• Title/Summary/Keyword: 문형 정보

Search Result 179, Processing Time 0.023 seconds

A Study on Development and Implementation of Website Evaluation Model (웹사이트평가 모델 개발과 적용에 관한 연구)

  • 문형남
    • Journal of the Korean Society for information Management
    • /
    • v.18 no.2
    • /
    • pp.31-56
    • /
    • 2001
  • The number of websites in Korea is increasing rapidly as demonstrated by more than 510,000websites registered under the ".kr" domain as of the end of December 2000. In order to effectively copewith the deluge of web information and maintain ready access to useful information on the web,utilization and management of web information through websites that have been evaluated and ratedfavorably is becoming increasingly important. As websites now increasingly provide industry-specificinformation, information managers are now finding it essential to meet their specific information needsthrough separation and ranking of useful information from the rest.However, evaluation of industry-specific information requires industry-specific expertise as well asgeneral website evaluation tools. This paper develops a website evaluation model and attempts to rankindustry-specific websites through case studies of previous website evaluation and consultation withexperts in specific industries. Based on the model developed, this paper selects 100 outstanding websitesin 10 areas of construction industry. The research also hypothesizes that, with appropriate modifications,the rating models used for the construction industry can also be applied to other industries for moreefficient information management.e efficient information management.

  • PDF

Automatic Product Review Helpfulness Estimation based on Review Information Types (상품평의 정보 분류에 기반한 자동 상품평 유용성 평가)

  • Kim, Munhyong;Shin, Hyopil
    • Journal of KIISE
    • /
    • v.43 no.9
    • /
    • pp.983-997
    • /
    • 2016
  • Many available online product reviews for any given product makes it difficult for a consumer to locate the helpful reviews. The purpose of this study was to investigate automatic helpfulness evaluation of online product reviews according to review information types based on the target of information. The underlying assumption was that consumers find reviews containing specific information related to the product itself or the reliability of reviewers more helpful than peripheral information, such as shipping or customer service. Therefore, each sentence was categorized by given information types, which reduced the semantic space of review sentences. Subsequently, we extracted specific information from sentences by using a topic-based representation of the sentences and a clustering algorithm. Review ranking experiments indicated more effective results than other comparable approaches.

Countermeasure for Prevention and Detection against Attacks to SMB Information System - A Survey (중소기업 정보시스템의 공격예방 및 탐지를 위한 대응 : 서베이)

  • Mun, Hyung-Jin;Hwang, Yooncheol;Kim, Ho-Yeob
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.2
    • /
    • pp.1-6
    • /
    • 2015
  • Small and medium-sized companies lack countermeasures to secure the safety of a information system. In this circumstance, they have difficulties regarding the damage to their images and legal losses, when the information is leaked. This paper examines the information leakage of the system and hacking methods including APT attacks. Especially, APT attack, Advanced Persistent Threats, means that a hacker sneaks into a target and has a latency period of time and skims all the information related to the target, and acts in the backstage and neutralize the security services without leaving traces. Because he attacks the target covering up his traces not to reveal them, the victim remains unnoticed, which increases the damage. This study examines attack methods and the process of them and seeks a countermeasure.

  • PDF

Virtual Keypads based on Tetris with Resistance for Attack using Location Information (위치정보로 비밀정보를 유추할 수 있는 공격에 내성이 있는 테트리스 형태 기반의 보안 키패드)

  • Mun, Hyung-Jin
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.6
    • /
    • pp.37-44
    • /
    • 2017
  • Mobile devices provide various services through payment and authentication by inputting important information such as passwords on the screen with the virtual keypads. In order to infer the password inputted by the user, the attacker captures the user's touch location information. The attacker is able to infer the password by using the location information or to obtain password information by peeping with Google Glass or Shoulder Surfing Attack. As existing secure keypads place the same letters in a set order except for few keys, considering handy input, they are vulnerable to attacks from Google Glass and Shoulder Surfing Attack. Secure keypads are able to improve security by rearranging various shapes and locations. In this paper, we propose secure keypads that generates 13 different shapes and sizes of Tetris and arranges keypads to be attached one another. Since the keypad arranges different shapes and sizes like the game, Tetris, for the virtual keypad to be different, it is difficult to infer the inputted password because of changes in size even though the attacker knows the touch location information.

A Study on the Cryptography Technology for Computing Stored and Encrypted Information without Key Leakage (키 유출 없이 저장되고 암호화된 정보를 계산할 수 있는 암호기술에 관한 연구)

  • Mun, Hyung-Jin;Hwang, Yoon-Cheol
    • Journal of Industrial Convergence
    • /
    • v.17 no.1
    • /
    • pp.1-6
    • /
    • 2019
  • Various cryptographic technologies have been proposed from ancient times and are developing in various ways to ensure the confidentiality of information. Due to exponentially increasing computer power, the encryption key is gradually increasing for security. Technology are being developed; however, security is guaranteed only in a short period of time. With the advent of the 4th Industrial Revolution, encryption technology is required in various fields. Recently, encryption technology using homomorphic encryption has attracted attention. Security threats arise due to the exposure of keys and plain texts used in the decryption processing for the operation of encrypted information. The homomorphic encryption can compute the data of the cipher text and secure process the information without exposing the plain text. When using the homomorphic encryption in processing big data like stored personal information in various services, security threats can be avoided because there is no exposure to key usage and decrypted information.

Designing a Digital Reconstruction of Koguryo Mural using Virtual Reality Technology for Interactive Cultural Heritage Learning (상호작용적인 문화 교육을 위해 가상현실을 이용한 고구려 벽화 복원 연구)

  • Cho Yong-Joo;Moon Hyung-Tae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1359-1365
    • /
    • 2006
  • Digital Koguryo is a virtual reality reconstruction of the Koguryo mural tumulus, Anak No. 3, designed for an interactive educational gaming and learning environment. Digital Koguryo aims at not only developing a digital reconstruction of cultural heritage but also helping young students learn the living style and the custom of Koguryo Kingdom while playing the game environment. This paper describes the digital restoration process of Koguryo mural paintings and 3D structure, as well as the construction of educational virtual environment designed to get more user's interests. It then discusses a few design issues learned from the development and the public demonstration. Finally, it will present the future research directions to improve the users' immersion.

A Proposition and Analysis of Useful Load Balancing Algorithm For Overloaded Daemon In WDCS (WDCS 에서 과부하 데몬을 위한 효율적인 부하분산 알고리즘 제안과 분석)

  • 문형섭;이홍도
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.292-295
    • /
    • 2000
  • This paper presents effective Load Balancing Algorithm by exampling EvtProc Daemon controlling the Event handling among the W/S Daemon which manages and controls Digital Cross Connect Systems. In this paper, when a lot of event occur, charging process waits regular times instead of executing consecutive exec process. so, We can reduce overheads of fork and exec process. another method of reducing the overheads is it that waiting process handles consecutives events of Op Code. And We also presents effective and stable management scheme of event handling , for the generation of event handling Child process by charging the Load Balancing to the main child process

  • PDF

Mixed Reality(MR) Technology Trends and Development Prospect (혼합현실(Mixed Reality) 기술 동향과 발전 전망)

  • Moon, Hyung-Nam;Cho, Hee-in;Han, Youngmi
    • The Journal of the Convergence on Culture Technology
    • /
    • v.3 no.3
    • /
    • pp.21-25
    • /
    • 2017
  • In this paper, we review relevant technologies of Mixed Reality(MR) and show important components of perspective that can overcome technical limitations of the current MR. An MR technology combines real and virtual objects in a real environment, and runs interactive in real time, and is regarded as an emerging technology in a large part of the future of Information Technology(IT). We've grouped the major obstacles limiting the wider use of MR technologies into three themes: technological limitations (i,e., tracking, rendering, authoring, and registration), user interface(UI) limitations(i.e., UI metaphor for MR interaction), and social acceptance issues.

The Expanded XrML Model for Dynamic Digital License Management (동적 디지털 라이센스 관리를 위한 확장된 XrML모델)

  • Li Yong-Zhen;Mun Hyung-Jin;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.231-238
    • /
    • 2006
  • As digital contents circulation environment goes on-line by fast development of the latest Internet, contents demand is growing rapidly. However, XrML hard to change dynamically and has controversial point that hard to reflect user's request maximum after create license and issues to user, in this paper study of active digital license administration model who can reflect user request dynamically and support reusability of license XrML eXrML model who design extension design and suggested. Expect that this presents efficient administration plan in administration study of license base as well as study for digital contents administration.

  • PDF

An Study of Life-log Analysis and Risk Detection System For Disabled Person Used by Mobile Sensor Networks (모바일 센서 네트워크를 활용한 장애인 라이프 로그의 분석 및 위험 감지 시스템에 관한 연구)

  • Seo, Jeong-Min;Mun, Hyung-Man;Park, Chang-Seon;Hwang, Jung-Hwan;Kim, Byung-Ju
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2010.07a
    • /
    • pp.311-314
    • /
    • 2010
  • 예전부터 IT 기술을 이용한 장애인의 복지 증진을 위한 많은 연구들이 진행되고 있다. 최근에는 거리에 설치된 수많은 모바일 센서들을 활용하여 라이프 로그를 저장하고 네트워크를 통하여 서버에 전송함으로써 로그를 저장한 후, 이러한 라이프 로그를 분석함으로써 해당 사용자가 위험에 노출되어 있는 지를 판단 할 수 있게 되는 시스템이 많이 제안되고 있다. 특히 장애인의 경우 위험에 노출되기 쉬우며 매번 보조자들이 함께 다녀야 한다는 부담 때문에 외출을 두려워하는 경향이 있다. 따라서 이러한 부담감을 덜어주어야 심리적으로도 육체적으로도 더 나은 삶을 살아갈 수 있게 유도할 수 있을 것이다. 본 연구는 이러한 심리적 부담감을 덜어주기 위한 방법으로 장애인의 라이프 로그를 기록하고 분석할 수 있는 시스템을 제안한다.

  • PDF