• Title/Summary/Keyword: Research Information Systems

Search Result 12,220, Processing Time 0.047 seconds

Enhanced Grid-Based Trajectory Cloaking Method for Efficiency Search and User Information Protection in Location-Based Services (위치기반 서비스에서 효율적 검색과 사용자 정보보호를 위한 향상된 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-Hye;Song, Doo-Hee;Cai, Tian-Yuan;Park, Kwang-Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.8
    • /
    • pp.195-202
    • /
    • 2018
  • With the development of location-based applications such as smart phones and GPS navigation, active research is being conducted to protect location and trajectory privacy. To receive location-related services, users must disclose their exact location to the server. However, disclosure of users' location exposes not only their locations but also their trajectory to the server, which can lead to concerns of privacy violation. Furthermore, users request from the server not only location information but also multimedia information (photographs, reviews, etc. of the location), and this increases the processing cost of the server and the information to be received by the user. To solve these problems, this study proposes the EGTC (Enhanced Grid-based Trajectory Cloaking) technique. As with the existing GTC (Grid-based Trajectory Cloaking) technique, EGTC method divides the user trajectory into grids at the user privacy level (UPL) and creates a cloaking region in which a random query sequence is determined. In the next step, the necessary information is received as index by considering the sub-grid cell corresponding to the path through which the user wishes to move as c(x,y). The proposed method ensures the trajectory privacy as with the existing GTC method while reducing the amount of information the user must listen to. The excellence of the proposed method has been proven through experimental results.

A Study on the Management of Copyright Information for Increasing the Free Use of Government Publications as Public Works (공공저작물로서 정부간행물 자유이용 촉진을 위한 저작권정보 관리에 관한 연구)

  • Seo, Hyeongdeok;Joung, Kyoung Hee
    • Journal of Korean Society of Archives and Records Management
    • /
    • v.22 no.3
    • /
    • pp.125-141
    • /
    • 2022
  • This study aims to suggest measures for handling copyright information on government publications during records and archives management to use them freely as public works according to Article 24-2 of the Copyright Act in Korea. Through email interviews with 17 records managers, persons in charge of government publication management, and government staff with experience in production from April 4 to June 13, 2022, this study determined the current situations and problems related to producing and managing copyright information on government publications. Based on the interview findings, this research suggested the following. First, Article 24-2 of the Copyright Act must be revised to apply the Korea Open Government License (KOGL) type 1 mandatorily to all public works. Second, a cooperative system for managing copyright information on government publications should be established to improve their production and management effectiveness. Third, copyright information, such as authors, copyright holders, copyright duration, information on the copyright property transfer, public works status, and reasons for nonpublic works, must be managed through records and archives management systems. Fourth and last, information on public works must be provided during the registration number application for government publication so that everyone can access the full texts of the publications on the National Archives of Korea website.

A study on the detection of fake news - The Comparison of detection performance according to the use of social engagement networks (그래프 임베딩을 활용한 코로나19 가짜뉴스 탐지 연구 - 사회적 참여 네트워크의 이용 여부에 따른 탐지 성능 비교)

  • Jeong, Iitae;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.28 no.1
    • /
    • pp.197-216
    • /
    • 2022
  • With the development of Internet and mobile technology and the spread of social media, a large amount of information is being generated and distributed online. Some of them are useful information for the public, but others are misleading information. The misleading information, so-called 'fake news', has been causing great harm to our society in recent years. Since the global spread of COVID-19 in 2020, much of fake news has been distributed online. Unlike other fake news, fake news related to COVID-19 can threaten people's health and even their lives. Therefore, intelligent technology that automatically detects and prevents fake news related to COVID-19 is a meaningful research topic to improve social health. Fake news related to COVID-19 has spread rapidly through social media, however, there have been few studies in Korea that proposed intelligent fake news detection using the information about how the fake news spreads through social media. Under this background, we propose a novel model that uses Graph2vec, one of the graph embedding methods, to effectively detect fake news related to COVID-19. The mainstream approaches of fake news detection have focused on news content, i.e., characteristics of the text, but the proposed model in this study can exploit information transmission relationships in social engagement networks when detecting fake news related to COVID-19. Experiments using a real-world data set have shown that our proposed model outperforms traditional models from the perspectives of prediction accuracy.

CAS 500-1/2 Image Utilization Technology and System Development: Achievement and Contribution (국토위성정보 활용기술 및 운영시스템 개발: 성과 및 의의)

  • Yoon, Sung-Joo;Son, Jonghwan;Park, Hyeongjun;Seo, Junghoon;Lee, Yoojin;Ban, Seunghwan;Choi, Jae-Seung;Kim, Byung-Guk;Lee, Hyun jik;Lee, Kyu-sung;Kweon, Ki-Eok;Lee, Kye-Dong;Jung, Hyung-sup;Choung, Yun-Jae;Choi, Hyun;Koo, Daesung;Choi, Myungjin;Shin, Yunsoo;Choi, Jaewan;Eo, Yang-Dam;Jeong, Jong-chul;Han, Youkyung;Oh, Jaehong;Rhee, Sooahm;Chang, Eunmi;Kim, Taejung
    • Korean Journal of Remote Sensing
    • /
    • v.36 no.5_2
    • /
    • pp.867-879
    • /
    • 2020
  • As the era of space technology utilization is approaching, the launch of CAS (Compact Advanced Satellite) 500-1/2 satellites is scheduled during 2021 for acquisition of high-resolution images. Accordingly, the increase of image usability and processing efficiency has been emphasized as key design concepts of the CAS 500-1/2 ground station. In this regard, "CAS 500-1/2 Image Acquisition and Utilization Technology Development" project has been carried out to develop core technologies and processing systems for CAS 500-1/2 data collecting, processing, managing and distributing. In this paper, we introduce the results of the above project. We developed an operation system to generate precision images automatically with GCP (Ground Control Point) chip DB (Database) and DEM (Digital Elevation Model) DB over the entire Korean peninsula. We also developed the system to produce ortho-rectified images indexed to 1:5,000 map grids, and hence set a foundation for ARD (Analysis Ready Data)system. In addition, we linked various application software to the operation system and systematically produce mosaic images, DSM (Digital Surface Model)/DTM (Digital Terrain Model), spatial feature thematic map, and change detection thematic map. The major contribution of the developed system and technologies includes that precision images are to be automatically generated using GCP chip DB for the first time in Korea and the various utilization product technologies incorporated into the operation system of a satellite ground station. The developed operation system has been installed on Korea Land Observation Satellite Information Center of the NGII (National Geographic Information Institute). We expect the system to contribute greatly to the center's work and provide a standard for future ground station systems of earth observation satellites.

Demonstration of Disaster Information and Evacuation Support Model for the Safety Vulnerable Groups (안전취약계층을 위한 재난정보 및 대피지원 모델 실증)

  • Son, Min Ho;Kweon, Il Ryong;Jung, Tae Ho;Lee, Han Jun
    • Journal of the Society of Disaster Information
    • /
    • v.17 no.3
    • /
    • pp.465-486
    • /
    • 2021
  • Purpose: Since most disaster information systems are centered on non-disabled people, the reality is that there is a lack of disaster information delivery systems for the vulnerable, such as the disabled, the elderly, and children, who are relatively vulnerable to disasters. The purpose of the service is to improve the safety of the disabled and the elderly by eliminating blind spots of informatization and establishing customized disaster information services to respond to disasters through IoT-based integrated control technology. Method: The model at the core of this study is the disaster alert propagation model and evacuation support model, and it shall be developed by reflecting the behavioral characteristics of the disabled and the elderly in the event of a disaster. The disaster alert propagation model spreads disaster situations collected using IoT technology, and the evacuation support model uses geomagnetic field-based measuring technology to identify the user's indoor location and help the disabled and the elderly evacuate safely. Results: Demonstration model demonstration resulted in an efficient qualitative evaluation of indoor location accuracy, such as the suitability of evacuation route guidance and satisfaction of services from the user's perspective. Conclusion: Disaster information and evacuation support services were established for the safety vulnerable groups of mobile app for model verification. The disaster situation was demonstrated through experts in the related fields and the disabled by limiting it to the fire situation. It was evaluated as "satisfaction" in the adequacy of disaster information delivery and evacuation support, and its functional satisfaction and user UI were evaluated as "normal" due to the nature of the pilot model. Through this, the disaster information and evacuation support services presented in this study were evaluated to support the safety vulnerable groups to a faster disaster evacuation without missing the golden time of disaster evacuation.

Influence of Motivational, Social, and Environmental Factors on the Learning of Hackers (동기적, 사회적, 그리고 환경적 요인이 해커의 기술 습득에 미치는 영향)

  • Jang, Jaeyoung;Kim, Beomsoo
    • Information Systems Review
    • /
    • v.18 no.1
    • /
    • pp.57-78
    • /
    • 2016
  • Hacking has raised many critical issues in the modern world, particularly because the size and cost of the damages caused by this disruptive activity have steadily increased. Accordingly, many significant studies have been conducted by behavioral scientists to understand hackers and their practices. Nonetheless, only qualitative methods, such as interviews, meta-studies, and media studies, have been employed in such studies because of hacker sampling limitations. Existing studies have determined that intrinsic motivation was the dominant factor influencing hackers, and that their techniques were mainly acquired from online hacking communities. However, such results have yet to be causally proven. This study attempted to identify the causal factors influencing the motivational and environmental factors encouraging hackers to learn hacking skills. To this end, hacker community members using the theory of planned behavior were observed to identify the causal factors of their learning of hacking skills. We selected a group of students who were developing their hacking skills. The survey was conducted over a two-week period in May 2015 with a total of 227 students as respondents. After list-wise deletion, 215 of the responses were deemed usable (94.7 percent). In summary, the hackers were aware that hacking skills are considered socially unethical, and their attitudes toward the learning of hacking skills were affected by both intrinsic and extrinsic motivations. In addition, the characteristics of the online hacking community affected their perceived behavioral control. This study introduced new concepts in the process of conducting a causal relationship analysis on a hacker sample. Moreover, this research expanded the discussion on the causal direction of subjective norms in unethical research, and empirically confirmed that both intrinsic and extrinsic motivations affect the learning of hacking skills. This study also made a practical contribution by raising the educational and policy response issues for ethical hackers and demonstrating the necessity to intensify the punishment for hacking.

Mining Intellectual History Using Unstructured Data Analytics to Classify Thoughts for Digital Humanities (디지털 인문학에서 비정형 데이터 분석을 이용한 사조 분류 방법)

  • Seo, Hansol;Kwon, Ohbyung
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.1
    • /
    • pp.141-166
    • /
    • 2018
  • Information technology improves the efficiency of humanities research. In humanities research, information technology can be used to analyze a given topic or document automatically, facilitate connections to other ideas, and increase our understanding of intellectual history. We suggest a method to identify and automatically analyze the relationships between arguments contained in unstructured data collected from humanities writings such as books, papers, and articles. Our method, which is called history mining, reveals influential relationships between arguments and the philosophers who present them. We utilize several classification algorithms, including a deep learning method. To verify the performance of the methodology proposed in this paper, empiricists and rationalism - related philosophers were collected from among the philosophical specimens and collected related writings or articles accessible on the internet. The performance of the classification algorithm was measured by Recall, Precision, F-Score and Elapsed Time. DNN, Random Forest, and Ensemble showed better performance than other algorithms. Using the selected classification algorithm, we classified rationalism or empiricism into the writings of specific philosophers, and generated the history map considering the philosopher's year of activity.

A Study of Establishing the Development Strategy of Construction Project Management System Using SWOT Analysis (SWOT분석을 통한 건설사업관리시스템 개발전략 수립에 관한 연구)

  • Kim, SeongJin;Ok, Hyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.11
    • /
    • pp.86-93
    • /
    • 2016
  • Information technology, such as IoT, Big Data, Drone, Cloud etc., is evolving every year. Information Society is changing Intelligence Society and Creative Society. A new Construction Projects Management System Roadmap is required because it is difficult to reflect the current IT environments based on the CALS(Continuous Acquisition & Life-cycle Support) master plan, which is performed to establish every five years since 1998. This study was prepared for the Roadmap with a focus on Construction Management System based on the 4th CALS master plan, which was performed to establish the 2012 year. To this end, the construction environment and several information systems were investigated and analyzed. The problems of the construction project information system were derived using SWOT analysis, the vision, goal, direction, strategy, main tasks, specific tasks, and timetable of the Construction Project Management System are presented. This roadmap is designed to be used as operational indicators of a future construction project management system.

Analysis of Eye-safe LIDAR Signal under Various Measurement Environments and Reflection Conditions (다양한 측정 환경 및 반사 조건에 대한 시각안전 LIDAR 신호 분석)

  • Han, Mun Hyun;Choi, Gyu Dong;Seo, Hong Seok;Mheen, Bong Ki
    • Korean Journal of Optics and Photonics
    • /
    • v.29 no.5
    • /
    • pp.204-214
    • /
    • 2018
  • Since LIDAR is advantageous for accurate information acquisition and realization of a high-resolution 3D image based on characteristics that can be precisely measured, it is essential to autonomous navigation systems that require acquisition and judgment of accurate peripheral information without user intervention. Recently, as an autonomous navigation system applying LIDAR has been utilized in human living space, it is necessary to solve the eye-safety problem, and to make reliable judgment through accurate obstacle recognition in various environments. In this paper, we construct a single-shot LIDAR system (SSLs) using a 1550-nm eye-safe light source, and report the analysis method and results of LIDAR signals for various measurement environments, reflective materials, and material angles. We analyze the signals of materials with different reflectance in each measurement environment by using a 5% Al reflector and a building wall located at a distance of 25 m, under indoor, daytime, and nighttime conditions. In addition, signal analysis of the angle change of the material is carried out, considering actual obstacles at various angles. This signal analysis has the merit of possibly confirming the correlation between measurement environment, reflection conditions, and LIDAR signal, by using the SNR to determine the reliability of the received information, and the timing jitter, which is an index of the accuracy of the distance information.

The Influence of TTF on GSS Usage and Task Performance : Focusing on moderating effect of COA and FOA (과업기술적합도(TTF)가 그룹지원시스템(GSS)의 사용 및 성과에 미치는 영향 : 전유방식동의 정도와 전유 충실도의 조절효과를 고려하여)

  • Kang, So-Ra;Chun, Bang-Jee
    • Journal of Korea Technology Innovation Society
    • /
    • v.10 no.4
    • /
    • pp.755-788
    • /
    • 2007
  • This study investigates the effects of individual and group level factors on the use of GSS (Group Support System) and task performance from GSS use. GSS facilitates the group work, so that GSS adoption is not necessarily influenced only by individual perceptions on information systems. Adaptive Structuration Theory (AST) in our study to explain the adoption and success from GSS use. AST contends that the success of IS is not necessarily the technical fit between tasks and technology, instead the political outcome among user socializations. We have the following two research inquires: Are the IS use and performance maximized when information technologies are provided properly?; and, Does TTF always influence positively on IS use (or performance)? To research these issues, we investigate the influence of TTF (Task-Technology Fit) on use and performance of GSS, which is introduced to foster collaboration among organizational members. Drawing insights from the AST, we examine if COA (Consensus on Appropriation) among group members and FOA (Faithfulness of Appropriation) between those who use technology and who design it show any moderating effect. A questionnaire survey was conducted on firms using the GSS for one month from June 2 to June 27 2005 and a sample of 303 responses was used for a statistical analysis. The result demonstrates that TTF exerts a positive influence on use and performance of GSS. We find that the stronger the COA, the greater the effect of W on use of GSS and performance. FOA likewise has a positive effect on both use of GSS and performance. The TTF model has been widely applied to studies on individual performance of information system, whereas the AST theory specifically explains members' adaptation process to information system. By integrating the AST theory with the TTF model, the study contributes to heightening our understanding on if and how individual performance varies with the use of GSS.

  • PDF