• 제목/요약/키워드: Information Reliance

검색결과 171건 처리시간 0.023초

소비자 제품지식과 제품속성의 중요도에 따른 정보탐색 (Consumer Information Search According to Prior knowledge and Degree of Importance of Products)

  • 이승신
    • 가정과삶의질연구
    • /
    • 제15권4호
    • /
    • pp.41-54
    • /
    • 1997
  • The purpose of this study is to analyze information search according to consumer's prior knowledge and degree of importance of products. Questionnare survey method was used in this research. The sample was taken from 548 university students in Seoul from 19th of June to 26th of June in 1997. Statistical methods used in this study were Frequency, Percentage, Regression and path Analysis. The major findings are summarized as follows; 1) The level of Consumer's prior knowledge showed somewhat middle. 2) Degree of importance of products showed in order of quality, A/S extension exchange price reliance of a manufacturing company a design etc. 3) Information search for the consumer's prior knowledge and importance showed high on the whole. The more prior knowledge consumer have the better they recognize for the importance of products. Therefore consumers are more likely to search information.

  • PDF

GPU-based Monte Carlo Photon Migration Algorithm with Path-partition Load Balancing

  • Jeon, Youngjin;Park, Jongha;Hahn, Joonku;Kim, Hwi
    • Current Optics and Photonics
    • /
    • 제5권6호
    • /
    • pp.617-626
    • /
    • 2021
  • A parallel Monte Carlo photon migration algorithm for graphics processing units that implements an improved load-balancing strategy is presented. Conventional parallel Monte Carlo photon migration algorithms suffer from a computational bottleneck due to their reliance on a simple load-balancing strategy that does not take into account the different length of the mean free paths of the photons. In this paper, path-partition load balancing is proposed to eliminate this computational bottleneck based on a mathematical formula that parallelizes the photon path tracing process, which has previously been considered non-parallelizable. The performance of the proposed algorithm is tested using three-dimensional photon migration simulations of a human skin model.

정보보호 교육이 청소년의 정보보호 실천에 미치는 영향 (Effects of Information Security Education on the Practice of Information Security for the Youth)

  • 강민성;김태성;김택영
    • Journal of Information Technology Applications and Management
    • /
    • 제26권2호
    • /
    • pp.27-40
    • /
    • 2019
  • As reliance on information and communication becomes widespread, a variety of information dysfunctions such as hacking, viruses, and the infringement of personal information are also occurring. Korean adolescents are especially exposed to an environment in which they are experiencing information dysfunction. In addition, youth cybercrimes are steadily occurring. To prevent cybercrime and the damage caused by information dysfunction, information security practices are essential. Accordingly, the purpose of this study is to discuss the factors affecting the information security practices of Korean youths, considering information security education, perceived severity, and perceived vulnerability as leading factors of the theory of planned behavior. A questionnaire survey was administered to 118 middle and high school students. Results of the hypothesis test show that information security education affects perceived behavior control, and perceived severity affects attitude. Subjective norms, information security attitudes, and perceived behavioral control were found to influence adolescents' practices of information security. However, perceived vulnerabilities did not affect youths' information security attitudes. This study confirms that information security education can help youths to practice information security. In other words, information security education is important, and it is a necessary element in the information curriculum of contemporary youth. However, perceived vulnerability to youth information security threats did not affect information security attitudes. Consequently, we suggest that it is necessary to strengthen the contents of the information security education for Korean youths.

Survey on the Authentication and Key Management of 802.11s

  • ;이상곤
    • 한국멀티미디어학회:학술대회논문집
    • /
    • 한국멀티미디어학회 2012년도 춘계학술발표대회논문집
    • /
    • pp.89-92
    • /
    • 2012
  • Wireless Mesh Network expanded the capability of the conventional wireless networking by allowing the nodes to operate in proactive mode, reactive mode or the combination of both, the hybrid mode in the multi-hopping nature. By doing so, the links between the nodes become much more robust and reliable because of the number of paths to reach a destination node from a source node can be more than 1 and do not need to rely on the access point (AP) alone to relay the messages. As there may be many possible ways to form an end-to-end link between 2 nodes, the routing security becomes another main concern of the 802.11s protocol. Besides its reliance on the 802.11i for the security measures, 802.11s also includes some new features such as the Mesh Temporal Key (MTK) and the Simultaneous Authentication of Equals (SAE). The authentication and key management (AKM) process of 802.11s were observed in this paper.

  • PDF

국내 기업개인정보보호 측정항목과 관리모형 개발에 관한 연구 (Development of a New Instrument to Measuring Concerns for Corporate Information Privacy Management)

  • 이성중;이영재
    • Journal of Information Technology Applications and Management
    • /
    • 제16권4호
    • /
    • pp.79-92
    • /
    • 2009
  • With the rising reliance on market estimation through customer analysis in customer-centered marketing, there is a rapid increase in the amount of personal data owned by corporations. There has been a corresponding rise in the customers' interest in personal information protection, and the problem of personal information leakage has risen as a serious issue. The purpose of this research is to develop a diagnosis model for personal information protection that is suited to our country's corporate environment, and on this basis, to present diagnostic instruments that can be applied to domestic corporations. This diagnosis model is a structural equation model that schematizes the degree of synthetic effect that administration factors and estimation items have on the protection of personal information owned by corporations. We develop the model- consisting of the administration factors for personal information protection and the measurement items of each factor- using the development method of standardized structural equation model. We then present a tool through which the administration factors and estimation items verified through this model can be used in the diagnosis for personal information protection in corporations. This diagnostic tool can be utilized as a useful instrument to prevent in advance the leakage of personal information in corporations.

  • PDF

정보 시스템 위험과 패스워드 특성간의 관계에 대한 연구 (A Study on Relationships Between Information Systems Risk and Password Characteristics)

  • 오창규;김종기;심윤주
    • 한국산업정보학회논문지
    • /
    • 제8권1호
    • /
    • pp.62-74
    • /
    • 2003
  • 정보시스템의 역할이 증대되고 있는 현시점에서 정보 자원에 대한 효과적인 보호는 매우 중요하다. 인터넷의 영향으로 정보 시스템의 개방화와 접속성의 증대로 인해 보다 많은 위협과 취약성에 노출되어 있으며 이들을 관리하는 것 또한 매우 중요한 이슈가 된다. 특히 정보 시스템의 사용을 위한 수단인 패스워드의 급증은 정보 보호에 더 많은 주의를 요하게 되었다. 본 연구에서는 위험분석에 사용되는 자산, 위협, 취약성 등으로부터 도출된 위험의 발생 가능성이 실제 지각된 위험에 어떠한 영향력을 행사하는가를 살펴보고, 여기서 도출된 위험이 정보보호를 위한 패스워드 특성에 어떠한 영향관계를 가지는가를 분석하였다. 이를 통해 패스워드의 효과적인 사용과 보안 대책을 수립하기 위한 방안을 제시하였다.

  • PDF

Adversarial Complementary Learning for Just Noticeable Difference Estimation

  • Dong Yu;Jian Jin;Lili Meng;Zhipeng Chen;Huaxiang Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제18권2호
    • /
    • pp.438-455
    • /
    • 2024
  • Recently, many unsupervised learning-based models have emerged for Just Noticeable Difference (JND) estimation, demonstrating remarkable improvements in accuracy. However, these models suffer from a significant drawback is that their heavy reliance on handcrafted priors for guidance. This restricts the information for estimating JND simply extracted from regions that are highly related to handcrafted priors, while information from the rest of the regions is disregarded, thus limiting the accuracy of JND estimation. To address such issue, on the one hand, we extract the information for estimating JND in an Adversarial Complementary Learning (ACoL) way and propose an ACoL-JND network to estimate the JND by comprehensively considering the handcrafted priors-related regions and non-related regions. On the other hand, to make the handcrafted priors richer, we take two additional priors that are highly related to JND modeling into account, i.e., Patterned Masking (PM) and Contrast Masking (CM). Experimental results demonstrate that our proposed model outperforms the existing JND models and achieves state-of-the-art performance in both subjective viewing tests and objective metrics assessments.

A Study on Distributed Self-Reliance Wireless Sensing Mechanism for Supporting Data Transmission over Heterogeneous Wireless Networks

  • Caytiles, Ronnie D.;Park, Byungjoo
    • International Journal of Internet, Broadcasting and Communication
    • /
    • 제12권3호
    • /
    • pp.32-38
    • /
    • 2020
  • The deployment of geographically distributed wireless sensors has greatly elevated the capability of monitoring structural health in social-overhead capital (SOC) public infrastructures. This paper deals with the utilization of a distributed mobility management (DMM) approach for the deployment of wireless sensing devices in a structural health monitoring system (SHM). Then, a wireless sensing mechanism utilizing low-energy adaptive clustering hierarchy (LEACH)-based clustering algorithm for smart sensors has been analyzed to support the seamless data transmission of structural health information which is essentially important to guarantee public safety. The clustering of smart sensors will be able to provide real-time monitoring of structural health and a filtering algorithm to boost the transmission of critical information over heterogeneous wireless and mobile networks.

Use of the estimated critical values adapting a regression equation for the approximate entropy test

  • 차경준;류제선
    • Journal of the Korean Data and Information Science Society
    • /
    • 제13권2호
    • /
    • pp.77-85
    • /
    • 2002
  • The statistical testing methods have been widely recognized to determine the plain and cipher texts. In fact, the randomness for a sequence from an encryption algorithm is necessary to guarantee security and reliance of cipher algorithm. Thus, the statistical randomness tests are used to discover cipher text. In this paper, we would provide the critical value for an approximate entropy test by estimating the nonlinear regression equation when the number of sequence and the level of significance are given. Thus, we can discern plan and cipher text for real problem with given number of sequence and the level of significance. Also, we confirm the fitness of the estimated critical values from the rate of success for plain or cipher text.

  • PDF

여러가지 Data Mining 기법으로부터 도출된 지식에 관한 전문가의 신뢰도에 대한 실증적 연구 (An Empirical Study for the Expert's Reliance on the Knowledge from the Several Data Mining Techniques)

  • 김광용
    • 지능정보연구
    • /
    • 제5권1호
    • /
    • pp.123-123
    • /
    • 1999
  • 본 연구는 여러 가지 데이터마이닝 기법으로부터 도출된 지식이 어떻게 인간의 판단에 영향을 미치는 가를 지식구조별, 자료특성별, 전문가지식의 일관성별로 실증적 연구를 하여 궁극적으로 전문가 의사결정에 도움이 되는 데이터마이닝 기법의 활용방안을 제시하고자 한다. 분석결과 전문가들의 판단은 데이터마이닝의 지식표현형태에 의한 영향을 많이 받고 있는 것으로 나타났으며, 특히 IF-THEN의 형태로 표현되는 명제형 지식구조에 가장 많은 신뢰를 갖는 것으로 나타났다. 특히 자료의 특성, 또는 전문가의 판단 일관성과 데이터마이닝 기법 사이에 상호작용효과가 있어 향후 데이터마이닝 기법을 활용하여 전문가의 의사결정을 돕고자 할 때는 이러한 차이점을 고려해야 하는 것으로 밝혀졌다.