• Title/Summary/Keyword: 웹사이트 검색

Search Result 208, Processing Time 0.024 seconds

CONSUMER BEHAVIOR UNDER TIME-PRESSURE AT ELECTRONIC COMMERCE (전자상거래에서 시간압박감이 소비자 행동에 미치는 영향연구)

  • 박치관
    • Journal of Information Technology Application
    • /
    • v.3 no.4
    • /
    • pp.43-62
    • /
    • 2001
  • Time variable has been one of the most important ones to explain consumer behavior. Time-pressure could give some impact on decision making process, consuming process of goods, the frequency of purchasing activities and their behavior about after service. It is widely accepted that on-line shopping through Internet can overcome the time and space limitations consumers usually meet for their shopping activities. If that concept is true, on-line shopping through Internet might be an attractive way for those who feel high time pressure for their shopping activities. To test the impact of time pressure on consumer behavior at Electronic Commerce, this paper set three hypothesis. Questionnaire were distributed to married women around Taejon. Sample size were 73, 39 of which from women who have job, 34 who don't have job. The result of this paper might shed some light on the policy making to develop Internet shopping malls.

  • PDF

Development of an Organism-specific Protein Interaction Database with Supplementary Data from the Web Sources (다양한 웹 데이터를 이용한 특정 유기체의 단백질 상호작용 데이터베이스 개발)

  • Hwang, Doo-Sung
    • The KIPS Transactions:PartD
    • /
    • v.9D no.6
    • /
    • pp.1091-1096
    • /
    • 2002
  • This paper presents the development of a protein interaction database. The developed system is characterized as follows. First, the proposed system not only maintains interaction data collected by an experiment, but also the genomic information of the protein data. Secondly, the system can extract details on interacting proteins through the developed wrappers. Thirdly, the system is based on wrapper-based system in order to extract the biologically meaningful data from various web sources and integrate them into a relational database. The system inherits a layered-modular architecture by introducing a wrapper-mediator approach in order to solve the syntactic and semantic heterogeneity among multiple data sources. Currently the system has wrapped the relevant data for about 40% of about 11,500 proteins on average from various accessible sources. A wrapper-mediator approach makes a protein interaction data comprehensive and useful with support of data interoperability and integration. The developing database will be useful for mining further knowledge and analysis of human life in proteomics studies.

Improved Tag Selection for Tag-cloud using the Dynamic Characteristics of Tag Co-occurrence (태그 동시 출현의 동적인 특징을 이용한 개선된 태그 클라우드의 태그 선택 방법)

  • Kim, Du-Nam;Lee, Kang-Pyo;Kim, Hyoung-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.6
    • /
    • pp.405-413
    • /
    • 2009
  • Tagging system is the system that allows internet users to assign new meta-data which is called tag to article, photo, video and etc. for facilitating searching and browsing of web contents. Tag cloud, a visual interface is widely used for browsing tag space. Tag cloud selects the tags with the highest frequency and presents them alphabetically with font size reflecting their popularity. However the conventional tag selection method includes known weaknesses. So, we propose a novel tag selection method Freshness, which helps to find fresh web contents. Freshness is the mean value of Kullback-Leibler divergences between each consecutive change of tag co-occurrence probability distribution. We collected tag data from three web sites, Allblog, Eolin and Technorati and constructed the system, 'Fresh Tag Cloud' which collects tag data and creates our tag cloud. Comparing the experimental results between Fresh Tag Cloud and the conventional one with data from Allblog, our one shows 87.5% less overlapping average, which means Fresh Tag Cloud outperforms the conventional tag cloud.

Development of Geophysical Data Management System (물리탐사자료 데이터베이스 시스템 구축 연구)

  • Lee, Tai-Sup;Hwang, Hak-Soo;Sun, Hee-Duck;Koo, Sung-Bon;Song, Yaung-Soo
    • Geophysics and Geophysical Exploration
    • /
    • v.3 no.1
    • /
    • pp.25-32
    • /
    • 2000
  • The geophysical data management system was developed to meet both the increasing demands of geophysical data in the practical application of civil engineering, underground water survey, and environmental problems and needs for digital archive and quality control of geophysical data. The system for a data manager is developed under Client/Server (C/S) environment. This manager system is characterized by a relational geophysical database system using MS SQL-server, standardization of geophysical data format, the development of C/S interface program for Windows environment, and the development of transfer program module for the searched data. The system developed for a general user under the internet environment is characterized by Web service (URL:http//geophy.kigam.re.kr) and the development of plug-in module to visualize geophysical image data.

  • PDF

Security Analysis on Password Authentication System of Web Sites (웹사이트 패스워드 인증 시스템의 보안성 분석)

  • Noh, Heekyeong;Choi, Changkuk;Park, Minsu;Kim, Seungjoo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.12
    • /
    • pp.463-478
    • /
    • 2014
  • Portal site is not only providing search engine and e-mail service but also various services including blog, news, shopping, and others. The fact that average number of daily login for Korean portal site Naver is reaching 300 million suggests that many people are using portal sites. With the increase in number of users followed by the diversity in types of services provided by portal sites, the attack is also increasing. Most of studies of password authentication is focused on threat and countermeasures, however, in this study, we analyse the security threats and security requirement of membership, login, password reset first phase, password reset second phase. Also, we measure security score with common criteria of attack potential. As a result, we compare password authentication system of domestic and abroad portal sites.

Improving Classification Accuracy in Hierarchical Trees via Greedy Node Expansion

  • Byungjin Lim;Jong Wook Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.113-120
    • /
    • 2024
  • With the advancement of information and communication technology, we can easily generate various forms of data in our daily lives. To efficiently manage such a large amount of data, systematic classification into categories is essential. For effective search and navigation, data is organized into a tree-like hierarchical structure known as a category tree, which is commonly seen in news websites and Wikipedia. As a result, various techniques have been proposed to classify large volumes of documents into the terminal nodes of category trees. However, document classification methods using category trees face a problem: as the height of the tree increases, the number of terminal nodes multiplies exponentially, which increases the probability of misclassification and ultimately leads to a reduction in classification accuracy. Therefore, in this paper, we propose a new node expansion-based classification algorithm that satisfies the classification accuracy required by the application, while enabling detailed categorization. The proposed method uses a greedy approach to prioritize the expansion of nodes with high classification accuracy, thereby maximizing the overall classification accuracy of the category tree. Experimental results on real data show that the proposed technique provides improved performance over naive methods.

Social Perception of Disaster Safety Education for Migrant Youth based on Big Data (빅데이터를 통해 바라본 이주배경청소년 재난안전교육에 대한 사회적 인식)

  • Ying Jin;Sang Jeong
    • Journal of the Society of Disaster Information
    • /
    • v.20 no.2
    • /
    • pp.462-469
    • /
    • 2024
  • Purpose: This study aims to analyze data on disaster safety education for migrant youth and to examine the corresponding social perceptions. Method: Data on disaster safety education for migrant youth were collected and analyzed using Textom and Ucinet. The data used in the study were searched on portal websites from 2016 to 2023 using the keywords 'migrant youth+ disaster + safety education'. Result: The analysis results showed that 'education (306)' had the highest frequency, followed by 'safety (287)', 'school (97)', 'society (85)', and 'support (77)'. The keyword with the high degree of centrality, closeness centrality, and betweenness centrality were 'education', 'safety' and 'society'. 'Family' ranked higher in betweenness centrality than the rankings of frequency analysis, degree centrality and closeness centrality, indicating that 'family' plays a significant role as a mediator in the network of disaster safety education for migrant youth. Conclusion: By examining social awareness about disaster safety education for migrant youth, the findings will be used to develop policies and strategies for disaster safety education that consider the unique vulnerabilities of migrant youth in disaster situations.

A Study on the Improvement and Utilization of Public N-Day Vulnerability Databases (N-day 취약점 데이터베이스 개선 및 활용 방안 연구)

  • JongSeon Jeong;Jungheum Park
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.667-680
    • /
    • 2024
  • If the software is not updated after the vulnerability is disclosed, it can continue to be attacked. As a result, the importance of N-day detection is increasing as attacks that exploit vulnerabilities increase. However, there is a problem that it is difficult to find specific version information in the published vulnerability database, or that the wrong version or software is outputted. There is also a limitation in that the connection between the published vulnerability databases is not good. In order to overcome these limitations, this paper proposes a method of building information including comprehensive vulnerability information such as CVE, CPE, and Exploit Database into an integrated database. Furthermore, by developing a website for searching for vulnerabilities based on an integrated database built as a result of this study, it is effective in detecting and utilizing vulnerabilities in specific software versions and Windows operating systems.

A Study on the Local Governments' Autonomous Laws Regulating Social Insurance Premium for Medical Security (의료보장을 위한 지방정부의 사회보험료 지원 자치법규에 관한 고찰)

  • Kim, Jesun
    • The Korean Society of Law and Medicine
    • /
    • v.20 no.1
    • /
    • pp.203-242
    • /
    • 2019
  • Since 2006, local governments in Korea have been providing premiums for social insurance, such as the National Health Insurance System, for the health care of local residents. The purpose of this study is to analyze the content of self-governing legislation that defines these policies. The method of conducting the research was based on the articles of the ordinance related to the 'public health insurance premium' of the self-governing statutes published on the website of the National Law Information Center. As of May 2019, 201 municipalities have enacted ordinances to support public health insurance premiums. In the case of state local governments, 8 out of 17 were found, and in the case of basic local governments, 193 out of 226. The constitution of the ordinance consisted of purpose, time of enactment, type of social insurance premium, object of social insurance premium, amount of social insurance premium support, method and process of social insurance premium support, time of social insurance premium support. This study analyzed contents of these articles. Finally, this study presented issues that could be controversial from the policy and legal viewpoints and suggestions for improvement.

Research on the Usage of Electronic Information Resources of the Humanities Scholars in Korea (인문학자의 전자정보원 이용행태에 관한 연구)

  • Yoon, Cheong-Ok
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.43 no.2
    • /
    • pp.5-28
    • /
    • 2009
  • The purpose of this study is to investigate the use of the electronic information resources of humanities scholars in Korea and propose the planning of academic library and information services to serve their needs. To collect data, a postal survey was conducted during the period of November 2007 through January 2008. Out of 799 humanities scholars sampled from 25 universities, 132 responded with a completion rate of 16%. The major findings of this study are as follows: Firstly, the majority of humanities scholars distribute their time equally between research and education, and conduct independent research. Secondly, they use, to a certain degree, electronic information resources largely in text format, and depend upon the electronic collection of their academic libraries. Thirdly, with the exception of a couple of sources of electronic journal resources, the electronic resources that these humanities scholars regularly use vary so widely that none could be considered to be a common resource. Fourthly, they value the convenience of accessing and using electronic resources, but worry about the quality and scope of the contents. It is suggested that academic libraries (1) become the gateway for the electronic information that is available both inside and outside the library, (2) provide integrated search feature for and a 'single sign on' access to electronic resources, and (3) plan customized user education for specific subject fields in the humanities.