• 제목/요약/키워드: IT전문지

검색결과 1,765건 처리시간 0.026초

Construction of Full-Text Database and Implementation of Service Environment for Electronic Theses and Dissertations (학위논문 전문데이터베이스 구축 및 서비스환경 구현)

  • Lee, Kyi-Ho;Kim, Jin-Suk;Yoon, Wha-Muk
    • The Transactions of the Korea Information Processing Society
    • /
    • 제7권1호
    • /
    • pp.41-49
    • /
    • 2000
  • Form the middle of 199os, most universities in Korea have requested their students to submit not only the original text books but also their Electronic Theses and Dissertations(ETD) for masters degree and doctorates degree. The ETD submitted by the students are usually developed by various kinds of word processors such as MS-Word, LaTex, and HWP. Since there is no standard format for ETD to merge various different formats yet, it is difficult to construct the integrated database that provides full-tex service. In this paper, we transform three different ETD formats into a unified one, construct a full-text database, and implement the full-text retrieval system for effective search in the Internet environment.

  • PDF

Method to Extract Communication History in Instant Messenger (인터넷 메신저의 통신내역 수집기술)

  • Lee, Jin-Kyung;Han, Ji-Sung;Lee, Sang-Jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제21권2호
    • /
    • pp.49-60
    • /
    • 2011
  • Instant Messenger is one of the most popular communication service when translating message or data each other through Internet. For digital crime investigation, therefore, it is obviously important to obtain communication trace and contents derived from Instant Messenger. This is because that gathering traditional communication histories also have been important until now. However, extracting communication trace and contents are not easy because they are generally encrypted or obfuscated in local system, futhermore, sometimes they are located at server computer for Instant Messenger. This paper researches on extracting communication histories against NateOn, BuddyBuddy, Yahoo! messenger and Mi3 messenger, and obtaining user password or bypassing authentication system to Instant Messenger Service when a user use auto-login option.

Development of Comprehensive Professionalism Measurement Tools for Hospital Administration staffs (병원행정직종사자의 포괄적 전문직업성을 위한 측정도구 개발)

  • Park, Ki-Hyeok;Jung, Yong-Mo
    • Journal of Convergence for Information Technology
    • /
    • 제10권11호
    • /
    • pp.340-350
    • /
    • 2020
  • This study was conducted to present comprehensive professionalism measurement tools suitable for hospital administration staffs. The study used measurement tools related to the psychological and behavioral characteristics of individuals used in prior studies for administration staffs at general hospitals and hospitals. Factor analysis and reliability analysis were conducted to verify the validity and internal relevance. As a result of the analysis, it was concluded that composed of 5 factors, and that the total reliability was 94.4%, which was very reasonable as a comprehensive professionalism measurement tool. Therefore, each component was defined as Confidence of Job performance, Salary Adequacy, Pride in Duties, Ability to achieve work goals, and Work Autonomy in order to provide a clear meaning. Professionalism from a modern perspective is a broader concept than traditional professionalism, including the subjective perceptions of job values and individuals' their abilities. Therefore, comprehensive professionalism measurement tools presented in this study will be very suitable and useful for hospital administration staffs.

The DTD Development through Document Structure Analysis of Journals (학술지 논문기사의 문헌구조 분석을 통한 DTD개발)

  • Yoon, So-Young
    • Journal of Information Management
    • /
    • 제28권2호
    • /
    • pp.20-53
    • /
    • 1997
  • To use SGML, which is international standard of markup language to construct fulltext database in digital libraries, the DTD is developed first. It is based on structure analysis of document. This study develops the SGML DTD for Korean document through document structure analysis of the Journal of the Korean Society for Information Management.

  • PDF

A Study on Exploitable Verification for Secure Open Source Software (안전한 오픈소스 소프트웨어를 위한 익스플로잇터블 검증에 관한 연구)

  • Kim, Bumryong;Song, JunHo;Kim, Geon;Jun, Moon-Seog
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 한국정보처리학회 2015년도 추계학술발표대회
    • /
    • pp.617-619
    • /
    • 2015
  • 최근 IT 제품의 활용의 증가와 함께 소프트웨어는 컴퓨터를 넘어 적용 범위가 더욱 넓어지고 그에 따른 수요 또한 급격히 성장하고 있다. 또한 상용 소프트웨어와 더불어 오픈소스 소프트웨어(Open Source Software)의 수요도 함께 급성장하고 있다. 하지만 오픈소스 소프트웨어는 보안에 대한 전문지식이 없는 개발자에 의해 개발이 이루어진다. 이에 하트블리드(HeartBleed), 쉘쇼크(ShellShock)와 같은 다양한 보안취약점(Security Vulnerabilities)이 발생하고 있으며 공격으로 이어지는 사례도 늘고 있다. 따라서 본 논문에서는 다른 소프트웨어 점검 도구들과 연계하여 발견된 보안취약점이 익스플로잇터블(Exploitable)한 지 검증하는 엔진을 제안한다.

A Study on Chaining Threat Analysis of Cybersecurity against Reactor Protection Systems (원자로보호계통 사이버보안 연계 위협 분석 연구)

  • Jung, Sungmin;Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • 제18권2호
    • /
    • pp.39-48
    • /
    • 2022
  • The application of digital technology to instrumentation and control systems in nuclear power plants has overcome many shortcomings of analog technology, but the threat of cybersecurity has increased. Along with other systems, the reactor protection system also uses digital-based equipment, so responding to cybersecurity threats is essential. We generally determine cybersecurity threats according to the role and function of the system. However, since the instrumentation and control system has various systems linked to each other, it is essential to analyze cybersecurity threats together between the connected systems. In this paper, we analyze the cybersecurity threat of the reactor protection system with the associated facilities. To this end, we quantitatively identified the risk of the reactor protection system by considering safety functions, a communication type, the use of analog or digital-based equipment of the associated systems, and the software vulnerability of the configuration module of the reactor protection system.

Cybersecurity Risk Assessment of a Diverse Protection System Using Attack Trees (공격 트리를 이용한 다양성보호계통 사이버보안 위험 평가)

  • Jung Sungmin;Kim Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • 제19권3호
    • /
    • pp.25-38
    • /
    • 2023
  • Instrumentation and control systems measure and control various variables of nuclear facilities to operate nuclear power plants safely. A diverse protection system, a representative instrumentation and control system, generates a reactor trip and turbine trip signal by high pressure in a pressurizer and containment to satisfy the design requirements 10CFR50.62. Also, it generates an auxiliary feedwater actuation signal by low water levels in steam generators. Cybersecurity has become more critical as digital technology is gradually applied to solve problems such as performance degradation due to aging of analog equipment, increased maintenance costs, and product discontinuation. This paper analyzed possible cybersecurity threat scenarios in the diverse protection system using attack trees. Based on the analyzed cybersecurity threat scenario, we calculated the probability of attack occurrence and confirmed the cybersecurity risk in connection with the asset value.

The Development of Patient-Accessible EMR System (환자 접근형 EMR 시스템의 개발)

  • Kim, Jin-Ho;Kwon, Tae-Kyu;Won, Yong-Gwan;Kim, Jung-Ja
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • 제14권3호
    • /
    • pp.595-602
    • /
    • 2010
  • EMR(Electronic Medical Record) is being broadly used in general medical institution, but it could be more efficient and convenient if patients could use it themselves. Because present EMR is the formula written by medical experts with professional words, the patient can not identify his detailed symptoms and even the name of disease. Otherwise, the patient should have many efforts for obtaining his medical records. To solve this problem, this study developed Patient-Accessible EMR system, which was founded as one of patient-centric medical services, and it shows that the patient can take his medical information without medical experts.

Machine Learning-based model for predicting changes in user evaluation reflecting the period of the product (제품 사용 기간을 반영한 기계학습 기반 사용자 평가 변화 예측 모델)

  • Boo Hyunkyung;Kim Namgyu
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • 제19권1호
    • /
    • pp.91-107
    • /
    • 2023
  • With the recent expansion of the commerce ecosystem, a large number of user evaluations have been produced. Accordingly, attempts to create business insights using user evaluation data have been actively made. However, since user evaluation can change after the user experiences the product, it is difficult to say that the analysis based only on reviews immediately after purchase fully reflects the user's evaluation of the product. Moreover, studies conducted so far on user evaluation have overlooked the fact that the length of time a user has used a product can affect the user's product evaluation. Therefore, in this study, we build a model that predicts the direction of change in the user's rating after use from the user's rating and reviews immediately after purchase. In particular, the proposed model reflects the product's period of use in predicting the change direction of the star rating. However, since the posterior information on the duration of product use cannot be used as input in the inference process, we propose a structure that utilizes information about the product's period of use using an auxiliary classifier. As a result of an experiment using 599,889 user evaluation data collected from the shopping platform 'N' company, we confirmed that the proposed model performed better than the existing model in terms of accuracy.

A Study on the ChatGPT: Focused on the News Big Data Service and ChatGPT Use Cases (ChatGPT에 관한 연구: 뉴스 빅데이터 서비스와 ChatGPT 활용 사례를 중심으로)

  • Lee Yunhee;Kim Chang-Sik;Ahn Hyunchul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • 제19권1호
    • /
    • pp.139-151
    • /
    • 2023
  • This study aims to gain insights into ChatGPT, which has recently received significant attention. The study utilized a mixed method involving case studies and news big data analysis. ChatGPT can be described as an optimized language model for dialogue. The question arises whether ChatGPT will replace Google search services, posing a potential threat to Google. It could hurt Google's advertising business, which is the foundation of its profits. With AI-based chatbots like ChatGPT likely to disrupt the web search industry, Google is establishing a new AI strategy. The study used the BIG KINDS service and analyzed 2,136 articles over six months, from August 23, 2022, to February 22, 2023. Thirty of these articles were written in 2022, while 2,106 have been reported recently as of February 22, 2023. Also, the study examined the contents of ChatGPT by utilizing literature research, news big data analysis, and use cases. Despite limitations such as the potential for false information, analyzing news big data and use cases suggests that ChatGPT is worth using.