auditors about that financial statements an enterprise made public were appropriately drew up in accordance with the corporate accounting principles from important point of view. Analysis of the audit opinion and so fourth according to 6,541 individual audit reports and introduced to the bill securities forward committee as a subject of external audit according to the raw of corporation external audit show that considerable change to the contents of audit report. This show as it is that uncertainty of future that is now being faced by our enterprise, because corporation which present audit reports since 1997 because of enterprise dishonor and contents of existence probability as a continued enterprise following to general economic crisis after 1998 occupy important position in special matters of audit report. Also, increase in special matters is due to application of the corporate accounting principles revised on December 11, 1998. In 1999, audit opinion under limitation(limitation, incongruity and rejecting opinion) increased greatly according to existence doubt as a continued enterprise, and this is the consequence of strengthening audit to the continues enterprise because of limited enterprise dishonor according to the stagnancy of business activities after 1997. Now financial supervisory service put in effect electromagnetic public announcement system about a project report of listed corporation (including an audit report) keeping pace with a documentary public announcement system as first phase since 1999 and expand to the unlisted corporation from 2000. As electromagnetic public announcement of public announcement documents including audit documents of external audit subject get a duty, approach of external user to the accounting information will be easier. Fixation of this system will make deep and wide analysis to the audit opinion, and this will draw up a plan to reconsider confidence of accounting information.

  • PDF

Flexible Database security System using Improved Role Hierarchy (개선된 역할 계층을 이용한 유연한 데이터베이스 보안 시스템)

  • Jung Min-A;Lee Kwang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.8
    • /
    • pp.1834-1839
    • /
    • 2005
  • Database security is essential to protect their data in most organization such as hospitals, central or local governments, banks which manage the private, sensitive and important data. Because the duty of the department recently became more various and complicated, the changes of security requirement are needed more frequently. Therefore, easily changeable, flexible security policy and efficient security management with preserving the integrity of security policy are very important. In this paper, we implemented a flexible database security system in the specimen and clinical information management system of leukemic research center using IRH(Improved Role Hierarchy). Data is protected by MAC and we propose a flexible access control and effective administration by using the IRH that is an improved role hierarchy of RBAC. If security policy is needed for changes, this system can do it easily by simply modifying the IRH with the decentralized administration. The modified security policy can be applied flexibly after alteration because the security level of the subject is not fixed but can be derived automatically from the IRH when user connects the system.

A Study on the Job Duties and Competencies of Data Librarians: Using Job Advertisement Analysis in the United States (데이터사서의 직무와 역량에 관한 연구 - 미국 구인광고 분석을 이용하여 -)

  • Park, Jiin;Park, Ji-Hong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.3
    • /
    • pp.145-162
    • /
    • 2021
  • To identify key job duties and core competencies of data librarians, this study conducted content analyses of 75 U.S. job advertisements of data librarians and statistical analyses of 105 responses from incumbent data librarians. As a result, the key job duties identified are jobs related to collaboration, workshops, trainings, conferences, data service, research consultation, and research support. Core competencies identified are communication skills, teaching, diversity, inclusion, and equality, data management, and data tool. This study is significant in that it analyzed the key duties and core competencies of the data librarians using the most up-to-date data and opinions collected from incumbent people. It can be a basis for future study such as on job satisfaction, user satisfaction, and perception surveys for data librarians.

A Model of Role Hierarchies providing Restricted Permission Inheritance (권한상속 제한 기능을 제공하는 역할계층 모델)

  • 이용훈;김용민;이형효;진승헌
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.4
    • /
    • pp.37-45
    • /
    • 2003
  • Role-based Access Control(RBAC) model has advantage of easy management of access control with constraints such as permission inheritance and separation of duty in role hierarchy. However, previous RBAC studies could not properly reflect the real-world organization structure with its role hierarchy. User who is a member of senior role can perform all permissions because senior role inherits all permissions of junior roles in the role hierarchy. Therefore there is a possibility for senior role members to abuse permissions due to violation of the least privilege principle. In this paper, we present a new model of role hierarchy, which restricts the unconditional permission inheritance. In the proposed model, a role is divided into sub roles(unconditional inheritance. restricted inheritance, private role), keeping organization structure in corporate environment. With restricted inheritance, the proposed model prevents permission abuse by specifying the degree of inheritance in role hierarchy.

A Study on the Critical Success Factors of Social Commerce through the Analysis of the Perception Gap between the Service Providers and the Users: Focused on Ticket Monster in Korea (서비스제공자와 사용자의 인식차이 분석을 통한 소셜커머스 핵심성공요인에 대한 연구: 한국의 티켓몬스터 중심으로)

  • Kim, Il Jung;Lee, Dae Chul;Lim, Gyoo Gun
    • Asia pacific journal of information systems
    • /
    • v.24 no.2
    • /
    • pp.211-232
    • /
    • 2014
  • Recently, there is a growing interest toward social commerce using SNS(Social Networking Service), and the size of its market is also expanding due to popularization of smart phones, tablet PCs and other smart devices. Accordingly, various studies have been attempted but it is shown that most of the previous studies have been conducted from perspectives of the users. The purpose of this study is to derive user-centered CSF(Critical Success Factor) of social commerce from the previous studies and analyze the CSF perception gap between social commerce service providers and users. The CSF perception gap between two groups shows that there is a difference between ideal images the service providers hope for and the actual image the service users have on social commerce companies. This study provides effective improvement directions for social commerce companies by presenting current business problems and its solution plans. For this, This study selected Korea's representative social commerce business Ticket Monster, which is dominant in sales and staff size together with its excellent funding power through M&A by stock exchange with the US social commerce business Living Social with Amazon.com as a shareholder in August, 2011, as a target group of social commerce service provider. we have gathered questionnaires from both service providers and the users from October 22, 2012 until October 31, 2012 to conduct an empirical analysis. We surveyed 160 service providers of Ticket Monster We also surveyed 160 social commerce users who have experienced in using Ticket Monster service. Out of 320 surveys, 20 questionaries which were unfit or undependable were discarded. Consequently the remaining 300(service provider 150, user 150)were used for this empirical study. The statistics were analyzed using SPSS 12.0. Implications of the empirical analysis result of this study are as follows: First of all, There are order differences in the importance of social commerce CSF between two groups. While service providers regard Price Economic as the most important CSF influencing purchasing intention, the users regard 'Trust' as the most important CSF influencing purchasing intention. This means that the service providers have to utilize the unique strong point of social commerce which make the customers be trusted rathe than just focusing on selling product at a discounted price. It means that service Providers need to enhance effective communication skills by using SNS and play a vital role as a trusted adviser who provides curation services and explains the value of products through information filtering. Also, they need to pay attention to preventing consumer damages from deceptive and false advertising. service providers have to create the detailed reward system in case of a consumer damages caused by above problems. It can make strong ties with customers. Second, both service providers and users tend to consider that social commerce CSF influencing purchasing intention are Price Economic, Utility, Trust, and Word of Mouth Effect. Accordingly, it can be learned that users are expecting the benefit from the aspect of prices and economy when using social commerce, and service providers should be able to suggest the individualized discount benefit through diverse methods using social network service. Looking into it from the aspect of usefulness, service providers are required to get users to be cognizant of time-saving, efficiency, and convenience when they are using social commerce. Therefore, it is necessary to increase the usefulness of social commerce through the introduction of a new management strategy, such as intensification of search engine of the Website, facilitation in payment through shopping basket, and package distribution. Trust, as mentioned before, is the most important variable in consumers' mind, so it should definitely be managed for sustainable management. If the trust in social commerce should fall due to consumers' damage case due to false and puffery advertising forgeries, it could have a negative influence on the image of the social commerce industry in general. Instead of advertising with famous celebrities and using a bombastic amount of money on marketing expenses, the social commerce industry should be able to use the word of mouth effect between users by making use of the social network service, the major marketing method of initial social commerce. The word of mouth effect occurring from consumers' spontaneous self-marketer's duty performance can bring not only reduction effect in advertising cost to a service provider but it can also prepare the basis of discounted price suggestion to consumers; in this context, the word of mouth effect should be managed as the CSF of social commerce. Third, Trade safety was not derived as one of the CSF. Recently, with e-commerce like social commerce and Internet shopping increasing in a variety of methods, the importance of trade safety on the Internet also increases, but in this study result, trade safety wasn't evaluated as CSF of social commerce by both groups. This study judges that it's because both service provider groups and user group are perceiving that there is a reliable PG(Payment Gateway) which acts for e-payment of Internet transaction. Accordingly, it is understood that both two groups feel that social commerce can have a corporate identity by website and differentiation in products and services in sales, but don't feel a big difference by business in case of e-payment system. In other words, trade safety should be perceived as natural, basic universal service. Fourth, it's necessary that service providers should intensify the communication with users by making use of social network service which is the major marketing method of social commerce and should be able to use the word of mouth effect between users. The word of mouth effect occurring from consumers' spontaneous self- marketer's duty performance can bring not only reduction effect in advertising cost to a service provider but it can also prepare the basis of discounted price suggestion to consumers. in this context, it is judged that the word of mouth effect should be managed as CSF of social commerce. In this paper, the characteristics of social commerce are limited as five independent variables, however, if an additional study is proceeded with more various independent variables, more in-depth study results will be derived. In addition, this research targets social commerce service providers and the users, however, in the consideration of the fact that social commerce is a two-sided market, drawing CSF through an analysis of perception gap between social commerce service providers and its advertisement clients would be worth to be dealt with in a follow-up study.

A Study on the Improvement Plan through Analyzing the Perception of Expert Group about Landscape Construction Defects (조경공사 하자에 관한 전문가 집단간 인식분석을 통한 개선방안 연구)

  • Lee, Sang-Suk;Yu, Joo-Eun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.40 no.4
    • /
    • pp.104-113
    • /
    • 2012
  • This study aimed to find out the improvement plan through analyzing the perception of the expert group engaged in landscape architectural construction and to focus on analyzing the expert groups' experience on Landscape Construction Defects (LCD), defect liability, warranty period, and implementation of the defect liability. The results are as follows: 1. Regarding the experience on the LCD, landscape construction contractors were an awareness of the LCD issue at a serious level, while public-sector clients recognize moderately the LCD issue; and on the first priority in defect implementation, landscape construction contractors considered repair cost while public-sector clients value the identifying causes of defects. 2. In disagreement on the defect liability, landscape construction contractors attributed it to client's lack of responsibility for maintenance while public-sector clients ascribed it to the absence of dealing a criteria with LCD, and regarding the appropriate defect implementation, public-sector clients preferred the following objective by dealing the criteria with LCD while landscape construction contractors advocates by sharing the responsibilities for dealing with LCD based on the identified causes of construction defects. 3. Regarding the warranty period, the public-sector clients considered the 2-year warranty period as appropriate while landscape construction contractors considered it comparatively long, and concerning the commencement of defect warranty period, the public-sector clients viewed it as it should commence to cover the overall completion of the construction while landscape construction contractors perceived it to start on the completion of each work. 4. As for the improvement of the defect implementation system, public-sector clients considered it necessary to establish the objective dealing the criteria with LCD while landscape construction contractors viewed the legislation of maintenance duty. Also, with regard to the important value in establishing and dealing the criteria with LCD, public-sector clients pointed out the objective of the criteria for determining the defects per work type while landscape construction contractors suggested client (user)'s maintenance duty. Because of research, because the system in dealing with LCD is an absence of LCD management agency and dealing the criteria with LCD, it is needed to establish an LCD management agency and make the system in dealing with LCD.

A Countermeasures on Credit Card Crime Using Personal Credit Information (개인신용정보이용 신용카드범죄에 대한 대처방안)

  • Kim, Jong-Soo
    • Korean Security Journal
    • /
    • no.9
    • /
    • pp.27-68
    • /
    • 2005
  • Recently, because credit card crime using a personal credit information is increasing, professionalizing, and spreading the area, the loss occurring from credit card crime is enormous and is difficult to arrest and punish the criminals. At past, crime from forging and counterfeiting the credit card was originated by minority criminals, but at present, the types and appearance of credit card crime is very different to contrasting past crime. The numbers of people using credit card in the middle of 1990's was increasing and barometer of living conditions was evaluated by the number having credit card, therefore this bad phenomenon occurring from credit card crime was affected by abnormal consumption patterns. There is no need emphasizing the importance of personal credit card in this credit society. so, because credit card crime using personal credit card information has a bad effect, and brings the economic loss and harms to individuals, credit card company, and members joining credit card. Credit card crime using personal credit card information means the conduct using another people's credit card information(card number, expiring duration, secret number) that detected by unlawful means. And crime using dishonest means from another people's credit information is called a crime profiting money-making and a crime lending an illegal advance by making false documents. A findings on countermeasures of this study are as follows: Firstly, Diverting user's mind, improving the art of printing, and legitimating password from payment gateway was suggested. Secondly, Complementing input of password, disseminating the system of key-board protection, and promoting legitimations of immediate notification duty was suggested. Thirdly, Certificating the electronic certificates as a personal certificates, assuring the recognition by sense organ of organism, and lessening the ratio of crime occurrence, and restricting the ratio of the credit card crime was suggested.

  • PDF