• Title/Summary/Keyword: Information

Search Result 264,361, Processing Time 0.122 seconds

Analysis of Information Adoption Pathways and Strategies of Raising Information Adoption of Farmers (농업인의 정보 수용경로 분석 및 정보수용 제고 방안)

  • Choi, Sang-Ho
    • Journal of Korean Society of Rural Planning
    • /
    • v.15 no.1
    • /
    • pp.73-87
    • /
    • 2009
  • This study analyzed the characteristics of diverse information adoption pathways per pathway of information composition category including 'information perception', 'information assessment', and 'information adoption' and examined information adoption characteristics per pattern. In addition, differences among agricultural researchers and farmers per information adoption stage were analyzed. According to these analyses, as for farmers' information adoption pathways, while the formal extension type and the situational reaction diffusion type used the direct pathway of 'information perception ${\rightarrow}$ information adoption,'the agriculturist connection type and the systematic approach type did not use the direct pathway of 'information perception ${\rightarrow}$ information adoption' but, instead, adopted information by moving from the 'information perception ${\rightarrow}$ information assessment' pathway to the 'information assessment ${\rightarrow}$ information adoption' pathway, with information assessment as the intermediation. In the case of farmers, information adoption was the highest in comparison with information assessment and information perception in all patterns whereas, in the case of agricultural researchers, the results were exactly opposite those of farmers. By suggesting an information adoption pathway appropriate to each pattern, this study sought to enhance information adoption.

The Impact of Organizational Information Security Climate on Employees' Information Security Participation Behavior (조직의 정보보안 분위기가 조직 구성원의 정보보안 참여 행동에 미치는 영향)

  • Park, Jaeyoung;Kim, Beomsoo
    • The Journal of Information Systems
    • /
    • v.29 no.4
    • /
    • pp.57-76
    • /
    • 2020
  • Purpose Although examining the antecedents of employees' extra-role behavior (i.e. information security participation behavior) in the information security context is significant for researchers and practitioners, most behavioral security studies have focused on employees' in-role behavior (i.e. information security policy compliance). Thus, this research addresses this gap by investigating how organizational information security climate influences information security participation behavior based on social information processing theory and Griffin and Neal's safety model. Design/methodology/approach We developed a research model by applying Griffin and Neal's safety model to the information security context and then tested our research model by conducting an online survey for employees of organizations with information security policies. Structural equation modeling (SEM) with SmartPLS 3.3.2 is used to test the corresponding hypothesis. Findings Our results show that organizational information security climate, information security knowledge, information security motivation are effective in motivating information security participation behavior. Also, we find that organizational information security climate positively influences both information security knowledge and information security motivation. Our findings emphasize the importance of organizational information security climate because it is capable of affecting employees on information security participation behavior. Our study contributes to the literature on information security by exploring the role of organizational information security climate in enhancing employees' information security participation behavior.

A VIDEO GEOGRAPHIC INFORMATION SYSTEM FOR SUPPORTING BI-DIRECTIONAL SEARCH FOR VIDEO DATA AND GEOGRAPHIC INFORMATION

  • Yoo, Jea-Jun;Joo, In-Hak;Park, Jong-Huyn;Lee, Jong-Hun
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.151-156
    • /
    • 2002
  • Recently, as the geographic information system (GIS) which searches, manages geographic information is used more widely, there is more requests for some systems which can search and display more actual and realistic information. As a response to these requests, the video geographic information system which connects video data obtained by using cameras and geographic information as it is by displaying the obtained video data is being more popular. However, because most existing video geographic information systems consider video data as an attribute of geographic information or use simple one-way links from geographic information to video data to connect video data with geographic information, they support only displaying video data through searching geographic information. In this paper, we design and implement a video geographic information system which connects video data with geographic information and supports hi-directional search; searching geographic information through searching video data and searching video data through searching geographic information. To do this, we 1) propose an ER data model to represent connection information related to video data, geographic information, 2) propose a process to extract and to construct connection information from video data and geographic information, 3) show a component based system architecture to organize the video geographic information system.

  • PDF

Effects of Information Security Education on the Practice of Information Security for the Youth (정보보호 교육이 청소년의 정보보호 실천에 미치는 영향)

  • Kang, Min-Seong;Kim, Tae-Sung;Kim, Taek-Young
    • Journal of Information Technology Applications and Management
    • /
    • v.26 no.2
    • /
    • pp.27-40
    • /
    • 2019
  • As reliance on information and communication becomes widespread, a variety of information dysfunctions such as hacking, viruses, and the infringement of personal information are also occurring. Korean adolescents are especially exposed to an environment in which they are experiencing information dysfunction. In addition, youth cybercrimes are steadily occurring. To prevent cybercrime and the damage caused by information dysfunction, information security practices are essential. Accordingly, the purpose of this study is to discuss the factors affecting the information security practices of Korean youths, considering information security education, perceived severity, and perceived vulnerability as leading factors of the theory of planned behavior. A questionnaire survey was administered to 118 middle and high school students. Results of the hypothesis test show that information security education affects perceived behavior control, and perceived severity affects attitude. Subjective norms, information security attitudes, and perceived behavioral control were found to influence adolescents' practices of information security. However, perceived vulnerabilities did not affect youths' information security attitudes. This study confirms that information security education can help youths to practice information security. In other words, information security education is important, and it is a necessary element in the information curriculum of contemporary youth. However, perceived vulnerability to youth information security threats did not affect information security attitudes. Consequently, we suggest that it is necessary to strengthen the contents of the information security education for Korean youths.

Develop and Deliver Essential Information Literacy Programs

  • Eisenderg, Michael B.
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.45 no.2
    • /
    • pp.5-21
    • /
    • 2011
  • There is an explosion of talk about crucial, new literacies for the 21st Century, for example critical thinking, problem-solving, media literacy, technology literacy, digital literacy, visual literacy. The other day, there was even an article about "gaming literacy!" How does one make sense of it all? The common factor in all these literacies is "information" - information seeking, information use, information processing, information presentation, and information evaluation. And, these "information" elements come together in information literacy: the ability to engage in effective and efficient information problem-solving. Information literacy is the overarching and unifying literacy, and all libraries have a unique and essential role to play in delivering meaningful information literacy programs to people of all ages. In this keynote paper and address, Professor and Dean Emeritus Mike Eisenberg will define the concept and structure of library-based information literacy programs and offer strategies for developing and implementing information literacy programs that are comprehensive(reaching all users), predictable (consistent over time), and accountable(measured and reported).

User attribute verification method using user mobile dynamic information

  • Kim, Seok-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.1
    • /
    • pp.145-149
    • /
    • 2019
  • Various supplementary authentication methods are used to supplement user authentication and authorization provided by existing password verification online1. In recent years, authentication and authorization methods using user attribute information have been studied and utilized in various services. User attribute information can be divided into static information and dynamic information. The existing methods focus on research to identify users using dynamic information or to generate challenge questions for user reauthentication. Static information such as a user's home address, school, company, etc. is associated with dynamic information such as location information. We propose a method to verify user attribute information by using the association between two attribute information. For this purpose, the static information of the user is verified by using the user's location record which is dynamic information. The experiment of this paper collects the dynamic information of the actual user and extracts the static information to verify the user attributes. And we implemented the user attribute information authentication system using the proposal verification method and evaluated the utility based on applicability, convenience, and security.

Survey of Temporal Information Extraction

  • Lim, Chae-Gyun;Jeong, Young-Seob;Choi, Ho-Jin
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.931-956
    • /
    • 2019
  • Documents contain information that can be used for various applications, such as question answering (QA) system, information retrieval (IR) system, and recommendation system. To use the information, it is necessary to develop a method of extracting such information from the documents written in a form of natural language. There are several kinds of the information (e.g., temporal information, spatial information, semantic role information), where different kinds of information will be extracted with different methods. In this paper, the existing studies about the methods of extracting the temporal information are reported and several related issues are discussed. The issues are about the task boundary of the temporal information extraction, the history of the annotation languages and shared tasks, the research issues, the applications using the temporal information, and evaluation metrics. Although the history of the tasks of temporal information extraction is not long, there have been many studies that tried various methods. This paper gives which approach is known to be the better way of extracting a particular part of the temporal information, and also provides a future research direction.

Cognitive Biases and Their Effects on Information Behaviour of Graduate Students in Their Research Projects

  • Behimehr, Sara;Jamali, Hamid R.
    • Journal of Information Science Theory and Practice
    • /
    • v.8 no.2
    • /
    • pp.18-31
    • /
    • 2020
  • Cognitive biases can influence human information behaviour and decisions made in information behaviour and use. This study aims to identify the biases involved in some aspects of information behaviour and the role they play in information behaviour and use. Twenty-five semi-structured face-to-face interviews were conducted in an exploratory qualitative study with graduate (MA and PhD) students who were at the stage of their dissertation/thesis research. Eisenberg & Berkowitz Big6TM Skills for Information Literacy was adopted as a framework for interviews and the analysis was done using grounded theory coding method. The findings revealed the presence of twenty-eight biases in different stages of information behaviour, including availability bias (affects the preference for information seeking strategies), attentional bias (leads to biased attention to some information), anchoring effect (persuades users to anchor in special parts of information), confirmation bias (increases the tendency to use information that supports one's beliefs), and choice-supportive bias (results in confidence in information seeking processes). All stages of information seeking were influenced by some biases. Biases might result in a lack of clarity in defining the information needs, failure in looking for the right information, misinterpretation of information, and might also influence the way information is presented.

Information Professionals Going Beyond the Needful User in Digital Humanities Project Collaboration

  • Engerer, Volkmar P.
    • Journal of Information Science Theory and Practice
    • /
    • v.8 no.1
    • /
    • pp.6-19
    • /
    • 2020
  • When information professionals deal with other disciplines in the course of digital humanities projects, they often assume that they are dealing with 'needful users' who have an 'information gap' to fill. This paper argues that the traditional view that information/knowledge is transferred from an information specialist donor to a domain specialist receiver is no longer appropriate in the digital humanities context, where the gap-and-search (or gap-and-filler) approach to information has given way to more direct, explorative engagement with information. The paper asks whether information science and the practising profession are ready for this paradigm shift and examines information science conservatism in two common collaboration scenarios, library support and digital development. It is shown that information science theory still assumes a traditional donor role in both scenarios. How information scientists deal with conservatism in practice is discussed in the example of the Prior project, in which the information science team exerted an ambiguous, hybrid approach with both conservative and non-conservative elements. Finally, two rather hypothetical answers are offered to the question of how information professionals should approach scholarly collaboration in the digital humanities context, where users have ceased to be supplicants. From a purely pragmatic perspective, information scientists need to shift their focus from information needs to research practices and the implications of these practices for digital information systems. More fundamentally, the emergence of digital humanities challenges information professionals to transform information systems designed for searching into digital objects that can be explored more freely by the digital humanities community.