• 제목/요약/키워드: Goal Sharing

검색결과 225건 처리시간 0.027초

BSC 프로젝트 활동이 기업의 업무혁신에 미치는 영향 (An Exploratory Study on the BSC Project Issues Influencing Business Process Innovation)

  • 천홍말;방명하
    • 한국IT서비스학회지
    • /
    • 제5권3호
    • /
    • pp.45-62
    • /
    • 2006
  • The research is intended to satisfy two interesting research purposes: one is to examine activities of both BSC adotion phase and implementation phase under carrying BSC project. The second purpose is to analyze the influence from those activities towards innovating business world. This study was conducted thru online questionnaires via online survey system during 3 months for targeting mainly on business users and consultants. The findings of the study suggest that employee's involvement, BSC information sharing, collaboration cross task related teams have major roles to operate BSC successfully. From findings, KPI choice, top-down goal allocation, budgeting allocation have strong influences on upgrading business innovations. Those businesses like to considering adoption of BSC can benefit from the findings of the research.

연합학습의 보안 취약점에 대한 연구동향 (A Survey on Threats to Federated Learning)

  • 한우림;조윤기;백윤흥
    • 한국정보처리학회:학술대회논문집
    • /
    • 한국정보처리학회 2023년도 춘계학술발표대회
    • /
    • pp.230-232
    • /
    • 2023
  • Federated Learning (FL) is a technique that excels in training a global model using numerous clients while only sharing the parameters of their local models, which were trained on their private training datasets. As a result, clients can obtain a high-performing deep learning (DL) model without having to disclose their private data. This setup is based on the understanding that all clients share the common goal of developing a global model with high accuracy. However, recent studies indicate that the security of gradient sharing may not be as reliable as previously thought. This paper introduces the latest research on various attacks that threaten the privacy of federated learning.

디자인씽킹 프로젝트와 팀활동만족도를 매개로 한 지식공유활동이 컴퓨팅사고력에 미치는 영향 (The Effect of Knowledge Sharing Activity on Computational Thinking through Design Thinking Project and Team Activity Satisfaction)

  • 박정선;박상혁
    • 디지털산업정보학회논문지
    • /
    • 제13권4호
    • /
    • pp.1-11
    • /
    • 2017
  • Our society has changed from an industrial society to a knowledge - based society, and the need for new knowledge creation activities through the convergence of various knowledge is emphasized. In accordance with these changes, universities aiming at nurturing human resources for society have sought new approaches and changes. The discussion of various curriculum for the future talent training in the university is aimed at the goal of developing problem solving ability irrespective of the subject of education or major. In this study, we tried to show that computational thinking ability can be improved by strengthening creative team activities by combining design thinking method in computer curriculum of general education course of university. To do this, we conducted a design thinking team project for students of computer general education course at G university in Gyeongnam province and conducted a survey. The results of the questionnaire were verified by statistical methods. The variables of this study satisfied both the validity and the reliability. Multiple regression analysis showed that knowledge sharing, team activity satisfaction, and design thinking project satisfaction factors all affect computing thinking ability.

Social-Aware Collaborative Caching Based on User Preferences for D2D Content Sharing

  • Zhang, Can;Wu, Dan;Ao, Liang;Wang, Meng;Cai, Yueming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권3호
    • /
    • pp.1065-1085
    • /
    • 2020
  • With rapid growth of content demands, device-to-device (D2D) content sharing is exploited to effectively improve the service quality of users. Considering the limited storage space and various content demands of users, caching schemes are significant. However, most of them ignore the influence of the asynchronous content reuse and the selfishness of users. In this work, the user preferences are defined by exploiting the user-oriented content popularity and the current caching situation, and further, we propose the social-aware rate, which comprehensively reflects the achievable contents download rate affected by the social ties, the caching indicators, and the user preferences. Guided by this, we model the collaborative caching problem by making a trade-off between the redundancy of caching contents and the cache hit ratio, with the goal of maximizing the sum of social-aware rate over the constraint of limited storage space. Due to its intractability, it is computationally reduced to the maximization of a monotone submodular function, subject to a matroid constraint. Subsequently, two social-aware collaborative caching algorithms are designed by leveraging the standard and continuous greedy algorithms respectively, which are proved to achieve different approximation ratios in unequal polynomial-time. We present the simulation results to illustrate the performance of our schemes.

Attribute-Based Data Sharing with Flexible and Direct Revocation in Cloud Computing

  • Zhang, Yinghui;Chen, Xiaofeng;Li, Jin;Li, Hui;Li, Fenghua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권11호
    • /
    • pp.4028-4049
    • /
    • 2014
  • Attribute-based encryption (ABE) is a promising cryptographic primitive for implementing fine-grained data sharing in cloud computing. However, before ABE can be widely deployed in practical cloud storage systems, a challenging issue with regard to attributes and user revocation has to be addressed. To our knowledge, most of the existing ABE schemes fail to support flexible and direct revocation owing to the burdensome update of attribute secret keys and all the ciphertexts. Aiming at tackling the challenge above, we formalize the notion of ciphertext-policy ABE supporting flexible and direct revocation (FDR-CP-ABE), and present a concrete construction. The proposed scheme supports direct attribute and user revocation. To achieve this goal, we introduce an auxiliary function to determine the ciphertexts involved in revocation events, and then only update these involved ciphertexts by adopting the technique of broadcast encryption. Furthermore, our construction is proven secure in the standard model. Theoretical analysis and experimental results indicate that FDR-CP-ABE outperforms the previous revocation-related methods.

국방 CALS 통합 데이터 환경을 위한 내용 기반의 표준 데이터 검색 기술 개발 (The content based standard data search technology under CALS integrated data environment)

  • 정승욱;우훈식
    • 안보군사학연구
    • /
    • 통권2호
    • /
    • pp.261-283
    • /
    • 2004
  • To build up the military strength based on information oriented armed forces, the Korean ministry of national defense (MND) promotes the defense CALS (Continuous Acquisition and Life cycle Support) initiative for the reductions of acquisition times, improvements of system qualities, and reductions of costs. These defense CALS activities are the major component of the underlying mid and long term defense digitization program and the ultimate goal of program is to bring a quick victory by providing real-time battlefield intelligence and the economical operations of the military. The concept of defense CALS is to automate the acquisition and disposition of defense systems throughout their life cycle. For implementing defense CALS, the technology for exchange and sharing CALS standard data that is created once and used many times should be considered. In order to develop an efficient CALS information exchange and sharing system, it is required to integrate distributed and heterogeneous data sources and provide systematic search tools for those data. In this study, we developed a content based search engine technology which is essential for the construction of integrated data environments. The developed technology provides the environment of sharing the CALS standard data such as SGML(Standard Generalized Markup Language) and STEP(Standard for The Exchange of Product model data). Utilizing this technology, users can find and access distributed and heterogeneous data sources without knowing its actual location.

  • PDF

Medical Image Watermarking Based on Visual Secret Sharing and Cellular Automata Transform for Copyright Protection

  • Fan, Tzuo-Yau;Chao, Her-Chang;Chieu, Bin-Chang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6177-6200
    • /
    • 2018
  • In order to achieve the goal of protecting medical images, some existing watermark techniques for medical image protection mainly focus on improving the invisibility and robustness properties of the method, in order to prevent unnecessary medical disputes. This paper proposes a novel copyright method for medical image protection based on visual secret sharing (VSS) and cellular automata transform (CAT). This method uses the protected medical image feature as well as VSS and a watermark to produce the ownership share image (OSI). The OSI is used for medical image verification and must be registered to a certified authority. In the watermark extraction process, the suspected medical image is used to generate a master share image (MSI). The watermark can be extracted by combining the MSI and the OSI. Different from other traditional methods, the proposed method does not need to modify the medical image in order to protect the copyright of the image. Moreover, the registered OSI used to verify the ownership and its appearance display meaningful information, facilitating image management. Finally, the results of the final experiment can prove the effectiveness of our method.

Links Between Macro Facilitators of Organizational Empowerment and Ambidextrous Behaviors: An Empirical Study from Pakistan

  • IQBAL, Sumaira;PARVEZ, Anjum;ANJUM, Muhammad Adeel;SAFDAR, Tayybah;AHMED, Ammarah
    • The Journal of Asian Finance, Economics and Business
    • /
    • 제9권2호
    • /
    • pp.113-120
    • /
    • 2022
  • The goal of this study is to see if there's a relationship between employees' ambidextrous behaviors and macro facilitators of organizational empowerment (such as control over workplace decisions, dynamic structural framework, and fluidity in information sharing) (exploration and exploitation). To acquire data, this study uses survey methods. A cross-sectional survey was done to collect information from academics at five large public sector universities in Pakistan's Balochistan province. Control over workplace decisions boosts academics' engagement in exploration and exploitation, while a dynamic structural framework merely increases their engagement in exploration, according to the findings based on data from 240 respondents (n = 240). The findings also show that information sharing flexibility has little effect on exploration and exploitation behaviors. In conclusion, the results of this study imply that organizational empowerment is critical for academics' ambidextrous behaviors to thrive. As a result, specific organizational facilitators of empowerment (such as control over workplace decisions and a dynamic structural framework) are advised in higher education institutions. This research is significant because it develops and tests a model that explains hitherto unexplored connections between macro facilitators of organizational empowerment and employees' ambidextrous behaviors. In addition, the research provides important insights for managerial practice and research.

Utilizing Block chain in the Internet of Things for an Effective Security Sharing Scheme

  • Sathish C;Yesubai Rubavathi, C
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권6호
    • /
    • pp.1600-1619
    • /
    • 2023
  • Organizations and other institutions have recently started using cloud service providers to store and share information in light of the Internet of Things (IoT). The major issues with this storage are preventing unauthorized access and data theft from outside parties. The Block chain based Security Sharing scheme with Data Access Control (BSSDAC) was implemented to improve access control and secure data transaction operations. The goal of this research is to strengthen Data Access Control (DAC) and security in IoT applications. To improve the security of personal data, cypher text-Policy Attribute-Based Encryption (CP-ABE) can be developed. The Aquila Optimization Algorithm (AOA) generates keys in the CP-ABE. DAC based on a block chain can be created to maintain the owner's security. The block chain based CP-ABE was developed to maintain secures data storage to sharing. With block chain technology, the data owner is enhancing data security and access management. Finally, a block chain-based solution can be used to secure data and restrict who has access to it. Performance of the suggested method is evaluated after it has been implemented in MATLAB. To compare the proposed method with current practices, Rivest-Shamir-Adleman (RSA) and Elliptic Curve Cryptography (ECC) are both used.

직무관련 지식의 공유에 영향을 미치는 요인 (Critical factors in Job-Related Knowledge Sharing)

  • 빅토리아;박동진
    • 경영정보학연구
    • /
    • 제10권2호
    • /
    • pp.179-194
    • /
    • 2008
  • 기업이 계속 존속하기 위해서는 조직구성원들이 가진 지식을 공유할 수 있는 다양한 방법을 모색해야 할 것이다. 그러나 조직 내의 개인들이 가치 있는 지식을 공유하도록 동기부여하는 최선의 이슈는 아직 완전히 해결되지 않고 있다. 이 연구는 지식경영시스템에서 조직구성원들이 지식을 공유하는데 영향을 미치는 요인들을 파악하기 위해 수정기술수용모형에 외부변수로 조직문화와 시스템품질을 추가한 구조방정식모형을 연구모형으로 제시하고 검정하였다. 연구결과, 본 연구에서 제시한 수정기술수용모형은 적용가능성이 입증되었고, 경영층 지원, 보상시스템 및 조직분위기 등으로 측정한 조직문화는 지각된 유용성에 직접적으로 영향을 미치고, 또한 기술요인으로 제시한 시스템품질은 이용편리성에 직접적으로 영향을 미치는 것으로 나타났다. 또한 조직은화와 시스템품질은 지각된 유용성과 태도를 통해 지식공유의도에 간접적으로 영향을 미치는 것으로 나타났다. 이 분석결과를 바탕으로 토의와 함의를 제시하였다.