• Title/Summary/Keyword: 정보인지

Search Result 218,543, Processing Time 0.112 seconds

A Study on Pseudonym Combination for Pseudonymized Vehicle Records (가명화된 차량 운행기록의 가명결합 방안 연구)

  • Eunjin Kim;Brent Byunghoon Kang
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.427-430
    • /
    • 2024
  • 교통체계서비스는 안전한 교통 환경을 구축하는 것을 목표로 하여 차량, 도로, 기반 시설의 정보를 수집 및 처리하여 안전 교통정보를 제공한다. 교통체계서비스가 수집하는 차량 운행정보는 교통 안전 정보 외에도 다른 분야에서도 활용될 수 있으며 특히 다른 데이터와 결합하는 것으로 다양한 결과를 도출할 수 있어 연구, 통계 작성 등에 필요한 자료이다. 그러나 차량의 운행정보는 운전자의 개인정보를 포함하고 있어 운행정보 활용 시 가명화 및 가명결합이 필수적이다. 본 논문에서는 가명화된 운행정보를 가명결합하는데 발생하는 문제점을 설명하고 이러한 문제를 해결한 가명결합 방안을 연구하였다. 그 결과 교통체계서비스가 수집한 운행정보를 다른 기관의 데이터와 결합하여 활용할 수 있게 하여 개인정보를 보호하면서 데이터의 유용성을 활용하는데 기여할 것으로 예상한다.

A Study on Traffic Information Collection RFID Based (RFID 기반 교통정보 수집에 관한 연구)

  • Kim, Tae-Wook;Lee, Jae-Hoon;Oh, Hae-Seok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.05a
    • /
    • pp.1303-1305
    • /
    • 2007
  • 현재 정보통신 기술의 발달에 상응하여 지능형 교통 시스템(ITS)은 네트워크 기반으로 실시간 교통 정보를 제공하기 위해 CCTV, GPS, VDS, 루프 검지기, 영상 검지기 등과 같은 다양한 방법으로 교통 정보 수집이 이루어지고 있다. 또한 정확한 정보 제공을 위해 정보의 수집 및 가공에 대한 많은 연구들이 진행되고 있다. 본 논문에서는 텔레매틱스 기반의 효율적인 교통정보 수집을 위해 RFID 태그 정보를 이용하여 교통정보를 수집하여 보다 정확한 실시간 차량 정보를 제공하는 교통정보 수집 시스템에 관한 연구를 기술하고자 한다.

Investigating of Psychological Factors Affecting Information Security Compliance Intention: Convergent Approach to Information Security and Organizational Citizenship Behavior (정보보안 준수의도에 대한 사회심리적 요인 분석: 정보보안과 조직시민행동이론 융합)

  • Han, Jin-Young;Kim, Yoo-Jung
    • Journal of Digital Convergence
    • /
    • v.13 no.8
    • /
    • pp.133-144
    • /
    • 2015
  • In digital convergence environment, information security management plays crucial role in maintaining firms' competitiveness. Organizational citizenship behavior(OCB) enables informations security countermeasures to be more effectively worked by helping employees to have much knowledge of information security policy, by facilitating employees to participate in information security education/training. Thus, the purpose of this study is to investigate the mediating effect of OCB on the relationships between information security countermeasures and compliance intention. Questionary was designed based on prior information security research, and survey was conducted among companies' employees across the industry. Results showed that information security policy and information security education/training were found to be key predictors of compliance intention. In addition, OCB was proven to mediate the relationships between information security countermeasures and compliance intention.

A Study on the Government Full-text Information Disclosure System through the Survey on the Government Officials' Perceptions (원문정보 공개제도에 대한 공무원들의 인식조사 연구)

  • Jang, Bo-Seong
    • Journal of Korean Library and Information Science Society
    • /
    • v.47 no.1
    • /
    • pp.339-360
    • /
    • 2016
  • This study is intended to analyze the actual condition of operating the full-text information disclosure system of government and Officials' Perceptions. According to the results of analysis, the public servant group's level of full-text information disclosure system was high. With regard to the positive and negative function of full-text information disclosure, an expectation for positive function was high in the aspect of assuring the transparency of administration. And public servants were worried about an increase in the burden of administrative duties. With regard to factors in hindering the development of full-text information disclosure, it was shown that the percentage of clients' abuse and misuse of full-text information was the highest. For the activation of full-text information disclosure system, it is necessary to prepare measures for preventing the abuse and misuse of full-text information.

A Study on Academic Library User's Information Literacy (학술연구정보 이용자에 관한 연구: 정보요구, 정보이용행태, 정보활용능력을 중심으로)

  • Yoo, Jae-Ok
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.15 no.2
    • /
    • pp.241-254
    • /
    • 2004
  • This study reviews academic library users' information needs, use behaviors, and information literacy by examining previous literature related to academic library use study. The information academic library users want most is information about how to use library such as a circulation policy. Only about 10% of library users' information needs requires reference librarian's professional knowledge and skills. The sign and information system of the library should be improved and revised in order to reduce the redundant how-to questions. When academic library users attempt to do subject searches through online library system, they experience difficulties to find the right menu on the library's interface. The study recommends that special efforts should be made for user education for utilizing research information since user's information utilizing ability is unexpectedly low.

  • PDF

Survey on Personal Information Encryption Technology (개인정보 암호화 기술에 관한 연구)

  • Kim, Ji Hyun;Lee, Dong Hoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.769-772
    • /
    • 2012
  • Personal Information Article2 defines personal authentication information, secret information, bio information for personal information and it is stipulated under article29 that the one who have duties must take adequate technological, administrative, physical measures to prevent from illegal reading and sneaking. Also it is stipulated under information communication network law28(1), enforcement regulation9, Korea Communications Commitee notice. To satisfy this, the one who have to take security actions of personal information are required to take technological measures and establish positive measures to continuously manage it.The insurance of technological security is possible by encryption of personal information, secure management and operation of encryption key,taking personal information security level of providin access control of personal information reading and audit.In this paper, we will analyze various technologies of personal information encryption which are essencial component in technological security measuresof personal information. This paper will help choose which technological measures you should take in personal information security.

  • PDF

A design of Customized Community Service System based on user-behavior analysis on social network (소셜 네트워크 사용자 행위의 속성 분석을 통한 맞춤형 커뮤니티 서비스 시스템 설계)

  • Shin, Eun-se;Kim, Myung-june;Han, So-ra;Oh, Eun-ji;Lee, Kang-whan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.10a
    • /
    • pp.190-192
    • /
    • 2012
  • 최근 소셜 네트워크 서비스는 언제 어디서나 정보를 누구라도 손쉽게 전달하고 볼 수 있는 수단으로 각광받고 있다. 소셜 네트워크 서비스의 주요한 특징은 사람과 사람, 사람과 정보, 정보와 정보 간의 관계 네트워크로서, 사용자가 능동적으로 참여한다는 것이다. 하지만 범람하는 수많은 정보들 속에서 사용자가 직접 정보를 검색 및 분류해야 하는 과정은 사람과 정보간의 관계 네트워크 측면에서 소셜의 의미를 충족하지 못한다. 이러한 기존의 정보 활용법은 사용자의 선호도에 따른 맞춤형 정보의 수용과 공유를 제시하지 못하고 있다. 본 연구에서 설계된 사용자 맞춤형 서비스 시스템은 사용자의 상황인식 속성정보와 이에 따른 선호도를 평가하는 알고리즘을 기반으로 하여 보다 효율적인 커뮤니티 공간이 제공될 수 있는 맞춤형 커뮤니티 서비스 시스템을 설계 제안한다. 제안된 시스템에서는 소셜 네트워크 서비스에서 사용자가 텍스트를 읽거나 작성하는 행위를 바탕으로 사용자의 관심사를 제공된 알고리즘으로 분석하여 사용자의 선호도에 따른 정보를 분류하고, 사용자의 인적정보로부터 선별한 유사 사용자들을 통해 신뢰성이 높은 정보를 우선적으로 선출한다. 따라서 사용자의 속성과 선호도를 고려한 상황인식 정보를 제공함으로써 사용자가 직접 정보를 검색 및 분류하는 과정을 단축하고 정보의 신뢰성을 향상할 수 있는 방법을 제시한다. 이러한 상황인식 기반의 맞춤형 커뮤니티 서비스 시스템은 실시간으로 많은 정보가 공유되는 서비스에서 다양하게 적용되어 인터넷 신문, 타겟 마케팅 광고 등의 응용분야에서 다양한 정보제공 서비스 시스템으로 적용될 수 있을 것으로 본다.

  • PDF

Implementation of Web-based Information System for Full-text Processing (전문 처리를 위한 웹 기반 정보시스템 구현)

  • Kim, Sang-Do;Mun, Byeong-Ju;Ryu, Geun-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.6
    • /
    • pp.1481-1492
    • /
    • 1999
  • As Internet is popularized by the advent of Web concept having characteristics such as open network, user-friendly, and easy-usage, there are many changes in Information systems providing various information. Web is rapidly transferred traditional Information systems to Web-based Information systems, because it provides not only text information but also multimedia information including image, audio, video, and etc. Also, as information contents were changed from text-based simple abstract information to full-text information, there was appeared various document formats processing Full-text information. But, as they naturally demand large systems memory, long processing time, broader transmission bandwidth, and etc, estimating of these factors is necessary when constructing information systems. This paper focuses on how to design and construct information system processing full-text information and providing function of an integrated document. Primarily, we should review standard document format which is used or developed, and any document format is appropriate to process full-text information in review with viewpoint of information system. Also, practically we should construct information system providing full-text information based on PDF document.

  • PDF

Information Technology Strategy and Architecture: An Explanatory Contingency Framework (정보기술전략과 정보기술아키텍쳐: 설명적 상황이론 프레임워크)

  • Yum, Ji-Hwan
    • Information Systems Review
    • /
    • v.4 no.2
    • /
    • pp.81-94
    • /
    • 2002
  • The study employs the conceptual framework of the strategic success paradigm developed by Ansoff (1990). The strategic success paradigm denotes that optimal performance will be attained when the level of environmental turbulence is aligned with the strategic aggressiveness and organizational capability. Based on the paradigm, authors developed the concept of IT (information technology) aggressiveness (IT aggressiveness henceforth) and capability (IT capability henceforth). In order to clarify the different concept of IT aggressiveness and capability, the author brought the concept of IT architecture. The difference of capability and architecture lies in the depth of technical considerations. Where capability refers attitudinal aspects of managers, architecture emphasizes technical capacity of the organization as a whole. The study validated the need for alignment among IT architecture, environmental turbulence and IT aggressiveness. The imbalance between IT strategy and IT architecture (such as a higher level of IT aggressiveness but a lower level of IT architecture, or vice versa) has a marginal contribution to the organizational IT performance. The alignment among organizational environmental turbulence, IT aggressiveness, and IT architecture resulted in an optimal level of IT performance especially in a turbulent environment.