• Title/Summary/Keyword: Private framework

Search Result 302, Processing Time 0.027 seconds

Macroeconomic Consequences of Pay-as-you-go Public Pension System (부과방식 공적연금의 거시경제적 영향)

  • Park, Chang-Gyun;Hur, Seok-Kyun
    • KDI Journal of Economic Policy
    • /
    • v.30 no.2
    • /
    • pp.225-270
    • /
    • 2008
  • We analyze macroeconomic consequences of pay-as-you-go (PAYGO) public pension system with a simple overlapping generations model. Contrary to large body of existing literatures offering quantitative results based on simulation study, we take another route by adopting a highly simplified framework in search of qualitatively tractable analytical results. The main contribution of our results lies in providing a sound theoretical foundation that can be utilized in interpreting various quantitative results offered by simulation studies of large scale general equilibrium models. We present a simple overlapping generations model with a defined benefit(DB) PAYGO public pension system as a benchmark case and derive an analytical equilibrium solution utilizing graphical illustration. We also discuss the modifications of the benchmark model required to encompass a defined contribution(DC) public pension system into the basic framework. Comparative statics analysis provides three important implications; First, introduction and expansion of the PAYGO public pension, DB or DC, result in lower level of capital accumulation and higher expected rate of return on the risky asset. Second, it is shown that the progress of population aging is accompanied by lower capital stock due to decrease in both demand and supply of risky asset. Moreover, risk premium for risky asset increases(decreases) as the speed of population aging accelerates(decelerates) so that the possibility of so-called "the great meltdown" of asset market cannot be excluded although the odds are not high. Third, it is most likely that the switch from DB PAYGO to DC PAYGO would result in lower capital stock and higher expected return on the risky asset mainly due to the fact that the young generation regards DC PAYGO pension as another risky asset competing against the risky asset traded in the market. This theoretical prediction coincides with one of the firmly established propositions in empirical literature that the currently dominant form of public pension system has the tendency to crowd out private capital accumulation.

  • PDF

International Legal Regulation for Environmental Contamination on Outer Space Activities (우주에서의 환경오염 방지를 위한 국제법적 규제)

  • Lee, Young-Jin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.24 no.1
    • /
    • pp.153-194
    • /
    • 2009
  • The resources of outer space are for the common exploitation of mankind, and it is a common responsibility of mankind to protect the outer space environment. With the rapid development of space science and technology, and especially with the busy space activities of some major space powers, environmental contamination or space debris is steadily increasing in quantity and has brought grave potential threats and actual damage to the outer space environment and human activities in space. Especially We must mitigate and seek out a solution to remove space debris which poses a threat directly to man's exploitation and use of outer space activities in the Low Earth Orbit (LEO) and in the Geostationary Orbit (GEO), through international cooperation and agreement in the fields of space science, economics, politics and law, in order to safeguard the life and property of mankind and protect the earth's environment. While the issue of space debris has been the subject of scientific study and discussion for some time now, it has yet to be fully addressed within the context of an international legal framework. During the earlier stages of the space age, which began in the late 1950s, the focus of international lawmakers and diplomats was the establishment of basic rules which sought to define the legal nature of outer space and set out the parameters for space activities and the nature and scope of activities carried out in outer space were quite limited. Consequently, environmental issues and the risks that might arise from the generation of space debris did not receive priority attention within the context of the development international space law. In recent years, however, the world has seen dramatic advances in technology and increases in the type and number of space-related activities which are being carried out. In addition, the number of actors in this field has exploded from two highly developed States to a vast array of different States, intergovernmental and nongovernmental organizations, including private industry. Therefore, the number of artificial objects in the near-Earth space is continually increasing. As has been previously mentioned, COPUOS was the entity that created the existing five treaties, and five sets of legal Principles, which form the core of space law, and COPUOS is clearly the most appropriate entity to oversee the creation of this regulatory body for the outer space environmental problem. This idea has been proposed by various States and also at the ILA Conference in Buenos Aires. The ILA Conference in Buenos Aires produced an extensive proposal for such a regulatory regime, dealing with space debris issues in legal terms This article seeks to discuss the status of international law as it relates to outer space environmental problem and space debris and indicate a course of action which might be taken by the international community to develop a legal framework which can adequately cope with the complexity of issues that have recently been recognized. In Section Ⅱ,Ⅲ and IV of this article discuss the current status of international space law, and the extent to which some of the issues raised by earth and space environment are accounted for within the existing United Nations multilateral treaties. Section V and VI discuss the scope and nature of space debris issues as they emerged from the recent multi-year study carried out by the ILA, Scientific and Technical Subcommittee, Legal Subcommittee of the United Nations Committee on the Peaceful Uses of Outer Space ("COPUOS") as a prelude to the matters that will require the attention of international lawmakers in the future. Finally, analyzes the difficulties inherent in the future regulation and control of space debris and the activities to protect the earth's environment. and indicates a possible course of action which could well provide, at the least, a partial solution to this complex challenge.

  • PDF

Financial Fraud Detection using Text Mining Analysis against Municipal Cybercriminality (지자체 사이버 공간 안전을 위한 금융사기 탐지 텍스트 마이닝 방법)

  • Choi, Sukjae;Lee, Jungwon;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.3
    • /
    • pp.119-138
    • /
    • 2017
  • Recently, SNS has become an important channel for marketing as well as personal communication. However, cybercrime has also evolved with the development of information and communication technology, and illegal advertising is distributed to SNS in large quantity. As a result, personal information is lost and even monetary damages occur more frequently. In this study, we propose a method to analyze which sentences and documents, which have been sent to the SNS, are related to financial fraud. First of all, as a conceptual framework, we developed a matrix of conceptual characteristics of cybercriminality on SNS and emergency management. We also suggested emergency management process which consists of Pre-Cybercriminality (e.g. risk identification) and Post-Cybercriminality steps. Among those we focused on risk identification in this paper. The main process consists of data collection, preprocessing and analysis. First, we selected two words 'daechul(loan)' and 'sachae(private loan)' as seed words and collected data with this word from SNS such as twitter. The collected data are given to the two researchers to decide whether they are related to the cybercriminality, particularly financial fraud, or not. Then we selected some of them as keywords if the vocabularies are related to the nominals and symbols. With the selected keywords, we searched and collected data from web materials such as twitter, news, blog, and more than 820,000 articles collected. The collected articles were refined through preprocessing and made into learning data. The preprocessing process is divided into performing morphological analysis step, removing stop words step, and selecting valid part-of-speech step. In the morphological analysis step, a complex sentence is transformed into some morpheme units to enable mechanical analysis. In the removing stop words step, non-lexical elements such as numbers, punctuation marks, and double spaces are removed from the text. In the step of selecting valid part-of-speech, only two kinds of nouns and symbols are considered. Since nouns could refer to things, the intent of message is expressed better than the other part-of-speech. Moreover, the more illegal the text is, the more frequently symbols are used. The selected data is given 'legal' or 'illegal'. To make the selected data as learning data through the preprocessing process, it is necessary to classify whether each data is legitimate or not. The processed data is then converted into Corpus type and Document-Term Matrix. Finally, the two types of 'legal' and 'illegal' files were mixed and randomly divided into learning data set and test data set. In this study, we set the learning data as 70% and the test data as 30%. SVM was used as the discrimination algorithm. Since SVM requires gamma and cost values as the main parameters, we set gamma as 0.5 and cost as 10, based on the optimal value function. The cost is set higher than general cases. To show the feasibility of the idea proposed in this paper, we compared the proposed method with MLE (Maximum Likelihood Estimation), Term Frequency, and Collective Intelligence method. Overall accuracy and was used as the metric. As a result, the overall accuracy of the proposed method was 92.41% of illegal loan advertisement and 77.75% of illegal visit sales, which is apparently superior to that of the Term Frequency, MLE, etc. Hence, the result suggests that the proposed method is valid and usable practically. In this paper, we propose a framework for crisis management caused by abnormalities of unstructured data sources such as SNS. We hope this study will contribute to the academia by identifying what to consider when applying the SVM-like discrimination algorithm to text analysis. Moreover, the study will also contribute to the practitioners in the field of brand management and opinion mining.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

An Empirical Study on the Determinants of Supply Chain Management Systems Success from Vendor's Perspective (참여자관점에서 공급사슬관리 시스템의 성공에 영향을 미치는 요인에 관한 실증연구)

  • Kang, Sung-Bae;Moon, Tae-Soo;Chung, Yoon
    • Asia pacific journal of information systems
    • /
    • v.20 no.3
    • /
    • pp.139-166
    • /
    • 2010
  • The supply chain management (SCM) systems have emerged as strong managerial tools for manufacturing firms in enhancing competitive strength. Despite of large investments in the SCM systems, many companies are not fully realizing the promised benefits from the systems. A review of literature on adoption, implementation and success factor of IOS (inter-organization systems), EDI (electronic data interchange) systems, shows that this issue has been examined from multiple theoretic perspectives. And many researchers have attempted to identify the factors which influence the success of system implementation. However, the existing studies have two drawbacks in revealing the determinants of systems implementation success. First, previous researches raise questions as to the appropriateness of research subjects selected. Most SCM systems are operating in the form of private industrial networks, where the participants of the systems consist of two distinct groups: focus companies and vendors. The focus companies are the primary actors in developing and operating the systems, while vendors are passive participants which are connected to the system in order to supply raw materials and parts to the focus companies. Under the circumstance, there are three ways in selecting the research subjects; focus companies only, vendors only, or two parties grouped together. It is hard to find researches that use the focus companies exclusively as the subjects probably due to the insufficient sample size for statistic analysis. Most researches have been conducted using the data collected from both groups. We argue that the SCM success factors cannot be correctly indentified in this case. The focus companies and the vendors are in different positions in many areas regarding the system implementation: firm size, managerial resources, bargaining power, organizational maturity, and etc. There are no obvious reasons to believe that the success factors of the two groups are identical. Grouping the two groups also raises questions on measuring the system success. The benefits from utilizing the systems may not be commonly distributed to the two groups. One group's benefits might be realized at the expenses of the other group considering the situation where vendors participating in SCM systems are under continuous pressures from the focus companies with respect to prices, quality, and delivery time. Therefore, by combining the system outcomes of both groups we cannot measure the system benefits obtained by each group correctly. Second, the measures of system success adopted in the previous researches have shortcoming in measuring the SCM success. User satisfaction, system utilization, and user attitudes toward the systems are most commonly used success measures in the existing studies. These measures have been developed as proxy variables in the studies of decision support systems (DSS) where the contribution of the systems to the organization performance is very difficult to measure. Unlike the DSS, the SCM systems have more specific goals, such as cost saving, inventory reduction, quality improvement, rapid time, and higher customer service. We maintain that more specific measures can be developed instead of proxy variables in order to measure the system benefits correctly. The purpose of this study is to find the determinants of SCM systems success in the perspective of vendor companies. In developing the research model, we have focused on selecting the success factors appropriate for the vendors through reviewing past researches and on developing more accurate success measures. The variables can be classified into following: technological, organizational, and environmental factors on the basis of TOE (Technology-Organization-Environment) framework. The model consists of three independent variables (competition intensity, top management support, and information system maturity), one mediating variable (collaboration), one moderating variable (government support), and a dependent variable (system success). The systems success measures have been developed to reflect the operational benefits of the SCM systems; improvement in planning and analysis capabilities, faster throughput, cost reduction, task integration, and improved product and customer service. The model has been validated using the survey data collected from 122 vendors participating in the SCM systems in Korea. To test for mediation, one should estimate the hierarchical regression analysis on the collaboration. And moderating effect analysis should estimate the moderated multiple regression, examines the effect of the government support. The result shows that information system maturity and top management support are the most important determinants of SCM system success. Supply chain technologies that standardize data formats and enhance information sharing may be adopted by supply chain leader organization because of the influence of focal company in the private industrial networks in order to streamline transactions and improve inter-organization communication. Specially, the need to develop and sustain an information system maturity will provide the focus and purpose to successfully overcome information system obstacles and resistance to innovation diffusion within the supply chain network organization. The support of top management will help focus efforts toward the realization of inter-organizational benefits and lend credibility to functional managers responsible for its implementation. The active involvement, vision, and direction of high level executives provide the impetus needed to sustain the implementation of SCM. The quality of collaboration relationships also is positively related to outcome variable. Collaboration variable is found to have a mediation effect between on influencing factors and implementation success. Higher levels of inter-organizational collaboration behaviors such as shared planning and flexibility in coordinating activities were found to be strongly linked to the vendors trust in the supply chain network. Government support moderates the effect of the IS maturity, competitive intensity, top management support on collaboration and implementation success of SCM. In general, the vendor companies face substantially greater risks in SCM implementation than the larger companies do because of severe constraints on financial and human resources and limited education on SCM systems. Besides resources, Vendors generally lack computer experience and do not have sufficient internal SCM expertise. For these reasons, government supports may establish requirements for firms doing business with the government or provide incentives to adopt, implementation SCM or practices. Government support provides significant improvements in implementation success of SCM when IS maturity, competitive intensity, top management support and collaboration are low. The environmental characteristic of competition intensity has no direct effect on vendor perspective of SCM system success. But, vendors facing above average competition intensity will have a greater need for changing technology. This suggests that companies trying to implement SCM systems should set up compatible supply chain networks and a high-quality collaboration relationship for implementation and performance.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

A Study on the Precedents Changing Related to International Jurisdiction in Electronic Commerce-Focused on U.S. Cases- (전자상거래의 국제재판관할 관련 판례변화에 관한 연구)

  • Woo, Kwang-Myung
    • International Commerce and Information Review
    • /
    • v.13 no.3
    • /
    • pp.3-29
    • /
    • 2011
  • The Internet has become a medium through which people engage in increasingly sophisticated transactions. Businesses and consumers now use the Internet to communicate and engage in commercial transactions creating a virtual worldwide marketplace. They fear that the determination of Internet jurisdiction could be uncertain because electronic commerce is not executed in one particular place. Until now, there are no specific rules in the model laws and conventions dealing with international jurisdiction in electronic commerce. Due to the fact that U.S. companies are at the forefront of Internet technology, litigation regarding electronic commerce in the U.S. is more advanced than anywhere else in the world This paper analysis the basic framework for personal jurisdiction and approach for determining international jurisdiction in electronic commerce cases and explain the differences of several approaches involving interactions over the Internet. According to jurisdiction approach test, the U.S. employs sliding scale, effects and targeting test in electronic commerce. In recent many research views the targeting test as a global standard for determining international electronic commerce jurisdiction. However, there is still no clear indication of conclusive test of jurisdiction determination for electronic commerce. Therefore, it is a changing and process of jurisdiction test in the U.S. cases. In Korea, there is jurisdiction related clause in Private International Law, but it may be asked whether applicable in electronic commerce. Accordingly, analysis of the precedents changing related to electronic commerce jurisdiction of U.s. is full of suggestions in Korean companies, consumers and helps an enactment of code of civil procedure that containing many group's demands.

  • PDF

"Legal Study on Boundary between Airspace and Outer Space" (영공(領空)과 우주공간(宇宙空間)의 한계(限界)에 관한 법적(法的) 고찰(考察))

  • Choi, Wan-Sik
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.2
    • /
    • pp.31-67
    • /
    • 1990
  • One of the first issues which arose in the evolution of air law was the determination of the vertical limits of airspace over private property. In 1959 the UN in its Ad Hoc Committee on the Peaceful Uses of Outer Space, started to give attention to the question of the meaning of the term "outer space". Discussions in the United Nations regarding the delimitation issue were often divided between those in favour of a functional approach ("functionalists"), and those seeking the delineation of a boundary ("spatialists"). The functionalists, backed initially by both major space powers, which viewed any boundary as possibly restricting their access to space(Whether for peaceful or military purposes), won the first rounds, starting with the 1959 Report of the Ad Hoc Committee on the Peaceful Uses of Outer Space which did not consider that the topic called for priority consideration. In 1966, however, the spatialists, were able to place the issue on the agenda of the Outer Sapce Committee pursuant to Resolution 2222 (xxx1). However, the spatialists were not able to present a common position since there existed a variety of propositions for delineation of a boundary. Over the years, the funtionalists have seemed to be losing ground. As the element of location is a decisive factor for the choice of the legal regime to be applied, a purely functional approach to the regulation of activities in the space above the Earth does not offer a solution. It is therefore to be welcomed that there is clear evidence of a growing recognition of the defect inherent to such an approach and that a spatial approach to the problem is gaining support both by a growing number of States as well as by publicists. The search for a solution of the problem of demarcating the two different legal regimes governing the space above the Earth has undoubtedly been facilitated, and a number of countries, among them Argentina, Belgium, France, Italy and Mexico have already advocated the acceptance of the lower boundary of outer space at a height of 100km. The adoption of the principle of sovereignty at that height does not mean that States would not be allowed to take protective measures against space activities above that height which constitute a threat to their security. A parallel can be drawn with the defence of the State's security on the high seas. Measures taken by States in their own protection on the high seas outside the territorial waters-provided that they are proportionate to the danger-are not considered to infringe the principle of international law. The most important issue in this context relates to the problem of a right of passage for space craft through foreign air space in order to reach outer space. In the reports to former ILA Conferences an explanation was given of the reasons why no customary rule of freedom of passage for aircraft through foreign territorial air space could as yet be said to exist. It was suggested, however, that though the essential elements for the creation of a rule of customary international law allowing such passage were still lacking, developments apperaed to point to a steady growth of a feeling of necessity for such a rule. A definite treaty solution of the demarcation problem would require further study which should be carried out by the UN Outer Space Committee in close co-operation with other interested international organizations, including ICAO. If a limit between air space and outer space were established, air space would automatically come under the regime of the Chicago Convention alone. The use of the word "recognize" in Art. I of chicago convention is an acknowledgement of sovereignty over airspace existing as a general principle of law, the binding force of which exists independently of the Convention. Further it is important to note that the Aricle recognizes this sovereignty, as existing for every state, holding it immaterial whether the state is or is not a contracting state. The functional criteria having been created by reference to either the nature of activity or the nature of the space object, the next hurdle would be to provide methods of verification. With regard to the question of international verification the establishment of an International Satelite Monitoring Agency is required. The path towards the successful delimitation of outer space from territorial space is doubtless narrow and stony but the establishment of a precise legal framework, consonant with the basic principles of international law, for the future activities of states in outer space will, it is still believed, remove a source of potentially dangerous conflicts between states, and furthermore afford some safeguard of the rights and interests of non-space powers which otherwise are likely to be eroded by incipient customs based on at present almost complete freedom of action of the space powers.

  • PDF

The Behavior Analysis of Exhibition Visitors using Data Mining Technique at the KIDS & EDU EXPO for Children (유아교육 박람회에서 데이터마이닝 기법을 이용한 전시 관람 행동 패턴 분석)

  • Jung, Min-Kyu;Kim, Hyea-Kyeong;Choi, Il-Young;Lee, Kyoung-Jun;Kim, Jae-Kyeong
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.77-96
    • /
    • 2011
  • An exhibition is defined as market events for specific duration to present exhibitors' main products to business or private visitors, and it plays a key role as effective marketing channels. As the importance of exhibition is getting more and more, domestic exhibition industry has achieved such a great quantitative growth. But, In contrast to the quantitative growth of domestic exhibition industry, the qualitative growth of Exhibition has not achieved competent growth. In order to improve the quality of exhibition, we need to understand the preference or behavior characteristics of visitors and to increase the level of visitors' attention and satisfaction through the understanding of visitors. So, in this paper, we used the observation survey method which is a kind of field research to understand visitors and collect the real data for the analysis of behavior pattern. And this research proposed the following methodology framework consisting of three steps. First step is to select a suitable exhibition to apply for our method. Second step is to implement the observation survey method. And we collect the real data for further analysis. In this paper, we conducted the observation survey method to obtain the real data of the KIDS & EDU EXPO for Children in SETEC. Our methodology was conducted on 160 visitors and 78 booths from November 4th to 6th in 2010. And, the last step is to analyze the record data through observation. In this step, we analyze the feature of exhibition using Demographic Characteristics collected by observation survey method at first. And then we analyze the individual booth features by the records of visited booth. Through the analysis of individual booth features, we can figure out what kind of events attract the attention of visitors and what kind of marketing activities affect the behavior pattern of visitors. But, since previous research considered only individual features influenced by exhibition, the research about the correlation among features is not performed much. So, in this research, additional analysis is carried out to supplement the existing research with data mining techniques. And we analyze the relation among booths using data mining techniques to know behavior patterns of visitors. Among data mining techniques, we make use of two data mining techniques, such as clustering analysis and ARM(Association Rule Mining) analysis. In clustering analysis, we use K-means algorithm to figure out the correlation among booths. Through data mining techniques, we figure out that there are two important features to affect visitors' behavior patterns in exhibition. One is the geographical features of booths. The other is the exhibit contents of booths. Those features are considered when the organizer of exhibition plans next exhibition. Therefore, the results of our analysis are expected to provide guideline to understanding visitors and some valuable insights for the exhibition from the earlier phases of exhibition planning. Also, this research would be a good way to increase the quality of visitor satisfaction. Visitors' movement paths, booth location, and distances between each booth are considered to plan next exhibition in advance. This research was conducted at the KIDS & EDU EXPO for Children in SETEC(Seoul Trade Exhibition & Convention), but it has some constraints to be applied directly to other exhibitions. Also, the results were derived from a limited number of data samples. In order to obtain more accurate and reliable results, it is necessary to conduct more experiments based on larger data samples and exhibitions on a variety of genres.

A Mutual P3P Methodology for Privacy Preserving Context-Aware Systems Development (프라이버시 보호 상황인식 시스템 개발을 위한 쌍방향 P3P 방법론)

  • Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.18 no.1
    • /
    • pp.145-162
    • /
    • 2008
  • One of the big concerns in e-society is privacy issue. In special, in developing robust ubiquitous smart space and corresponding services, user profile and preference are collected by the service providers. Privacy issue would be more critical in context-aware services simply because most of the context data themselves are private information: user's current location, current schedule, friends nearby and even her/his health data. To realize the potential of ubiquitous smart space, the systems embedded in the space should corporate personal privacy preferences. When the users invoke a set of services, they are asked to allow the service providers or smart space to make use of personal information which is related to privacy concerns. For this reason, the users unhappily provide the personal information or even deny to get served. On the other side, service provider needs personal information as rich as possible with minimal personal information to discern royal and trustworthy customers and those who are not. It would be desirable to enlarge the allowable personal information complying with the service provider's request, whereas minimizing service provider's requiring personal information which is not allowed to be submitted and user's submitting information which is of no value to the service provider. In special, if any personal information required by the service provider is not allowed, service will not be provided to the user. P3P (Platform for Privacy Preferences) has been regarded as one of the promising alternatives to preserve the personal information in the course of electronic transactions. However, P3P mainly focuses on preserving the buyers' personal information. From time to time, the service provider's business data should be protected from the unintended usage from the buyers. Moreover, even though the user's privacy preference could depend on the context happened to the user, legacy P3P does not handle the contextual change of privacy preferences. Hence, the purpose of this paper is to propose a mutual P3P-based negotiation mechanism. To do so, service provider's privacy concern is considered as well as the users'. User's privacy policy on the service provider's information also should be informed to the service providers before the service begins. Second, privacy policy is contextually designed according to the user's current context because the nomadic user's privacy concern structure may be altered contextually. Hence, the methodology includes mutual privacy policy and personalization. Overall framework of the mechanism and new code of ethics is described in section 2. Pervasive platform for mutual P3P considers user type and context field, which involves current activity, location, social context, objects nearby and physical environments. Our mutual P3P includes the privacy preference not only for the buyers but also the sellers, that is, service providers. Negotiation methodology for mutual P3P is proposed in section 3. Based on the fact that privacy concern occurs when there are needs for information access and at the same time those for information hiding. Our mechanism was implemented based on an actual shopping mall to increase the feasibility of the idea proposed in this paper. A shopping service is assumed as a context-aware service, and data groups for the service are enumerated. The privacy policy for each data group is represented as APPEL format. To examine the performance of the example service, in section 4, simulation approach is adopted in this paper. For the simulation, five data elements are considered: $\cdot$ UserID $\cdot$ User preference $\cdot$ Phone number $\cdot$ Home address $\cdot$ Product information $\cdot$ Service profile. For the negotiation, reputation is selected as a strategic value. Then the following cases are compared: $\cdot$ Legacy P3P is considered $\cdot$ Mutual P3P is considered without strategic value $\cdot$ Mutual P3P is considered with strategic value. The simulation results show that mutual P3P outperforms legacy P3P. Moreover, we could conclude that when mutual P3P is considered with strategic value, performance was better than that of mutual P3P is considered without strategic value in terms of service safety.