Time filter

Source Type

Seoul, South Korea

Kangnam University is a private Christian university located in Yongin, South Korea. Founded July 1, 1946, by Reverend Yi Ho-bin as the Choong-ang Theology Institute, the school initially met at a lecture hall in the local Seoul YMCA in Seoul, South Korea. The university holds the spirit of Gyeongcheonanein, which means 'to worship the heavens and love mankind'. The institution eventually moved in 1967 to Jangsa-dong in Seoul and then to the Daechi-dong, Gangnam-gu of Seoul in 1974. In 1976, the school was renamed the Kangnam Social Welfare School; the name, which the university kept to this day, comes from the city ward it was located in at the time. In 1980, the school left Seoul and moved to its present location in Yongin, Gyeonggi-do, South Korea. Kangnam received its university accreditation in 1992. EverLine has a station located near the university. Wikipedia.

Park J.-E.,Kangnam University
Journal of Pragmatics | Year: 2016

On the basis of Sacks et al.'s (1974) turn-taking model, I explore the flexibility of the Korean turn-taking system. Noting first that speakers bring a turn to a stop without projected final turn elements, I propose that the turn stop is a legitimate completion specifiable as a transition-relevance place (TRP). I view turn construction as a process of improvisation in which lexical chunks are accumulated one after another to deliver a recognizable action; a TRP is thus constituted at the completion of a lexical chunk loosely tied to a prior lexical chunk. In parallel, a turn stop occurs at a lexical boundary in which the lexical chunks thus far accumulated have conveyed a complete action. I argue that any lexical boundary can serve as a TRP on the condition of action completion, as negotiated and determined by the participants' shared knowledge and experiences. This flexibility of TRP constitution is proposed as a specification of Sacks et al.'s (1974) generic model applied to Korean conversation. © 2016 Elsevier B.V.

An Y.,Kangnam University
Communications in Computer and Information Science | Year: 2012

In 2011, Lee et al. proposed an improved Li-Hwang's biometrics-based remote user authentication scheme, and claimed that does not only provide session key establishment and mutual authentication but also withstand various attacks. In this paper, we analyze the security of Lee et al.'s scheme and we show that Lee et al.'s scheme is still insecure against the various attacks. Also, we propose an improved scheme that can remove these security flaws of Lee et al.'s scheme and provide session key agreement, even if the secret information stored in the smart card is revealed. As a result of security analysis, the improved scheme is relatively more secure than the related authentication schemes in terms of the security. © 2012 Springer-Verlag.

An Y.,Kangnam University
Journal of Biomedicine and Biotechnology | Year: 2012

Recently, many biometrics-based user authentication schemes using smart cards have been proposed to improve the security weaknesses in user authentication system. In 2011, Das proposed an efficient biometric-based remote user authentication scheme using smart cards that can provide strong authentication and mutual authentication. In this paper, we analyze the security of Dass authentication scheme, and we have shown that Dass authentication scheme is still insecure against the various attacks. Also, we proposed the enhanced scheme to remove these security problems of Dass authentication scheme, even if the secret information stored in the smart card is revealed to an attacker. As a result of security analysis, we can see that the enhanced scheme is secure against the user impersonation attack, the server masquerading attack, the password guessing attack, and the insider attack and provides mutual authentication between the user and the server. © Copyright 2012 Younghwa An.

An Y.-H.,Kangnam University
International Conference on Advanced Communication Technology, ICACT | Year: 2013

Password-based authentication schemes have been widely adopted to protect resources from unauthorized access. In 2010, Khan et al. proposed an efficient and secure dynamic ID-based authentication scheme to overcome the weaknesses of Wang et al.'s scheme. In this paper, we show that Khan et al.'s scheme is vulnerable to password guessing attack, forgery attack, and does not provide user anonymity. Also, we propose the improved scheme to overcome the security drawbacks of Khan et al.'s scheme and to provide user anonymity and session key agreement, even if the secret values stored in the smart card is revealed. As a result, the improved scheme is relatively more secure than the related scheme in terms of security. © 2013 GIRI.

Objective: This study aimed to understand the dyadic relationships between family communication and quality of life (QOL) and between coping and QOL in Chinese-American and Korean-American breast cancer survivor (BCS)-family member dyads.Methods: A cross-sectional survey design was used. A total of 32 Chinese-American and Korean-American BCS-family member dyads were recruited from the California Cancer Surveillance Program and area hospitals in Los Angeles County, California, USA. The dyadic data were analyzed using a pooled regression actor-partner interdependence model.Results: The study findings demonstrated that the survivors' general communication and use of reframing coping positively predicted their own QOL. The survivors' and family members' general communication was also a strong predictor of the family members' physical-related QOL score specifically. Meanwhile, each person's use of mobilizing coping negatively predicted his or her partner's QOL.Conclusions: The study findings add important information to the scarce literature on the QOL of Asian-American survivors of breast cancer. The findings suggest that Chinese-American and Korean- American BCS and their family members may benefit from interventions that enhance communication and coping within the family unit. © 2014 John Wiley & Sons, Ltd.

Discover hidden collaborations