• Title/Summary/Keyword: Drawing method

Search Result 1,342, Processing Time 0.028 seconds

Mobile Contents Transformation System Research for Personalization Service (개인화 서비스를 위한 모바일 콘텐츠 변환 시스템 연구)

  • Bae, Jong-Hwan;Cho, Young-Hee;Lee, Jung-Jae;Kim, Nam-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.119-128
    • /
    • 2011
  • The Sensor technology and portable device capability able to collect recent user information and the information about the surrounding environment haven been highly developed. A user can be made use of various contents and the option is also extending with this technology development. In particular, the initial portable device had simply a call function, but now that has evolved into 'the 4th screen' which including movie, television, PC ability. also, in the past, a portable device to provided only the services of a SMS, in recent years, it provided to interactive video service, and it include technology which providing various contents. Also, it is rising as media which leading the consumption of contents, because it can be used anytime, anywhere. However, the contents available for the nature of user's handheld devices are limited. because it is very difficult for making the contents separately according to various device specification. To find a solution to this problem, the study on one contents from several device has been progressing. The contents conversion technology making use of the profile of device out of this study comes to the force and profile study has been progressing for this. Furthermore, Demand for a user is also increased and the study on the technology collecting, analyzing demands has been making active progress. And what is more, Grasping user's demands by making use of this technology and the study on the technology analyzing, providing contents has been making active progress as well. First of all, there is a method making good use of ZigBee, Bluetooth technology about the sensor for gathering user's information. ZigBee uses low-power digital radio for wireless headphone, wireless communication network, and being utilized for smart energy, automatic home system, wireless communication application and wireless sensor application. Bluetooth, as industry standards of PAN(Personal Area Networks), is being made of use of low power wireless device for the technology supporting data transmission such as drawing file, video file among Bluetooth device. With analyzing the collected information making use of this technology, it utilizes personalized service based on network knowledge developed by ETRI to service contents tailor-made for a user. Now that personalized service builds up network knowledge about user's various environments, the technology provides context friendly service constructed dynamically on the basis of this. The contents to service dynamically like this offer the contents that it converses with utilizing device profile to working well. Therefore, this paper suggests the system as follow. It collects the information, for example of user's sensitivity, context and location by using sensor technology, and generates the profile as a means of collected information as sensor. It collects the user's propensity to the information by user's input and event and generates profile in the same way besides the gathered information by sensor. Device transmits a generated profile and the profile about a device specification to proxy server. And proxy server transmits a profile to each profile management server. It analyzes profile in proxy server so that it selects the contents user demand and requests in contents server. Contents server receives a profile of user portable device from device profile server and converses the contents by using this. Original source code of contents convert into XML code using the device profile and XML code convert into source code available in user portable device. Thus, contents conversion process is terminated and user friendly system is completed as the user transmits optimal contents for user portable device.

The Reinforcing Mechanism of Sustaining Participations in Open Source Software Developers: Based on Social Identity Theory and Organizational Citizenship Behavior Theory (오픈 소스 개발자들의 참여 의도 강화 기제 및 참여 지속 의도에 관한 연구: 사회 정체성 이론과 조직시민행동 이론에 기반하여)

  • Choi, Junghong;Choi, Joohee;Lee, Hye Sun;Hwangbo, Hwan;Lee, Inseong;Kim, Jinwoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.3
    • /
    • pp.1-23
    • /
    • 2013
  • Open Source Software Development (OSSD) differentiates itself from traditional closed software development in that it reveals its source codes online and allows anyone to participate in projects. Even though its success was in doubt, many of the open collaborative working models produced successful results. Academia started to get interested in how developers are willing to participate even when there are no extrinsic rewards for their efforts. Many studies tried to explain developers' motivations, and the pursuit of ideology, reputation, and altruism are found to be the answers. Those studies, however, focused mostly on how the first contribution is made out of a certain motivation. Nowadays, OSSD reaches at its maturity and 70% of professional developers have used or utilized open source software or code in their works. As the proportion of people experiencing OSS, the accounts from previous studies are expected to be weakened. Also, extant literature fails to explain how the motivation of participating in OSS evolves over time and experiences. Given that changing over time or over experiences is the natural in the perception of motivation, studies in an attempt to understand how the motivation changes or evolves are in need. In this study, we aimed to explain how the perception about OSS from past usage or related experiences leads to the intention to sustain OSS participations. By doing so, we try to bridge the gap between previous studies and the actual phenomenon. We argued that perceived instrumentality about OSS learned from past experiences will first affect the formation of organizational identity towards general OSS community. And once the organizational identity is formed, it will affect the one's following behaviors related to OSS development, most likely to sustain the favoring stance toward OSS community. Our research distinguishes itself from previous one in that it divides the paths from organizational identity formed to the intention to sustain the voluntary helping behaviors, by altruistic and conforming intentions. Drawing on this structural model, we could explain how organizational identity engages in forming the sustaining intention from past experiences, and that the intention to help at individual level and organizational level works at different level in OSS community. We grounded our arguments on Social identity theory and Organizational Citizenship theory. We examined our assumption by constructing a structural equation model (SEM) and had 88 developers to answer our online surveys. The result is analyzed by PLS (partial least square) method. Consequently, all paths but one in our model are supported, the one which assumed the association between perceived instrumentality and altruistic intention. Our results provide directions in designing online collaborative platforms where open access collaboration is meant to occur. Theoretically, our study suggests that organizational citizenship behavior can occur from organizational identity, even in bottom-up organizational settings. More specifically, we also argue to consider both organizational level and individual level of motivation in inducing sustained participations within the platforms. Our result can be interpreted to indicate the importance of forming organizational identity in sustaining the participatory behaviors. It is because there was no direct association between perceived instrumentality from past experiences and altruistic behavior, but the perception of organizational identity bridges the two constructs. This means that people with no organizational identity can sustain their participations through conforming intention from only the perception of instrumentality, but it needs little more than that for the people to feel the intention to directly help someone in the community-first to form the self-identity as a member of the given community.

Developing Measurement Tool of Entrepreneurship for Young Entrepreneurs (청년 창업자를 위한 창업역량 측정도구 개발)

  • Lee, Ji An;Ahn, Young Sik
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.13 no.4
    • /
    • pp.197-209
    • /
    • 2018
  • Recently, many start-up failures occur as the number of attempts to start a business increases in a social atmosphere that encourages start-up. In particular, young entrepreneurs have a lower survival rate than general entrepreneurs because young entrepreneurs are challenging just with a simple idea to overcome the difficulties of employment while lacking prior knowledge and experience of business. Therefore, the reason for the failure of start-up is lack of preparation for start-up and lack of entrepreneurship. The purpose of this study is to develop a measurement tool to build a basic framework for entrepreneurship development and start - up preparation activities for young people. To develop an entrepreneurship measurement tool, researchers developed a preliminary question through qualitative research methods such as literature research, focus group interview, and expert verification. After that, researchers surveyed 102 entrepreneurs using quantitative research method and to verify the construct validity of the measurement tool, the final entrepreneurship measurement tool was completed through exploratory factor analysis and confirmatory factor analysis. The entrepreneurship measurement tool developed through this research process consists of 7 components and 15 measurement items. First, in the step of 'confirming entrepreneurial intention', two items of 'self-analytic competence', three items of 'ability of establishing start-up philosophy'are contained. Second, in the step of 'drawing up a start-up model', two items are contained in each category such as, 'ability of eliciting entrepreneurial idea,' 'ability of analyzing idea validity,' 'competence of planning a venture start-up model'. Third, in the step of 'planning the venture start-up,' two items are contained in each category such as, 'business-plan presentation competency,' 'ability of implementing organizational system.'. The measurement tool of entrepreneurship is meaningful as it could help young entrepreneur find out their lacking competence in preparing their start-ups and strengthen necessary competences by measuring their own entrepreneurship. Rather in the entrepreneurship education, basic data that can diagnose the entrepreneurship of young entrepreneurs is provided.

An Examination of Knowledge Sourcing Strategies Effects on Corporate Performance in Small Enterprises (소규모 기업에 있어서 지식소싱 전략이 기업성과에 미치는 영향 고찰)

  • Choi, Byoung-Gu
    • Asia pacific journal of information systems
    • /
    • v.18 no.4
    • /
    • pp.57-81
    • /
    • 2008
  • Knowledge is an essential strategic weapon for sustaining competitive advantage and is the key determinant for organizational growth. When knowledge is shared and disseminated throughout the organization, it increases an organization's value by providing the ability to respond to new and unusual situations. The growing importance of knowledge as a critical resource has forced executives to pay attention to their organizational knowledge. Organizations are increasingly undertaking knowledge management initiatives and making significant investments. Knowledge sourcing is considered as the first important step in effective knowledge management. Most firms continue to make an effort to realize the benefits of knowledge management by using various knowledge sources effectively. Appropriate knowledge sourcing strategies enable organizations to create, acquire, and access knowledge in a timely manner by reducing search and transfer costs, which result in better firm performance. In response, the knowledge management literature has devoted substantial attention to the analysis of knowledge sourcing strategies. Many studies have categorized knowledge sourcing strategies into intemal- and external-oriented. Internal-oriented sourcing strategy attempts to increase firm performance by integrating knowledge within the boundary of the firm. On the contrary, external-oriented strategy attempts to bring knowledge in from outside sources via either acquisition or imitation, and then to transfer that knowledge across to the organization. However, the extant literature on knowledge sourcing strategies focuses primarily on large organizations. Although many studies have clearly highlighted major differences between large and small firms and the need to adopt different strategies for different firm sizes, scant attention has been given to analyzing how knowledge sourcing strategies affect firm performance in small firms and what are the differences between small and large firms in the patterns of knowledge sourcing strategies adoption. This study attempts to advance the current literature by examining the impact of knowledge sourcing strategies on small firm performance from a holistic perspective. By drawing on knowledge based theory from organization science and complementarity theory from the economics literature, this paper is motivated by the following questions: (1) what are the adoption patterns of different knowledge sourcing strategies in small firms (i,e., what sourcing strategies should be adopted and which sourcing strategies work well together in small firms)?; and (2) what are the performance implications of these adoption patterns? In order to answer the questions, this study developed three hypotheses. First hypothesis based on knowledge based theory is that internal-oriented knowledge sourcing is positively associated with small firm performance. Second hypothesis developed on the basis of knowledge based theory is that external-oriented knowledge sourcing is positively associated with small firm performance. The third one based on complementarity theory is that pursuing both internal- and external-oriented knowledge sourcing simultaneously is negatively or less positively associated with small firm performance. As a sampling frame, 700 firms were identified from the Annual Corporation Report in Korea. Survey questionnaires were mailed to owners or executives who were most erudite about the firm s knowledge sourcing strategies and performance. A total of 188 companies replied, yielding a response rate of 26.8%. Due to incomplete data, 12 responses were eliminated, leaving 176 responses for the final analysis. Since all independent variables were measured using continuous variables, supermodularity function was used to test the hypotheses based on the cross partial derivative of payoff function. The results indicated no significant impact of internal-oriented sourcing strategies while positive impact of external-oriented sourcing strategy on small firm performance. This intriguing result could be explained on the basis of various resource and capital constraints of small firms. Small firms typically have restricted financial and human resources. They do not have enough assets to always develop knowledge internally. Another possible explanation is competency traps or core rigidities. Building up a knowledge base based on internal knowledge creates core competences, but at the same time, excessive internal focused knowledge exploration leads to behaviors blind to other knowledge. Interestingly, this study found that Internal- and external-oriented knowledge sourcing strategies had a substitutive relationship, which was inconsistent with previous studies that suggested complementary relationship between them. This result might be explained using organizational identification theory. Internal organizational members may perceive external knowledge as a threat, and tend to ignore knowledge from external sources because they prefer to maintain their own knowledge, legitimacy, and homogeneous attitudes. Therefore, integrating knowledge from internal and external sources might not be effective, resulting in failure of improvements of firm performance. Another possible explanation is small firms resource and capital constraints and lack of management expertise and absorptive capacity. Although the integration of different knowledge sources is critical, high levels of knowledge sourcing in many areas are quite expensive and so are often unrealistic for small enterprises. This study provides several implications for research as well as practice. First this study extends the existing knowledge by examining the substitutability (and complementarity) of knowledge sourcing strategies. Most prior studies have tended to investigate the independent effects of these strategies on performance without considering their combined impacts. Furthermore, this study tests complementarity based on the productivity approach that has been considered as a definitive test method for complementarity. Second, this study sheds new light on knowledge management research by identifying the relationship between knowledge sourcing strategies and small firm performance. Most current literature has insisted complementary relationship between knowledge sourcing strategies on the basis of data from large firms. Contrary to the conventional wisdom, this study identifies substitutive relationship between knowledge sourcing strategies using data from small firms. Third, implications for practice highlight that managers of small firms should focus on knowledge sourcing from external-oriented strategies. Moreover, adoption of both sourcing strategies simultaneousiy impedes small firm performance.

Evaluation of Electron Boost Fields based on Surgical Clips and Operative Scars in Definitive Breast Irradiation (유방보존술 후 방사선치료에서 수술 흉터와 삽입된 클립을 이용한 전자설 추가 방사선 조사야 평가)

  • Lee, Re-Na;Chung, Eun-Ah;Lee, Ji-Hye;Suh, Hyun-Suk
    • Radiation Oncology Journal
    • /
    • v.23 no.4
    • /
    • pp.236-242
    • /
    • 2005
  • Purpose: To evaluate the role of surgical clips and scars in determining electron boost field for early stage breast cancer undergoing conserving surgery and postoperative radiotherapy and to provide an optimal method in drawing the boost field. Materials and Methods: Twenty patients who had $4{\sim}7$ surgical clips in the excision cavity were selected for this study. The depth informations were obtained to determine electron energy by measuring the distance from the skin to chest wall (SCD) and to the clip implanted in the most posterior area of tumor bed. Three different electron fields were outlined on a simulation film. The radiological tumor bed was determined by connecting all the clips implanted during surgery Clinical field (CF) was drawn by adding 3 cm margin around surgical scar. Surgical field (SF) was drawn by adding 2 cm margin around surgical clips and an Ideal field (IF) was outlined by adding 2 cm margin around both scar and clips. These fields were digitized into our planning system to measure the area of each separate field. The areas of the three different electron boost fields were compared. Finally, surgical clips were contoured on axial CT images and dose volume histogram was plotted to investigate 3-dimensional coverage of the clips. Results : The average depth difference between SCD and the maximal clip location was $0.7{\pm}0.55cm$. Greater difference of 5 mm or more was seen in 12 patients. The average shift between the borders of scar and clips were 1.7 1.2, 1.2, and 0.9 cm in superior, inferior, medial, and lateral directions, respectively. The area of the CF was larger than SF and IF in 6y20 patients. In 15/20 patients, the area difference between SF and if was less than 5%. One to three clips were seen outside the CF in 15/20 patients. In addition, dosimetrically inadequate coverage of clips (less than 80% of prescribed dose) were observed in 17/20 patients when CF was used as the boost field. Conclusion: The electron field determined from clinical scar underestimates the tumor bed in superior-inferior direction significantly and thereby underdosing the tissue at risk. The electron field obtained from surgical clips alone dose not cover the entire scar properly As a consequence, our technique, which combines the surgical clips and clinical scars in determining electron boost field, was proved to be effective in minimizing the geographical miss as well as normal tissue complications.

$^{99m}Tc-MAG_3$ Elimination Index on Normal Functioning Transplanted Kidney ($^{99m}Tc-MAG_3$ 제거지수를 이용한 이식신장의 기능평가)

  • Jeon, Woo-Jin;Kim, Ju-Heon;Park, Mi-Ok;Lee, Hee-Jung;Hyun, Jung-Ae;Zeon, Seok-Kil
    • The Korean Journal of Nuclear Medicine
    • /
    • v.29 no.1
    • /
    • pp.79-83
    • /
    • 1995
  • Purpose : We analysed $^{99m}Tc-MAG_3$ renal scans to evaluate renal function of transplanted kidney and to detect various renal transplant complications, measuring the ratio of renal radioactivity at three minutes to that at 20 minutes(elimination index). Material and Methods : The fifty seven renal transplantation recipients were studied. There were 50 normal functioning transplanted kidneys as group I and 7 abnormal function-ing transplanted kidney, including 5 cases of acute renal rejection, 2 cases of acute tubular necrosis as group IIl. The protocol consisted of: (1) $^{99m}Tc-MAG_3$ 740MBq injection intravenously : (2) sequential imaging for 2min(60two-second images) followed by 30min(30 sixty-second images) : (3) drawing of region of interest(ROI) on renal imaging; (4) time-activity corves were generated from renal ROI after background subtraction, and time of maximum activity($T_{max}$) and half time of maximal peak radioactivity($T_{1/2}$) were produced in the renogram curve. (5) EI through Bischof-Delaloye method as determined on the renogram curve. Results : Normal group( I ) shows mean EI of 2.21(95.0% Confidence limit of 2.01-2.87), $T_{max}$ of 154 sec, $T_{1/2}$ of 1,139 sec. Abnormal group(II) shows mean EI of 0.74, $T_{max}$ of 1,466 sec, $T_{1/2}$ of 19,224 sec. The EI, $T_{max}$, $T_{1/2}$, BUN and serum creatinine values are significantly different between normal group(I) and abnormal group(II) (p<0.0001). Conclusion : By measuring EI with $^{99m}Tc-MAG_3$, renal function of transplanted kidney could be easily evaluated and various complications could be detected early.

  • PDF

Studies on the Processing of Krill Sauce (크릴간장 제조(製造)에 관한 연구(硏究))

  • Lee, Eung-Ho;Cho, Soon-Yeong;Cha, Yong-Jun;Park, Hyang-Suk;Kwon, Chil-Sung
    • Journal of the Korean Society of Food Science and Nutrition
    • /
    • v.13 no.1
    • /
    • pp.97-106
    • /
    • 1984
  • The Antarctic krill, Euphausia superba, is drawing attention over the world as the largest source of unutilized proteins in the ocean. For the use of krill as a human food, processing conditions of krill sauce by autolysis and/or commercial proteolytic enzyme digestion were examined. The krill was chopped and mixed with equal weight of water, and hydrolyzed by autolysis and/or commercial proteolytic enzyme digestion. The optimal conditions for hydrolysis of krill were $52.5^{\circ}C$, pH 7.0-7.5, 3 hours by autolysis, $52.5^{\circ}C$, pH 6.3, 3hours by bromelain (0.5 %) digestion, and $52.5^{\circ}C$, pH 7.0-7.5, 3 hours by commercial complex enzyme (5 %) digestion, respectively The maximum hydrolyzing rate of protein were 83.2 % by autolysis, 89.7 % by bromelain digestion, 92.7 % by commercial complex enzyme digestion. After krill meat hydrolyzed by autolysis at optimum condition, inactivated at $100^{\circ}C$ for 20 minutes and filtered with Buchner funnel. Two kinds of products were prepared with krill hydrolysate and preservatives: one contained 10 % of sodium chloride and 0.06 % of benzoic acid and the other 10 % of sodium chloride and 3 % of ethyl alcohol. These products were filled in the sterilized glass bottle and sealed. The pH, volatile basic nitrogen, amino nitrogen, color value (L, a and b values) and viable counts of bacteria were determined during storage at $37^{\circ}C$. The results showed that the products could be preserved in good condition during one month at $37^{\circ}C$. As a method to reduce the sodium level in krill sauce, it is convinced that sodium chloride could be replaced half in partially by potassium chloride. In the products prepared from krill by autolysis, bromelain or commercial complex enzyme digestion, hypoxanthine and 5'-IMP were abundant among the nucleotides and their related compounds as 15.3-20.4 ${\mu}mole/g$, dry solid, 2.2-2.5 ${\mu}mole/g$, dry solid, respectively. The abundant free amino acids were lysine, leucine, proline, alanine and valine. The contents of these amino acids were 67.4 %, 69.4 %, 69.8 % of the total free amino acids of each products. And TMAO, betaine and total creatinine were low in contents. The flavor of krill sauce prepared from krill by autolysis or enzyme digestion was not inferior to that of traditional Kerean soy sauce by sensory evaluation.

  • PDF

The Anti-Sticking Effect of Mixture of Trisodium Phosphate and Citric Acid on Oral Streptococcus species (구강 내 사슬알균 종들에 대한 제3인산나트륨과 구연산의 탈부착 효과)

  • Jung, Choong-Hyun;Cho, Hyung-Hun;Choi, Gwang-Ju;Kang, Seung-Yong;Yang, Nam-Woong
    • Korean Journal of Microbiology
    • /
    • v.44 no.4
    • /
    • pp.289-292
    • /
    • 2008
  • Trisodium phosphate 12 hydrate and citric acid monohydrate mixture showed the strong anti-sticking effect on Streptococcus mutans, Streptococcus mitis, and Streptococcus salivarius, which are adhered to glass beads. Each Streptococcus species was shaking-cultured in brain heart infusion broth containing three glass beads. After 18 hr, glass beads were slightly washed into normal saline by three-pin-pointed pincette. Each three glass-beads set was put into reagent -containing tubes, which have 40 mg of bits of weighing paper for gaining brushing effect as similar as brushing one's teeth. The tubes were shaken by vortex mixer for 10 min except non-oral microbe, Streptococcus agalactiae (5 min). The samples were colony-counted by serial agar dilution method. Experiment was repeated three times for each Streptococcus species. The relative ratios of bacterial de-adherence by reagents were calculated in comparison with normal saline control. The de-adherence degree of citric acid-trisodium phosphate-saline mixture (CTS, pH 6.0) against Streptococcus mutans came to an average of 12.5 times compared with normal saline control. Trisodium-saline (TS, pH 8.4) showed the average of 7.5 times, and citric acid-saline (CS, pH 4.6) showed 6.0 times compared to the control group. The bacterial de-adherence degree against Streptococcus salivarius was each 7.2,2.6 and 2.8 times in above reagent sequence in comparison with saline control. CTS and TS showed 2.4 and 3.4 times of anti-sticking effect on Streptococcus mitis respectively, but CS had no anti-sticking effect on this bacterium. CTS, TS and CS showed 0.7, 0.6, and 0.6 times on non-oral microbe, Streptococcus agalactiae, separately compared with saline control. These results show that oral Streptococcus mutans, Streptococcus salivarius, and Streptococcus mitis, which are causative of dental caries or subacute endocarditis, may be easily removed from oral cavity by CTS mixture. It is conceivable that our experimental results will enable the development of a new conceptive toothpaste to prevent dental caries or subacute endocarditis after drawing teeth.

An Analysis of Middle school Technology Teachers' Stage of Concerns about Maker Education By Concerns-Based Adoption Model (관심기반수용모형(CBAM)에 의한 중학교 기술교사의 메이커 교육 관심도 분석)

  • Kang, Sang-Hyun;Kim, Jinsoo
    • 대한공업교육학회지
    • /
    • v.44 no.2
    • /
    • pp.104-122
    • /
    • 2019
  • In the era of the fourth industrial revolution, maker education is drawing attention as a method of student-led education. At a time when interest in maker education is also growing in technology education, figuring out what stage of concern(SoC) a middle school technology teacher is critical to effective implementation. This study analyzed SoC in maker education by layer sampling among 400 middle school technology teachers using Concerns-based adoption model. SoC was then obtained by measuring the origin using the SoCQ and then presenting it as a SOCQ profile. Gender, training experience with two lower variables were analyzed using t verification, working cities, teaching experience with more than three lower variables were analyzed using one-way ANOVA. Studies showed that SoC in maker education of middle school technology teachers showed the most similar characteristics to that of non-users. The difference in concern depending on gender was that male teachers were more concerned in maker education than female teachers. The difference in concern depending on the working city was that teachers working in the township were more concerned in the maker education than teachers working in the large city, and the difference in concern depending on the teaching career was higher among teachers with middle experience than those with low and high experience. There was also a higher stage of concern in maker education than in teachers without training experience. Therefore, it is necessary to provide middle school technology teachers with an introduction to the maker education and various information, teaching, learning and evaluation data to enhance overall concern and to support the use and evaluation of the maker education in the classroom by providing various teacher training and consulting on the maker education in the future. Further, through further study, we should conduct study that analyzes both Stage of Concern, Level of Use and Innovation Configuration, to put in the effort for effective settlement of maker education.

Game Theoretic Optimization of Investment Portfolio Considering the Performance of Information Security Countermeasure (정보보호 대책의 성능을 고려한 투자 포트폴리오의 게임 이론적 최적화)

  • Lee, Sang-Hoon;Kim, Tae-Sung
    • Journal of Intelligence and Information Systems
    • /
    • v.26 no.3
    • /
    • pp.37-50
    • /
    • 2020
  • Information security has become an important issue in the world. Various information and communication technologies, such as the Internet of Things, big data, cloud, and artificial intelligence, are developing, and the need for information security is increasing. Although the necessity of information security is expanding according to the development of information and communication technology, interest in information security investment is insufficient. In general, measuring the effect of information security investment is difficult, so appropriate investment is not being practice, and organizations are decreasing their information security investment. In addition, since the types and specification of information security measures are diverse, it is difficult to compare and evaluate the information security countermeasures objectively, and there is a lack of decision-making methods about information security investment. To develop the organization, policies and decisions related to information security are essential, and measuring the effect of information security investment is necessary. Therefore, this study proposes a method of constructing an investment portfolio for information security measures using game theory and derives an optimal defence probability. Using the two-person game model, the information security manager and the attacker are assumed to be the game players, and the information security countermeasures and information security threats are assumed as the strategy of the players, respectively. A zero-sum game that the sum of the players' payoffs is zero is assumed, and we derive a solution of a mixed strategy game in which a strategy is selected according to probability distribution among strategies. In the real world, there are various types of information security threats exist, so multiple information security measures should be considered to maintain the appropriate information security level of information systems. We assume that the defence ratio of the information security countermeasures is known, and we derive the optimal solution of the mixed strategy game using linear programming. The contributions of this study are as follows. First, we conduct analysis using real performance data of information security measures. Information security managers of organizations can use the methodology suggested in this study to make practical decisions when establishing investment portfolio for information security countermeasures. Second, the investment weight of information security countermeasures is derived. Since we derive the weight of each information security measure, not just whether or not information security measures have been invested, it is easy to construct an information security investment portfolio in a situation where investment decisions need to be made in consideration of a number of information security countermeasures. Finally, it is possible to find the optimal defence probability after constructing an investment portfolio of information security countermeasures. The information security managers of organizations can measure the specific investment effect by drawing out information security countermeasures that fit the organization's information security investment budget. Also, numerical examples are presented and computational results are analyzed. Based on the performance of various information security countermeasures: Firewall, IPS, and Antivirus, data related to information security measures are collected to construct a portfolio of information security countermeasures. The defence ratio of the information security countermeasures is created using a uniform distribution, and a coverage of performance is derived based on the report of each information security countermeasure. According to numerical examples that considered Firewall, IPS, and Antivirus as information security countermeasures, the investment weights of Firewall, IPS, and Antivirus are optimized to 60.74%, 39.26%, and 0%, respectively. The result shows that the defence probability of the organization is maximized to 83.87%. When the methodology and examples of this study are used in practice, information security managers can consider various types of information security measures, and the appropriate investment level of each measure can be reflected in the organization's budget.