• Title/Summary/Keyword: Intelligence Sharing

Search Result 220, Processing Time 0.028 seconds

A Study on How to Set up a Standard Framework for AI Ethics and Regulation (AI 윤리와 규제에 관한 표준 프레임워크 설정 방안 연구)

  • Nam, Mun-Hee
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.4
    • /
    • pp.7-15
    • /
    • 2022
  • With the aim of an intelligent world in the age of individual customization through decentralization of information and technology, sharing/opening, and connection, we often see a tendency to cross expectations and concerns in the technological discourse and interest in artificial intelligence more than ever. Recently, it is easy to find claims by futurists that AI singularity will appear before and after 2045. Now, as part of preparations to create a paradigm of coexistence that coexists and prosper with AI in the coming age of artificial intelligence, a standard framework for setting up more correct AI ethics and regulations is required. This is because excluding the risk of omission of setting major guidelines and methods for evaluating reasonable and more reasonable guideline items and evaluation standards are increasingly becoming major research issues. In order to solve these research problems and at the same time to develop continuous experiences and learning effects on AI ethics and regulation setting, we collect guideline data on AI ethics and regulation of international organizations / countries / companies, and research and suggest ways to set up a standard framework (SF: Standard Framework) through a setting research model and text mining exploratory analysis. The results of this study can be contributed as basic prior research data for more advanced AI ethics and regulatory guidelines item setting and evaluation methods in the future.

A Study on the Characteristics of the Creation Process of Convergence Performing Arts - Focusing on PADAF - (융·복합 공연예술 창작과정의 특징 연구 - 파다프(PADAF)를 중심으로)

  • Jo, Jeong-Min
    • Journal of Korea Entertainment Industry Association
    • /
    • v.14 no.8
    • /
    • pp.163-174
    • /
    • 2020
  • The purpose of this study is to derive the characteristics of the creative process of convergence performing arts. Therefore, the PADAF-Play and Dance Art Festival, a representative convergence performing arts festival in Korea that has been held steadily every year since the first event in 2011, was selected as the subject of the study. Through PADAF, a representative convergence performing arts festival in Korea, qualitative case studies were selected through process-oriented discovery to study the characteristics of the creative process of convergence performing arts, which is a key feature of performing arts in the 21st century. For realistic and empirical research, the 8th and 9th PADAF participated in the entire process from the initial stage of preparation to the closing ceremony and conducted several in-depth interviews with PADAF officials and participating artists. Looking at the characteristics of the convergence performance art creation process through PADAF, creators overcame difficulties that they had not thought of in different ways in the process of meeting different heterogeneous genres, but through understanding other genres, experiential values through convergence, sharing as collaborators, and various ways of communication. The characteristics of the convergence performing arts creation process, which is focused on PADAF, are "Rhizom thinking" by French philosopher Gilles Deleuze(1925-1995), "Collective intelligence," and "Experimental Value for Experimental Creation" by creators. Through this derivation, we will help the changing performing arts scene based on the basic human desire to understand convergence performance art a little more and communicate through the extended expression of convergence.

Analysis of the Danmu Phenomenon on the Chinese Video Platform Bilibili - Focused on Henry Jenkins' Concept of Participatory Culture (중국 동영상 플랫폼 Bilibili의 탄막 현상 분석- 헨리 젠킨스의 참여문화 개념을 중심으로)

  • HUANG SHIYI;Kwon Hochang
    • Trans-
    • /
    • v.15
    • /
    • pp.81-104
    • /
    • 2023
  • This paper analyzes the danmu phenomenon with the concept of participatory culture proposed by Henry Jenkins. Unlike other comments, Danmu is a function that allows users to post anonymously while watching a video, and comments posted at that time are immediately displayed on the screen and can be viewed by other viewers. The service was first launched by Niconico. In this paper, the danmu phenomenon in the Chinese video platform Bilibili is analyzed by focusing on three aspects. First, in terms of creative sharing under collective intelligence, we explore how users create their own creations and share them with other users through danmu. Second, in the collaboration model under public participation, the method and meaning of collective cooperation through users' interaction is dealt with. Third, in terms of financial support of commercial capital, the influence of danmu videos to create commercial profits is analyzed as a case. In addition, the negative aspects and challenges of participatory culture in Bilibili are analyzed. Negative aspects such as participation gap, copyright infringement, excessive use of danmu and problems of anonymity were reviewed, and major challenges to realize the potential of danmu as a participatory culture were suggested. This paper comprehensively analyzes danmu using research methods such as literature review and case studies, and through this, tries to derive insights on how participatory culture and danmu interact and evolve in modern society. Danmu, as a participatory medium, is an important tool that promotes individual and collective creation and interaction, and is pioneering a new boundary between the media industry and its users.

Proposal of Standardization Plan for Defense Unstructured Datasets based on Unstructured Dataset Standard Format (비정형 데이터셋 표준포맷 기반 국방 비정형 데이터셋 표준화 방안 제안)

  • Yun-Young Hwang;Jiseong Son
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.189-198
    • /
    • 2024
  • AI is accepted not only in the private sector but also in the defense sector as a cutting-edge technology that must be introduced for the development of national defense. In particular, artificial intelligence has been selected as a key task in defense science and technology innovation, and the importance of data is increasing. As the national defense department shifts from a closed data policy to data sharing and activation, efforts are being made to secure high-quality data necessary for the development of national defense. In particular, we are promoting a review of the business budget system to secure data so that related procedures can be improved to reflect the unique characteristics of AI and big data, and research and development can begin with sufficient large quantities and high-quality data. However, there is a need to establish standardization and quality standards for structured data and unstructured data at the national defense level, but the defense department is still proposing standardization and quality standards for structured data, so this needs to be supplemented. In this paper, we propose an unstructured data set standard format for defense unstructured data sets, which are most needed in defense artificial intelligence, and based on this, we propose a standardization method for defense unstructured data sets.

Lessons learned from Operation Iraqi Freedom(OIF) for ROK forces (이라크전쟁의 군사적 교훈)

  • Mun, Gwang-Geon
    • Journal of National Security and Military Science
    • /
    • s.1
    • /
    • pp.71-111
    • /
    • 2003
  • The key lessons of the very complex modern war can be dangerously misleading to the outsiders. The efforts trying to draw lessons learned from the Iraq War (OIF : Operation Iraqi Freedom) may be biased by the view of point by Americans, because most of war episodes have been come from the Western media coverage. More serious bias can be committed thanks to the differences of warfighting doctrines and military technology between US forces and ROK forces. However, OIF-fought allied commanders and outside military experts said this campaign exemplified 21st-century warfare: swift, agile and decisive, employing overpowering technology to bring relentless violence to bear in many places at once. Even though the campaign evolved differently than anticipated, allied forces regrouped and regained the initiative remarkably quickly, thanks in large part to a new command flexibility, tied to new technology that made possible the more rapid sharing of data. These factors permitted "new air-land dynamic". The things that compel that are good sensors networked with good intelligence disseminated through a robust networking system, which then yields speed. Speed turns out to be a very important factor for conducting "Rapid Decisive Operations" relied on joint "Mass of Effects". ROK forces facing the heaviest ground threat in the world may learn more from Cold War era-typed US Army 3rd Infantry Division (3ID), which operating considerably beyond existing doctrine. 3ID flew its personnel into Kuwait to meet up with equipment already located in the region as pre-positioned stock. During OIF, the division conducted continuous offensive operations over 230km deep battlespace for 21 days. The lessons learned for ROK army to prepare tomorrow's war may be found from 3ID in its training, command and control, task organization, firepower and battlespace management, and logistics.

  • PDF

Mutual Authentication Scheme between Multiple Instances for Secure Data Share of Virtualized Environment (가상화 환경의 안전한 데이터 공유를 위한 다중 인스턴스간 상호인증 기법)

  • Choi, Dohyeon;Kim, Sangkun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.83-94
    • /
    • 2016
  • Recent cloud, big data, there is a problem for the architectural security vulnerability to the server platforms of various fields such as artificial intelligence occurs consistently, but using the virtualization technology. In addition, most secure virtualization technology is known to be dependent on the type is limited and the platform provider. This paper presents a method for mutual authentication for secure data between multiple instances of a shared virtualized environment. The proposed method was designing a security architecture in consideration of the mutual authentication between multiple independent instances, and enhance the safety of a security protocol for sharing data by applying a key chain techniques. Performance analysis results and the existing security architecture demonstrated that protect each virtualized instances of the session and the other way, a compliance effectiveness for each instance of the mutual authentication process.

Horticultural Activity Interventions and Outcomes: A Review

  • Park, Sin-Ae;Lee, A-Young;Lee, Geung-Joo;Kim, Dae-Sik;Kim, Wan Soon;Shoemaker, Candice A.;Son, Ki-Cheol
    • Horticultural Science & Technology
    • /
    • v.34 no.4
    • /
    • pp.513-527
    • /
    • 2016
  • The objective of the present study was to review the current research about the outcomes of horticultural activity interventions in order to determine research trends and analyze the characteristics of horticultural activity interventions. We reviewed the literature using search engines such as the Web of Science, Proquest Dissertation and Theses, Academic Search Premier, Research Information sharing Service, and Korean National Assembly Digital Library to locate journal articles that include relevant search terms (e.g., gardening activity, gardening program, allotment garden, urban agriculture, horticultural therapy, and horticultural activity). We initially identified 14,414 journal articles that were published before April 2014 and selected 509 of the papers for review. We found that studies investigating treating children and adults 8 to 64 years old were the most common, and horticultural activities such as gardening outdoors, planting indoors, making crafts with live plants, arranging flowers, making crafts with artificial or pressed flowers, and other activities were usually combined. Short/medium term (11 to 20 sessions) horticultural activity programs were the most frequent, and most interventions were of medium duration (> 60 min to 120 min). Most of the studies focused on the psychological or emotional effects of horticultural intervention, such as its effects on emotional intelligence, self-esteem, stress, and depression. Further studies are needed to analyze the research methodology, specific outcomes, and strengths or weaknesses of studies investigating horticultural activity interventions.

Trend Analysis of Movie Content Curation and Metadata Standards Research - Focus on the Art Management Perspective - (영화 콘텐츠 큐레이션과 메타데이터 표준 연구의 동향 분석 -예술경영 관점으로-)

  • Bae, Seung-Ju
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.6
    • /
    • pp.163-171
    • /
    • 2020
  • This study analyzed the contents and changes by year of metadata research that appeared in the study of domestic movie curation from the viewpoint of art management. The research method used thesis search site to search 'movie' and 'metadata' as keywords, and analyzed them in 4 stages of change according to the research trend by year, purpose of research content, analysis by use, and type of recommendation method. As for research results, movie metadata research is highly interested in user-side research, and is developing from an introduction stage to an evolutionary stage of recommendation to a sharing and participation stage. It was concluded that movie curation evolved into 6 stages: search support, content-based, collaborative filtering, hybrid, artificial intelligence, and curation.

An Exploratory Study on the Management Framework of Social Media as Knowledge Creation Platform (지식 창조 플랫폼으로서의 소셜미디어 관리모델 설계를 위한 탐색 연구)

  • Kim, Sang Wook
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.7
    • /
    • pp.149-158
    • /
    • 2012
  • Much attention is being paid to social media because of their potentials to draw collective intelligence. In this context does this study attempt to draw some implications of social media as knowledge creation platform and suggest a conceptual framework of social media management. Information sharing among the public through social media literally produces profound influence throughout the society and thus not only business firms but all levels of public institutions, including government are seeking to take its advantage for various purposes such as public relations, crowd sourcing, etc. Especially considering that social media open the possibility of social knowledge creation platform in the Big Data era, this study is perhaps able to contribute to further development of social media management model together with a series of measuring indexes.

The Composition and Analytical Classification of Cyber Incident based Hierarchical Cyber Observables (계층적 침해자원 기반의 침해사고 구성 및 유형분석)

  • Kim, Young Soo;Mun, Hyung-Jin;Cho, Hyeisun;Kim, Byungik;Lee, Jin Hae;Lee, Jin Woo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.139-153
    • /
    • 2016
  • Cyber incident collected from cyber-threat-intelligence sharing Center is growing rapidly due to expanding malicious code. It is difficult for Incident analysts to extract and classify similar features due to Cyber Attacks. To solve these problems the existing Similarity Analysis Method is based on single or multiple cyber observable of similar incidents from Cyber Attacks data mining. This method reduce the workload for the analysis but still has a problem with enhancing the unreality caused by the provision of improper and ambiguous information. We propose a incident analysis model performed similarity analysis on the hierarchically classified cyber observable based on cyber incident that can enhance both availability by the provision of proper information. Appling specific cyber incident analysis model, we will develop a system which will actually perform and verify our suggested model.