• Title, Summary, Keyword: information

Search Result 230,529, Processing Time 0.2 seconds

Analysis of Information Adoption Pathways and Strategies of Raising Information Adoption of Farmers (농업인의 정보 수용경로 분석 및 정보수용 제고 방안)

  • Choi, Sang-Ho
    • Journal of Korean Society of Rural Planning
    • /
    • v.15 no.1
    • /
    • pp.73-87
    • /
    • 2009
  • This study analyzed the characteristics of diverse information adoption pathways per pathway of information composition category including 'information perception', 'information assessment', and 'information adoption' and examined information adoption characteristics per pattern. In addition, differences among agricultural researchers and farmers per information adoption stage were analyzed. According to these analyses, as for farmers' information adoption pathways, while the formal extension type and the situational reaction diffusion type used the direct pathway of 'information perception ${\rightarrow}$ information adoption,'the agriculturist connection type and the systematic approach type did not use the direct pathway of 'information perception ${\rightarrow}$ information adoption' but, instead, adopted information by moving from the 'information perception ${\rightarrow}$ information assessment' pathway to the 'information assessment ${\rightarrow}$ information adoption' pathway, with information assessment as the intermediation. In the case of farmers, information adoption was the highest in comparison with information assessment and information perception in all patterns whereas, in the case of agricultural researchers, the results were exactly opposite those of farmers. By suggesting an information adoption pathway appropriate to each pattern, this study sought to enhance information adoption.

A VIDEO GEOGRAPHIC INFORMATION SYSTEM FOR SUPPORTING BI-DIRECTIONAL SEARCH FOR VIDEO DATA AND GEOGRAPHIC INFORMATION

  • Yoo, Jea-Jun;Joo, In-Hak;Park, Jong-Huyn;Lee, Jong-Hun
    • Proceedings of the KSRS Conference
    • /
    • /
    • pp.151-156
    • /
    • 2002
  • Recently, as the geographic information system (GIS) which searches, manages geographic information is used more widely, there is more requests for some systems which can search and display more actual and realistic information. As a response to these requests, the video geographic information system which connects video data obtained by using cameras and geographic information as it is by displaying the obtained video data is being more popular. However, because most existing video geographic information systems consider video data as an attribute of geographic information or use simple one-way links from geographic information to video data to connect video data with geographic information, they support only displaying video data through searching geographic information. In this paper, we design and implement a video geographic information system which connects video data with geographic information and supports hi-directional search; searching geographic information through searching video data and searching video data through searching geographic information. To do this, we 1) propose an ER data model to represent connection information related to video data, geographic information, 2) propose a process to extract and to construct connection information from video data and geographic information, 3) show a component based system architecture to organize the video geographic information system.

  • PDF

Effects of Information Security Education on the Practice of Information Security for the Youth (정보보호 교육이 청소년의 정보보호 실천에 미치는 영향)

  • Kang, Min-Seong;Kim, Tae-Sung;Kim, Taek-Young
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.2
    • /
    • pp.27-40
    • /
    • 2019
  • As reliance on information and communication becomes widespread, a variety of information dysfunctions such as hacking, viruses, and the infringement of personal information are also occurring. Korean adolescents are especially exposed to an environment in which they are experiencing information dysfunction. In addition, youth cybercrimes are steadily occurring. To prevent cybercrime and the damage caused by information dysfunction, information security practices are essential. Accordingly, the purpose of this study is to discuss the factors affecting the information security practices of Korean youths, considering information security education, perceived severity, and perceived vulnerability as leading factors of the theory of planned behavior. A questionnaire survey was administered to 118 middle and high school students. Results of the hypothesis test show that information security education affects perceived behavior control, and perceived severity affects attitude. Subjective norms, information security attitudes, and perceived behavioral control were found to influence adolescents' practices of information security. However, perceived vulnerabilities did not affect youths' information security attitudes. This study confirms that information security education can help youths to practice information security. In other words, information security education is important, and it is a necessary element in the information curriculum of contemporary youth. However, perceived vulnerability to youth information security threats did not affect information security attitudes. Consequently, we suggest that it is necessary to strengthen the contents of the information security education for Korean youths.

Develop and Deliver Essential Information Literacy Programs

  • Eisenderg, Michael B.
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.2
    • /
    • pp.5-21
    • /
    • 2011
  • There is an explosion of talk about crucial, new literacies for the 21st Century, for example critical thinking, problem-solving, media literacy, technology literacy, digital literacy, visual literacy. The other day, there was even an article about "gaming literacy!" How does one make sense of it all? The common factor in all these literacies is "information" - information seeking, information use, information processing, information presentation, and information evaluation. And, these "information" elements come together in information literacy: the ability to engage in effective and efficient information problem-solving. Information literacy is the overarching and unifying literacy, and all libraries have a unique and essential role to play in delivering meaningful information literacy programs to people of all ages. In this keynote paper and address, Professor and Dean Emeritus Mike Eisenberg will define the concept and structure of library-based information literacy programs and offer strategies for developing and implementing information literacy programs that are comprehensive(reaching all users), predictable (consistent over time), and accountable(measured and reported).

User attribute verification method using user mobile dynamic information

  • Kim, Seok-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.145-149
    • /
    • 2019
  • Various supplementary authentication methods are used to supplement user authentication and authorization provided by existing password verification online1. In recent years, authentication and authorization methods using user attribute information have been studied and utilized in various services. User attribute information can be divided into static information and dynamic information. The existing methods focus on research to identify users using dynamic information or to generate challenge questions for user reauthentication. Static information such as a user's home address, school, company, etc. is associated with dynamic information such as location information. We propose a method to verify user attribute information by using the association between two attribute information. For this purpose, the static information of the user is verified by using the user's location record which is dynamic information. The experiment of this paper collects the dynamic information of the actual user and extracts the static information to verify the user attributes. And we implemented the user attribute information authentication system using the proposal verification method and evaluated the utility based on applicability, convenience, and security.

Survey of Temporal Information Extraction

  • Lim, Chae-Gyun;Jeong, Young-Seob;Choi, Ho-Jin
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.931-956
    • /
    • 2019
  • Documents contain information that can be used for various applications, such as question answering (QA) system, information retrieval (IR) system, and recommendation system. To use the information, it is necessary to develop a method of extracting such information from the documents written in a form of natural language. There are several kinds of the information (e.g., temporal information, spatial information, semantic role information), where different kinds of information will be extracted with different methods. In this paper, the existing studies about the methods of extracting the temporal information are reported and several related issues are discussed. The issues are about the task boundary of the temporal information extraction, the history of the annotation languages and shared tasks, the research issues, the applications using the temporal information, and evaluation metrics. Although the history of the tasks of temporal information extraction is not long, there have been many studies that tried various methods. This paper gives which approach is known to be the better way of extracting a particular part of the temporal information, and also provides a future research direction.

Study about the Impact of Information Security Systems on Corporate Performance: Based on IT Relatedness Theory (정보보안체계 수립이 Multibusiness 기업 성과에 미치는 영향에 관한 연구: IT Relatedness 이론 관점에서)

  • Koo, Ja Myon;Park, Joo Seok;Park, Jae Hong
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.129-149
    • /
    • 2013
  • According to the development of new Information Technologies, firms consistently invest a significant amount of money in IT activities, such as establishing internal and external information systems. However, several anti-Information activities-such as hacking, leakage of information and system destruction-are also rapidly increasing, thus many firms are exposed to direct and indirect threats. Therefore, firms try to establish information security systems and manage these systems more effectively via an enterprise perspective. However, stakeholders or some managers have negative opinions about information security systems. Therefore, in this research, we study the relationship between multibusiness firms' performance and information security systems. Information security indicates physical and logical correspondence of information system department against threats and disaster. Studies on information security systems suggested frameworks such as IT Governance Cube and COBIT Framework to identify information security systems. Thus, this study define that information security systems is a controlled system on enterprise IT process and resource on IT Governance perspective rather than independent domain of IT. Thus, Information Security Systems should be understood as a subordinate concept of IT and business processes. In addition, this study incorporates information capability to information security system literature to show the positive relationship between Information Security Systems and Corporate Performance. The concept of information capability suggested that an interaction of human, information, technical and an effect on corporate performance using three types of capability (IT Practice, Information Management Practice, Information Behaviors and Values). Information capability is about firms' capability to manage IT infrastructure and information as well as individual employees who use IT infrastructure and information. Thus, this study uses information capability as a mediating variable for the relationship between information security systems and firms' performance. To investigate the relationship between Information Security Systems and multibusiness firms' performance, this study extends the IT relatedness concept into Information Security Systems. IT relatedness provides understanding of how corporations cope with conflicts between headquarters and business units to create a synergy effect and achieve high performance using IT resources. Based on the previous literature, this study develops the IT Security Relatedness model. IT Security Relatedness is our main independent variable, while Information Capability and Information Security Performance are mediating variables. To control for the common method bias, we collect each multibusiness firm's financial performance and use it as our dependent variable. We find that Information Security Systems influence Information Capability and Information Security Performance positively, and these two variables consequently influence Corporate Performance positively. In addition, this result indirectly shows that corporations under a multibusiness environment can obtain synergy effects using the integrated Information Security Systems. This positive impact of Information Security Systems on multibusiness firms' performance has an important implication to various stakeholders. Therefore, multibusiness firms need to establish Information Security Systems to achieve better financial performance.

Information Professionals Going Beyond the Needful User in Digital Humanities Project Collaboration

  • Engerer, Volkmar P.
    • Journal of Information Science Theory and Practice
    • /
    • v.8 no.1
    • /
    • pp.6-19
    • /
    • 2020
  • When information professionals deal with other disciplines in the course of digital humanities projects, they often assume that they are dealing with 'needful users' who have an 'information gap' to fill. This paper argues that the traditional view that information/knowledge is transferred from an information specialist donor to a domain specialist receiver is no longer appropriate in the digital humanities context, where the gap-and-search (or gap-and-filler) approach to information has given way to more direct, explorative engagement with information. The paper asks whether information science and the practising profession are ready for this paradigm shift and examines information science conservatism in two common collaboration scenarios, library support and digital development. It is shown that information science theory still assumes a traditional donor role in both scenarios. How information scientists deal with conservatism in practice is discussed in the example of the Prior project, in which the information science team exerted an ambiguous, hybrid approach with both conservative and non-conservative elements. Finally, two rather hypothetical answers are offered to the question of how information professionals should approach scholarly collaboration in the digital humanities context, where users have ceased to be supplicants. From a purely pragmatic perspective, information scientists need to shift their focus from information needs to research practices and the implications of these practices for digital information systems. More fundamentally, the emergence of digital humanities challenges information professionals to transform information systems designed for searching into digital objects that can be explored more freely by the digital humanities community.