• Title/Summary/Keyword: Personal Information Management System

Search Result 755, Processing Time 0.025 seconds

Study on smart contents development directions for children with autistic disorder to enhance adaptive behavior (자폐성장애 아동의 적응행동 향상을 위한 스마트 콘텐츠 개발 방향에 대한 연구)

  • Han, Dong-Wook;Kang, Min-Chae
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.123-131
    • /
    • 2013
  • This study aims to investigate development directions for smart contents to support enhancing adaptive behavior skills of children with autistic disorder in elementary school. AHP survey of experts including special education teachers and directors in educational institution for disability children was performed to analyze importance weight for smart contents development necessity and effectiveness in adaptive behavior skills. And the smart contents development suitability through pre-discussion for idea generation for various development method and AHP survey with smart application development experts was evaluated. The results show that the effective and suitable adaptive behavior skills for smart contents development were understanding of languaging, time management and keeping, movement skills, wearing clothes, and personal hygiene in order of importance. Based on this study, education authorities should make an effort not to develop fragmentary educational smart contents but to support development of smart contents and service systems with better effectiveness and usability to meet demand for special education teachers and parents considering characteristics of children with autism.

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

A Study on Decision Making for Blockchain-based IT Platform Selection for Security Token (블록체인 기반의 토큰 증권 IT 플랫폼 선택을 위한 의사결정 연구)

  • Soo-oh Yang;Byung Wan Suh
    • Journal of Platform Technology
    • /
    • v.11 no.5
    • /
    • pp.37-48
    • /
    • 2023
  • Since the announcement of the Financial Services Commission's 'Token Securities Issuance and Distribution System Improvement Plan' in February 2023, financial institutions, securities firms, and blockchain companies have been actively considering implementing IT platforms, but they are facing difficulties in selecting IT platforms for token securities because related legal regulations have not yet been clearly established. As a result, the need for rational and systematic criteria for the selection of blockchain-based token securities IT platforms has emerged, and this study explores and evaluates the key factors of token securities IT platform selection. Four factors were identified as the top-level factors, including 'maturity of the platform', 'operation and management of the platform', 'cost of introducing and maintaining the platform', and 'regulatory compliance for token securities', and 17 factors were identified as sub-level factors, including 'diversity', 'user authentication management', 'Adoption Costs', and 'financial regulations'. Among the 17 sub-factors, 'government financial regulation' and 'personal information protection' are selected as important factors, and the results of this study can help related organizations and financial companies make strategic decisions by providing systematic decision-making criteria for selecting token securities IT platforms.

  • PDF

Design of Embedded Security Controller Based on Client Authentication Utilizing User Movement Information (사용자의 이동정보를 활용한 클라이언트 인증 기반의 임베디드 보안 컨트롤러 설계)

  • Hong, Suk-Won
    • Journal of Digital Convergence
    • /
    • v.18 no.3
    • /
    • pp.163-169
    • /
    • 2020
  • A smart key has been used in a variety of embedded environments and there also have been attacks from a remote place by amplifying signals at a location of a user. Existing studies on defence techniques suggest multiple sensors and hash functions to improve authentication speed; these, however, increase the electricity usage and the probability of type 1 error. For these reasons, I suggest an embedded security controller based on client authentication and user movement information improving the authentication method between a controller and a host device. I applied encryption algorithm to the suggested model for communication using an Arduino board, GPS, and Bluetooth and performed authentication through path analysis utilizing user movement information for the authentication. I found that the change in usability was nonsignificant when performing actions using the suggested model by evaluating the time to encode and decode. The embedded security controller in the model can be applied to the system of a remote controller for a two-wheeled vehicle or a mobile and stationary host device; in the process of studying, I found that encryption and decryption could take less then 100ms. The later study may deal with protocols to speed up the data communication including encryption and decryption and the path data management.

The Plans for Core Personnel Management to Prevent Industrial Technology Leakage (산업기술 유출방지를 위한 핵심인력 관리방안에 관한 연구)

  • Kim, Soon-Seok;Shin, Jae-Chul
    • Korean Security Journal
    • /
    • no.25
    • /
    • pp.109-130
    • /
    • 2010
  • As many countries in the world including the Republic of Korea have used all their national resources in the accelerating economic information warfare, illegal leakage of industrial technologies and information has increased rapidly. The costs required for damage prevention from 2007 to 2008 are estimated at approximately KRW 180 trillion which is expected to increase gradually in future. Because the tricks of leaking key technologies are also getting increasingly systematized, sophisticated and bigger, e.g., simple theft at the individual level or the conspiracy of all the staff taking part in the research activities, we should pay special attention to technology security in addition to technology development. While there are several factors affecting such the brain drain, they usually include personal, social, political and cultural factors, for instance, very heavy educational expenditure of children compared to relatively low pay, the speedy labor market circulation for experienced personnel, or political restrictions on researches. In this context, as part of efforts made to prevent the outflow of core personnel, individual companies and research institutes should establish systematically appropriate core personnel management systems for their own organizational or business goals and principles which are intented to ensure to give better treatment and benefit to core personnel and to exercise closer supervision over them. Furthermore, the conventional personnel management system should be radically and flexibly improved in the manner of encouraging the core personnel returning to the organization to combine their external experiences with practices, instead of penalizing them. At the same time, it is necessary to train and educate core personnel through mutual collaboration and in-house training facilities as well as external academic programs operated jointly at the level of the industry. Finally, as the issues concerning the outflow of core personnel are not just problems of relevant companies and other advanced countries have devoted their best efforts to secure their own key technologies at the national level, it is urgent for the industry and the competent authorities to cooperate closely.

  • PDF

A Study on the Impact of SNS Usage Characteristics, Characteristics of Loan Products, and Personal Characteristics on Credit Loan Repayment (SNS 사용특성, 대출특성, 개인특성이 신용대출 상환에 미치는 영향에 관한 연구)

  • Jeong, Wonhoon;Lee, Jaesoon
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.18 no.5
    • /
    • pp.77-90
    • /
    • 2023
  • This study aims to investigate the potential of alternative credit assessment through Social Networking Sites (SNS) as a complementary tool to conventional loan review processes. It seeks to discern the impact of SNS usage characteristics and loan product attributes on credit loan repayment. To achieve this objective, we conducted a binomial logistic regression analysis examining the influence of SNS usage patterns, loan characteristics, and personal attributes on credit loan conditions, utilizing data from Company A's credit loan program, which integrates SNS data into its actual loan review processes. Our findings reveal several noteworthy insights. Firstly, with respect to profile photos that reflect users' personalities and individual characteristics, individuals who choose to upload photos directly connected to their personal lives, such as images of themselves, their private circles (e.g., family and friends), and photos depicting social activities like hobbies, which tend to be favored by individuals with extroverted tendencies, as well as character and humor-themed photos, which are typically favored by individuals with conscientious traits, demonstrate a higher propensity for diligently repaying credit loans. Conversely, the utilization of photos like landscapes or images concealing one's identity did not exhibit a statistically significant causal relationship with loan repayment. Furthermore, a positive correlation was observed between the extent of SNS usage and the likelihood of loan repayment. However, the level of SNS interaction did not exert a significant effect on the probability of loan repayment. This observation may be attributed to the passive nature of the interaction variable, which primarily involves expressing sympathy for other users' comments rather than generating original content. The study also unveiled the statistical significance of loan duration and the number of loans, representing key characteristics of loan portfolios, in influencing credit loan repayment. This underscores the importance of considering loan duration and the quantity of loans as crucial determinants in the design of microcredit products. Among the personal characteristic variables examined, only gender emerged as a significant factor. This implies that the loan program scrutinized in this analysis does not exhibit substantial discrimination based on age and credit scores, as its customer base predominantly consists of individuals in their twenties and thirties with low credit scores, who encounter challenges in securing loans from traditional financial institutions. This research stands out from prior studies by empirically exploring the relationship between SNS usage and credit loan repayment while incorporating variables not typically addressed in existing credit rating research, such as profile pictures. It underscores the significance of harnessing subjective, unstructured information from SNS for loan screening, offering the potential to mitigate the financial disadvantages faced by borrowers with low credit scores or those ensnared in short-term liquidity constraints due to limited credit history a group often referred to as "thin filers." By utilizing such information, these individuals can potentially reduce their credit costs, whereas they are supposed to accrue a more substantial financial history through credit transactions under conventional credit assessment system.

  • PDF

Dynamic Power Management Framework for Mobile Multi-core System (모바일 멀티코어 시스템을 위한 동적 전력관리 프레임워크)

  • Ahn, Young-Ho;Chung, Ki-Seok
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.47 no.7
    • /
    • pp.52-60
    • /
    • 2010
  • In this paper, we propose a dynamic power management framework for multi-core systems. We reduced the power consumption of multi-core processors such as Intel Centrino Duo and ARM11 MPCore, which have been used at the consumer electronics and personal computer market. Each processor uses a different technique to save its power usage, but there is no embedded multi-core processor which has a precise power control mechanism such as dynamic voltage scaling technique. The proposed dynamic power management framework is suitable for smart phones which have an operating system to provide multi-processing capability. Basically, our framework follows an intuitive idea that reducing the power consumption of idle cores is the most effective way to save the overall power consumption of a multi-core processor. We could minimize the energy consumption used by idle cores with application-targeted policies that reflect the characteristics of active workloads. We defined some properties of an application to analyze the performance requirement in real time and automated the management process to verify the result quickly. We tested the proposed framework with popular processors such as Intel Centrino Duo and ARM11 MPCore, and were able to find that our framework dynamically reduced the power consumption of multi-core processors and satisfied the performance requirement of each program.

A CF-based Health Functional Recommender System using Extended User Similarity Measure (확장된 사용자 유사도를 이용한 CF-기반 건강기능식품 추천 시스템)

  • Sein Hong;Euiju Jeong;Jaekyeong Kim
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.3
    • /
    • pp.1-17
    • /
    • 2023
  • With the recent rapid development of ICT(Information and Communication Technology) and the popularization of digital devices, the size of the online market continues to grow. As a result, we live in a flood of information. Thus, customers are facing information overload problems that require a lot of time and money to select products. Therefore, a personalized recommender system has become an essential methodology to address such issues. Collaborative Filtering(CF) is the most widely used recommender system. Traditional recommender systems mainly utilize quantitative data such as rating values, resulting in poor recommendation accuracy. Quantitative data cannot fully reflect the user's preference. To solve such a problem, studies that reflect qualitative data, such as review contents, are being actively conducted these days. To quantify user review contents, text mining was used in this study. The general CF consists of the following three steps: user-item matrix generation, Top-N neighborhood group search, and Top-K recommendation list generation. In this study, we propose a recommendation algorithm that applies an extended similarity measure, which utilize quantified review contents in addition to user rating values. After calculating review similarity by applying TF-IDF, Word2Vec, and Doc2Vec techniques to review content, extended similarity is created by combining user rating similarity and quantified review contents. To verify this, we used user ratings and review data from the e-commerce site Amazon's "Health and Personal Care". The proposed recommendation model using extended similarity measure showed superior performance to the traditional recommendation model using only user rating value-based similarity measure. In addition, among the various text mining techniques, the similarity obtained using the TF-IDF technique showed the best performance when used in the neighbor group search and recommendation list generation step.

A Study on the Moderating Effect of Perceived Voluntariness in the Organizational Information System Usage and Performance (정보시스템 사용과 성과에 있어서 자발성의 조절효과에 관한 연구)

  • Lee, Seung-Chang;Lee, Ho-Geun;Jung, Chang-Wook;Chung, Nam-Ho;Suh, Eung-Kyo
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.195-221
    • /
    • 2009
  • According to an industry report, a large number of organizations have invested in Organizational Information System(OIS) in the past few years. Several research results indicate that successful investments in OIS lead to productivity enhancement, while failed ones result in undesirable consequences such as financial losses and dissatisfaction among employees. In spite of huge investments, however, many organizations have failed in achieving the hoped-for returns from OIS. Thus, understanding user acceptance, adoption, and usage of new IS(Information Systems) is an important issue for IS practitioners. Indeed, study of the user acceptance of new information system has been one of the most important research topics in the contemporary IS literature. Several theoretical models are tested to examine 'user acceptance' and 'usage behavior' in IS context. While many research models incorporate 'ease of use' or 'usefulness' as important factors in explaining user acceptance, Technology Acceptance Model(TAM) has been one of the most widely applied models in user acceptance and usage behavior. Even in recent IS studies that employ theories of innovation diffusion in the area of IS implementation, a major focus has been on the user's perception of information technologies. In this research, we study 'voluntariness' as an important factor in IS acceptance by users. Voluntariness is defined as "the degree to which the use of the innovation is perceived as being voluntary, or of free will" When examining the diffusion of accepting OIS, a thoughtful consideration should be given to 'perceived voluntariness.' Current article has following research questions: 1) What models are appropriate to explain the success of OIS? and 2) How does the 'voluntariness' affect the success of OIS? In order to answer these questions, a research model is proposed to describe the detailed nature of association among three independent variables (IT usage level, task interdependency, and organizational support), a mediating variable (IS usage), a dependent variable (perceived performance), and a moderating variable(perceived voluntariness). The central claim of this article is that organizations hardly realize expected returns from OIS investments unless perceived voluntariness is effectively managed after operating OIS. As an example of OIS in this study we have selected the Intranet of Republic of Korea Air Force (ROKAF). ROKAF has implemented the Intranet in an attempt to improve communication and coordination within the organization. To test our research model and hypotheses, survey questionnaires were first sent out to 400 Intranet users. With the assistance of ROKAF, Intranet users were initially identified among its members, and subjects were randomly drawn from the pool. 377 survey responses were finally returned. The unit of measurement and analysis in this research is a personal level. Path analysis based on structural equation modeling was used to test research hypotheses. Construct validity represents accordance between the theoretical base concept of constructs and its measurement items. Tests for the reliability and discriminant validity are accepted, thus verifying our survey instrument. In this research, we have proposed a conceptual framework to highlight the importance of perceived voluntariness after organization deploys OIS. The results of our analysis present several key finding. First, all three independent variables (IT usage level, task interdependency, and organizational support) have significant effects on IS usage, which will eventually improve performance. Thus, IS usage plays a mediating role between antecedent variables (IT usage level. task interdependency, and organizational support) and performance improvement. Second, the effect of the task dependency was the highest for IS usage among the three antecedent variables. This is highly plausible since one of the Intranet's major capabilities is to facilitate communication among members within an organization. Accordingly, we conclude that the higher the task dependency, the higher Intranet usage. The effect of user's IT usage level was the second, while the effect of the organizational support was the third. Finally, the perceived voluntariness plays a pivotal role in enhancing perceived performance in personal level after launching the Intranet. Relationships among investigated variables were significantly different between groups with a high level and a low level of voluntariness. The impact of the Intranet usage on the performance was greater in the higher level voluntariness group than in the lower one. For the lower level voluntariness group, the user's IT usage had the highest effect on the Intranet usage among the three antecedent variables. In short, our study suggests that the higher the perceived voluntariness is the more IS usage will be. Perceived voluntariness was found to have a moderating effect on the relationships among user IT usage level, task interdependency, IS usage, and perceived performance, supporting all the hypotheses on the moderating effect. Most of all, user IT usage level has the strongest influence on IS usage, indicating that users with superior IT usage are more likely to enjoy a high level of perceived performance.

The Effect of Synchronous CMC Technology by Task Network: A Perspective of Media Synchronicity Theory (개인의 업무 네트워크 특성에 따른 동시적 CMC의 영향 : 매체 동시성 이론 관점)

  • Kim, Min-Soo;Park, Chul-Woo;Yang, Hee-Dong
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.21-43
    • /
    • 2008
  • The task network which is formed of different individuals can be recognized as a social network. Therefore, the way to communicate with people inside or outside the network has considerable influence on their outcome. Moreover, the position on which a member stands in a network shows the different effects of the information systems supporting communication with others. In this paper, it is to be studied how personal CMC (computer-mediated communication) tools affect the mission that those who work for a network perform through diverse task networks. Especially, we focused on synchronicity of CMC. On this score, the perspective of Media Synchronicity Theory was taken that had been suggested by criticizing Media Richness Theory. It is the objective, from this perspective, to find which characteristics of networks make the value of IT supporting synchronicity high. In the research trends of social networks, there have been two traditional perspectives to explain the effect of network: embeddedness and diversity ones. These differ from the aspect which type of social network can provide much more economic benefits. As similar studies have been reported by various researchers, these are also divided into the bonding and bridging views which are based on internal and external tie, respectively, Size, density, and centrality were measured as the characteristics of personal task networks. Size means the level of relationship between members. It is the total number of other colleagues who work with a specific member for a certain project. It means, the larger the size of task network, the more the number of coworkers who interact each other through the job. Density is the ratio of the number of relationships arranged actually to the total number of available ones. In an ego-centered network, it is defined as the ratio of the number of relationship made really to the total number of possible ones between members who are actually involved each other. The higher the level of density, the larger the number of projects on which the members collaborate. Centrality means that his/her position is on the exact center of whole network. There are several methods to measure it. In this research, betweenness centrality was adopted among them. It is measured by the position on which one member stands between others in a network. The determinant to raise its level is the shortest geodesic that represents the shortest distance between members. Centrality also indicates the level of role as a broker among others. To verify the hypotheses, we interviewed and surveyed a group of employees of a nationwide financial organization in which a groupware system is used. They were questioned about two CMC applications: MSN with a higher level of synchronicity and email with a lower one. As a result, the larger the size of his/her own task network, the smaller its density and the higher the level of his/her centrality, the higher the level of the effect using the task network with CMC tools. Above all, this positive effect is verified to be much more produced while using CMC applications with higher-level synchronicity. Among the a variety of situations under which the use of CMC gives more benefits, this research is considered as one of rare cases regarding the characteristics of task network as moderators by focusing ITs for the operation of his/her own task network. It is another contribution of this research to prove empirically that the values of information system depend on the social, or comparative, characteristic of time. Though the same amount of time is shared, the social characteristics of users change its value. In addition, it is significant to examine empirically that the ITs with higher-level synchronicity have the positive effect on productivity. Many businesses are worried about the negative effect of synchronous ITs, for their employees are likely to use them for personal social activities. However. this research can help to dismiss the concern against CMC tools.