• Title/Summary/Keyword: data centric

Search Result 471, Processing Time 0.022 seconds

A Study of Influencing Factors Upon Using C4I Systems: The Perspective of Mediating Variables in a Structured Model (C4I 시스템 사용의 영향 요인에 관한 연구: 구조모형의 매개변수의 관점에서)

  • Kim, Chong-Man;Kim, In-Jai
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.73-94
    • /
    • 2009
  • The general aspects for the future warfare shows that the concept of firepower and maneuver centric warfare has been replacing with that of information and knowledge centric warfare. Thus, some developed countries are now trying to establish the information systems to perform intelligent warfare and innovate defense operations. The C4I(Command, Control, Communication, Computers and Intelligence for the Warrior) systems make it possible to do modern and systematic war operations. The basic idea of this study is to investigate how TAM(Technology Acceptance Model) can explain the acceptance behavior in military organizations. Because TAM is inadequate in explaining the acceptance processes forcomplex technologies and strict organizations, a revised research model based upon TAM was developed in order to assess the usage of the C4I system. The purpose of this study is to investigate factors affecting the usage of C4I in the Korean Army. The research model, based upon TAM, was extended through a belief construct such as self-efficacy as one of mediating variables. The self-efficacy has been used as a mediating variable for technology acceptance, and the variable was included in the research model. The external variables were selected on the basis of previous research. The external variables can be classified into following: 1) technological, 2) organizational, and 3) environmental factors on the basis of TOE(Technology-Organization-Environment) framework. The technological factor includes the information quality and the task-technology fitness. The organizational factor includes the influence of senior colleagues. The environmental factor includes the education/train data. The external variables are considered very important for explaining the behavior patterns of information technology or systems. A structured questionnaire was developed and administrated to those who were using the C4I system. Total 329 data were used for statistical data analyses. A confirmatory factor analysis and structured equation model were used as main statistical methods. Model fitness Indexes for measurement and structured models were verified before all 18 hypotheses were tested. This study shows that the perceived usefulness and the self-efficacy played their roles more than the perceived ease of use did in TAM. In military organizations, the perceived usefulness showed its mediating effects between external variables and dependent variable, but the perceived ease of use did not. These results imply that the perceived usefulness can explain the acceptance processes better than the perceived ease of use in the army. The self-efficacy was also used as one of the three mediating variables, and showed its mediating effects in explaining the acceptance processes. Such results also show that the self-efficacy can be selected as one possible belief construct in TAM. The perceived usefulness was influenced by such factors as senior colleagues, the information quality, and the task-technology fitness. The self-efficacy was affected by education/train and task-technology fitness. The actual usage of C4I was influenced not by the perceived ease of use but by the perceived usefulness and selfefficacy. This study suggests the followings: (1) An extended TAM can be applied to such strict organizations as the army; (2) Three mediation variables are included in the research model and tested at real situations; and (3) Several other implications are discussed.

Analysis of SCI Journals Cited by Korean Journals in the Computer field

  • Kim, Byungkyu;You, Beom-Jong;Kang, Ji-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.11
    • /
    • pp.79-86
    • /
    • 2019
  • It is very important to analyze and provide information resources for research output produced in the computer field, the core science of the 4th Industrial Revolution. In this paper, SCI journals cited from domestic journals in the computer field were identified and the citation rankings and their co-citation networks were generated, analyzed, mapped and visualized. For this, the bibliographic and citation index information from 2015 to 2017 in the KSCD were used as the basis data, and the co-citation method and network centrality analysis were used. As a result of this study, the number of citations and the citation ranks of SCI journals and papers cited by korean journals in the computer field were analyzed, and peak time(2 years), half-life(6.6 years), and immediacy citation rate(2.4%) were measured by citation age analysis. As a result of network centrality analysis, Three network centralities(degree, betweenness, closeness) of the cited SCI journals were calculated, and the ranking of journals by each network centrality was measured, and the relationship between the subject classifications of the cited SCI journals was visualized through the mapping of the network.

The Evaluation for Web Mining and Analytics Service from the View of Personal Information Protection and Privacy (개인정보보호 관점에서의 웹 트래픽 수집 및 분석 서비스에 대한 타당성 연구)

  • Kang, Daniel;Shim, Mi-Na;Bang, Je-Wan;Lee, Sang-Jin;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.121-134
    • /
    • 2009
  • Consumer-centric marketing business is surely one of the most successful emerging business but it poses a threat to personal privacy. Between the service provider and the user there are many contrary issues to each other. The enterprise asserts that to abuse the privacy data which is anonymous there is not a problem. The individual only will not be able to willingly submit the problem which is latent. Web traffic analysis technology itself doesn't create issues, but this technology when used on data of personal nature might cause concerns. The most criticized ethical issue involving web traffic analysis is the invasion of privacy. So we need to inspect how many and what kind of personal informations being used and if there is any illegal treatment of personal information. In this paper, we inspect the operation of consumer-centric marketing tools such as web log analysis solutions and data gathering services with web browser toolbar. Also we inspect Microsoft explorer-based toolbar application which records and analyzes personal web browsing pattern through reverse engineering technology. Finally, this identified and explored security and privacy requirement issues to develop more reliable solutions. This study is very important for the balanced development with personal privacy protection and web traffic analysis industry.

An Efficient Technique for Storing XML Data Without DTD (DTD가 없는 XML 데이터의 효율적인 저장 기법)

  • Park, Gyeong-Hyeon;Lee, Gyeong-Hyu;Ryu, Geun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.495-506
    • /
    • 2001
  • XML makes it possible for data to be exchanged regradless of the data model in which it is represented or the platform on which it is stored, serving as a standard for data exchange format on the internet. Especially, it is natural to send XML data without DTD on the internet when XML is data-centric. Therefore it is needed to extract relational schema to store XML data efficiently, to optimize queries, and to publish data which have been stored in the relational database in the XML format. In this paper, we proposed a method to generate relational database in the XML documents without DTD and store XML data using upper/lower bound schema extraction technique for semistructured data. In extracting a lower bound schema, we especially show an efficient technique for creating relational schema by using simulation with is more advanced than the datalog method.

  • PDF

Development of Smart City IoT Data Quality Indicators and Prioritization Focusing on Structured Sensing Data (스마트시티 IoT 품질 지표 개발 및 우선순위 도출)

  • Yang, Hyun-Mo;Han, Kyu-Bo;Lee, Jung Hoon
    • The Journal of Bigdata
    • /
    • v.6 no.1
    • /
    • pp.161-178
    • /
    • 2021
  • The importance of 'Big Data' is increasing to the point that it is likened to '21st century crude oil'. For smart city IoT data, attention should be paid to quality control as the quality of data is associated with the quality of public services. However, data quality indicators presented through ISO/IEC organizations and domestic/foreign organizations are limited to the 'User' perspective. To complement these limitations, the study derives supplier-centric indicators and their priorities. After deriving 3 categories and 13 indicators of supplier-oriented smart city IoT data quality evaluation indicators, we derived the priority of indicator categories and data quality indicators through AHP analysis and investigated the feasibility of each indicator. The study can contribute to improving sensor data quality by presenting the basic requirements that data should have to individuals or companies performing the task. Furthermore, data quality control can be performed based on indicator priorities to provide improvements in quality control task efficiency.

A Hierarchical Data Dissemination Protocol in Large-Scale Wireless Sensor Networks (대규모 무선 센서 네트워크에서 계층적 데이터 전달 프로토콜)

  • Chu, Seong-Eun;Kang, Dae-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.8
    • /
    • pp.1505-1510
    • /
    • 2008
  • In large-scale wireless sensor networks, the deployed nodes cannot be replaced or recharged after first deployment. Also, dead nodes maγ lead to the partition of whole networks. While performing data dissemination under a battery power constraint, energy efficiency is a key design factor of routing protocol. As a solution for the efficient data dissemination, in this paper, we propose a protocol namely Hierarchical Data Dissemination (HDD) which provides scalable and efficient data delivery to multiple sources and mobile sinks. HDD uses the facts that sink nodes are central gathering Points and source-centric data forwarding paths are constructed and it is maintained with two-tier communications. The performance of HDD is compared with TTDD about the energy consumption, data delivery time and data success ration. The extensive simulation results show that HDD Routing Protocol outperforms TIDD by more than $1.5{\sim}3times$ on energy consumption.

Adaptive EY-NPMA: A Medium Access Protocol for Wireless LANs

  • Dimitriadis, Gerasimos;Pavlidou, Foteini-Niovi
    • Journal of Communications and Networks
    • /
    • v.6 no.4
    • /
    • pp.307-316
    • /
    • 2004
  • Wireless local area networks have known an increasing popularity during the past few years. However, as new user applications diverge from the traditional data-centric model, the introduction of efficient, QoS aware medium access methods becomes of utmost importance. EY-NPMA is a medium access protocol belonging to the contention paradigm that provides support for service differentiation and low collision rates. In this paper, we address a shortcoming of EY-NPMA as indicated by previous studies, namely the insensitivity of the protocol to different working conditions. In this work, we study and evaluate a mechanism that allows a network employing EY-NPMA to adapt its operating parameters according to the offered load. Simulation studies further document and confirm the positive characteristics of the proposed mechanism.

5G Mobile Traffic Forecast (5G 모바일 트래픽 전망)

  • Jahng, J.H.;Park, S.K.
    • Electronics and Telecommunications Trends
    • /
    • v.35 no.6
    • /
    • pp.129-136
    • /
    • 2020
  • Korea launched the world's first commercial 5G services in April 2019. Mobile traffic is expected to increase further with the acceleration of mobile-centric data utilization. It is one of the most important indexes of the growth of the mobile communications market, and it has a close relationship with frequency demand and supply, network management, and information communication policy. To overcome the limitations of an analytical solution due to the high complexity of the real world, this paper estimates the diffusion of 5G users using systemic thinking and the behavior of individual agents. Based on these demand forecasts, contributions to the establishment of strategic policies are suggested. For better understanding, global 5G predictions of subscribers and mobile traffic are also compared.

Understanding University Industry Technology Transfer: Relationship Management Approaches of Leading Universities in Europe And USA

  • Schneider, Jan-Philip;Kock, Alexander;Schultz, Carsten
    • World Technopolis Review
    • /
    • v.4 no.2
    • /
    • pp.62-78
    • /
    • 2015
  • The importance of university technology transfer has widely been brought to the center of attention over the last decades. Research and practice thereby often concentrate on issues related to patenting and licensing or entrepreneurship but abstract away from relationship- and network-focused initiatives. In this paper, we argue that efforts to systematically develop close, long-term collaboration partnerships - although complex and resource intensive - are likely to be more beneficial for both universities and industry in the long run. Drawing on data derived from interviews with technology transfer executives of 22 leading European and U.S. universities, we analyze and discuss well-established practices of network and relationship management and their possible impact on technology transfer success. Our findings indicate that dedicated relationship management approaches can yield a sustainable competitive advantage for universities. We thereby shift the focus away from transaction-orientation towards more forward-looking relationship-centric approaches and discuss their institutionalization in great detail.

A Case Study of Information System Auditing of CBD Project (CBD프로젝트의 정보시스템감리 사례연구)

  • 조남재;박기호;전순천;박준호
    • Journal of Information Technology Applications and Management
    • /
    • v.11 no.2
    • /
    • pp.167-178
    • /
    • 2004
  • Different from traditional development methodologies like waterfall model, the CBD (component based development) methodology relies on a building block approach in the design and development of information system. The audit procedure and checklist for the traditional IS development methodology are required to be modified to be suitable for CBD. This research reviewed IS audit guidelines for the existing development process and analyzed multiple projects that employed the by component based development process. For the purpose of this study, we chose a governmental project and a next-generation IS project of a financial agency as sample cases. By comparing existing IS audit checklists and items actually reviewed in audit projects, this study identified appropriate check items for the CBD-centric audit program. New items were proposed as additional items such as project control in management phase, usage case and conceptual model establishment, component evaluation and design, in implementation phase, and so forth. The result of the research provides new guidelines for the audit CBD projects for the purposed of increased efficiency and qualify of application development projects.

  • PDF