• Title/Summary/Keyword: 연구자 식별자

Search Result 29, Processing Time 0.028 seconds

Personal Recommendation Service Design Through Big Data Analysis on Science Technology Information Service Platform (과학기술정보 서비스 플랫폼에서의 빅데이터 분석을 통한 개인화 추천서비스 설계)

  • Kim, Dou-Gyun
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.28 no.4
    • /
    • pp.501-518
    • /
    • 2017
  • Reducing the time it takes for researchers to acquire knowledge and introduce them into research activities can be regarded as an indispensable factor in improving the productivity of research. The purpose of this research is to cluster the information usage patterns of KOSEN users and to suggest optimization method of personalized recommendation service algorithm for grouped users. Based on user research activities and usage information, after identifying appropriate services and contents, we applied a Spark based big data analysis technology to derive a personal recommendation algorithm. Individual recommendation algorithms can save time to search for user information and can help to find appropriate information.

Understanding Research Trends of Open Access via Topic Growth Analysis (토픽 성장 분석을 통한 오픈액세스 분야 연구 동향 분석)

  • Jaemin, Chung;Wan Jong, Kim
    • Journal of the Korean Society for information Management
    • /
    • v.39 no.4
    • /
    • pp.75-97
    • /
    • 2022
  • To solve the problems of the traditional scholarly communication system, global interest in the open access paradigm continues. Nevertheless, there is still a lack of research to understand global research and growth trends in the field of open access through data-based quantitative methods. This study aims to identify which sub-fields exist in open access and analyze how long each research field will grow in the future. To this end, topic modeling and growth curve analysis were applied to global academic papers in the field of open access. This study identified 14 research topics related to open access, open data, and open collaboration, which are three key elements of open science, and foresaw that the field of open access will grow over the next 65 years. The results of this study are expected to support researchers and policymakers in understanding global research trends of open access.

Legal Issues in Protecting and Utilitizing Medical Data in United States - Focused on HIPAA/HITECH, 21st Century Cures Act, Common Law, Guidance - (미국의 보건의료데이터 보호 및 활용을 위한 주요 법적 쟁점 -미국 HIPAA/HITECH, 21세기 치료법, 공통규칙, 민간 가이드라인을 중심으로-)

  • Kim, Jae Sun
    • The Korean Society of Law and Medicine
    • /
    • v.22 no.4
    • /
    • pp.117-157
    • /
    • 2021
  • This research reviewed the HIPAA/HITECH, 21st Century Cures Act, Common Law, and private Guidances from the perspectives in protecting and utilitizing the medical data, while implications were followed. First, the standards for protection and utilization are relatively clearly regulated through single law on personal medical information in the United States. The HIPAA has been introduced in 1996 as fundamental act on protection of medical data. Medical data was divided into personally identifiable information, non-identifying information, and limited dataset under HIPAA. Regulations on de-identification measures for medical information, objects for deletion of limited data sets, and agreement on prohibition of data re-identification were stipulated. Moreover, in the 21st Century Cures Act regulated mutual compatibility for data sharing, prohibition of data blocking, and strengthening of accessibility of data subjects. Common Law introduced comprehensive consent system and clearly stipulates procedures. Second, the regulatory system is relatively simplified and clearly stipulated in the United States. To be specific, the expert consensus and the safe harbor system were introduced as an anonymity measure for identifiable medical information, which clearly defines the process while increasing trust. Third, the protection of the rights of the data subject is specified, the duty of explanation is specified in detail, while the information right of the consumer (opt-out procedure) for identification information is specified. For instance, the HHS rule and FDA regulations recognize the comprehensive consent system for human research, but the consent procedure, method, and requirements are stipulated through the common rule. Fourth, in the case of the United States, a trust-based system is being used throughout the health and medical data legislation. To be specific, Limited Data Sets are allowed to use in condition to the researcher's agreement to prohibit re-identification, and de-identification or consent process is simplified under the system.

Cross-sectional analysis on recreation specialization of surfing participants (서핑 참여자의 레크리에이션 전문화에 관한 횡단적 분석)

  • Yeom, Sang-geun;Kang, Hyun-Wook
    • Journal of the Korean Applied Science and Technology
    • /
    • v.37 no.2
    • /
    • pp.340-353
    • /
    • 2020
  • The purpose of this study is to introduce surfing which is not a familiar leisure activity in Korea and provide understanding of surfing participants through the cross-sectional analysis on the process of forming recreational specialization from introductory levels with enthusiastic surfing participants. This study employs a qualitative approach to analyze each participant's experience on recreation specialization in detail, and in particular uses ethnographic research methods to derive participants' meaning of life and daily routines and cultural behavioral patterns changed through surfing. First, through the analysis of in-depth interview data, total 531 conceptual words were identified and the first categorization was established. Second, surfing participants mentioned that they had high expectations of surfing even before they first encountered it. Third, surfing participants noted that they experienced leisure constraints and made efforts to resolve this issue before reaching the recreation specialization process. Fourth, surfing participants were found to go through a recreation specialization process. Fifth, surfing participants were found to undergo life changes. They worked hard in their everyday life through physical training, improvement of surfing skills, and analysis of their own videos to be better at surfing.

Deriving Essential Security Requirements of IVN through Case Analysis (사례 분석을 통한 IVN의 필수 보안 요구사항 도출)

  • Song, Yun keun;Woo, Samuel;Lee, Jungho;Lee, You sik
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.2
    • /
    • pp.144-155
    • /
    • 2019
  • One of the issues of the automotive industry today is autonomous driving vehicles. In order to achieve level 3 or higher as defined by SAE International, harmonization of autonomous driving technology and connected technology is essential. Current vehicles have new features such as autonomous driving, which not only increases the number of electrical components, but also the amount and complexity of software. As a result, the attack surface, which is the access point of attack, is widening, and software security vulnerabilities are also increasing. However, the reality is that the essential security requirements for vehicles are not defined. In this paper, based on real attacks and vulnerability cases and trends, we identify the assets in the in-vehicle network and derive the threats. We also defined the security requirements and derived essential security requirements that should be applied at least to the safety of the vehicle occupant through risk analysis.

A STUDY ON THE ERRORS UN THE CEPHALOMETRIC MEASUREMENTS (두부방사선사진의 계측오류에 관한 연구)

  • Na, Kwang-Cheon;Yoon, Young-Jooh;Kim, Kwang-Won
    • The korean journal of orthodontics
    • /
    • v.28 no.1 s.66
    • /
    • pp.75-83
    • /
    • 1998
  • This study was done to recognize the importance of errors in measurements of cephalometric radiograph and to find the anatomical structures those need special care to select as a reference points through the detection of the systematic errors and estimation of random errors. For this purose, 100 cephalometric radiographs were prepared by usual manner and 61 reference points, and 130 measurement variables were established. Measurement errors were detected and estimated by the comparison of the 25 randomly-selected samples for repeated measurements with the main sample. The following results were obtained : 1. In comparison of the repeated measurements, there were statistical significant differences in 24 variables which were 18.4% of 130 total variables. 2. The frequency of the difference in identification of the reference points between the repeated measurements was very high in the root apex of upper incisor(as), the most posterior wall of maxilla(tu), soft tissue nasion(n'), soft tissue frontal eminence(ft), and ad3 in airway. 3. After correction of reference points marking until the level of below 5% significance, the range of random errors were from 0.67 to 1.71 degree or mm. 4. The variable shown the largest random error was the interincisal angle(ILs-ILi). 5. Measurement errors were mainly caused by the lack of precision in anatomic definitions and obscure radiographic image. From the above results, the author could find the high possibility of errors in cephalometric measurements and from this point, we should include error analysis in all the studies concerning measurments. In is essential to have a concept of error analysis not only for the investigator but also for a reader of other articles.

  • PDF

An Empirical Study of Students' Start-Up Activities: Integrated Approach of Student-Focused Cognitive Model and Supportive Activities of University (대학생 창업활동에 대한 실증적 연구 : 대학생 중심의 인지적 모델과 대학지원의 통합적 접근)

  • Chang, Sooduck;Lee, Jaehoon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.9 no.4
    • /
    • pp.65-76
    • /
    • 2014
  • The basic purpose of this study is to examine the relationship among entrepreneurial intention, university supports for startup, and startup activities of university students. For the study, we identified the influence factors of students' startup intention based on reviewing preceding studies and examined how these factors affect their intention of new venture startup. In addition, this study attempted to examine how these factors that can have a significant impact on entrepreneurial intention affect startup activities and analyzed how entrepreneurial intention would mediate the relationship between these influence factors and startup activities. A total of 769 students who chosen by random were surveyed and all questionnaires were sent by mail to the universities that entrepreneurship education and entrepreneurial programs were selected as the forerunners from the government. As a result, this study revealed that student's psychological traits such as entrepreneurial self-efficacy and risk-taking have significant effect on the intention of startup. And student's exposure to the role models and various entrepreneurial experiences such as entrepreneurship education and entrepreneurial student's club in the university has significantly positive influence on the intention of startup. This study also found that the effects of these explanatory variables of this research on startup activities have been partially mediated by entrepreneurial intention. The entrepreneurial intention was also proven to have a significant effect on startup activities. Finally, the extent to which university supports activities for students' startup moderated the relationship between entrepreneurial intention and university students' startup activities. We believe that these results of this study contribute to the understanding of the entrepreneurship process both theoretical and practical perspectives.

  • PDF

A Framework for Identifying and Analyzing IT Project Risk Factors (IT프로젝트 위험 요인 식별 및 분석 프레임워크 연구)

  • Jangho Choi;Chanhee Kwak;Heeseok Lee
    • Information Systems Review
    • /
    • v.19 no.4
    • /
    • pp.87-110
    • /
    • 2017
  • Analyzing and finding the risk factors in information technology (IT) projects have been discussed because risk management is an important issue in IT project management. This study obtained the risk factor checklists with priorities, analyzed the causal relationship of risk factors, and determined their influences on IT project management. However, only few studies systematically classified IT project risk factors in terms of risk exposure. These studies considered both the probability of occurrence and the degree of risk simultaneously. The present study determined 53 IT project risk factors on the basis of literature and expert group discussions. Additionally, this study presented clustering analysis based on the data of 140 project managers. The IT project risk factor classification framework was divided into four areas (HIHF, HILF, LIHF, and LILF). The present results can be used to help IT project managers establish effective risk management strategies and reduce IT project failures. This study also provides academic implication because it considers both the probability of occurrence and the degree of influence of risk factors.

The Tool to Design Sustainable Business Models: A Case Study for the Social Ventures (지속가능한 비즈니스모델 설계 도구: 소셜벤처 사례를 중심으로)

  • Park, JaeWhan;Jeon, Hyejin
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.14 no.1
    • /
    • pp.187-198
    • /
    • 2019
  • The purpose of this study is to seek ways of utilizing TLBMC by understanding business model of social ventures that are accompanied by social and environmental as well as economic missions. In order to achieve this, business models from economic, environmental and social perspectives will be analyzed, and we seek to enhance sustainability of social venture entrepreneurs. As the analysis tool, TLBMC(Triple Layered Business Model Canvas) expands upon the business model canvas that is widely utilized and recognizes economical terms. The TLBMC is proposed by Joyce, A., & Paquin, R. L.(2016) to help achieve a holistic view with horizontal and vertical associations. The study tries to overcome limitations of previous studies and observe a variety of economic, environmental, and social perspectives that social ventures should have with the TLBMC. As a result, it has the following implications; Firstly, creating separate social, environmental and economic business model canvas helps a business to have a holistic approach. Secondly, it was found that social venture characteristics of environmental and social perspectives were applied in practice. Lastly, we have established experience data on social venture business model. This study focuses on the opinions, the meanings and the subjective views of the participants. As a result, conclusions are drawn by the researchers ' assertions and has limitations as a research on case studies. However, this study will help people who are preparing or studying social ventures to have economic, environmental, and social perspectives. Also, redefinition of the direction and value of entrepreneurs operating social ventures, such as vision and mission, will help clarify the roles and responsibility of organizations. As a fundamental step for future empirical studies, this study could be the base for social venture business model studies.