• Title/Summary/Keyword: News Use

Search Result 396, Processing Time 0.03 seconds

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Studies about Acceptance of Songs or Sounds 'Sori(唱)' appeared in Musical Comedy performed in Korean Traditional Music and Changeable Aspects Thereof - Centering around Korean Musical Group, Taroo - (국악뮤지컬에 나타난 소리(창(唱))의 수용 및 변화양상 연구 - "'국악뮤지컬집단 타루'를 중심으로" -)

  • Jung, Hyewon
    • Journal of Korean Theatre Studies Association
    • /
    • no.49
    • /
    • pp.5-47
    • /
    • 2013
  • Among the styles of performing arts, perhaps the genre that has attracted the largest audience would be musical. Popularity of musical has brought diverse changes in our performing arts market, and, upon emerging another musical genre, called 'Korean Traditional Musical Comedy,' it has been well-received by the audiences. 'Korean Traditional Musical Comedy' is a word that are formed by merging two other terms such as 'Korean Traditional Music' and 'Musical (Comedy).' In the meantime, however, it has yet some problems in order to be defined as the genre that has concrete concepts. It is because the term such as Korean Traditional Musical Comedy was created being closely associated with a marketing purpose rather than a term that defines the characteristics of a genre of performing arts. Although this new musical genre has drawn attentions of many audiences by adding 'Musical Comedy' to 'Korean Traditional Music' that was not quite popular to the public, it still does not have any established forms so that there is a fine line between "Korean Traditional Musical Comedy" and another genre like traditional style folk opera ("Changgeuk"). Looking at the characteristics of the musical work called 'Korean Traditional Musical Comedy, in general, first of all, it is a performance where music and drama are played. Here, the distinctive characteristic of this musical is that 'Korean Traditional Music' is sung. And the kinds of Korean traditional musics being sung are mainly Pansori (dramatic story-singing) and folk-songs, and, in most cases, Korean traditional musical instruments are being used as accompanying music. In this paper, the researcher investigated the aspects of experiment centering around Korean Musical Group, Taroo. These days, various experiments has been repeated not only for the works of Taroo but other musical work presently called 'Korean Traditional Musical Comedy' also. Having encompassed overall performance factors including use of musical instruments, dance, acting, materials for drama as well as music in drama, the researcher has gone through experiments repeatedly. Meanwhile, however, the subject matters that make 'Korean Traditional Musical Comedy' mostly attractive to the audiences are music and songs or sounds. ["Sori" also called "Chang" (唱)] Particularly, under the current situation of our musicals, the role of "Sori" is extremely important. The factor that plays absolutely most important role in acceptance and transformation of "Sori" is the created Pansori. Since the created Pansori is composed with new rhythmic patterns and new narrative poems, it tells the present story. Also it draws good responses from the audiences owing to easy conveyance of dialogues. And, its new style brings diversification to organization of musical instruments, so then this leads to the arrangements of music for Korean traditional music instruments, as well as instrumental music ensemble, orchestra, and jazz band, etc. Likewise, upon appearing creative musics in 'Korean Traditional Musical Comedy,' professional music and vocal compositions have begun to emerge naturally. And, the song specialist and writer, of course, staffs including direction, lighting, and sounds, etc are required. That is, professional composition method are forced to be introduced to all areas. Other than this, there are many music pieces which are based on our unique songs and sounds ("Sori") and such traditional factors as use of lead singer for ceremony or chorus, and the method that puts weight on Pansori. Accordingly many things accomplished. However, it is required that 'Korean Traditional Musical Comedy' go through numerous discussions and more experiments. Above all, the most important things are the role of actor and actress, and their changes, and training of actor and actress further. Good news is there are good audience responses. 'Korean Traditional Musical Comedy' is an open genre. As musicals are divided into several domains according to the characteristics thereof, 'Korean Traditional Musical Comedy' will be able to show its distinctive features in various styles according to embodiment.

A New Approach to Automatic Keyword Generation Using Inverse Vector Space Model (키워드 자동 생성에 대한 새로운 접근법: 역 벡터공간모델을 이용한 키워드 할당 방법)

  • Cho, Won-Chin;Rho, Sang-Kyu;Yun, Ji-Young Agnes;Park, Jin-Soo
    • Asia pacific journal of information systems
    • /
    • v.21 no.1
    • /
    • pp.103-122
    • /
    • 2011
  • Recently, numerous documents have been made available electronically. Internet search engines and digital libraries commonly return query results containing hundreds or even thousands of documents. In this situation, it is virtually impossible for users to examine complete documents to determine whether they might be useful for them. For this reason, some on-line documents are accompanied by a list of keywords specified by the authors in an effort to guide the users by facilitating the filtering process. In this way, a set of keywords is often considered a condensed version of the whole document and therefore plays an important role for document retrieval, Web page retrieval, document clustering, summarization, text mining, and so on. Since many academic journals ask the authors to provide a list of five or six keywords on the first page of an article, keywords are most familiar in the context of journal articles. However, many other types of documents could not benefit from the use of keywords, including Web pages, email messages, news reports, magazine articles, and business papers. Although the potential benefit is large, the implementation itself is the obstacle; manually assigning keywords to all documents is a daunting task, or even impractical in that it is extremely tedious and time-consuming requiring a certain level of domain knowledge. Therefore, it is highly desirable to automate the keyword generation process. There are mainly two approaches to achieving this aim: keyword assignment approach and keyword extraction approach. Both approaches use machine learning methods and require, for training purposes, a set of documents with keywords already attached. In the former approach, there is a given set of vocabulary, and the aim is to match them to the texts. In other words, the keywords assignment approach seeks to select the words from a controlled vocabulary that best describes a document. Although this approach is domain dependent and is not easy to transfer and expand, it can generate implicit keywords that do not appear in a document. On the other hand, in the latter approach, the aim is to extract keywords with respect to their relevance in the text without prior vocabulary. In this approach, automatic keyword generation is treated as a classification task, and keywords are commonly extracted based on supervised learning techniques. Thus, keyword extraction algorithms classify candidate keywords in a document into positive or negative examples. Several systems such as Extractor and Kea were developed using keyword extraction approach. Most indicative words in a document are selected as keywords for that document and as a result, keywords extraction is limited to terms that appear in the document. Therefore, keywords extraction cannot generate implicit keywords that are not included in a document. According to the experiment results of Turney, about 64% to 90% of keywords assigned by the authors can be found in the full text of an article. Inversely, it also means that 10% to 36% of the keywords assigned by the authors do not appear in the article, which cannot be generated through keyword extraction algorithms. Our preliminary experiment result also shows that 37% of keywords assigned by the authors are not included in the full text. This is the reason why we have decided to adopt the keyword assignment approach. In this paper, we propose a new approach for automatic keyword assignment namely IVSM(Inverse Vector Space Model). The model is based on a vector space model. which is a conventional information retrieval model that represents documents and queries by vectors in a multidimensional space. IVSM generates an appropriate keyword set for a specific document by measuring the distance between the document and the keyword sets. The keyword assignment process of IVSM is as follows: (1) calculating the vector length of each keyword set based on each keyword weight; (2) preprocessing and parsing a target document that does not have keywords; (3) calculating the vector length of the target document based on the term frequency; (4) measuring the cosine similarity between each keyword set and the target document; and (5) generating keywords that have high similarity scores. Two keyword generation systems were implemented applying IVSM: IVSM system for Web-based community service and stand-alone IVSM system. Firstly, the IVSM system is implemented in a community service for sharing knowledge and opinions on current trends such as fashion, movies, social problems, and health information. The stand-alone IVSM system is dedicated to generating keywords for academic papers, and, indeed, it has been tested through a number of academic papers including those published by the Korean Association of Shipping and Logistics, the Korea Research Academy of Distribution Information, the Korea Logistics Society, the Korea Logistics Research Association, and the Korea Port Economic Association. We measured the performance of IVSM by the number of matches between the IVSM-generated keywords and the author-assigned keywords. According to our experiment, the precisions of IVSM applied to Web-based community service and academic journals were 0.75 and 0.71, respectively. The performance of both systems is much better than that of baseline systems that generate keywords based on simple probability. Also, IVSM shows comparable performance to Extractor that is a representative system of keyword extraction approach developed by Turney. As electronic documents increase, we expect that IVSM proposed in this paper can be applied to many electronic documents in Web-based community and digital library.

A Study of the Effect of Model Characteristics on Purchasing intentions and Brand Attitudes (광고모델 특성이 구매의도와 브랜드태도에 미치는 영향)

  • Kim, Sung-Duck;Youn, Myoung-Kil;Kim, Ki-Soo
    • Journal of Distribution Science
    • /
    • v.10 no.4
    • /
    • pp.47-53
    • /
    • 2012
  • Businesses make use of advertising strategy using models to give consumers efficient product information. Modern advertisements often make use of models for greater reminiscence to create messages and remind viewers of the product. The purpose of this study was to examine the characteristics of each type of model. The subjects were 230 college students in their twenties or older, and the material was collected from October 20, 2011 to November 5, 2011 to examine the effects of model characteristics on buying intention as well as attitude toward a brand. A questionnaire survey was used; investigators gave one copy to each interviewee. The study investigated the characteristics of each model using a questionnaire of each 40 copies with five kinds of photographs. The characteristics of models had great influence on buying intention and attitude toward the brand: First, factor 2 (being honest and virtuous and having good credit and a good press assessment) and factor 3 (being interesting and a good communicator and creating good memories) had great influence on buying intention. Factor 2 was explained by reliability, and factor 3 by the efficiency of the model in creating a feeling. Second, factors 1 (being attractive, smart, unique, friendly, loved by others, and popular), 2, and 3 influenced attitude toward brand. Factor 1 encapsulated the outgoing characteristics of a model, factor 2 was based on reliability, and factor 3 was based on the efficiency of the model in creating a feeling. The model's positive effects on buying intention and attitudes toward brand shall be examined. For their positive influence on buying intention, reliability and efficiency shall be given attention. For their positive influence on attitude toward brand, creating a good impression, having outgoing characteristics, being reliable, and efficiency shall be given attention. The findings were as follows: Model characteristics influencing buying intention were similar to those influencing attitude toward brand. The differences were as follows. First, reliability and efficiency influenced buying intention. When customers were asked to consider the influence on buying intention of an advertisement, regardless of the strength of the buying intention, they considered these two characteristics. Customers decided to buy based not only on the credibility of the product as presented in the advertisement but also the transmission of the contents of the advertisement. Second, outgoing characteristics, reliability, and efficiency influenced attitude toward a brand. The attitude toward a brand was said to be the attitude toward the business. The attitude is produced even after buying, so businesses view it as very important. The attitude might vary depending upon the model used rather than the brand. Therefore, a model with outgoing characteristics was thought to be important. Therefore, attitude toward a brand whose model influenced buying intention as well as attitude toward brand had outgoing characteristics. The result is that an image the model was related to attitude toward the brand. As such, customers would buy the goods advertised. However, an outgoing image of a model was also important to create a positive attitude toward a business brand. For instance, talent Park Gyeong-Rim's photo was used to promote cosmetics about 10 years ago. When she worked as a model of cosmetics products, she had to make compensation for losses and damages because she made a mistake on a talk show program. At that time, customers who had bought the cosmetics product asked for refunds of several billion won. As such, models who are said to be the face of the businesses they represent can play an important role. To advertise in the most attractive and effective way, the current image of a model should be investigated by examining current activities and news articles after selecting the model, and the model's efficiency and attitude toward the brand should be examined. Factors that stimulate customers' buying decisions can be used to plan advertisement that have positive influence on a brand. This study had the limitation of investigating mainly college students and there were insufficient copies of the questionnaire. The investigation was not done widely but in detail so that a concrete investigation could not be done. Further studies shall supplement these shortcomings and discuss new directions.

  • PDF

The study of Breast Specific Gamma Imaging Protocol using Self-development Phantom (자체 제작된 팬텀을 적용한 Breast Specific Gamma Imaging 검사 프로토콜에 대한 고찰)

  • Lee, Hae-Jung;Lee, Juyoung;Lim, Kuen-Kyo;Park, Hoon-Hee
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.18 no.2
    • /
    • pp.39-47
    • /
    • 2014
  • Purpose As breast cancer patients continue to increase every year, cases of BSGI are on the rise with a heavier reliance on it. However, BSGI protocol in hospitals was not studied enough despite it was covered by hospital's condition and recommendation of manufacturers. The objective of the study was an examination of methods to be applicable to BSGI protocols, putting the self-development phantom to use in quality assessment of the images. Materials and Methods Dilon 6800 (Dilon Technologies Inc, Newport News, USA) was used in the study and five different sizes of sphere were distinctively produced in the phantom. The study used $^{99m}TcO_4$. The cases were classified in to three categories that background radioactivity to region of interest as ratio of 2: 4: 8, They were acquired images for 5, 7, 10mins. The acquired image was set region of interest according to the size of sphere, and We analyzed quantitative and qualitative analysis. The acquired data statistically analyzed with SPSS ver.18.0. Results As the result of quantitative and qualitative analysis, count rate of each sphere in accordance with difference of injection dose showed that higher count rate as injection dose and sphere size increased (P<0.005). Count rate of each sphere in accordance with difference of acquisition time showed that higher count rate as acquisition time and sphere size increased (P<0.005). Contrast noise ratio of each sphere in accordance with difference of injection dose showed that higher contrast noise ratio as injection dose increased. Particularly, Contrast noise ratio of eight times ratio images was the highest among. Contrast noise ratio of each sphere in accordance with difference of acquisition time showed that higher contrast noise ratio as acquisition time increased. And, Contrast noise ratio of seven minute image was the highest among (P<0.005). Conclusion There was significant change of Contrast noise ratio through quantitative and qualitative analysis. Moreover, We found usefulness of phantom. If Institutions identified image through the phantom study and they made BSGI protocol, We expected to help the improvement of diagnostic value of the images.

  • PDF

A Literature Review and Classification of Recommender Systems on Academic Journals (추천시스템관련 학술논문 분석 및 분류)

  • Park, Deuk-Hee;Kim, Hyea-Kyeong;Choi, Il-Young;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.139-152
    • /
    • 2011
  • Recommender systems have become an important research field since the emergence of the first paper on collaborative filtering in the mid-1990s. In general, recommender systems are defined as the supporting systems which help users to find information, products, or services (such as books, movies, music, digital products, web sites, and TV programs) by aggregating and analyzing suggestions from other users, which mean reviews from various authorities, and user attributes. However, as academic researches on recommender systems have increased significantly over the last ten years, more researches are required to be applicable in the real world situation. Because research field on recommender systems is still wide and less mature than other research fields. Accordingly, the existing articles on recommender systems need to be reviewed toward the next generation of recommender systems. However, it would be not easy to confine the recommender system researches to specific disciplines, considering the nature of the recommender system researches. So, we reviewed all articles on recommender systems from 37 journals which were published from 2001 to 2010. The 37 journals are selected from top 125 journals of the MIS Journal Rankings. Also, the literature search was based on the descriptors "Recommender system", "Recommendation system", "Personalization system", "Collaborative filtering" and "Contents filtering". The full text of each article was reviewed to eliminate the article that was not actually related to recommender systems. Many of articles were excluded because the articles such as Conference papers, master's and doctoral dissertations, textbook, unpublished working papers, non-English publication papers and news were unfit for our research. We classified articles by year of publication, journals, recommendation fields, and data mining techniques. The recommendation fields and data mining techniques of 187 articles are reviewed and classified into eight recommendation fields (book, document, image, movie, music, shopping, TV program, and others) and eight data mining techniques (association rule, clustering, decision tree, k-nearest neighbor, link analysis, neural network, regression, and other heuristic methods). The results represented in this paper have several significant implications. First, based on previous publication rates, the interest in the recommender system related research will grow significantly in the future. Second, 49 articles are related to movie recommendation whereas image and TV program recommendation are identified in only 6 articles. This result has been caused by the easy use of MovieLens data set. So, it is necessary to prepare data set of other fields. Third, recently social network analysis has been used in the various applications. However studies on recommender systems using social network analysis are deficient. Henceforth, we expect that new recommendation approaches using social network analysis will be developed in the recommender systems. So, it will be an interesting and further research area to evaluate the recommendation system researches using social method analysis. This result provides trend of recommender system researches by examining the published literature, and provides practitioners and researchers with insight and future direction on recommender systems. We hope that this research helps anyone who is interested in recommender systems research to gain insight for future research.

A Study for Factors Influencing the Usage Increase and Decrease of Mobile Data Service: Based on The Two Factor Theory (모바일 데이터 서비스 사용량 증감에 영향을 미치는 요인들에 관한 연구: 이요인 이론(Two Factor Theory)을 바탕으로)

  • Lee, Sang-Hoon;Kim, Il-Kyung;Lee, Ho-Geun;Park, Hyun-Jee
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.97-122
    • /
    • 2007
  • Conventional networking and telecommunications infrastructure characterized by wires, fixed location, and inflexibility is giving way to mobile technologies. Numerous research reports point to the ultimate domination of wireless communication. With the increasing prevalence of advanced cell-phones, various mobile data services (hereafter MDS) are gaining popularity. Although cellular networks were originally introduced for voice communications, statistics indicate that data services are replacing the matured voice service as the growth engine for telecom service providers. For example, SK Telecom, the Korea's largest mobile service provider, reported that 25.6% of revenue and 28.5% of profit came from MDS in 2006 and the share is growing. Statistics also indicate that, in 2006, the average revenue per user (ARPU) for voice didn't change but MDS grew seven percents from the previous year, further highlighting its growth potential. MDS is defined "as an assortment of digital data services that can be accessed using a mobile device over a wide geographic area." A variety of MDS have been deployed, with a few reaching the status of killer applications. Many of them need to access the Internet through the cellular-phone infrastructure. In the past, when the cellular network didn't have acceptable bandwidth for data services, SMS (short messaging service) dominated MDS. Now, Internet-ready, next-generation cell-phones are driving rich digital data services into the fabric of everyday life, These include news on various topics, Internet search, mapping and location-based information, mobile banking and gaming, downloading (i.e., screen savers), multimedia streaming, and various communication services (i.e., email, short messaging, messenger, and chaffing). The huge economic stake MDS has on its stakeholders warrants focused research to understand associated dynamics behind its adoption. Lyytinen and Yoo(2002) pointed out the limitation of traditional adoption models in explaining the rapid diffusion of innovations such as P2P or mobile services. Also, despite the increasing popularity of MDS, unexpected drop in its usage is observed among some people. Intrigued by these observations, an exploratory study was conducted to examine decision factors of MDS usage. Data analysis revealed that the increase and decrease of MDS use was influenced by different forces. The findings of the exploratory study triggered our confirmatory research effort to validate the uni-directionality of studied factors in affecting MDS usage. This differs from extant studies of IS/IT adoption that are largely grounded on the assumption of bi-directionality of explanatory variables in determining the level of dependent variables (i.e., user satisfaction, service usage). The research goal is, therefore, to examine if increase and decrease in the usage of MDS are explained by two separate groups of variables pertaining to information quality and system quality. For this, we investigate following research questions: (1) Does the information quality of MDS increase service usage?; (2) Does the system quality of MDS decrease service usage?; and (3) Does user motivation for subscribing MDS moderate the effect information and system quality have on service usage? The research questions and subsequent analysis are grounded on the two factor theory pioneered by Hertzberg et al(1959). To answer the research questions, in the first, an exploratory study based on 378 survey responses was conducted to learn about important decision factors of MDS usage. It revealed discrepancy between the influencing forces of usage increase and those of usage decrease. Based on the findings from the exploratory study and the two-factor theory, we postulated information quality as the motivator and system quality as the de-motivator (or hygiene) of MDS. Then, a confirmative study was undertaken on their respective role in encouraging and discouraging the usage of mobile data service.

WHICH INFORMATION MOVES PRICES: EVIDENCE FROM DAYS WITH DIVIDEND AND EARNINGS ANNOUNCEMENTS AND INSIDER TRADING

  • Kim, Chan-Wung;Lee, Jae-Ha
    • The Korean Journal of Financial Studies
    • /
    • v.3 no.1
    • /
    • pp.233-265
    • /
    • 1996
  • We examine the impact of public and private information on price movements using the thirty DJIA stocks and twenty-one NASDAQ stocks. We find that the standard deviation of daily returns on information days (dividend announcement, earnings announcement, insider purchase, or insider sale) is much higher than on no-information days. Both public information matters at the NYSE, probably due to masked identification of insiders. Earnings announcement has the greatest impact for both DJIA and NASDAQ stocks, and there is some evidence of positive impact of insider asle on return volatility of NASDAQ stocks. There has been considerable debate, e.g., French and Roll (1986), over whether market volatility is due to public information or private information-the latter gathered through costly search and only revealed through trading. Public information is composed of (1) marketwide public information such as regularly scheduled federal economic announcements (e.g., employment, GNP, leading indicators) and (2) company-specific public information such as dividend and earnings announcements. Policy makers and corporate insiders have a better access to marketwide private information (e.g., a new monetary policy decision made in the Federal Reserve Board meeting) and company-specific private information, respectively, compated to the general public. Ederington and Lee (1993) show that marketwide public information accounts for most of the observed volatility patterns in interest rate and foreign exchange futures markets. Company-specific public information is explored by Patell and Wolfson (1984) and Jennings and Starks (1985). They show that dividend and earnings announcements induce higher than normal volatility in equity prices. Kyle (1985), Admati and Pfleiderer (1988), Barclay, Litzenberger and Warner (1990), Foster and Viswanathan (1990), Back (1992), and Barclay and Warner (1993) show that the private information help by informed traders and revealed through trading influences market volatility. Cornell and Sirri (1992)' and Meulbroek (1992) investigate the actual insider trading activities in a tender offer case and the prosecuted illegal trading cased, respectively. This paper examines the aggregate and individual impact of marketwide information, company-specific public information, and company-specific private information on equity prices. Specifically, we use the thirty common stocks in the Dow Jones Industrial Average (DJIA) and twenty one National Association of Securities Dealers Automated Quotations (NASDAQ) common stocks to examine how their prices react to information. Marketwide information (public and private) is estimated by the movement in the Standard and Poors (S & P) 500 Index price for the DJIA stocks and the movement in the NASDAQ Composite Index price for the NASDAQ stocks. Divedend and earnings announcements are used as a subset of company-specific public information. The trading activity of corporate insiders (major corporate officers, members of the board of directors, and owners of at least 10 percent of any equity class) with an access to private information can be cannot legally trade on private information. Therefore, most insider transactions are not necessarily based on private information. Nevertheless, we hypothesize that market participants observe how insiders trade in order to infer any information that they cannot possess because insiders tend to buy (sell) when they have good (bad) information about their company. For example, Damodaran and Liu (1993) show that insiders of real estate investment trusts buy (sell) after they receive favorable (unfavorable) appraisal news before the information in these appraisals is released to the public. Price discovery in a competitive multiple-dealership market (NASDAQ) would be different from that in a monopolistic specialist system (NYSE). Consequently, we hypothesize that NASDAQ stocks are affected more by private information (or more precisely, insider trading) than the DJIA stocks. In the next section, we describe our choices of the fifty-one stocks and the public and private information set. We also discuss institutional differences between the NYSE and the NASDAQ market. In Section II, we examine the implications of public and private information for the volatility of daily returns of each stock. In Section III, we turn to the question of the relative importance of individual elements of our information set. Further analysis of the five DJIA stocks and the four NASDAQ stocks that are most sensitive to earnings announcements is given in Section IV, and our results are summarized in Section V.

  • PDF

A Study on the Cause Analysis and Countermeasures of the Traditional Market for Fires in the TRIZ Method (TRIZ 기법에 의한 재래시장 화재의 원인분석과 대책에 관한 연구)

  • Seo, Yong-Goo;Min, Se-Hong
    • Fire Science and Engineering
    • /
    • v.31 no.4
    • /
    • pp.95-102
    • /
    • 2017
  • The fires in the traditional markets often occur recently with the most of them expanded into great fires so that the damage is very serious. The status of traditional markets handling the distribution for ordinary people is greatly shrunk with the aggressive marketing of the local large companies and the foreign large distribution companies after the overall opening of the local distribution market. Most of the traditional markets have the history and tradition from decades to centuries and have grown steadily with the joys and sorrows of ordinary people and the development of the local economy. The fire developing to the large fire has the characteristics of the problem that the fire possibility is high since all products can be flammable due to the deterioration of facilities, the arbitrary modification of equipment, and the crowding of the goods for sale. Furthermore, most of the stores are petty with their small sizes so that the passage is narrow affecting the passage of pedestrians. Accordingly, the traditional markets are vulnerable to fire due to the initial unplanned structural problem so that the large scale fire damage occurs. The study is concerned with systematically classifying and analyzing the result by applying the TRIZ tool to the fire risk factors to extract the fundamental problem with the fire of the traditional market and make the active response. The study was done for preventing the fire on the basis of it and the expansion to the large fire in case of fire to prepare the specific measure to minimize the fire damage. On the basis of the fire expansion risk factor of the derived traditional market, the study presented the passive measures such as the improvement of the fire resisting capacity, the fire safety island, etc. and the active and institutional measures such as the obligation of the fire breaking news facilities, the application of the extra-high pressure pump system, the divided use of the electric line, etc.

The Promotion State and Measures to Improve the Record Information Disclosure System (기록정보공개 제도 개선 추진 현황과 방안)

  • Zoh, Young-Sam
    • The Korean Journal of Archival Studies
    • /
    • no.22
    • /
    • pp.77-114
    • /
    • 2009
  • The right to know is not satisfied merely by making or improving laws or systems. The right to know is a matter of culture rather than system. Nevertheless, consistent system improvement measures are required. There are many laws relating to the right to know. In particular, at the core are the Official Information Disclosure Act, the Record and Archives Management Act, and the Presidential Record Management Act. The fact that systems relating to official record management and presidential record management are related to the right to know is understood by the promotion of records and archives management reform after the year 2004, as a result of which the national archives management innovation road map was established. Reflecting the many opinions of the "Information Disclosure System Improvement Task Force" composed with participation of the government and the press after the participatory government's announcement of "Measures to Advance the Support System for News Coverage," amendments to the Information Disclosure Act have come forward with system improvement measures in connection with issues that had arisen until then. Such improvement measures have not resulted in actual improvements. This thesis proposes several system improvement measures, focusing on those that have arisen until now but have not been reflected in discussion, such as converting the concept of information non-disclosure into disclosure postponement, preparing and disclosing particular information disclosure standards, specifying personal information for non-disclosure, specifying and strictly applying any information that has not been disclosed for purposes of internal review, deleting non-disclosure items in stenographic records that do not have a reason to exist, and establishing limits and terms of non-disclosure. Of the most remarkable system improvement measures that have been made until now is our recognition that the right to know is not limited to the information disclosure system but that the "cause" of archive management should be systematic and scientific. In other words, the right to know is understood to establish not just accidential factors, such as with a whistle-blower, but the inevitable factors of systemization of production, distribution, preservation, and use of archives. Much more study should be pursued regarding disclosure of archives information. In particular, difficult issues to be resolved regarding reading records at permanent archives management institutions, such as the National Archives of Korea, or copyrights that arise in the process, require constant study from academia and relevant institutions.