• Title/Summary/Keyword: The Degree of Importance in Information System

Search Result 94, Processing Time 0.031 seconds

Improving Personal Data Protection in IoT Environments (사물인터넷(IoT) 환경에서 개인정보보호 강화를 위한 제도 개선 방안)

  • Lee, Ae Ri;Son, Soomin;Kim, Hyun Jin;Kim, Beomsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.995-1012
    • /
    • 2016
  • In Internet of Things (IoT) environments, devices or sensors everywhere can automatically collect data without the individual awareness, further combine and share data using ubiquitous network, and thus the development of IoT raises new challenges in respect of personal data protection and privacy. This study aims to identify main issues related to data protection in the IoT and propose adequate measures. We analyzed the types of personal data controllers and processors in IoT and figured out the issues regarding the processing of personal data and the rights to privacy of data subject. Accordingly, we suggested the institutional ways (e.g., establishment of user-friendly notice and flexible consent system, re-identification risk monitoring system, data protection in cross-border transfer, and user education) to improve the situation of personal data protection in IoT and finally proposed the improvement tasks to carry out first based on the degree of urgency and importance.

A Study on the Evaluation Factors on Korean University Education for Promoting Educational Service Export from the Perspective of Chinese Student in Korea (교육서비스수출 촉진을 위한 한국 대학교육 평가요인에 관한 연구: 중국인 유학생 관점에서)

  • Hong, Song-Hon
    • International Commerce and Information Review
    • /
    • v.13 no.4
    • /
    • pp.463-484
    • /
    • 2011
  • The survey was conducted by Chinese students who currently attend universities for the purpose of evaluating factors that determine the quality of educational services of universities in Korea. Three public universities and five private universities in Kyungsang province were surveyed for the purpose of this study with standardized questionnaires. The study raised questions on four different fronts: 1) Is there a difference in the importance of evaluation factors by Chinese student's on the quality of educational services between public universities and private ones? 2) Is there a difference in the degree of satisfaction felt by Chinese students who attend public universities or private ones? 3) Are there any significant differences in the importance of evaluation factors and satisfaction with the quality of educational services? 4) How different the relative influence of evaluation factors has on satisfaction with the quality of educational services for overall Korean university system? The results of this study showed that there was no statistical difference in signification in the importance of evaluation factors on the quality of educational services between public universities and private universities. Only the relationship factor in criteria four had an effect on satisfaction with quality of educational services between public and private universities. There were significant differences in the importance of evaluation factors and satisfaction with the quality of educational services. Chinese students determined that professor's lectureship as the most important factor, and is the ultimate deciding factor whether they attend a public or private university. It should be noted that studying and knowledge are primary concerns to them. Improvements in the quality of educational services in area of lectureship, physical education facilities, relationship, and administrative services are essential and crucially important for Korean universities in order to attract foreign students and to enhance their competitiveness in the global setting.

  • PDF

The Design and Implementation of Access Control framework for Collaborative System (협력시스템에서의 접근제어 프레임워크 설계 및 구현)

  • 정연일;이승룡
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.10C
    • /
    • pp.1015-1026
    • /
    • 2002
  • As per increasing research interest in the field of collaborative computing in recent year, the importance of security issues on that area is also incrementally growing. Generally, the persistency of collaborative system is facilitated with conventional authentication and cryptography schemes. It is however, hard to meet the access control requirements of distributed collaborative computing environments by means of merely apply the existing access control mechanisms. The distributed collaborative system must consider the network openness, and various type of subjects and objects while, the existing access control schemes consider only some of the access control elements such as identity, rule, and role. However, this may cause the state of security level alteration phenomenon. In order to handle proper access control in collaborative system, various types of access control elements such as identity, role, group, degree of security, degree of integrity, and permission should be taken into account. Futhermore, if we simply define all the necessary access control elements to implement access control algorithm, then collaborative system consequently should consider too many available objects which in consequence, may lead drastic degradation of system performance. In order to improve the state problems, we propose a novel access control framework that is suitable for the distributed collaborative computing environments. The proposed scheme defines several different types of object elements for the accessed objects and subjects, and use them to implement access control which allows us to guarantee more solid access control. Futhermore, the objects are distinguished by three categories based on the characteristics of the object elements, and the proposed algorithm is implemented by the classified objects which lead to improve the systems' performance. Also, the proposed method can support scalability compared to the conventional one. Our simulation study shows that the performance results are almost similar to the two cases; one for the collaborative system has the proposed access control scheme, and the other for it has not.

A Study on the Survey System for Customer Satisfaction Feedback in the Service Industry (서비스산업의 고객 만족도 피드백을 위한 설문 시스템에 관한 연구)

  • Kang, Min-Shik;Song, Eun-Jee;Kong, Hyo-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2389-2395
    • /
    • 2015
  • An accurate feedback about customer satisfaction is a very important factor to efficiently manage achievements in the service industry. However, Korea is lack of quantitative and standardized system of customer satisfaction measurement. This paper suggests standardized survey system with more in-depth and various methods of questionnaire survey as well as analysis which is able to efficiently evaluate customer satisfaction. This system is that investigates customer satisfaction of process based services, which uses various methods including simply designed questionnaires, customer satisfaction survey via mobile, and an investigation on follow-up satisfaction rate. In addition, we adopted scoring system to digitize a degree of satisfaction rate, so the suggested system provides an opportunity to improve specific objects those need to be improved by clearly evaluating a degree of satisfaction rate and applying various analysis techniques, such as IPA (Importance Performance Analysis), process analysis, and expectation analysis etc. This study substantiates suggested system through applying it to travel agency which is a representative enterprise of tour service.

A User Authentication System Using Face Analysis and Similarity Comparison (얼굴 분석과 유사도 비교를 이용한 사용자 인증 시스템)

  • Ryu Dong-Yeop;Yim Young-Whan;Yoon Sunnhee;Seo Jeong Min;Lee Chang Hoon;Lee Keunsoo;Lee Sang Moon
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.11
    • /
    • pp.1439-1448
    • /
    • 2005
  • In this paper, after similarity of color information in above toro and geometry position analysis of important characteristic information in face and abstraction object that is inputted detects face area using comparison, describe about method to do user certification using ratio information and hair spring degree. Face abstraction algorithm that use color information has comparative advantages than face abstraction algorithm that use form information because have advantage that is not influenced facial degree or site etc. that tip. Because is based on color information, change of lighting or to keep correct performance because is sensitive about color such as background similar to complexion is difficult. Therefore, can be used more efficiently than method to use color information as that detect characteristic information of eye and lips etc. that is facial importance characteristic element except color information and similarity for each object achieves comparison. This paper proposes system that eye and mouth's similarity that calculate characteristic that is ratio red of each individual after divide face by each individual and is segmentalized giving weight in specification calculation recognize user confirming similarity through search. Could experiment method to propose and know that the awareness rate through analysis with the wave rises.

  • PDF

Partnership and EDI Adoption Attitude affecting on EDI Implementation Success (EDI 구축 성공에 영향을 미치는 파트너십과 EDI 수용태도)

  • Kim, Jae-Kyeong;Lee, Sang-Chul;Lee, Jung-Eun;Lee, Jae-Kwang
    • Asia pacific journal of information systems
    • /
    • v.12 no.4
    • /
    • pp.1-19
    • /
    • 2002
  • The fact that EDI is the IT system between partners implies the importance of studying the affecting factors associated with partnership in EDI. But there are few researches about the inter-organizational factors related to the relationship between partner firms, so called partnerships, influencing the implementation of EDI. Therefore our research is to investigate the relationship between partnership and EDI implementation with inter-organizational perspective. Additionally, we investigate the moderating role of EDI adoption attitude when the companies are divided into two groups, proactive attitude and reactive attitude. As a result, first, we found the positive relationships between the partnership factors about partnerships among trading partners and the degree of EDI implementation. Second, we expected that proactive firms have stronger significant relationships than reactive firms, but only the relationships between interdependence and integration, interdependence and utilization and trust and integration were proved to be signigicant among ten relationships. Third, we found positive relationships between EDI adoption attitude and EDI implementation.

A Technique for Requirements Normalization and Selection based on Practical Approach (사례 기반의 요구사항 정형화 및 선정 평가 기법)

  • Byun, Jung-Won;Rhew, Sung-Yul;Kim, Jin-Su
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.11
    • /
    • pp.149-161
    • /
    • 2012
  • In the customer-centered world, which is used internet and social network services actively, it is important that their needs should be embraced into systems. Our study proposes a technique to normalize and select 1,800 customer's needs at C company. In order to normalize the requirements, we have specified requirements by considering a standard for requirements specification, have identified a set of keywords of requirements and have constructed a relation-graph of requirements. The graph presents objectives to design and build a system, and shows a degree of relative importance for each requirement. And then, we propose a techniques for requirements selection according to their contribution points, which are calculated using relative degree. We demonstrates our techniques by a case study of C company.

Story-based Information Retrieval (스토리 기반의 정보 검색 연구)

  • You, Eun-Soon;Park, Seung-Bo
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.81-96
    • /
    • 2013
  • Video information retrieval has become a very important issue because of the explosive increase in video data from Web content development. Meanwhile, content-based video analysis using visual features has been the main source for video information retrieval and browsing. Content in video can be represented with content-based analysis techniques, which can extract various features from audio-visual data such as frames, shots, colors, texture, or shape. Moreover, similarity between videos can be measured through content-based analysis. However, a movie that is one of typical types of video data is organized by story as well as audio-visual data. This causes a semantic gap between significant information recognized by people and information resulting from content-based analysis, when content-based video analysis using only audio-visual data of low level is applied to information retrieval of movie. The reason for this semantic gap is that the story line for a movie is high level information, with relationships in the content that changes as the movie progresses. Information retrieval related to the story line of a movie cannot be executed by only content-based analysis techniques. A formal model is needed, which can determine relationships among movie contents, or track meaning changes, in order to accurately retrieve the story information. Recently, story-based video analysis techniques have emerged using a social network concept for story information retrieval. These approaches represent a story by using the relationships between characters in a movie, but these approaches have problems. First, they do not express dynamic changes in relationships between characters according to story development. Second, they miss profound information, such as emotions indicating the identities and psychological states of the characters. Emotion is essential to understanding a character's motivation, conflict, and resolution. Third, they do not take account of events and background that contribute to the story. As a result, this paper reviews the importance and weaknesses of previous video analysis methods ranging from content-based approaches to story analysis based on social network. Also, we suggest necessary elements, such as character, background, and events, based on narrative structures introduced in the literature. We extract characters' emotional words from the script of the movie Pretty Woman by using the hierarchical attribute of WordNet, which is an extensive English thesaurus. WordNet offers relationships between words (e.g., synonyms, hypernyms, hyponyms, antonyms). We present a method to visualize the emotional pattern of a character over time. Second, a character's inner nature must be predetermined in order to model a character arc that can depict the character's growth and development. To this end, we analyze the amount of the character's dialogue in the script and track the character's inner nature using social network concepts, such as in-degree (incoming links) and out-degree (outgoing links). Additionally, we propose a method that can track a character's inner nature by tracing indices such as degree, in-degree, and out-degree of the character network in a movie through its progression. Finally, the spatial background where characters meet and where events take place is an important element in the story. We take advantage of the movie script to extracting significant spatial background and suggest a scene map describing spatial arrangements and distances in the movie. Important places where main characters first meet or where they stay during long periods of time can be extracted through this scene map. In view of the aforementioned three elements (character, event, background), we extract a variety of information related to the story and evaluate the performance of the proposed method. We can track story information extracted over time and detect a change in the character's emotion or inner nature, spatial movement, and conflicts and resolutions in the story.

Korean Public Relations Trend and Social Acceptance in 1960s (1960년대 한국의 PR 상황 및 사회적 수용에 대한 연구)

  • Chae, Myung-Jin;Seon, Hye-Jin
    • Korean journal of communication and information
    • /
    • v.35
    • /
    • pp.292-328
    • /
    • 2006
  • This study examined Korean Public Relations trend and social acceptance in 1960s. It centers on the acceptance conditions of PR concept, corporate PR and governmental PR. It analyzed PR recognition and practical activities of the general corporations, financial institutions and public corporations in dealing with corporate PR. It also analyzed Korean governmental PR through examining the structure of governmental PR system, PR activities in rural communities and the police. In those days, PR concept had been misused to no small degree and not been accepted correctly that the necessity to let people know PR in its proper meaning was raised. Laying emphasis upon the technical side, corporate PR activities had centered on publicity. Especially, at that time, the banks, the insurance companies and the public corporations had perceived the importance of PR and implemented a set of PR activities. It can be said that a special feature in government PR in 1960s lies in the expansion of the public information system and reinforcement of PR policies. Also, PR in rural communities had been doing to give information relating to agriculture technique and to improve the living conditions of the farm area. The importance of PR in police had been on the side of promoting relations with people and improving treatment of the people by policeman.

  • PDF

A Trend Analysis and Policy proposal for the Work Permit System through Text Mining: Focusing on Text Mining and Social Network analysis (텍스트마이닝을 통한 고용허가제 트렌드 분석과 정책 제안 : 텍스트마이닝과 소셜네트워크 분석을 중심으로)

  • Ha, Jae-Been;Lee, Do-Eun
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.9
    • /
    • pp.17-27
    • /
    • 2021
  • The aim of this research was to identify the issue of the work permit system and consciousness of the people on the system, and to suggest some ideas on the government policies on it. To achieve the aim of research, this research used text mining based on social data. This research collected 1,453,272 texts from 6,217 units of online documents which contained 'work permit system' from January to December, 2020 using Textom, and did text-mining and social network analysis. This research extracted 100 key words frequently mentioned from the analyses of data top-level key word frequency, and degree centrality analysis, and constituted job problem, importance of policy process, competitiveness in the respect of industries, and improvement of living conditions of foreign workers as major key words. In addition, through semantic network analysis, this research figured out major awareness like 'employment policy', and various kinds of ambient awareness like 'international cooperation', 'workers' human rights', 'law', 'recruitment of foreigners', 'corporate competitiveness', 'immigrant culture' and 'foreign workforce management'. Finally, this research suggested some ideas worth considering in establishing government policies on the work permit system and doing related researches.