• Title/Summary/Keyword: Information Sharing Platform

Search Result 361, Processing Time 0.026 seconds

A Construction of the C_MDR(Component_MetaData Registry) for the Environment of Exchanging the Component (컴포넌트 유통환경을 위한 컴포넌트 메타데이타 레지스트리 구축 : C_MDR)

  • Song, Chee-Yang;Yim, Sung-Bin;Baik, Doo-Kwon;Kim, Chul-Hong
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.614-629
    • /
    • 2001
  • As the information-intensive society in 21c based on the environment of global internet is promoted, the software is getting more large and complex, and the demand for the software is increasing briskly. So, it becomes an important issue in academic and industrial field to activate reuse by developing and exchanging the standardized component. Currently, the information services as a product type of each company are provided in foreign market place for reusing a commercial component, but the components which are serviced in each market place are different, insufficient and unstandardized. That is, construction for Component Data Registry based on ISO 11179, is not accomplished. Hence, the national government has stepped up the plan for sending out public component at 2001. Therefore, the systems as a tool for sharing and exchange of data, have to support the meta-information of standardized component. In this paper, we will propose the C_MDR system: a tool to register and manage the standardized meta-information, based upon ISO 11179, for the commercialized common component. The purpose of this system is to systemically share and exchange the data in chain of acceleration of reusing the component. So, we will show the platform of specification for the component meta-information, then define the meta-information according to this platform, also represent the meta-information using XML for enhancing the interoperability of information with other system. Moreover, we will show that three-layered expression make modeling to be simple and understandable. The implementation of this system is to construct a prototype system of the component meta-information through the internet on www, this system uses ASP as a development language and RDBMS Oracle for PC. Thus, we may expect the standardization of the exchanged component metadata, and be able to apply to the exchanged reuse tool.

  • PDF

A Study on the Possibility of Self-Correction in the Market for Protecting Internet Privacy (인터넷 개인정보보호의 시장자체해결가능성에 대한 연구)

  • Chung, Sukkyun
    • Journal of Digital Convergence
    • /
    • v.10 no.9
    • /
    • pp.27-37
    • /
    • 2012
  • Internet privacy has become a significant issue in recent years in light of the sharp increase in internet-based social and economic activities. The technology which collects, processes and disseminates personal information is improving significantly and the demand for personal information is rising given its inherent value in regard to targeted marketing and customized services. The high value placed on personal information has turned it into a commodity with economic worth which can be transacted in the marketplace. Therefore, it is strongly required to approach the issue of privacy from economic perspective in addition to the prevailing approaches. This article analyzes the behaviors of consumers and firms in gathering personal information, and shielding it from unauthorized access, using a game theory framework in which players strive to do their best under the given conditions. The analysis shows that there exist no market forces which require all firms to respect consumer privacy, and that government intervention in the form of a nudging incentive for information sharing and/or strict regulation is necessary.

A research on the Construction and Sharing of Authority Record-focusing on the Case of Social Networks and Archival Context Project (전거레코드 구축 및 공유에 관한 연구 SNAC 프로젝트 사례를 중심으로)

  • Lee, Eun Yeong
    • The Korean Journal of Archival Studies
    • /
    • no.71
    • /
    • pp.49-89
    • /
    • 2022
  • This study suggests the necessity and domestic application plan a national authority database that promotes an integrated access, richer search, and understanding of historical information sources and archival resources distributed among cultural heritage institutions through the "Social Networks and Archive Context" project case. As the SNAC project was transformed into an international cooperative organization led by NARA, it was possible to secure a sustainable operating system and realize cooperative authority control. In addition, SNAC authority records have the characteristics of providing richer contextual information about life and history and social and intellectual network information compared to libraries. Through case analysis, First, like SNAC, a cooperative body led by the National Archives and having joint ownership of the National Library of Korea should lead the development and expand the scope of participating institutions. Second, in the cooperative method, take a structure in which divisions are made for each field with special strengths, but the main decision-making is made through the administrative team in which the two organizations participate. Third, development of scalable open source software that can collect technical information in various formats when constructing authority data, designing with the structure and elements of archival authority records, designing functions to control the quality of authority records, and building user-friendly interfaces and the need for a platform design reflecting content elements.

Beyond Platforms to Ecosystems: Research on the Metaverse Industry Ecosystem Utilizing Information Ecology Theory (플랫폼을 넘어 생태계로: Information Ecology Theory를 활용한 메타버스 산업 생태계연구 )

  • Seokyoung Shin;Jaiyeol Son
    • Information Systems Review
    • /
    • v.25 no.4
    • /
    • pp.131-159
    • /
    • 2023
  • Recently, amidst the backdrop of the COVID-19 pandemic shifting towards an endemic phase, there has been a rise in discussions and debates about the future of the metaverse. Simultaneously, major metaverse platforms like Roblox have been launching services integrated with generative AI, and Apple's mixed reality hardware, Vision Pro, has been announced, creating new expectations for the metaverse. In this situation where the outlook for the metaverse is divided, it is crucial to diagnose the metaverse from an ecosystem perspective, examine its key ecological features, driving forces for development, and future possibilities for advancement. This study utilized Wang's (2021) Information Ecology Theory (IET) framework, which is representative of ecosystem research in the field of Information Systems (IS), to derive the Metaverse Industrial Ecosystem (MIE). The analysis revealed that the MIE consists of four main domains: Tech Landscape, Category Ecosystem, Metaverse Platform, and Product/Service Ecosystem. It was found that the MIE exhibits characteristics such as digital connectivity, the integration of real and virtual worlds, value creation capabilities, and value sharing (Web 3.0). Furthermore, the interactions among the domains within the MIE and the four characteristics of the ecosystem were identified as driving forces for the development of the MIE at an ecosystem level. Additionally, the development of the MIE at an ecosystem level was categorized into three distinct stages: Narrow Ecosystem, Expanded Ecosystem, and Everywhere Ecosystem. It is anticipated that future advancements in related technologies and industries, such as robotics, AI, and 6G, will promote the transition from the current Expanded Ecosystem level of the MIE to an Everywhere Ecosystem level, where the connection between the real and virtual worlds is pervasive. This study provides several implications. Firstly, it offers a foundational theory and analytical framework for ecosystem research, addressing a gap in previous metaverse studies. It also presents various research topics within the metaverse domain. Additionally, it establishes an academic foundation that integrates concept definition research and impact studies, which are key areas in metaverse research. Lastly, referring to the developmental stages and conditions proposed in this study, businesses and governments can explore future metaverse markets and related technologies. They can also consider diverse metaverse business strategies. These implications are expected to guide the exploration of the emerging metaverse market and facilitate the evaluation of various metaverse business strategies.

A design and implementation of the video conferencing system on the WWW (웹 기반의 화상회의 시스템의 설계 및 구현)

  • Kim, Sung-Jin;Park, Yong-Jin
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.36T no.4
    • /
    • pp.123-132
    • /
    • 1999
  • A video conferencing system provides sharing the conference environment for geographically dispersed computer users who use the audio and video information. But the conventional video conferencing systems have some problems which are dependent on specific software and/or hardware and bound the certain platform and network environment. Furthermore the participants must know the information about other participants before joining the conference session and they have to use the same video conferencing system. This paper describes design and implementation of the video conferencing system on the WWW to solve the mentioned problems. The conference applications are transmitted from a WWW server and executed in the participants Web browsers. The participant can carry out conference services by using only the web browser. The WWW server takes charge of conferencing management including the information related to the participants and provides supported conference tools such as whiteboard, chatting and multimedia controls. Therefore the participants can easily join the conference sessions and perform conference working regardless of network connection situations. We used the Java to implement the seamless session connections and interaction between the conference participants which are the most important when implementing the video conferencing system on the WWW and used the ActiveX technology about the audio and video controls to make it easy the hardware control.

  • PDF

Research on Vehicle Diagnostic and Monitoring technology Using WiBro Portable Device (와이브로 휴대기기를 사용한 차량진단 및 모니터링 기술에 관한 연구)

  • Ryoo, Hee-Soo;Won, Yong-Gwan;Park, Kwon-Chul;Ahn, Yong-Beom
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.10
    • /
    • pp.17-26
    • /
    • 2010
  • This is concerned with the technology to monitor the vehicle operation, failure and disorder by using WiBro portable device. More precisely, the technology makes it possible that the information collection device is connected to both ECU(Electronic Control Unit) which is the device for controlling engine, transmission, brake, air-bag, etc that are connected to in-vehicle network and OBD-II connector that is for data collection from various sensors. In addition, with a WiBro portable device (cell phone, PDA, PMP, UMPC, etc). equipped with a vehicle diagnostic programs, information for operation, failure and malfunction can be obtained and analyzed in real-time, and alarm is alerted when the vehicle is in abnormal status, which makes the early reactions to the status. Furthermore, the collected data can be sent through WiBro network to the server managed by the company specialized in managing the vehicles, thus the technology could help the drivers who have less knowledge about their auto-vehicles have safe and economic driving. There is always a possibility of malfunction due to various types of noise that are caused by wring-harness when the device is wired-connected. In this research, in order to overcome this problem, we propose a system configuration that can do monitoring and diagnosis with a device for collecting data from vehicle and a personal WiBro device. Also, we performed research on data acquisition and interlock for the system defined by the definition for information and data sharing platform.

A Feasibility Study on the Infrastructure Project of PCB Industrial Technology (PCB 산업기술 기반구축 사업의 타당성 분석 연구)

  • Kim, Dae Ho
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.8 no.4
    • /
    • pp.57-66
    • /
    • 2013
  • Domestic PCB industry formed by orders of demand companies is extremely vulnerable in its innovation infrastructure including high value-added technology development and information exchange. The majority of PCB products produced in the country relies on the imports from abroad and it causes its vulnerability to external market changes. Due to the negative perceptions about the industry (e.g., 3D job), low treatment (especially SMEs) and expertise employment avoidance in PCB industry, the job market conditions of PCB industry is not so good. In these circumstances, the PCB industry is completely dependent on the demand market such as cellular phones, and tablet PC, and as a result the responsiveness of PCB industry to the changes in demand market is also vulnerable. In this PCB industry, Korean government is trying to build the research infrastructure for PCB industry that realizes the sharing of information among companiesthrough the operation of the PCB industry innovation forum (information innovation), builds SME suppot platform and supports quality improvement (technology innovation), and supports enterprise collaboration processes (material-process-equipment) utilizing PCM open laboratory. The PCB industry technology infratstructure project is going to be promoted by the government(1.3 billion won, each year) and the private investmen(434 million won each year) from 2013 to 2017(5 years project)(table 1). This study analyzes the feasibility of the project, by using the AHP analysis and the results shows that this project is considered feasible because the AHP overall score is evaluated as 0.841, the overall score is greater than or equal to 0.55.

  • PDF

Comparative Study of Machine learning Techniques for Spammer Detection in Social Bookmarking Systems (소셜 복마킹 시스템의 스패머 탐지를 위한 기계학습 기술의 성능 비교)

  • Kim, Chan-Ju;Hwang, Kyu-Baek
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.5
    • /
    • pp.345-349
    • /
    • 2009
  • Social bookmarking systems are a typical web 2.0 service based on folksonomy, providing the platform for storing and sharing bookmarking information. Spammers in social bookmarking systems denote the users who abuse the system for their own interests in an improper way. They can make the entire resources in social bookmarking systems useless by posting lots of wrong information. Hence, it is important to detect spammers as early as possible and protect social bookmarking systems from their attack. In this paper, we applied a diverse set of machine learning approaches, i.e., decision tables, decision trees (ID3), $na{\ddot{i}}ve$ Bayes classifiers, TAN (tree-augment $na{\ddot{i}}ve$ Bayes) classifiers, and artificial neural networks to this task. In our experiments, $na{\ddot{i}}ve$ Bayes classifiers performed significantly better than other methods with respect to the AUC (area under the ROC curve) score as veil as the model building time. Plausible explanations for this result are as follows. First, $na{\ddot{i}}ve$> Bayes classifiers art known to usually perform better than decision trees in terms of the AUC score. Second, the spammer detection problem in our experiments is likely to be linearly separable.

The Study of Response Model & Mechanism Against Windows Kernel Compromises (Windows 커널 공격기법의 대응 모델 및 메커니즘에 관한 연구)

  • Kim, Jae-Myong;Lee, Dong-Hwi;J. Kim, Kui-Nam
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.1-12
    • /
    • 2006
  • Malicious codes have been widely documented and detected in information security breach occurrences of Microsoft Windows platform. Legacy information security systems are particularly vulnerable to breaches, due to Window kernel-based malicious codes, that penetrate existing protection and remain undetected. To date there has not been enough quality study into and information sharing about Windows kernel and inner code mechanisms, and this is the core reason for the success of these codes into entering systems and remaining undetected. This paper focus on classification and formalization of type target and mechanism of various Windows kernel-based attacks, and will present suggestions for effective response methodologies in the categories of, "Kernel memory protection", "Process & driver protection" and "File system & registry protection". An effective Windows kernel protection system will be presented through the collection and analysis of Windows kernel and inside mechanisms, and through suggestions for the implementation methodologies of unreleased and new Windows kernel protection skill. Results presented in this paper will explain that the suggested system be highly effective and has more accurate for intrusion detection ratios, then the current legacy security systems (i.e., virus vaccines and Windows IPS, etc) intrusion detection ratios. So, It is expected that the suggested system provides a good solution to prevent IT infrastructure from complicated and intelligent Windows kernel attacks.

  • PDF

Effects of Collective Intelligence-Based SSI Instruction on Promoting Middle School Students' Key Competencies as Citizens (집단지성을 강조한 과학기술 관련 사회쟁점 수업이 중학교 영재학급 학생들의 역량 함양에 미치는 효과)

  • Lee, Hyunju;Choi, Yunhee;Ko, Yeonjoo
    • Journal of The Korean Association For Science Education
    • /
    • v.35 no.3
    • /
    • pp.431-442
    • /
    • 2015
  • SSI instruction can be an effective tool to promote key competencies for future citizens. Our assumption of the study is that applying the concept of collective intelligence in the context of SSI learning would facilitate the learning. Thus, we designed and implemented Collective Intelligence-based SSI instruction over almost a year and observed the effects of the instruction on enhancing students' collaboration, information management, critical thinking, and communication skills. Twenty 9th grade students enrolled in a science-gifted program voluntarily participated. Data was collected by administering a questionnaire to examine the skills before, in the middle of, and after the instruction, and by conducting classroom observations and focus student group interviews. The results indicated some degree of improvement in their targeted skills. First, they experienced the expansion of their thoughts by actively sharing information and ideas using the web platform. Second, they became more flexible and open to different points of views in order to accomplish a common goal. Third, they appreciated having independent time and space to explore their own positions on the issues and to search necessary information, and believed that the process encouraged them to more pro-actively participate and communicate in the group debates. Lastly, they positively perceived the values that collaboration with diverse group members could produce.