• Title/Summary/Keyword: User Management System

Search Result 3,214, Processing Time 0.032 seconds

Mobile Voice Note File Management Service For Improving Accessibility of the Blind (전맹인의 접근성 향상을 위한 모바일 음성 메모 파일 관리 서비스)

  • Lim, Soon-Bum;Lee, Mi Ji;Choi, Yoo Jin;Yook, Juhye;Park, Joo Hyun;Lee, Jongwoo
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.11
    • /
    • pp.1215-1222
    • /
    • 2019
  • Recently, people with disabilities also search for and collect information from the web through smart devices, and save collected information on smart devices or take notes. For non-disabled people, various memo applications are provided on the market, so it is more convenient to choose according to their preference. However, existing memo services are limited for use by blind people due to the importance of visual information. The problem with blind people when using smart devices is that the screen is not recognized, so it is not possible to check in which location the menu of the application exists. In addition, it is difficult to input and manipulate text, and systematic file management and control are not possible. Therefore, in this paper, we propose the development of voice memo service that blind people can use only voice and hearing information and can operate menu with Bluetooth remote controller. We will develop a system that includes a comprehensive voice file management function for storing, searching, playing, and deleting files, rather than simply storing voice files.

Information Right Management System using Secret Splitting of Hardware Dependent Encryption Keys (하드웨어에 종속된 암호키 비밀 분할을 이용한 정보권한관리 시스템)

  • Doo, So-Young;Kong, Eun-Bae
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.3
    • /
    • pp.345-351
    • /
    • 2000
  • This paper presents a right management scheme using secret splitting protocol. Right management schemes combat piracy of proprietary data (such as digital music). In these schemes, encryption has been used and it is essential to protect the keys used in encryption. We introduce a new key protection method in which a secret encryption key is generated using both user's hardware-dependent unique information (such as MAC address) and cryptographically secure random bit strings provided by data owner. This scheme prevents piracy by checking hardware-dependent information during rendering and improves the secrecy of the data by individualizing the encryption key for each data.

  • PDF

An Empirical Study on the Acceptance of Knowledge Management Systems in Public Institutions : Using Technology Acceptance Model (공공기관의 지식관리시스템 수용모형에 관한 실증적 연구)

  • Jeong, Dae-Yul;Seo, Jeong-Sun
    • The Journal of Information Systems
    • /
    • v.13 no.2
    • /
    • pp.22-48
    • /
    • 2004
  • Information systems that are not used cannot be useful. In order to increase user acceptance, it is necessary to understand why people accept or reject information systems. Technology Acceptance Model(TAM) is one of the most influential research models for studying determinants how users accept information systems. Recently, Knowledge Management Systems(KMS) have become important components of corporate systems as the foundation of industrialized economics has shifted from natural resources to knowledge assets. This paper applies TAM to investigate users' acceptance of KMS in public administration institutions. It sampled 182 users who had experience in using KMS. Many empirical researches have suggested that TAM can be integrated with other organizational theories to improve its predictive and explanatory ower. We extended the basic TAM by the integration of appraisal and reward satisfaction theory. There are many external variables that influence the perception and the belief of system users. We introduced two external variables(job characteristics, IT self-efficacy) and one additional perception variable, perceived appraisal and reward(PAR) in the basic TAM model. The LISREL model analysis is used for finding out the causality among variables and testing the model fitness. As result, The IT self-efficacy influences to the perceived ease of use(PEOU) and the PAR, and the PEOU influences directly to the perceived usefulness(PU), the PAR, and the attitude toward KMS. The KMS participation intention(PI) was influenced by the PAR and the attitude directly,andbythePEOUindirectly. Finally, this paper suggests some guidelines for the adoption of KMS in public sectors on the basis of the study results.

  • PDF

A Study on the Methodology for Application Traffic Management using RMON (RMON 기반의 응용 서비스 트래픽 관리를 위한 방법론 연구)

  • Han, Jeong-Su;An, Seong-Jin;Jeong, Jin-Uk
    • The KIPS Transactions:PartC
    • /
    • v.9C no.3
    • /
    • pp.413-420
    • /
    • 2002
  • With the rapid development of computer networks, how to speed up network services and to guarantee QoS (Quality-of-Service) for users has drawn much attention from computer scientists. So has the need to manage network application services in order to manage network resources more effectively and meet the users' demands. In this paper, we present methodology of determining the traffic of application services on the network, so as to manage network resources effectively and thus to make application services more user-oriented. On the basis of this methodology and by using RMON MIB we develop analysis parameters and their algorithm to manage the traffic of application services on the network, thus realizing Web-based Application Management System which allows network managers to extract and analyze the Internet application service traffic beyond the limitation of time and space.

Development of Construction Material Naming Ontology for Automated Building Energy Analysis (건축물 에너지 분석 자동화를 위한 건축 자재명 온톨로지 구축)

  • Kim, Ka-Ram;Kim, Gun-Woo;Yoo, Dong-Hee;Yu, Jung-Ho
    • Korean Journal of Construction Engineering and Management
    • /
    • v.12 no.5
    • /
    • pp.137-145
    • /
    • 2011
  • BIM Data exchange using standard format can provide a user friendly and practical way of integrating the BIM tools in the life cycle of a building on the currently construction industry which is participated various stakeholder. It used IFC format to exchange the BIM data from Design software to energy analysis software. However, since we can not use the material name data in the library of an energy analysis directly, it is necessary to input the material property data for building energy analysis. In this paper, to matching the material named of name of DOE-2 default library, rhe extracted material names from BIM file are inferred by the ontology With this we can make the reliable input data of the engine by development a standard data and also increase the efficient of building energy analysis process. The methodology can enable to provide a direction of BIM-based information management system as a conceptual study of using ontology in the construction industry.

Theorization and Utilization of Smart Tourism Ecosystems (스마트 관광 생태계의 이론화와 활용)

  • Koo, Chulmo;Kim, Jeong Hyeon;Chung, Namho
    • Information Systems Review
    • /
    • v.16 no.3
    • /
    • pp.69-87
    • /
    • 2014
  • The integration of Tourism and Information Communication Technology (ICT) has been continued based on a drastic progress of ICT in the entire sectors of tourism industry. A variety of terminologies such as eTourism, Virtual Tourism, Smart Tourism have appeared during the last decades, however, tourism with Smartphones created a new paradigm has not discussed yet in tourism industry and academia. By investigating on the previous literature in the role of ICT in tourism, we have classified five major streams in the past such as end user perspective (tourist behaviour), Community, Multimedia and Web, Intelligent System, and Smart Tourism. At a result, we investigated the concept of smart tourism and extended to research on Smart Tourism Ecosystems. We suggest the concept of smart tourism ecosystems, which may create values by interacting among tourism players (tourist, distribution channel, supply channel, government, and local community). We propose the discussion of meaning of 'creating shared value' through 'Smart Tourism Ecosystems'.

Channel Set Manager Development and Performance Analysis for Cognitive Radio System (인지 무선 시스템을 위한 채널 집합 관리기의 개발 및 성능 분석)

  • Park, Chang-Hyun;Song, Myung-Sun
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.5
    • /
    • pp.8-14
    • /
    • 2008
  • There are two a approaches for the Cognitive Radio(CR) development. One is 'Full CR', which Joseph Mitola III proposed, and another is 'Spectrum CR', which is currently being standardized. The target approach of this paper is the latter and we develop a Cognitive Engine(CE) and simulated a channel set management(CSM), which is a core function of CE. The Channel set management evaluates channel quality and Incumbent User(IU) vacancy possibility and classifies the channel set, which is performed by using channel state history. Especially, a very important function for the channel set management is a channel state prediction and this paper proposed a Hidden Markov Model(HMM) based channel state prediction and a method for increasing performance. Also, we applied the proposed method into our simulator and simulated channel state prediction. Through the simulation, we verified as we applied our proposed scheme, the performance of channel state prediction gets better and through comparing with RS and SS, we verified the HMM based Channel state prediction is better.

A Study on Improving User Satisfaction through Internal Marketing of University Archives (대학기록관의 내부마케팅을 통한 이용자 만족도 제고 방안)

  • Ku, Young-Mi;Hong, Hyun-Jin
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.30 no.4
    • /
    • pp.235-254
    • /
    • 2019
  • According to the development of information technology, the paradigm of the archives is shifting from preservation management of past records to use-oriented services. In this regard, this study is conducted an empirical study on the effect of internal marketing factors of university archives on the customer orientation of employees in order to improve organizational satisfaction for users of records information service. Based on the previous research, the delegation of authority, internal communication, management support, and training are established as factors of internal marketing, and the parameters for this are job satisfaction, organizational commitment, customer orientation as dependent variables, and We set up hypothesis between research variables and attempted an analysis through statistical system. In summary, each element of internal marketing showed significant results on job satisfaction and organizational commitment, and management support was most closely related to job satisfaction, organizational commitment, and customer orientation of university archive staff.

A Study on the Key Factors for Activating Enterprise Architecture in the Public Sectors: A Perspective of IT Governance (공공부문 Enterprise Architecture 활성화에 영향을 미치는 핵심요인에 관한 연구: IT Governance 관점에서)

  • Kim, Choong Nyoung;Oh, Seung Woon
    • Journal of Information Technology and Architecture
    • /
    • v.10 no.4
    • /
    • pp.423-433
    • /
    • 2013
  • The purpose of this research is to propose a practical guideline for activating EA which has been operated in the public institutions. For this purpose, how EA is being operated in the public sector, was analyzed from the viewpoint of IT Governance and on the basis of the result, key activities for EA managers could be developed. The key activities were also compared between the two different groups in terms of EA Maturity Level and the difference in the key activities between the two were examined. As a result, it was found that the use of EA has effect on building and improving IT management systems. It is suggested that the Relational Mechanism should be better understood and recognized as necessary activities for activating EA. In addition, the higher the level of EA maturity is, the more likely such various effects as the enhancement of IT management system, user satisfaction, IT utilization, and the improvement of business can be produced. This result could be interpreted that such desired outcomes of EA could be realized only when EA is actively utilized.

Prototype Design and Security Association Mechanism for Policy-based on Security Management Model (정책기반 보안관리 모델을 위한 프로토타입과 정책 협상 메커니즘)

  • 황윤철;현정식;이상호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.1
    • /
    • pp.131-138
    • /
    • 2003
  • With the Internet winning a huge popularity, there rise urgent problems which are related to Network Security Managements such as Protecting Network and Communication from un-authorized user. Accordingly, Using Security equipments have been common lately such as Intrusion Detection Systems, Firewalls and VPNs. Those systems. however, operate in individual system which are independent to me another. Their usage are so limited according to their vendors that they can not provide a corporate Security Solution. In this paper, we present a Hierarchical Security Management Model which can be applicable to a Network Security Policies consistently. We also propose a Policy Negotiation Mechanism and a Prototype which help us to manage Security Policies and Negotiations easier. The results of this research also can be one of the useful guides to developing a Security Policy Server or Security Techniques which can be useful in different environments. This study also shows that it is also possible to improve a Security Characteristics as a whole network and also to support Policy Associations among hosts using our mechanisms.