• Title/Summary/Keyword: 인터넷 정보 신뢰도

Search Result 1,152, Processing Time 0.034 seconds

Convergence of Information Technology and Corporate Strategy (정보기술과 기업전략의 융합에 관한 연구)

  • Kim, Lark Sang
    • Journal of the Korea Convergence Society
    • /
    • v.6 no.6
    • /
    • pp.17-26
    • /
    • 2015
  • Firms that have adopted internet technology have been confused by distorted market signals. It is natural to look at marketplace outcomes for guidance, when confronted with a new business phenomenon. However, market signals can be unreliable in the early states of any important new information technology. New technologies trigger rampant experimentation, and the experimentation is often unsustainable. As a result, market behavior is distorted and must be interpreted cautiously. In Chapter 1, we review a concept of business model and roles of strategies in a business model. In Chapter 2, we discuss a strategic auditing method for analyzing market/channel positioning, product/service positioning, value chain/value network positioning and external environmental factors. In chapter 3, we introduces major frameworks for understanding factors forming strategies. The strategic grid model categorizes four quadrants depending on the level of impacts of information technology on operation and strategy. The strategic alignment model presents a new method of assessing an alignment of information technology and business throughout all elements of a business model. In this research, we review the concept of a business model. This research introduces factors that shape strategies and new frameworks for understanding these factors. The research objective of this manuscript is to present a guidance for firms how to use information technology for attaining sustainable competitive advantages.

A Study on Geospatial Information Role in Digital Twin (디지털트윈에서 공간정보 역할에 관한 연구)

  • Lee, In-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.268-278
    • /
    • 2021
  • Technologies that are leading the fourth industrial revolution, such as the Internet of Things (IoT), big data, artificial intelligence (AI), and cyber-physical systems (CPS) are developing and generalizing. The demand to improve productivity, economy, safety, etc., is spreading in various industrial fields by applying these technologies. Digital twins are attracting attention as an important technology trend to meet demands and is one of the top 10 tasks of the Korean version of the New Deal. In this study, papers, magazines, reports, and other literature were searched using Google. In order to investigate the contribution or role of geospatial information in the digital twin application, the definition of a digital twin, we investigated technology trends of domestic and foreign companies; the components of digital twins required in manufacturing, plants, and smart cities; and the core techniques for driving a digital twin. In addition, the contributing contents of geospatial information were summarized by searching for a sentence or word linked between geospatial-related keywords (i.e., Geospatial Information, Geospatial data, Location, Map, and Geodata and Digital Twin). As a result of the survey, Geospatial information is not only providing a role as a medium connecting objects, things, people, processes, data, and products, but also providing reliable decision-making support, linkage fusion, location information provision, and frameworks. It was found that it can contribute to maximizing the value of utilization of digital twins.

The Future of Radio and its Role in the Era of Smart Media (스마트미디어 시대 속 라디오의 미래와 역할 고찰)

  • KWON, Youngsung;SONG, Haeryong
    • Trans-
    • /
    • v.1
    • /
    • pp.117-139
    • /
    • 2016
  • Radio, the first broadcasting medium in history, is also the first mobile medium that meets the currently mobile ecology based on mobile communications network. As a result, it is easily approachable to consumers, can easily engage individual consumers, and its program contents have a huge appealing power to individual listeners, allowing it to form intimacy with audiences at the closest distance. However, the listening rating of radio has decreased greatly because it has experienced various changes by many other competitive media such as TV and internet and it has been influenced by relative constant hypothesis. Also, radio now faces a bigger competition due to the emergence of smartphone. In this circumstance, radio showed movements to evolve into a digital radio that presents improved sound, strengthened reception power, and increased number of channels, but it suddenly changed to DMB and portable multimedia DMB is having huge problems in its marketability due to smartphone. Yet, the listening rating of analogue radio broadcasting that remained unchanged was 13.99% in 2014, an increase by 47% from 2011, and the percentage of listeners under the age of 18 increased by 2.4 times from 2011 to 2014, which was a unique and interesting phenomenon. Accordingly, this paper compared the characteristics of internet and radio that have the traits of daily life, information, individuality, participatory, adventurousness, alternative media, expertise, and sound media. The paper then examined the listening method of radio, in which the direct groundwave antenna reception through a vehicular device is the most common form during the use of transportation means. Finally, it sought to investigate the future of radio based on the understanding of the increase in radio listening ratings, especially by comparing it to the characteristics of smart generation that focus on smartphone and the internet The study results demonstrated that entertainment and amusements are attempting at changes while they used to be obtained selectively by the smart generation from fragmentary information. In addition, radio is expected to become an influential medium in the future through its advantages of 'selected information' and reliability. However, considering such possibilities, radio needs to build the expertise and reliability of broadcasting contents much more at the same time as its digitalization, and it will be able to have its own competitiveness by focusing on various experiences and cultural exposures.

  • PDF

Implementation of the Personal Information Infringement Detection Module in the HTML5 Web Service Environment (HTML5 웹 서비스 환경에서의 개인정보 침해 탐지 모듈 구현)

  • Han, Mee Lan;Kwak, Byung Il;Kim, Hwan Kuk;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.1025-1036
    • /
    • 2016
  • The conversion of the international standard web utilization HTML5 technology is being developed for improvement of the internet environment based on nonstandard technology like ActiveX. Hyper Text Markup Language 5 (HTML5) of basic programming language for creating a web page is designed to consider the security more than HTML4. However, the range of attacks increased and a variety of security threats generated from HTML4 environment inherited by new HTML5 API. In this paper, we focus on the script-based attack such as CSRF (Cross-Site Request Forgery), Cookie Sniffing, and HTML5 API such as CORS (Cross-Origin Resource Sharing), Geolocation API related with the infringement of the personal information. We reproduced the infringement cases actually and embodied a detection module of a Plug-in type diagnosed based on client. The scanner allows it to detect and respond to the vulnerability of HTML5 previously, thereby self-diagnosing the reliability of HTML5-based web applications or web pages. In a case of a new vulnerability, it also easy to enlarge by adding another detection module.

The Design and Implementation of e-BCOS for e-Business Component System (e-비즈니스 컴포넌트 시스템 설계 및 구현)

  • Choi, Ha-Jung;Kim, Haeng-Kon
    • The KIPS Transactions:PartD
    • /
    • v.10D no.1
    • /
    • pp.85-100
    • /
    • 2003
  • Today's computing system has expanded its application to business trade and distributed work transactions using the Internet. As the demand for more flexible, adaptable, extensible, and robust web-based enterprise, these application development has been gradually expanded based on reusable, independent, and portable components. Component Based Development (CBD) works by developing and evolving software from selected reusable software components and then assembling them within appropriate software architecture. However, it requires an increase in cost to build new components as well as the necessary effort to develop of the business requirement these components. Standardized component models are required as well from the perspective of systems in order to support rapid and exact component information transmission on the web. In this paper, we describe the e-Business Component Development with agent for rapid application development on the web that correspond to the demands of users in the business domain. We design and implement the specifications of e-business components by combining these demands. In order to improve the agent register and retrieval, we propose the intelligent search and register agents, which can conduct more precise searching and specializing for components. The system enables the locating of user's frequently used components through an agent involving register and retrieval, as well as rapid procedures for registers The e-BCOS (e-Business Component System) is the agent system for the user to register distributed components and to search for components Information. The e-BCOS increases reusability through the e-business component development of distributed components in the business domain. For the share and delivery, specification with XML is acceptable to user's variable order e-BCOS Includes the effective investment, timeliness, reliability, efficiency, and maintenance effort by with agent.

The Analysis of Kinetic Parameters for BNR Process Simulation in Domestic Wastewater (국내하수에 적합한 BNR 공정 시뮬레이션을 위한 최적 동력학적 계수 산출)

  • Kim, Dae-Sung;Park, Myung-Gyun;Ahn, Ho-Chul;Ahn, Won-Sik;Lee, Eui-Sin
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2006.05a
    • /
    • pp.1385-1390
    • /
    • 2006
  • 외국에서 ASM 모델의 BNR 적용 연구결과를 국내 하수에 적용하기에는 하수농도, 온도, 슬러지농도 등이 국내와는 달라 적용상 무리가 있다. 본 연구에서 BNR 시뮬레이션을 위한 입력 자료로 활용되는 인자들은 IAWPRC task group에서 제안하는 값들을 사용하되 국내 하수성상에서 필요로 하는 인자들은 직접 실험을 통하여 부분적으로 구해냄으로써 모델 시뮬레이션의 신뢰도를 높이고자 하였다. F/M비의 변화량과 1/SRT과의 관계로부터, 종속영양미생물 생산계수 $Y_H$값을 구한결과, 0.40mg VSS/mg COD였다. 이것을 ASM No.2d에 적용하기 위하여 mg cell COD formed/mg COD oxidized 단위로 환산한 결과 0.58을 나타냈다. H 하수처리장의 1차 침전지 하수를 이용하여 호기성상태에서 OUR Test를 통한 미생물에 의한 유기물 섭취시 산소섭취율 변화를 측정하였다. 호기성상태와 무산소상태에서 구한 쉽게 분해되는 용존성유기물(Ss)값을 비교해보면 각각 35.5mg/L와 39.9mg/L로 약간의 차이는 있으나 유사한 값을 보여주고 있다. 시뮬레이션을 위한 동력학적 계수 중 무산소 상태에서 종속영양미생물의 ${\mu}_{max,H}$$3.56d^{-1}$로 나타났고, 호기성상태에서는 구하면 ${\mu}_{max,H}$$4.2d^{-1}$로 산출되었다. 종속영양미생물의 사멸계수 $b_H$를 구하기 위한 실험에서 초기 OUR의 10%이내가 될 때까지 걸린 시간은 7일정도가 걸렸으며, 사멸률 $b_H$$0.043hr^{-1}$로 나타났다. 독립영양미생물의 최대비성장률 ${\mu}_{max,A}$는 최대암모니아 섭취률을 이용하여 구한 결과 $0.65d^{-1}$로 나타났다.EX>$60%{\sim}87%$가 수심 10m 이내에 분포하였고, 녹조강과 남조강이 우점하는 하절기에는 5m 이내에 주로 분포하였다. 취수탑 지점의 수심이 연중 $25{\sim}35m$를 유지하는 H호의 경우 간헐식 폭기장치를 가동하는 기간은 물론 그 외 기간에도 취수구의 심도를 표층 10m 이하로 유지 할 경우 전체 조류 유입량을 60% 이상 저감할 수 있을 것으로 조사되었다.심볼 및 색채 디자인 등의 작업이 수반되어야 하며, 이들을 고려한 인터넷용 GIS기본도를 신규 제작한다. 상습침수지구와 관련된 각종 GIS데이타와 각 기관이 보유하고 있는 공공정보 가운데 공간정보와 연계되어야 하는 자료를 인터넷 GIS를 이용하여 효율적으로 관리하기 위해서는 단계별 구축전략이 필요하다. 따라서 본 논문에서는 인터넷 GIS를 이용하여 상습침수구역관련 정보를 검색, 처리 및 분석할 수 있는 상습침수 구역 종합정보화 시스템을 구축토록 하였다.N, 항목에서 보 상류가 높게 나타났으나, 철거되지 않은 검전보나 안양대교보에 비해 그 차이가 크지 않은 것으로 나타났다.의 기상변화가 자발성 기흉 발생에 영향을 미친다고 추론할 수 있었다. 향후 본 연구에서 추론된 기상변화와 기흉 발생과의 인과관계를 확인하고 좀 더 구체화하기 위한 연구가 필요할 것이다.게 이루어질 수 있을 것으로 기대된다.는 초과수익률이 상승하지만, 이후로는 감소하므로, 반전거래전략을 활용하는 경우 주식투자기간은 24개월이하의 중단기가 적합함을 발견하였다. 이상의 행태적 측면과 투자성과측면의 실증결과를 통하여 한국주식시장에 있어서 시장수익률을 평균적으로 초과할 수 있는 거래전략은 존재하므로 이러한 전략을 개발 및 활용할 수 있으며, 특히, 한국주식시장에 적합한 거래전략은 반전거래전략이고, 이 전략의 유용성은 투자자가 설정한 투자기간보다 더욱 긴 분석기간의 주식가격정보에 의하여 최대한 발휘될 수 있음을 확인하였다.(M1), 무역적자의 폭, 산업의 생산

  • PDF

A Study on the Influence of Information Security on Consumer's Preference of Android and iOS based Smartphone (정보보안이 안드로이드와 iOS 기반 스마트폰 소비자 선호에 미치는 영향)

  • Park, Jong-jin;Choi, Min-kyong;Ahn, Jong-chang
    • Journal of Internet Computing and Services
    • /
    • v.18 no.1
    • /
    • pp.105-119
    • /
    • 2017
  • Smartphone users hit over eighty-five percentage of Korean populations and personal private items and various information are stored in each user's smartphone. There are so many cases to propagate malicious codes or spywares for the purpose of catching illegally these kinds of information and earning pecuniary gains. Thus, need of information security is outstanding for using smartphone but also user's security perception is important. In this paper, we investigate about how information security affects smartphone operating system choices by users. For statistical analysis, the online survey with questionnaires for users of smartphones is conducted and effective 218 subjects are collected. We test hypotheses via communalities analysis using factor analysis, reliability analysis, independent sample t-test, and linear regression analysis by IBM SPSS statistical package. As a result, it is found that hardware environment influences on perceived ease of use. Brand power affects both perceived usefulness and perceived ease of use and degree of personal risk-accepting influences on perception of smartphone spy-ware risk. In addition, it is found that perceived usefulness, perceived ease of use, degree of personal risk-accepting, and spy-ware risk of smartphone influence significantly on intention to purchase smartphone. However, results of independent sample t-test for each operating system users of Android or iOS do not present statistically significant differences among two OS user groups. In addition, each result of OS user group testing for hypotheses is different from the results of total sample testing. These results can give important suggestions to organizations and managers related to smartphone ecology and contribute to the sphere of information systems (IS) study through a new perspective.

A Study on Touchless Finger Vein Recognition Robust to the Alignment and Rotation of Finger (손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구)

  • Park, Kang-Ryoung;Jang, Young-Kyoon;Kang, Byung-Jun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.275-284
    • /
    • 2008
  • With increases in recent security requirements, biometric technology such as fingerprints, faces and iris recognitions have been widely used in many applications including door access control, personal authentication for computers, internet banking, automatic teller machines and border-crossing controls. Finger vein recognition uses the unique patterns of finger veins in order to identify individuals at a high level of accuracy. This paper proposes new device and methods for touchless finger vein recognition. This research presents the following five advantages compared to previous works. First, by using a minimal guiding structure for the finger tip, side and the back of finger, we were able to obtain touchless finger vein images without causing much inconvenience to user. Second, by using a hot mirror, which was slanted at the angle of 45 degrees in front of the camera, we were able to reduce the depth of the capturing device. Consequently, it would be possible to use the device in many applications having size limitations such as mobile phones. Third, we used the holistic texture information of the finger veins based on a LBP (Local Binary Pattern) without needing to extract accurate finger vein regions. By using this method, we were able to reduce the effect of non-uniform illumination including shaded and highly saturated areas. Fourth, we enhanced recognition performance by excluding non-finger vein regions. Fifth, when matching the extracted finger vein code with the enrolled one, by using the bit-shift in both the horizontal and vertical directions, we could reduce the authentic variations caused by the translation and rotation of finger. Experimental results showed that the EER (Equal Error Rate) was 0.07423% and the total processing time was 91.4ms.

Decision Supporting System for Shadow Mask′s Development Using Rule and Case (Rule과 Case를 활용한 설계 의사결정 지원 시스템)

  • 김민성;진홍기;정사범;손기목;예병진
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2002.05a
    • /
    • pp.315-322
    • /
    • 2002
  • 최근에 경험적 지식을 체계화하는 방법으로 사례기반추론(CBR: Case Based Reasoning) 및 규칙기반추론(RBR: Rule Based Reasoning)이 여러 분야에서 이용되고 있다. CBR과 RBR이 각각 활용되기도 하지만 문제 해결의 정확성을 높이기 위해 복합된 형태로 사용되기도 하고, 흑은 효과적으로 문제를 해결하기 위해 문제 해결 단계별로 각각 사용되기도 한다 또한 데이터에서 지식을 추출하기 위한 세부 알고리즘으로는 인공지능과 통계적 분석기법 등이 활발하게 연구 및 적용되고 있다. 본 연구는 모니터의 핵심 부품인 섀도우마스크(Shadow Mask)를 개발하는데 있어 도면 협의부터 설계가지의 과정에 CBR과 RBR을 활용하고 발생되는 데이터를 이용하여 진화(Evolution)하는 지식기반시스템(Knowledge Based System)으로 구축하는 것을 목적으로 하고 있다. 특히 도면 협의시 인터넷상에 웹서버 시스템을 통하여 규격 (User Spec.)을 생성하고 이를 이용하여 자동으로 도면이 설계되도록 하고 저장된 사례들을 공유할 수 있도록 하여 도면 검토 시간이 단축되고 검토의 정확성을 기할 수 있어 실패비용을 감소시켰다. 그리고 실제 설계시 CBR과 RBR을 활용하여 자동설계를 할 수 있게 하였고 현장에서 발생되는 데이터를 지식화하여 유사사례 설계가 가능하도록 하였다. 지식기반시스템은 신속한 도면 검토가 가능하므로 인원 활용이 극대화되고, 섀도우 마스크 설계자와 마스터 패턴 설계자 사이의 원활한 의사소통을 통해 고객과의 신뢰성 확보와 신인도 향상을 기대할 수 있는 효과가 있다. 그리고 고급설계자에게만 의지되어온 것을 어느 정도 해결할 수 있고, 신입설계자에게는 훌륭한 교육시스템이 될 수 있다.한 도구임을 입증하였다는 점에서 큰 의의를 갖는다고 하겠다.운 선용품 판매 및 관련 정보 제공 등 해운 거래를 위한 종합적인 서비스가 제공되어야 한다. 이를 위해, 본문에서는 e-Marketplace의 효율적인 연계 방안에 대해 해운 관련 업종별로 제시하고 있다. 리스트 제공형, 중개형, 협력형, 보완형, 정보 연계형 등이 있는데, 이는 해운 분야에서 사이버 해운 거래가 가지는 문제점들을 보완하고 업종간 협업체제를 이루어 원활한 거래를 유도할 것이다. 그리하여 우리나라가 동북아 지역뿐만 아니라 세계적인 해운 국가 및 물류 ·정보 중심지로 성장할 수 있는 여건을 구축하는데 기여할 것이다. 나타내었다.약 1주일간의 포르말린 고정이 끝난 소장 및 대장을 부위별, 별 종양개수 및 분포를 자동영상분석기(Kontron Co. Ltd., Germany)로 분석하였다. 체의 변화, 장기무게, 사료소비량 및 마리당 종양의 개수에 대한 통계학적 유의성 검증을 위하여 Duncan's t-test로 통계처리 하였고, 종양 발생빈도에 대하여는 Likelihood ration Chi-square test로 유의성을 검증하였다. C57BL/6J-Apc$^{min/+}$계 수컷 이형접합체 형질전환 마우스에 AIN-76A 정제사료만을 투여한 대조군의 대장선종의 발생률은 84%(Group 3; 21/25례)로써 I3C 100ppm 및 300ppm을 투여한 경우에 있어서는 각군 모두 60%(Group 1; 12/20 례, Group 2; 15/25 례)로 감소하는 경향을 나타내었다. 대장선종의 마리당 발생개수에 있어서는 C57BL/6J-Apc$^{min/+}$계 수컷 이형접합체 형질전환 마우스에 AIN-76A 정제사료만을 투여한

  • PDF

Approaches to Applying Social Network Analysis to the Army's Information Sharing System: A Case Study (육군 정보공유체계에 사회관계망 분석을 적용하기 위한방안: 사례 연구)

  • GunWoo Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.5
    • /
    • pp.597-603
    • /
    • 2023
  • The paradigm of military operations has evolved from platform-centric warfare to network-centric warfare and further to information-centric warfare, driven by advancements in information technology. In recent years, with the development of cutting-edge technologies such as big data, artificial intelligence, and the Internet of Things (IoT), military operations are transitioning towards knowledge-centric warfare (KCW), based on artificial intelligence. Consequently, the military places significant emphasis on integrating advanced information and communication technologies (ICT) to establish reliable C4I (Command, Control, Communication, Computer, Intelligence) systems. This research emphasizes the need to apply data mining techniques to analyze and evaluate various aspects of C4I systems, including enhancing combat capabilities, optimizing utilization in network-based environments, efficiently distributing information flow, facilitating smooth communication, and effectively implementing knowledge sharing. Data mining serves as a fundamental technology in modern big data analysis, and this study utilizes it to analyze real-world cases and propose practical strategies to maximize the efficiency of military command and control systems. The research outcomes are expected to provide valuable insights into the performance of C4I systems and reinforce knowledge-centric warfare in contemporary military operations.