• Title/Summary/Keyword: 과학기술정보서비스

Search Result 1,610, Processing Time 0.027 seconds

The Effect of Self-Efficacy and Job Stress on Quality of Service of Care Givers (요양보호사의 자기효능감과 직무스트레스가 서비스 질에 미치는 영향)

  • Seong, Ji-A
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.12
    • /
    • pp.82-90
    • /
    • 2020
  • The purpose of this study was to investigate the effects of Self-Efficacy and Job Stress on Quality of Service. Data were collected through self reported structured questionnaire from Care givers using convenient sampling methods from May 1 to August 30, 2019. The data were analyzed with SPSS/WIN 25.0 using independent t-test, one way ANOVA, Pearson's correlational coefficient and multiple regression. These factors together explained 42.0% of the Quality of service in Care givers(F=13.86, p=<.001). Factor influence the Quality of Service was Self-Efficacy(β=0.56, p=<.001). The findings of this study indicate that education programs should be developed to improve the self-efficiency of caregivers and that further studies should be conducted on their effects.

Establishment of advancement and usage-enhancement method of water service GIS system (수도GIS 시스템 고도화 및 활용성 증대 방안)

  • Hwang, Eui-Ho;Koh, Deuk-Koo;Lee, Geun-Sang
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2007.05a
    • /
    • pp.366-372
    • /
    • 2007
  • In this research, a ubiquitous-based strategy for managing waterworks facilities is proposed to increase the usability of the existing related databases and to ensure the systematic way of distributing information. The current status of the existing waterworks GIS and GIS database were analyzed to achieve the goal. By studying the state-of-the-art technology, we found that importing the LBS(Location Based Service) technology to the databases is necessary. The results of these efforts are exclusive waterworks-mobile-terminals and LBS system supporting them. Furthermore, the applicability of the ubiquitous technology to waterworks has been examined to realize the real-time waterworks management.

  • PDF

A refinement of customer satisfactory factors in multimedia contentware evaluation process - focused on company website design - (멀티미디어 컨텐트웨어 상품에 대한 소비자 감성 평가 요소(문화성 인자)추출에 관한 연구 - 기업 웹사이트를 중심으로 -)

  • 이종호;김명석;이현이;김태균
    • Archives of design research
    • /
    • v.11 no.1
    • /
    • pp.291-302
    • /
    • 1998
  • This paper covers the development process of multimedia evaluation system, especially focused on customer satisfactory factors while customers navigating net-based Interactive multimedia system. Customers usually experience new level of interaction cased by newly developed web-based technology In ordinary multimedia system. However, if it gives customers satisfactory experience is a matter of question. To find out the relationship between customer satisfaction and interactivity factors exposed by multimedia system, a model has been developed which describes the structure of web-based multimedia system and its relation to customer satisfactory factors. Five different experiments, including 'semantic differential', 'focus group interview', and 'expert review', has been conducted and four customer satisfactory factors were identified. Those are 'customery value', 'structural perfectness', 'visual perfectness', and 'contemporaneity'. With these factors and newly delveoped evaluation system, 7 different web-site has been evaluated and analyzed at the end of this report.

  • PDF

An Analysis Method of User Preference by using Web Usage Data in User Device (사용자 기기에서 이용한 웹 데이터 분석을 통한 사용자 취향 분석 방법)

  • Lee, Seung-Hwa;Choi, Hyoung-Kee;Lee, Eun-Seok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.3
    • /
    • pp.189-199
    • /
    • 2009
  • The amount of information on the Web is explosively growing as the Internet gains in popularity. However, only a small portion of the information on the Web is truly relevant or useful to the user. Thus, offering suitable information according to user demand is an important subject in information retrieval. In e-commerce, the recommender system is essential to revitalize commercial transactions, raise user satisfaction and loyalty towards the information provider. The existing recommender systems are mostly based on user data collected at servers, so user data are dispersed over several servers. Therefore, web servers that lack sufficient user behavior data cannot easily infer user preferences. Also, if the user visits the server infrequently, it may be hard to reflect the dynamically changing user's interest. This paper proposes a novel personalization system analyzing the user preference based on web documents that are accessed by the user on a user device. The system also identifies non-content blocks appearing repeatedly in the dynamically generated web documents, and adds weight to the keywords extracted from the hyperlink sentence selected by the user. Therefore, the system establishes at an early stage recommendation strategies for the web server that has little user data. Also, user profiles are generated rapidly and more accurately by identifying the information blocks. In order to evaluate the proposed system, this study collected web data and purchase history from users who have current purchase activity. Then, we computed the similarity between purchase data and the user profile. We confirm the accuracy of the generated user profile since the web page containing the purchased item has higher correlation than other item pages.

A Study on the Functional User Interface of the Korean Hisory Information System in the Knowledge Information Resource Management (지식정보자원관리사업 역사분야 정보시스템의 기능적 사용자 인터페이스에 대한 연구)

  • Lee, Keon-Sik
    • Journal of the Korean Society for information Management
    • /
    • v.23 no.1 s.59
    • /
    • pp.335-352
    • /
    • 2006
  • Since 2000, the Ministry of Information and Communication has spearhead the so-called Knowledge Information Resource Management Project to turn South Korea into an information-knowledge powerhouse. With the project, the ministry has digitalized major information content in various fields such as history, education, culture and science, enabling many people to benefit through the Internet. During the period,12 institutions have participated in the history fields, The participants are as follows: Muncheongak at Gyeongsang National University, Ministry of Patriots and Veterans Affairs, National Institute of Korean History, Independence Hall of Korea, Korean Classics Research Insitute, Korea Democracy Foundation, Gyujanggak Archives, Seoul National University, Jongyeonggak, Sungkyunkwan University, The War Memorial of Korea, Korean Studies Advancement Center, Korean Women's Development Institute, and The Academy of Korean Studies. Because the 12 information systems have different functional user interfaces, it is confusing for people to utilize them effectively That requires us to standardize the interfaces, which would improve the overall improvement in effectiveness. This paper compares each user interface of the 12 information systems to determine their similarities and differences in terms of how to search information and present results. This work will pave the way to build a standardized user interface .

A Study on the Customized Security Policy for Effective Information Protection System (실효적인 정보보호관리 통제를 위한 맞춤형 보안정책 연구)

  • Son, Young-hwan;Kim, In-seok
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.3
    • /
    • pp.705-715
    • /
    • 2017
  • Today, the world is evolving into a huge community that can communicate with real-time information sharing and communication based on the rapid advancement of scientific technology and information. Behind this information, the adverse effects of information assets, such as hacking, viruses, information assets, and unauthorized disclosure of information assets, are continually increasing as a serious social problem. Each time an infringement of the invasion and personal information leaks occur, many regulatory policies have been announced, including stricter regulations for protecting the privacy of the government and establishing comprehensive countermeasures. Also, companies are making various efforts to increase awareness of the importance of information security. Nevertheless, information security accidents like the leaks of industrial secrets are continuously occurring and the frequency is not lessening. In this thesis, I proposed a customized security policy methodology that supports users with various business circumstances and service and also enables them to respond to the security threats more confidently and effectively through not a monotonous and technical but user-centered security policy.

A Study on Spam Regulation (스팸규제에 관한 연구)

  • Baek, Yun-Chul
    • Journal of Information Management
    • /
    • v.38 no.4
    • /
    • pp.48-67
    • /
    • 2007
  • The economic burden which our society has to take exceeds the benefit that it becomes by the free circulation of information. Problems such as inconvenience or inequality between people can also occur since the regulation task of spam e-mail or SMS is imposed on two organs; the Department of Information and Communication and Free Trade Commission. The dualization of regulation separates related laws, which makes exception according to the $\ulcorner$Law on Information Communication Usage and Information Protection$\lrcorner$ or poses double regulation toward the same case. The spam prevention activity at free hands of information communication network provider such as portal site or mobile communication has many limitations along with comparison and analysis of spam regulations abroad. Therefore, examinations on legal obligation such as service restriction, identification and technical measure to spam prevention is needed. This study focuses on making the scope of spam regulation clear by considering the domestic related laws and the general environment of industry, on enacting law which regulates spam including advertisement and on deducting essential facts in enacting or modifying related laws and thus, deducting the form and contents of spam regulation law which is most decent in our domestic environment.

A Study on the Trend of Healthcare Device Technology by Biometric Signal (생체신호를 통한 헬스케어 디바이스 기술 동향 연구)

  • Choi, Kyoung-Ho;Yang, Eun-Seok
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.2
    • /
    • pp.165-176
    • /
    • 2020
  • Customized medical care and services timely providing effective prevention and treatment by collecting and using individuals' biomedical data are recently possible and utilized for users' health care. They are developed as the real-time health care services and information is provided to individuals by using smart phones, PC, tablet, etc. Interactive communication is supported by informing managers of analysis data and results, through collected data. It is therefore the time for constructing health care. This study attempts to prepare for patent applications of technical development at this time, by analyzing the tendency of smart wearable health care technologies, including biological signal-based health care devices and real-time health care system. Patents regarding smart wearable health care technologies were reported to have the relatively higher concentration of research development. Korea focuses on patent activities for real-time health care systems across the intervals of analysis, while U.S and European countries actively make efforts for patent activities regarding health care devices Japan conduct patent activities across health care devices and systems, based on bio-technologies. Korea has recently dominated the market of patents for bio-technologies-based health care devices and real-time health care devices and also appears to secure patents for the technologies and the market, so entry barriers to the market of smart wearable health care technologies are determined to be higher in Korea. It is important to establish the portfolios of patents, by securing patent rights for the figures of products, manufacturing methods and other related technical systems, if technologies are planned to be commercialized.

An Informetric Analysis on Intellectual Structures with Multiple Features of Academic Library Research Papers (복수 자질에 의한 지적 구조의 계량정보학적 분석연구: 국내 대학도서관 분야 연구논문을 대상으로)

  • Choi, Sang-Hee
    • Journal of the Korean Society for information Management
    • /
    • v.28 no.2
    • /
    • pp.65-78
    • /
    • 2011
  • The purpose of this study is to identify topic areas of academic library research using two informetric methods; word clustering and Pathfinder network. For the data analysis, 139 articles published in major library and information science journals from 2005 to 2009 were collected from the Korean Science Citation Index database. The keywords that represent research topics were gathered from two sections: an and titles in references. Results showed that reference titles usefully represent topics in detail, and combinings and reference titles can produce an expanded topic map.

Anomaly Detection Analysis using Repository based on Inverted Index (역방향 인덱스 기반의 저장소를 이용한 이상 탐지 분석)

  • Park, Jumi;Cho, Weduke;Kim, Kangseok
    • Journal of KIISE
    • /
    • v.45 no.3
    • /
    • pp.294-302
    • /
    • 2018
  • With the emergence of the new service industry due to the development of information and communication technology, cyber space risks such as personal information infringement and industrial confidentiality leakage have diversified, and the security problem has emerged as a critical issue. In this paper, we propose a behavior-based anomaly detection method that is suitable for real-time and large-volume data analysis technology. We show that the proposed detection method is superior to existing signature security countermeasures that are based on large-capacity user log data according to in-company personal information abuse and internal information leakage. As the proposed behavior-based anomaly detection method requires a technique for processing large amounts of data, a real-time search engine is used, called Elasticsearch, which is based on an inverted index. In addition, statistical based frequency analysis and preprocessing were performed for data analysis, and the DBSCAN algorithm, which is a density based clustering method, was applied to classify abnormal data with an example for easy analysis through visualization. Unlike the existing anomaly detection system, the proposed behavior-based anomaly detection technique is promising as it enables anomaly detection analysis without the need to set the threshold value separately, and was proposed from a statistical perspective.