• 제목/요약/키워드: Key issues

검색결과 1,698건 처리시간 0.024초

Reorganizing Social Issues from R&D Perspective Using Social Network Analysis

  • Shun Wong, William Xiu;Kim, Namgyu
    • Journal of Information Technology Applications and Management
    • /
    • 제22권3호
    • /
    • pp.83-103
    • /
    • 2015
  • The rapid development of internet technologies and social media over the last few years has generated a huge amount of unstructured text data, which contains a great deal of valuable information and issues. Therefore, text mining-extracting meaningful information from unstructured text data-has gained attention from many researchers in various fields. Topic analysis is a text mining application that is used to determine the main issues in a large volume of text documents. However, it is difficult to identify related issues or meaningful insights as the number of issues derived through topic analysis is too large. Furthermore, traditional issue-clustering methods can only be performed based on the co-occurrence frequency of issue keywords in many documents. Therefore, an association between issues that have a low co-occurrence frequency cannot be recognized using traditional issue-clustering methods, even if those issues are strongly related in other perspectives. Therefore, in this research, a methodology to reorganize social issues from a research and development (R&D) perspective using social network analysis is proposed. Using an R&D perspective lexicon, issues that consistently share the same R&D keywords can be further identified through social network analysis. In this study, the R&D keywords that are associated with a particular issue imply the key technology elements that are needed to solve a particular issue. Issue clustering can then be performed based on the analysis results. Furthermore, the relationship between issues that share the same R&D keywords can be reorganized more systematically, by grouping them into clusters according to the R&D perspective lexicon. We expect that our methodology will contribute to establishing efficient R&D investment policies at the national level by enhancing the reusability of R&D knowledge, based on issue clustering using the R&D perspective lexicon. In addition, business companies could also utilize the results by aligning the R&D with their business strategy plans, to help companies develop innovative products and new technologies that sustain innovative business models.

Future of Organised Retailing in India - The Critical HR Issues

  • Nandi, Subrata Kumar
    • 아태비즈니스연구
    • /
    • 제4권2호
    • /
    • pp.1-10
    • /
    • 2013
  • According to the Global Retail Development Index (GRDI) published by A.T. Kearney (2012), India is the $5^{th}$ most attractive retail destination in the world. The retail industry in India has been largely fragmented with small businesses dominating the retail landscape, with very few large players having multiple retail outlets. However, in the last few years, the industry has witnessed a significant growth in the number of large retailers having a chain of outlets across the country. This growth in the organised retail sector has driven primarily by large Indian retail organisations and conglomerates. With the government reducing the restrictions on foreign participation in Indian retail business by increasing the FDI cap on both single and multi-brand retail outlets, the industry is likely to see an explosive growth in the organised retail sector which accounts for only 8 percent of the total industry. With more foreign retailers poised to enter into the country, one of the key issues that the industry may face is finding the right quality of manpower. Literature suggests that in an industry which is characterised by players offering similar kinds of product assortments at similar price levels, success would be governed by the quality of service, which entails employees having the right skills and attitudes for offering quality service. Therefore, the two key issues that may be of importance for retailers are levels of skills and the motivation of the employees. However, according to the National Skill Development Corporation (NSDC, 2009), a significant skill gap exists in the industry, which may widen further in the years ahead, leading to greater challenges for organisations. This paper highlights some of the challenges and issues which characterise the industry in India, and suggests how companies could look at these challenges and seek ways to overcome these challenges.

  • PDF

통계적 문제해결 지도를 위한 예비초등교사들의 통계적 소양 조사 연구 (Pre-Service Elementary School Teachers' Statistical Literacy Related To Statistical Problem Solving)

  • 고은성;박민선
    • 대한수학교육학회지:학교수학
    • /
    • 제19권3호
    • /
    • pp.443-459
    • /
    • 2017
  • 최근 통계적 소양이 통계교육의 모든 목표를 포괄한다고 보는 통계적 소양에 대한 대안적 관점이 강조되고 있다. 통계적 소양에 대한 대안적 관점과 통계교육 및 평가에서의 통계적 소양에 대한 다양성 관점을 바탕으로 살펴보면, 통계적 문제해결과 관련된 핵심 이슈 및 아이디어들을 통계적 소양을 구성하는 요소로 간주할 수 있다. 본 연구의 목적은 통계적 문제해결의 각 단계에서의 핵심 이슈에 대한 예비초등교사들의 이해를 조사하는 것이다. 이를 위해 먼저 통계적 문제해결에 관한 선행연구를 바탕으로 각 단계에서의 핵심 이슈들을 선별하여 분석틀을 개발하였다. 다음으로 26명의 예비초등교사들에게 통계 포스터를 비판적으로 분석하게 하여 각 이슈에 대한 예비초등교사들의 이해를 조사하고, 통계교육에서의 교사 교육에 관한 시사점을 도출하였다.

Web of Science 빅데이터를 활용한 텍스트 마이닝 기반의 정보윤리 이슈 탐색 (Exploring Information Ethics Issues based on Text Mining using Big Data from Web of Science)

  • 김한성
    • 컴퓨터교육학회논문지
    • /
    • 제22권3호
    • /
    • pp.67-78
    • /
    • 2019
  • 본 연구의 목적은 Web of Science(WoS)에서 제공하는 학술 빅데이터를 활용하여 정보윤리 이슈를 탐색하고 향후 정보과 정보윤리 교육을 위한 시사점을 제공하는 것에 있다. 이를 위해 WoS에서 제공하는 학술논문 중 정보윤리와 관련해 출판된 318편의 논문을 텍스트 마이닝 하였다. 구체적으로는 R을 활용해 주요키워드에 대한 빈도 분석(TF, DF, TF-IDF), 토픽 모델링 기반의 정보윤리 이슈 분석, 그리고 각 이슈에 대한 연도별 출연 빈도를 분석하여 정보윤리 연구의 경향성을 탐색하였다. 주요 결과를 살펴보면 다음과 같다. 첫째, TF-IDF를 통해 'digital', 'student', 'software', 'privacy' 등의 단어가 주요 키워드임을 확인하였다. 둘째, 토픽 모델링 분석 결과, 'Professional value', 'Cyber-bullying', 'AI and Social Impact' 등을 포함한 총 8개 이슈로 분석되었고, 그 중, 'Professional value'와 'Cyber-bullying' 이슈가 상대적으로 높은 비율을 차지하고 있었다. 본 연구는 이러한 분석 결과를 기초로 우리나라 정보윤리 교육을 시사점을 논의하였다.

안전한 클라우드 서비스를 위한 상호의존적 다중세션 인증 기법 설계 (A Design of Interdependent Multi Session Authentication Scheme for Secure Cloud Service)

  • 송준호;최도현;박중오
    • 디지털산업정보학회논문지
    • /
    • 제10권3호
    • /
    • pp.181-196
    • /
    • 2014
  • Cloud computer technology currently provides diverse services based on a comprehensive environment ranging from hardware to solution, network and service. While the target of services has been extended from institutions and corporations to personal infrastructure and issues were made about security problems involved with protection of private information, measures on additional security demands for such service characteristics are insufficient. This paper proposes a multi-session authentication technique based on the characteristics of SaaS (Software as a Service) among cloud services. With no reliable authentication authority, the proposed technique reinforced communication sessions by performing key agreement protocol safe against key exposure and multi-channel session authentication, providing high efficiency of performance through key renewal using optimzied key table. Each formed sessions have resistance against deprivation of individual confirmation and service authority. Suggested confirmation technique that uses these features is expected to provide safe computing service in clouding environment.

Cryptanalysis of Hu-Niu-Yang's Multi-server Password Authenticated Key Agreement Schemes Using Smart Card

  • Lee, Sang-Gon;Lim, Meng-Hui;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • 제7권3호
    • /
    • pp.340-344
    • /
    • 2009
  • Multi-server password authentication schemes enable remote users to obtain service from multiple servers with single password without separately registering to each server. In 2007, Hu-Niu-Yang proposed an improved efficient password authenticated key agreement scheme for multi-server architecture based on Chang-Lee's scheme proposed in 2004. This scheme is claimed to be more efficient and is able to overcome a few existing deficiencies in Chang-Lee's scheme. However, we find false claim of forward secrecy property and some potential threats such as offline dictionary attack, key-compromise attack, and poor reparability in their scheme. In this paper, we will discuss these issues in depth.

MANET의 멀티캐스트 환경에서 신뢰성 향상을 위한 계층기반 암호 프로토콜 기법 연구 (A Study on Hierarchy-based Secure Encryption Protocol for Trust Improvement on Multicast Environment of MANET)

  • 양환석
    • 디지털산업정보학회논문지
    • /
    • 제13권3호
    • /
    • pp.43-51
    • /
    • 2017
  • MANET consists of only wireless nodes having limited processing capability. It processes routing and data transmission through cooperation among each other. And it is exposed to many attack threats due to the dynamic topology by movement of nodes and multi-hop communication. Therefore, the reliability of transmitted data between nodes must be improved and security of integrity must be high. In this paper, we propose a method to increase the reliability of transmitted data by providing a secure cryptography protocol. The proposed method used a hierarchical structure to provide smooth cryptographic services. The cluster authentication node issues the cluster authentication key pair and unique key to the nodes. The nodes performs the encryption through two steps of encryption using cluster public key and block encryption using unique key. Because of this, the robustness against data forgery attacks was heightened. The superior performance of the proposed method can be confirmed through comparative experiment with the existing security routing method.

An Efficient Implementation of Key Frame Extraction and Sharing in Android for Wireless Video Sensor Network

  • Kim, Kang-Wook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권9호
    • /
    • pp.3357-3376
    • /
    • 2015
  • Wireless sensor network is an important research topic that has attracted a lot of attention in recent years. However, most of the interest has focused on wireless sensor network to gather scalar data such as temperature, humidity and vibration. Scalar data are insufficient for diverse applications such as video surveillance, target recognition and traffic monitoring. However, if we use camera sensors in wireless sensor network to collect video data which are vast in information, they can provide important visual information. Video sensor networks continue to gain interest due to their ability to collect video information for a wide range of applications in the past few years. However, how to efficiently store the massive data that reflect environmental state of different times in video sensor network and how to quickly search interested information from them are challenging issues in current research, especially when the sensor network environment is complicated. Therefore, in this paper, we propose a fast algorithm for extracting key frames from video and describe the design and implementation of key frame extraction and sharing in Android for wireless video sensor network.

Survey of Cognitive Radio VANET

  • He, Xinxin;Shi, Weisen;Luo, Tao
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권11호
    • /
    • pp.3837-3859
    • /
    • 2014
  • Vehicular Ad hoc Networks (VANET) becomes more popular in industry, academia and government. However, Typical VANET is challenged by high speed mobility and insufficient spectrum resources over congested scenarios. To address those serious problems, some articles have introduced Cognitive Radio (CR) technology into VANET and formed CR-VANET. In this article, we propose an overview of CR-VANET by exploring different architectures and features. Moreover, we provide taxonomy of state-of-the-art papers in this emerging field and the key articles are well analyzed respectively. In addition, we illustrate both research and application frameworks of CR-VANET based on our works, and propose some open research issues for inspiring future work.