• Title/Summary/Keyword: Internet Information Activities

Search Result 687, Processing Time 0.034 seconds

An Analysis on the Changes of Logistics Industry using Internet of Things

  • Lee, Seong-Hoon
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.9 no.1
    • /
    • pp.57-66
    • /
    • 2019
  • The Internet of Things is one of the most important technologies that can realize a super connective society. Efforts are being made to use the Internet in most areas of our society. In this flow, one of the interesting things that we see in our lives is the change in the logistics industry. The key to change is that it is likely to evolve continuously as it pursues unmanned activities. In this study, we examined the change of the logistics industry using the Internet of things. It also describes the necessary processes for efficient operation of the unmanned market

A Qualitative Study on Facilitating Factors of User-Created Contents: Based on Theories of Folklore (사용자 제작 콘텐츠의 활성화 요인에 대한 정성적 연구: 구비문학 이론을 중심으로)

  • Jung, Seung-Ki;Lee, Ki-Ho;Lee, In-Seong;Kim, Jin-Woo
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.43-72
    • /
    • 2009
  • Recently, user-created content (UCC) have emerged as popular medium of on-line participation among users. The Internet environment has been constantly evolving, attracting active participation and information sharing among common users. This tendency is a significant deviation from the earlier Internet use as an one-way information channel through which users passively received information or contents from contents providers. Thanks to UCCs online users can now more freely generate and exchange contents; therefore, identifying the critical factors that affect content-generating activities has increasingly become an important issue. This paper proposes a set of critical factors for stimulating contents generation and sharing activities by Internet users. These factors were derived from the theories of folklores such as tales and songs. Based on some shared traits of folklores and UCC content, we found four critical elements which should be heeded in constructing UCC contents, which are: context of culture, context of situation, skill of generator, and response of audience. In addition, we selected three major UCC websites: a specialized contents portal, a general internet portal, and an official contents service site, They have different use environments, user interfaces, and service policies, To identify critical factors for generating, sharing and transferring UCC, we traced user activities, interactions and flows of content in the three UCC websites. Moreover, we conducted extensive interviews with users and operators as well as policy makers in each site. Based on qualitative and quantitative analyses of the data, this research identifies nine critical factors that facilitate contents generation and sharing activities among users. In the context of culture, we suggest voluntary community norms, proactive use of copyrights, strong user relationships, and a fair monetary reward system as critical elements in facilitating the process of contents generation and sharing activities. Norms which were established by users themselves regulate user behavior and influence content format. Strong relationships of users stimulate content generation activities by enhancing collaborative content generation. Particularly, users generate contents through collaboration with others, based on their enhanced relationship and specialized skills. They send and receive contents by leaving messages on website or blogs, using instant messenger or SMS. It is an interesting and important phenomenon, because the quality of contents can be constantly improved and revised, depending on the specialized abilities of those engaged in a particular content. In this process, the reward system is an essential driving factor. Yet, monetary reward should be considered only after some fair criterion is established. In terms of the context of the situation, the quality of contents uploading system was proposed to have strong influence on the content generating activities. Among other influential factors on contents generation activities are generators' specialized skills and involvement of the users were proposed. In addition, the audience response, especially effective development of shared interests as well as feedback, was suggested to have significant influence on contents generation activities. Content generators usually reflect the shared interest of others. Shared interest is a distinct characteristic of UCC and observed in all the three websites, in which common interest is formed by the "threads" embedded with content. Through such threads of information and contents users discuss and share ideas while continuously extending and updating shared contents in the process. Evidently, UCC is a new paradigm representing the next generation of the Internet. In order to fully utilize this innovative paradigm, we need to understand how users take advantage of this medium in generating contents, and what affects their content generation activities. Based on these findings, UCC service providers should design their websites as common playground where users freely interact and share their common interests. As such this paper makes an important first step to gaining better understand about this new communication paradigm created by UCC.

An Empirical Analysis of the Effects of Information Technology on Knowledge Management Activity and Performance (정보기술이 지식경영활동과 성과에 미치는 효과에 대한 실증분석)

  • Choi, Eunsoo;Lee, Yooncheol
    • Knowledge Management Research
    • /
    • v.10 no.3
    • /
    • pp.51-80
    • /
    • 2009
  • The purpose of this study is to empirically analyze the impact that occurs when Korean organizations make practical use of various information technology tools and systems in the knowledge management process, such as sharing, learning and creating knowledge. Such a process is usually made through online and offline knowledge management activities. This paper also verifies how the externalization of tacit knowledge, and the internalization of explicit knowledge via the Internet and offline socialization activities have altered the mechanisms of knowledge transfers inside organizations. For the research, a survey was conducted on the satisfaction and usability levels of information technology, and the impact of IT usage on the results of knowledge management activities and knowledge transfers. 622 Korean organizations were surveyed, including major listed firms and public organizations. The results were examined as an online/offline integration process using SECI's Model proposed by Nonaka (1994, 1995). The analysis shows that information technology satisfaction and the usage of information technology help accelerate the pace of the knowledge flow and amplify the volume of the knowledge transfer by boosting the externalization and internalization processes-also known as knowledge management activities. However. there is no distinct correlation between information technology and socialization, an offline knowledge transferal activity. In particular, the quality of knowledge-an end result of knowledge transfer-does not improve merely by the externalization of online knowledge and instead requires the internalization of knowledge processes. Above all, the research reveals that offline socialization processes vastly contribute to the improvement of knowledge quality. This paper suggests that in order to ensure a transfer of quality knowledge, an organization or a company should focus on the use of information technology rather than the satisfaction level of information technology, and that knowledge transfers via the Internet has limitations in creating high quality of knowledge. For an organization to ensure the transfer of high-quality knowledge, the organization should not entirely hinge the transfer of knowledge online, as it is essential to have an offline method-a form of socialization such as a 'community of practice.'

  • PDF

A Study on Electronic Commerce Transaction Modeling based on SET (SET을 기반으로 한 전자상거래 트랜잭션 모델링에 대한 연구)

  • 고영철;송병열;조현규;함호상
    • The Journal of Society for e-Business Studies
    • /
    • v.2 no.1
    • /
    • pp.79-94
    • /
    • 1997
  • Commerce activities which are free form space and time constraint using a communication network are called Electronic Commerce(EC). Because of sending a commercial information using open network such as Internet in EC, they need the security of commerce information (payment information and purchase information), checking the integrity of transferring data and certifying all parts participated in commerce for a secure commerce. Recently Visa and MasterCard Co. released the Secure Electronic Transaction (SET) Protocol for secure payment card transaction on Internet. This paper proposes a Secure Electronic Commerce Transaction Model(SECTM) using SET in order to support the secure commerce on Internet. The proposed transaction model prevents merchant from abusing the cardholder's payment information (credit-card number etc.) and enables cardholder to shop securely in Electronic Shopping Mall.

  • PDF

Survey on the IETF Activities for IPv6 Multi-homing (IPv6 멀티홈을 지원하기 위한 IETF 연구 동향)

  • Kim Geonung;Song Byung-Kwen;Ju Yong-Wan;Kim Weon
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11a
    • /
    • pp.208-210
    • /
    • 2005
  • 장애 극복, 중복, 부하 분산, 서비스 비용, 정책 등의 이유로, IPv6에서 멀티홈(Multi-homing)을 지원하는 연구들이 진행 중이다. 본 논문에서는 현재 진행 중인 멀티홈 지원 방안들을 살펴보고, 특히 이름과 위치 정보를 분리하는 방향으로 진행 중인 연구들 중 대표적인 HIP와 Shim의 방안을 비교한다.

  • PDF

Simulation of Detecting the Distributed Denial of Service by Multi-Agent

  • Seo, Hee-Suk;Lee, Young-Won
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.59.1-59
    • /
    • 2001
  • The attackers on Internet-connected systems we are seeing today are more serious and more technically complex than those in the past. Computer security incidents are different from many other types of crimes because detection is unusually difficult. So, network security managers need a IDS and Firewall. IDS (Intrusion Detection System) monitors system activities to identify unauthorized use, misuse or abuse of computer and network system. It accomplishes these by collecting information from a variety of systems and network resources and then analyzing the information for symptoms of security problems. A Firewall is a way to restrict access between the Internet and internal network. Usually, the input ...

  • PDF

Change of the Time Use Pattern by Internet Use: Analysis on the Korean Time Use Survey (2000, 2005) (인터넷 이용에 따른 생활시간 패턴의 변화: 2000년, 2005년 생활시간 조사를 활용한 통시적 분석)

  • Kang, Nam-Jun;Lee, Jae-Hyun;Oh, Hyun-Kyung
    • Korean journal of communication and information
    • /
    • v.41
    • /
    • pp.145-180
    • /
    • 2008
  • This study tries to test time reallocation hypothesis proposed by Lee(2005) that claims the time use pattern as a whole has changed as new media is introduced-in this case, internet-in our daily lift. It has been pointed out that researches, confined to study whether time use for traditional media is displaced by a new media, have such a limitation as 'media isolationism' and resulted in incoherent conclusions. In order to verify time reallocation hypothesis, which explains the influence of internet use on daily activities with broad perspectives, this research employed two different methods. First, this study analyzed the differences of time use patterns of daily activities and media use behaviors between internet users and non-users by using t-test. Second, logistic regression was used to confirm that the difference of time use pattern between internet users and non-users in many daily activities. The results show that time use pattern for daily activities has reorganized In the most of the age groups. Especially, in the young age groups, time reallocation by internet appeared more obvious than the equivalent old age groups.

  • PDF

A Study on the Functions and Activities of National Scholar Information Network Systems (우리나라 국가적 학술정보 유통체제의 기능 및 활동에 관한 연구)

  • Shin, Dong-Min
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.16 no.1
    • /
    • pp.285-314
    • /
    • 2005
  • The purpose of this study is to review and analyze the overlapping functions and activities of the nationwide scientific and technical information network system This study is helpful for users to gather information and for librarians and nations to reduce wastage of budgets through discarding the duplicated expenses of performing activities of the network systems. The research targets are KISTI and KERIS, which are functioning as the information network systems in the fields of science and technology. The research methods are literary reviews for theory background and analysis of their activities from internet homepages. As a result of the research, it is found and confirmed that there are some overlapping and duplicating functions and activities in the network systems.

  • PDF

Effects of The Enterprise Characteristics, CI Interest Level, and Informatization Level on CI Activities (기업 특성, 경쟁정보 관심도, 정보화 수준이 경쟁정보 활동에 미치는 영향)

  • 이헌성;강민철
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.27 no.4
    • /
    • pp.167-184
    • /
    • 2002
  • The importance of competitive intelligence (CI), which collects/uses information about competitors, industries, etc., has been increased due to the rapidly changing business environment of today. However, there exist few domestic researches on CI. With this background, a study of domestic companies was performed that examines how the enterprise characteristics, the interest on CI, and the informatization level affect the way/level and outcome of CI. Results showed that bigger enterprises have the higher interest on CI than smaller ones and enterprises having high interest perform CI activities systematically and variously including using the internet. Further, the results uncovered the enterprises performing CI actively use the information acquired from the activity effectively in their business. The results also revealed that there are no difference between the IT companies and the others and that the jnformatization level is irrelevant to the internet CI activity level.

Why Social Comparison on Instagram Matters: Its impact on Depression

  • Hwnag, Ha Sung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.3
    • /
    • pp.1626-1638
    • /
    • 2019
  • Social Networking Sites (SNS) provide people with unique online social interaction environments where users can disclose their thoughts, feelings, and opinions to their personal contacts. Although previous studies have suggested that such activities produce positive effects on SNS user well-being, this study considered potential negative effects by investigating the relationship between SNS use and depression. In particular, This stydy examined how specific activities are related to different types of social comparison (upward/downward/horizontal) and how these different types of social comparison influence depressed moods among college students. The analysis of a survey of 245 Instagram users found that (1) looking at other people's status updates and commenting on other people's photos influences upward social comparison, (2) frequency of Instagram use predicts upward/downward/horizontal social comparison, and (3) upward social comparison was postively associated with depression, while downward social comparison was negatively associated with depression. Furthermore, the path anlaysis show that social comparison mediates the effect of Instagram use on depression. It suggests that Instagram use does not directly increase depression but it can lead to depression when social comparison on Instagram triggers depression.