• Title/Summary/Keyword: Business of Security

Search Result 1,865, Processing Time 0.025 seconds

Using CR System at the Department of Radiation Oncology PACS Evaluation (방사선 종양학과에서 CR System을 이용한 PACS 유용성 평가)

  • Hong, Seung-Il;Kim, Young-Jae
    • Journal of the Korean Society of Radiology
    • /
    • v.6 no.2
    • /
    • pp.143-149
    • /
    • 2012
  • Today each hospital is trend that change rapidly by up to date, digitization and introducing newest medical treatment equipment. So, we introduce new CR system and supplement film system's shortcoming and PACS, EMR, RTP system's network that is using in hospital harmoniously and accomplish quality improvement of medical treatment and service elevation about business efficiency enlargement and patient Accordingly, we wish to introduce our case that integrate reflex that happen with radiation oncology here upon to PACS using CR system and estimate the availability. We measured that is Gantry, Collimator Star Shot, Light vs. Radiation, HDR QA(Dwell position accuracy) with Medical LINAC(MEVATRON-MX) Then, PACS was implemented on the digital images on the monitor that can be confirmed through the QA. Also, for cooperation with OCS system that is using from present source and impose code that need in treatment in each treatment, did so that Order that connect to network, input to CR may appear, did so that can solve support data mistake (active Pinacle's case supports DICOM3 file from present source but PACS does not support DICOM3 files.) of Pinacle and PACS that is Planning System and look at Planning premier in PACS. All image and data constructed integration to PACS as can refer and conduct premier in Hospital anywhere using CR system. Use Dosimetry IP in Filmless environment and QA's trial such as Light/Radition field size correspondence, gantry rotation axis' accuracy, collimator rotation axis' accuracy, brachy therapy's Dwell position check is available. Business efficiency by decrease and so on of unnecessary human strength consumption was augmented accordingly with session shortening as that integrate premier that is neted with radiation oncology using CR system to PACS. and for the future patient information security is essential.

Development Process and Methods of Audit and Certification Toolkit for Trustworthy Digital Records Management Agency (신뢰성 있는 전자기록관리기관 감사인증도구 개발에 관한 연구)

  • Rieh, Hae-young;Kim, Ik-han;Yim, Jin-Hee;Shim, Sungbo;Jo, YoonSun;Kim, Hyojin;Woo, Hyunmin
    • The Korean Journal of Archival Studies
    • /
    • no.25
    • /
    • pp.3-46
    • /
    • 2010
  • Digital records management is one whole system in which many social and technical elements are interacting. To maintain the trustworthiness, the repository needs periodical audit and certification. Thus, individual electronic records management agency needs toolkit that can be used to self-evaluate their trustworthiness continuously, and self-assess their atmosphere and system to recognize deficiencies. The purpose of this study is development of self-certification toolkit for repositories, which synthesized and analysed such four international standard and best practices as OAIS Reference Model(ISO 14721), TRAC, DRAMBORA, and the assessment report conducted and published by TNA/UKDA, as well as MoRe2 and current national laws and standards. As this paper describes and demonstrate the development process and the framework of this self-certification toolkit, other electronic records management agencies could follow the process and develop their own toolkit reflecting their situation, and utilize the self-assessment results in-house. As a result of this research, 12 areas for assessment were set, which include (organizational) operation management, classification system and master data management, acquisition, registration and description, storage and preservation, disposal, services, providing finding aids, system management, access control and security, monitoring/audit trail/statistics, and risk management. In each 12 area, the process map or functional charts were drawn and business functions were analyzed, and 54 'evaluation criteria', consisted of main business functional unit in each area were drawn. Under each 'evaluation criteria', 208 'specific evaluation criteria', which supposed to be implementable, measurable, and provable for self-evaluation in each area, were drawn. The audit and certification toolkit developed by this research could be used by digital repositories to conduct periodical self-assessment of the organization, which would be used to supplement any found deficiencies and be used to reflect the organizational development strategy.

A Study on the Influence of IT Education Service Quality on Educational Satisfaction, Work Application Intention, and Recommendation Intention: Focusing on the Moderating Effects of Learner Position and Participation Motivation (IT교육 서비스품질이 교육만족도, 현업적용의도 및 추천의도에 미치는 영향에 관한 연구: 학습자 직위 및 참여동기의 조절효과를 중심으로)

  • Kang, Ryeo-Eun;Yang, Sung-Byung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.4
    • /
    • pp.169-196
    • /
    • 2017
  • The fourth industrial revolution represents a revolutionary change in the business environment and its ecosystem, which is a fusion of Information Technology (IT) and other industries. In line with these recent changes, the Ministry of Employment and Labor of South Korea announced 'the Fourth Industrial Revolution Leader Training Program,' which includes five key support areas such as (1) smart manufacturing, (2) Internet of Things (IoT), (3) big data including Artificial Intelligence (AI), (4) information security, and (5) bio innovation. Based on this program, we can get a glimpse of the South Korean government's efforts and willingness to emit leading human resource with advanced IT knowledge in various fusion technology-related and newly emerging industries. On the other hand, in order to nurture excellent IT manpower in preparation for the fourth industrial revolution, the role of educational institutions capable of providing high quality IT education services is most of importance. However, these days, most IT educational institutions have had difficulties in providing customized IT education services that meet the needs of consumers (i.e., learners), without breaking away from the traditional framework of providing supplier-oriented education services. From previous studies, it has been found that the provision of customized education services centered on learners leads to high satisfaction of learners, and that higher satisfaction increases not only task performance and the possibility of business application but also learners' recommendation intention. However, since research has not yet been conducted in a comprehensive way that consider both antecedent and consequent factors of the learner's satisfaction, more empirical research on this is highly desirable. With the advent of the fourth industrial revolution, a rising interest in various convergence technologies utilizing information technology (IT) has brought with the growing realization of the important role played by IT-related education services. However, research on the role of IT education service quality in the context of IT education is relatively scarce in spite of the fact that research on general education service quality and satisfaction has been actively conducted in various contexts. In this study, therefore, the five dimensions of IT education service quality (i.e., tangibles, reliability, responsiveness, assurance, and empathy) are derived from the context of IT education, based on the SERVPERF model and related previous studies. In addition, the effects of these detailed IT education service quality factors on learners' educational satisfaction and their work application/recommendation intentions are examined. Furthermore, the moderating roles of learner position (i.e., practitioner group vs. manager group) and participation motivation (i.e., voluntary participation vs. involuntary participation) in relationships between IT education service quality factors and learners' educational satisfaction, work application intention, and recommendation intention are also investigated. In an analysis using the structural equation model (SEM) technique based on a questionnaire given to 203 participants of IT education programs in an 'M' IT educational institution in Seoul, South Korea, tangibles, reliability, and assurance were found to have a significant effect on educational satisfaction. This educational satisfaction was found to have a significant effect on both work application intention and recommendation intention. Moreover, it was discovered that learner position and participation motivation have a partial moderating impact on the relationship between IT education service quality factors and educational satisfaction. This study holds academic implications in that it is one of the first studies to apply the SERVPERF model (rather than the SERVQUAL model, which has been widely adopted by prior studies) is to demonstrate the influence of IT education service quality on learners' educational satisfaction, work application intention, and recommendation intention in an IT education environment. The results of this study are expected to provide practical guidance for IT education service providers who wish to enhance learners' educational satisfaction and service management efficiency.

The Character and Negotiability of Air Waybill (항공화물운송상(航空貨物運送狀)의 성질(性質)과 유통성(流通性))

  • Lee, Kang-Bin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.4
    • /
    • pp.65-85
    • /
    • 1992
  • The air waybill is supposed to be made out by the consignor. If the carrier makes it out, he is deemed, subject to proof to the contrary, to have done so on behalf of the consignor. The air waybill shall be made out in three original parts. The first part shall be marked "for the carrier", and shall be signed by the consignor. The second part shall be marked "for the consignee", it shall be signed by the consignor and by the carrier and shall accompany the goods. The third part shall be signed by the carrier and handed by him to the consignor, after the goods have been accepted. According to the original Warsow Convention article 8, the air waybill must contain 17 particulars or items. However, the Hague Protocol reduced to three the number of particulars required to appear on the air waybill. Only one item is obligatory, namely, the notice that the carriage is subject to the rules of the Warsaw Convention. The absence of the air waybill entails unlimited liability of the carrier because it deprives him of the right to avail himself of the provisions of the Warsaw Convention which exclude or limit his liability. The consignor shall be liable for all damages suffered by the carrier or any other person by reason of the irregularity, incorrectness or incompleteness of the particulars and statements in the air waybill. Although the contract of the carriage of goods by air is not a formal contract, the document of carriage is issued. The issue of air wayhill is not essential for the existence or validity of the contract, but serves merely as a means of proof. The Hague Protocol has lessened the consequences of the carrier's neglect to faithfully accomplish the required formalities. Henceforth, these formalities no longer constitute legal obligations. The air waybill is the consignment note used for the carriage of goods by air. It is often called an air consignment note and is not a document of title or transferable/negotiable instrument. It is basically a receipt for the goods for despatch and is prima facie evidence of the conditions of carriage. Each of the original parts of the air waybill has evidential value and possession of his part is a condition for the exercise by the consignor or cosignee of his rights under the contract of carriage. Oveall, it is an usage that under a documentary letter of credit, the consignee on the air waybill is the opening bank of the letter of credit, and the notify party is the importer who applied for the letter of credit. In Korea there is an usage as to process of cargo delivery in air transportation as follows: The carrier carries the cargo into the bonded area of the airport and gives both the notice of arrival of the cargo and the consignee's air waybill to the notify party who is the importer. Then the notify party obtains the Letter of Guarantee from the opening bank in exchange for reimbursing the amount of the letter of credit or tendering the security therefor to the opening bank. The notify party then presents this document to the customs authorities for the process of customs clearance. The opening bank becomes a consignee only to ensure repayment of the funds it has expended, and the only interest of the opening bank as consignee is the reimbursement of the money paid to the exporter under the documentary letter of credit. Just as the bill of lading in maritime law, the air waybill has always been considered negotiable although the Warsaw Convention does not emphasize this aspect of negotiability. However, the Hague Protocol article 4 corrected the situation by stating that "nothing in this Convention prevents the issue of a negotiable air waybill." This provision officially recognizes that the air waybill must meet the needs of the present day business circles by being a negotiable instrument. Meanwhile, Montreal Additional Protocol no. 4 has brought important changes. Registration by computer is acceptable and the parties to the contract of carriage are allowed to replace the air waybill with a receipt for the goods. In conclusion, as the Warsaw Convention has not details of provisions relating to the issuing of the negotiable air waybill, it is hoped that there should be supplement to the Warsaw Convention and establishment of international commercial usage with regard to the negotiable air waybill.

  • PDF

Extreme Job, How Will We Survive Since "Candlelight Protest"? -A Revival of Comic Mode and a Comedy Film in the Age of Self-Management (<극한직업>, '촛불혁명' 이후 어떻게 버티며 살아남을 것인가? -코믹 모드의 부활과 자기경영 시대의 코미디영화)

  • Chung, Young-Kwon
    • Journal of Popular Narrative
    • /
    • v.26 no.3
    • /
    • pp.221-254
    • /
    • 2020
  • This paper finds a solution in the social context which cannot be explained thoroughly by well-timed release date, revival of comedy films, and the attraction of Lee Byeong-heon's comedy etc. while it throws question of how the film, Extreme Job captivated 16 million audience. The incredible hits of Extreme Job cannot be explained by analyzing the text alone. After this essay investigates a function and a role of comedy as a public sphere, it examines people's desires and wishes in the comedy and other genres since 2008 when the conservative government has seized power. Since 2008 a series of dark tone's action thriller, social problem film, and disaster film have emerged, these genres showed absence of public security, crisis of democracy and criticism against rulling class. On the other hand, hit comedy films have showed escapism such as weepie, nostalgia, and fantasy at the same time, generally. Although Veteran (2015) is not full-blown comedy, after this film's big success, "comic mode" has gradually revived. A light tone's films which are truer to genre rules has started representing the wishes of people toward social reforms and changes. Meanwhile, "Candlelight Protest" served as a momentum to recover the democracy which has been in crisis, but it could not lead changes in economic and daily lives. Exreme Job can be read as a question how we will survive since "Candlight Protest." The lives of detectives as self-employed workers who has taken over a fried chicken restaurant for going undercover are appearances of ordinary persons who must survive in the edless conpetition. Furthermore, this film shows a dream of a "great success myth" which becomes well-known as a famous restaurant and a self-management such as brand-naming and an exapansion of franchise business. We can read ganster's chicken franchises as a huge distribution industry which disturbs market system by delivering drugs secretly. While applauses that we give to the police having identities of self-employed workers which sweeps the ganster are giving support to oridinary neighborhood like us, they are also wishes of people who long for the restoration of publicness of police in the market which is becoming increasingly privatized today. A significance of this essay is to examine Extreme Job in terms of the geography of film genres and the revival of comic mode sicne 2008 at the macro level, and is to read the film in the perspective of the problems of economic and daily lives which has been still unsolved since "Candlelight Protest" at the micro level.

A Study on the Complex Color Analysis by Industry for Signboard Improvement Project - Focused on the Jongno-gil, Dongsang-dong, Gimhae-si - (간판개선사업을 위한 업종별 복합 색채 분석 연구 - 김해시 동상동 종로길을 중심으로 -)

  • Park, Han Na;Son, Jeong Eun;Choi, In Kyu;Paik, Jin Kyung
    • Korea Science and Art Forum
    • /
    • v.37 no.4
    • /
    • pp.149-159
    • /
    • 2019
  • This research was started to identify the color status of signboards at the target site and suggest the direction of improvement for the signboard project in Dongsang-dong, Jongno-gil, a central area of the old city center of Gimhae. The area under study forms a depressed street atmosphere with old facilities, and is a typical type of old city center sign that needs to be rebuilt. The purpose of this study is to investigate prior research related to signage and similar signboard improvement cases, and then to identify the current status of colors by sorting out the casting, auxiliary and highlighted colors through the survey of the color of the signboard in the target area, and to propose a desirable direction for the future sign business based on the basis of these findings. This paper divided the target sections by industry and conducted a color analysis of signboards. The results and contents of the research are as follows. First, cast-colored signboards in general businesses showed a variety of primary color distributions with high L* values, on average, with high intensity and high chromaticity. Second, the auxiliary colors were mostly white or black in color-free, making a contrast between the casting colors. Third, the highlight was that a* value showed a high distribution in positive water plus and was mainly distributed in obsolescence, such as red or yellow, and color was used to reflect the characteristics of each store. However, the stores in the entire section lack unity because they were using colors that were higher in color than middle colors, which was causing the street's aesthetic look to be undermined. Based on the results of these studies, it is thought that the future color scheme for Gimhae's signature improvement project will limit the number of colors to a certain extent and give a sense of security and visual comfort to the use of colorlessness and obscurity around the representative colors of Gimhae.

An Analysis of IT Trends Using Tweet Data (트윗 데이터를 활용한 IT 트렌드 분석)

  • Yi, Jin Baek;Lee, Choong Kwon;Cha, Kyung Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.21 no.1
    • /
    • pp.143-159
    • /
    • 2015
  • Predicting IT trends has been a long and important subject for information systems research. IT trend prediction makes it possible to acknowledge emerging eras of innovation and allocate budgets to prepare against rapidly changing technological trends. Towards the end of each year, various domestic and global organizations predict and announce IT trends for the following year. For example, Gartner Predicts 10 top IT trend during the next year, and these predictions affect IT and industry leaders and organization's basic assumptions about technology and the future of IT, but the accuracy of these reports are difficult to verify. Social media data can be useful tool to verify the accuracy. As social media services have gained in popularity, it is used in a variety of ways, from posting about personal daily life to keeping up to date with news and trends. In the recent years, rates of social media activity in Korea have reached unprecedented levels. Hundreds of millions of users now participate in online social networks and communicate with colleague and friends their opinions and thoughts. In particular, Twitter is currently the major micro blog service, it has an important function named 'tweets' which is to report their current thoughts and actions, comments on news and engage in discussions. For an analysis on IT trends, we chose Tweet data because not only it produces massive unstructured textual data in real time but also it serves as an influential channel for opinion leading on technology. Previous studies found that the tweet data provides useful information and detects the trend of society effectively, these studies also identifies that Twitter can track the issue faster than the other media, newspapers. Therefore, this study investigates how frequently the predicted IT trends for the following year announced by public organizations are mentioned on social network services like Twitter. IT trend predictions for 2013, announced near the end of 2012 from two domestic organizations, the National IT Industry Promotion Agency (NIPA) and the National Information Society Agency (NIA), were used as a basis for this research. The present study analyzes the Twitter data generated from Seoul (Korea) compared with the predictions of the two organizations to analyze the differences. Thus, Twitter data analysis requires various natural language processing techniques, including the removal of stop words, and noun extraction for processing various unrefined forms of unstructured data. To overcome these challenges, we used SAS IRS (Information Retrieval Studio) developed by SAS to capture the trend in real-time processing big stream datasets of Twitter. The system offers a framework for crawling, normalizing, analyzing, indexing and searching tweet data. As a result, we have crawled the entire Twitter sphere in Seoul area and obtained 21,589 tweets in 2013 to review how frequently the IT trend topics announced by the two organizations were mentioned by the people in Seoul. The results shows that most IT trend predicted by NIPA and NIA were all frequently mentioned in Twitter except some topics such as 'new types of security threat', 'green IT', 'next generation semiconductor' since these topics non generalized compound words so they can be mentioned in Twitter with other words. To answer whether the IT trend tweets from Korea is related to the following year's IT trends in real world, we compared Twitter's trending topics with those in Nara Market, Korea's online e-Procurement system which is a nationwide web-based procurement system, dealing with whole procurement process of all public organizations in Korea. The correlation analysis show that Tweet frequencies on IT trending topics predicted by NIPA and NIA are significantly correlated with frequencies on IT topics mentioned in project announcements by Nara market in 2012 and 2013. The main contribution of our research can be found in the following aspects: i) the IT topic predictions announced by NIPA and NIA can provide an effective guideline to IT professionals and researchers in Korea who are looking for verified IT topic trends in the following topic, ii) researchers can use Twitter to get some useful ideas to detect and predict dynamic trends of technological and social issues.

An Intelligent Intrusion Detection Model Based on Support Vector Machines and the Classification Threshold Optimization for Considering the Asymmetric Error Cost (비대칭 오류비용을 고려한 분류기준값 최적화와 SVM에 기반한 지능형 침입탐지모형)

  • Lee, Hyeon-Uk;Ahn, Hyun-Chul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.4
    • /
    • pp.157-173
    • /
    • 2011
  • As the Internet use explodes recently, the malicious attacks and hacking for a system connected to network occur frequently. This means the fatal damage can be caused by these intrusions in the government agency, public office, and company operating various systems. For such reasons, there are growing interests and demand about the intrusion detection systems (IDS)-the security systems for detecting, identifying and responding to unauthorized or abnormal activities appropriately. The intrusion detection models that have been applied in conventional IDS are generally designed by modeling the experts' implicit knowledge on the network intrusions or the hackers' abnormal behaviors. These kinds of intrusion detection models perform well under the normal situations. However, they show poor performance when they meet a new or unknown pattern of the network attacks. For this reason, several recent studies try to adopt various artificial intelligence techniques, which can proactively respond to the unknown threats. Especially, artificial neural networks (ANNs) have popularly been applied in the prior studies because of its superior prediction accuracy. However, ANNs have some intrinsic limitations such as the risk of overfitting, the requirement of the large sample size, and the lack of understanding the prediction process (i.e. black box theory). As a result, the most recent studies on IDS have started to adopt support vector machine (SVM), the classification technique that is more stable and powerful compared to ANNs. SVM is known as a relatively high predictive power and generalization capability. Under this background, this study proposes a novel intelligent intrusion detection model that uses SVM as the classification model in order to improve the predictive ability of IDS. Also, our model is designed to consider the asymmetric error cost by optimizing the classification threshold. Generally, there are two common forms of errors in intrusion detection. The first error type is the False-Positive Error (FPE). In the case of FPE, the wrong judgment on it may result in the unnecessary fixation. The second error type is the False-Negative Error (FNE) that mainly misjudges the malware of the program as normal. Compared to FPE, FNE is more fatal. Thus, when considering total cost of misclassification in IDS, it is more reasonable to assign heavier weights on FNE rather than FPE. Therefore, we designed our proposed intrusion detection model to optimize the classification threshold in order to minimize the total misclassification cost. In this case, conventional SVM cannot be applied because it is designed to generate discrete output (i.e. a class). To resolve this problem, we used the revised SVM technique proposed by Platt(2000), which is able to generate the probability estimate. To validate the practical applicability of our model, we applied it to the real-world dataset for network intrusion detection. The experimental dataset was collected from the IDS sensor of an official institution in Korea from January to June 2010. We collected 15,000 log data in total, and selected 1,000 samples from them by using random sampling method. In addition, the SVM model was compared with the logistic regression (LOGIT), decision trees (DT), and ANN to confirm the superiority of the proposed model. LOGIT and DT was experimented using PASW Statistics v18.0, and ANN was experimented using Neuroshell 4.0. For SVM, LIBSVM v2.90-a freeware for training SVM classifier-was used. Empirical results showed that our proposed model based on SVM outperformed all the other comparative models in detecting network intrusions from the accuracy perspective. They also showed that our model reduced the total misclassification cost compared to the ANN-based intrusion detection model. As a result, it is expected that the intrusion detection model proposed in this paper would not only enhance the performance of IDS, but also lead to better management of FNE.

An Exploratory Study of REID Benefits for Apparel Retailing (의류소매업에서의 RFID 이점에 대한 탐색적 연구)

  • Kim, Hae-Jung;Kim, Eun-Young
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.30 no.12 s.159
    • /
    • pp.1697-1707
    • /
    • 2006
  • Relentless advances in information technology are constantly transforming market dynamics of the retail industry. RFID is an emerging innovative technology that can reduce labor costs, improve inventory control and increase sales by effective business processes. Apparel retailers need to recognize the benefits of RFID and identify critical success factors. By focusing on apparel retailers, this study attempts (1) to identify the reality of RFID associated with benefits; and (2) to prospect the implementation of RFID in apparel retailing. We conducted a focus group interview with selected six panels who were experts of retail industry in the United States to obtain data regarding RFID attributes. Content analysis was used to generate related excerpts and classify 31 attributes of RFID benefits from the meaningful 173 responses. For experience of RFID, retailers were familiar with RFID technology and expressed the belief that RFID basically would support an existing retail system for speed to markets. However, retailers addressed the level of experience with RFID technology that they were still in the early adoption stage among few innovative companies. The content analysis identified five dimensions of RFID benefits for apparel retailing: Visibility and Velocity, Revenue Enhancement, Customer Service, Security, and Employee Productivity. This result lends support to the belief that RFID has a significant potential to streamline supply chain management, store operation and customer service for apparel retailing. This study provides intellectual and managerial implications far practitioners and researchers by postulating the effective use of RFID in the apparel retail industry.

Personalized Recommendation System for IPTV using Ontology and K-medoids (IPTV환경에서 온톨로지와 k-medoids기법을 이용한 개인화 시스템)

  • Yun, Byeong-Dae;Kim, Jong-Woo;Cho, Yong-Seok;Kang, Sang-Gil
    • Journal of Intelligence and Information Systems
    • /
    • v.16 no.3
    • /
    • pp.147-161
    • /
    • 2010
  • As broadcasting and communication are converged recently, communication is jointed to TV. TV viewing has brought about many changes. The IPTV (Internet Protocol Television) provides information service, movie contents, broadcast, etc. through internet with live programs + VOD (Video on demand) jointed. Using communication network, it becomes an issue of new business. In addition, new technical issues have been created by imaging technology for the service, networking technology without video cuts, security technologies to protect copyright, etc. Through this IPTV network, users can watch their desired programs when they want. However, IPTV has difficulties in search approach, menu approach, or finding programs. Menu approach spends a lot of time in approaching programs desired. Search approach can't be found when title, genre, name of actors, etc. are not known. In addition, inserting letters through remote control have problems. However, the bigger problem is that many times users are not usually ware of the services they use. Thus, to resolve difficulties when selecting VOD service in IPTV, a personalized service is recommended, which enhance users' satisfaction and use your time, efficiently. This paper provides appropriate programs which are fit to individuals not to save time in order to solve IPTV's shortcomings through filtering and recommendation-related system. The proposed recommendation system collects TV program information, the user's preferred program genres and detailed genre, channel, watching program, and information on viewing time based on individual records of watching IPTV. To look for these kinds of similarities, similarities can be compared by using ontology for TV programs. The reason to use these is because the distance of program can be measured by the similarity comparison. TV program ontology we are using is one extracted from TV-Anytime metadata which represents semantic nature. Also, ontology expresses the contents and features in figures. Through world net, vocabulary similarity is determined. All the words described on the programs are expanded into upper and lower classes for word similarity decision. The average of described key words was measured. The criterion of distance calculated ties similar programs through K-medoids dividing method. K-medoids dividing method is a dividing way to divide classified groups into ones with similar characteristics. This K-medoids method sets K-unit representative objects. Here, distance from representative object sets temporary distance and colonize it. Through algorithm, when the initial n-unit objects are tried to be divided into K-units. The optimal object must be found through repeated trials after selecting representative object temporarily. Through this course, similar programs must be colonized. Selecting programs through group analysis, weight should be given to the recommendation. The way to provide weight with recommendation is as the follows. When each group recommends programs, similar programs near representative objects will be recommended to users. The formula to calculate the distance is same as measure similar distance. It will be a basic figure which determines the rankings of recommended programs. Weight is used to calculate the number of watching lists. As the more programs are, the higher weight will be loaded. This is defined as cluster weight. Through this, sub-TV programs which are representative of the groups must be selected. The final TV programs ranks must be determined. However, the group-representative TV programs include errors. Therefore, weights must be added to TV program viewing preference. They must determine the finalranks.Based on this, our customers prefer proposed to recommend contents. So, based on the proposed method this paper suggested, experiment was carried out in controlled environment. Through experiment, the superiority of the proposed method is shown, compared to existing ways.