• Title/Summary/Keyword: information Offering

Search Result 829, Processing Time 0.027 seconds

A Study on Modeling of Digital Libraries (디지털 라이브러리 모형에 관한 연구)

  • Lee Chang-Yeol
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.32 no.4
    • /
    • pp.117-140
    • /
    • 1998
  • With the advancement of Internet technology, traditional libraries are going through a new metamorphosis into digital libraries. Digital libraries substitute digital files for papers, metadata for catalogues, world wide users on the network for localized patrons, while offering limitless possibilities for easy downloading of information. The aim of the study is to present a model for our digital library based on the knowledge acquired from the analysis of the state of the art technology employed in building and managing digital libraries. It is our belief that the national information infrastructure for digital libraries are mandatory for an open information society.

  • PDF

A Hedonic Model Effects for Consumer-oriented Retargeting Advertising Based on Internet of Things

  • Kim, Bo-Ram;Yoon, Yong-Ik;Chung, Man-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.2
    • /
    • pp.75-80
    • /
    • 2017
  • In this study, we developed a Hedonic Model for Retargeting Advertising Based on Consumer-centerd IoT space for offering useful, interest, and interactive information to consumer. And most existing relative researches about Internet of Things but, this paper focusing on the Type of information, humor, and interactive and analyze the attitude and clicks intention to Retargeting Advertising Based on Consumer-centerd Internet of Things. According to the results, humor Advertising is positively related to attitude and click intention toward Internet of Things Advertising. But information Ad and interactive Ad affect positive to click intention. This is mean that click intention is more immediate reaction of consumers in the IoT space. Therefore Future research will be designed in a more interactive elements that can lead to positive reaction of consumers on the Internet of Things be more effective if you advertise advertising.

A Study on the Scale Calculation of Information Support Facility of the Elementary School (초등학교 정보화 지원시설의 규모산정에 관한 연구)

  • Jo, Byeong-Seong;Lee, Ho-Chin
    • The Journal of Sustainable Design and Educational Environment Research
    • /
    • v.4 no.4
    • /
    • pp.25-38
    • /
    • 2004
  • Schools have focused so far on a student-oriented education. As the roles of schools, however, have been increasingly emphasized in the information society, community-centered functions are now additionally required. Beyond simply allowing communities to utilize selected facilities, schools can conduct re-education programs for community residents and actively use their facilities for such purposes. As explained above, schools must continuously evolve to meet current needs and demands, such as by offering special classes and utilizing learning facilities in the elementary levels to promote learning in ever-changing societies. This study analyzed the functions of school facilities to communities, as well as the educational functions involved in teaching-learning processes, in light of the advent of a knowledge and information society. Through analysis, the types of information facilities in elementary schools were derived. On the basis of such derived types, systematic and reasonable methods to estimate the scope were suggested.

  • PDF

A Comparative Study on the Information Security Strategy of Korean I-Government with Defense-in-Depth Strategy of DoD (미 국방성의 종심방어전략과 전자정부의 정보보호전략에 관한 비교 연구)

  • Song Woon-ho;Jeong Wook-jae;Kim Joon-bum;Kang Han-seung
    • The KIPS Transactions:PartC
    • /
    • v.12C no.5 s.101
    • /
    • pp.659-664
    • /
    • 2005
  • Advanced countries overhaul government workflows using IT, which not only enhances efficiency and productivity, but paves the way to a 'e-Government' offering prompt, quality service for citizens. This research analyzes the DiD(Defense-in-Depth Strategy) and compares the information protection strategy of Korean e-Government with DiD for reliable and safe e-Government's build.

A Study on the Information Disclosure of Financial services Using Content Analsysis (금융상품정보제공 실태파악을 위한 금융상품팜플렛 내용분석)

  • 허은영;최현자
    • Journal of the Korean Home Economics Association
    • /
    • v.38 no.11
    • /
    • pp.63-75
    • /
    • 2000
  • To identify the actual situation of financial information disclosure, a content analysis was performed on pamphlets of a time deposit and a new reserve trust offered by banks and other financial institutes. Although consumers required information on interest rate, tax favor, loan service, protection of brink depositors and bank security to select a financial service account, informations offered on pamphlets are not sufficient. Therefore concrete way of information offer system shoed be developed. In offering interest rate, interest rate after tax deduction or payment at maturity should be also mentioned. Information on tax favor, protection of bank depositors and bank security should be contained in pamphlets as well. Use of easy terms and notes are recommended for developing pamphlets for financial products.

  • PDF

Personal Information Extraction Using A Microphone Array (마이크로폰어레이를 이용한 사용자 정보추출)

  • Kim, Hye-Jin;Yoon, Ho-Sub
    • The Journal of Korea Robotics Society
    • /
    • v.3 no.2
    • /
    • pp.131-136
    • /
    • 2008
  • This paper proposes a method to extract the personal information using a microphone array. Useful personal information, particularly customers, is age and gender. On the basis of this information, service applications for robots can satisfy users by offering services adaptive to the special needs of specific user groups that may include adults and children as well as females and males. We applied Gaussian Mixture Model (GMM) as a classifier and Mel Frequency Cepstral coefficients (MFCCs) as a voice feature. The major aim of this paper is to discover the voice source parameters of age and gender and to classify these two characteristics simultaneously. For the ubiquitous environment, voices obtained by the selected channels in a microphone array are useful to reduce background noise.

  • PDF

Offering system for major article Using Text Mining and Data Mining (텍스트마이닝과 데이터마이닝을 이용한 주요기사 제공 시스템)

  • Song, Sung-Mook;Ryu, Joon-Suk;Kim, Ung-Mo
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.11a
    • /
    • pp.733-734
    • /
    • 2009
  • 현대사회에서 인터넷의 비약적인 발전과 빠른 보급으로 우리가 접할 수 있는 정보의 양이 늘어나고 이들 중에서 필요한 정보만을 얻어내기에는 쉽지 않다. 특히 비구조적이고 정형화되지 않은 텍스트 데이터인 기사들을 텍스트마이닝을 이용하여 기사 헤드라인을 용어 단위로 구분하여 추출하고 데이터마이닝의 연관 규칙을 적용하여 빈발항목의 지지도와 용어간의 연관성을 통해 기사의 내용에 효과적으로 접근하는 시스템을 제안하고자 한다.

Behavioral Analysis Zero-Trust Architecture Relying on Adaptive Multifactor and Threat Determination

  • Chit-Jie Chew;Po-Yao Wang;Jung-San Lee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.9
    • /
    • pp.2529-2549
    • /
    • 2023
  • For effectively lowering down the risk of cyber threating, the zero-trust architecture (ZTA) has been gradually deployed to the fields of smart city, Internet of Things, and cloud computing. The main concept of ZTA is to maintain a distrustful attitude towards all devices, identities, and communication requests, which only offering the minimum access and validity. Unfortunately, adopting the most secure and complex multifactor authentication has brought enterprise and employee a troublesome and unfriendly burden. Thus, authors aim to incorporate machine learning technology to build an employee behavior analysis ZTA. The new framework is characterized by the ability of adjusting the difficulty of identity verification through the user behavioral patterns and the risk degree of the resource. In particular, three key factors, including one-time password, face feature, and authorization code, have been applied to design the adaptive multifactor continuous authentication system. Simulations have demonstrated that the new work can eliminate the necessity of maintaining a heavy authentication and ensure an employee-friendly experience.

A Conjoint Analysis of Online Information Privacy Concerns: A case in Korea (온라인 프라이버시 침해 우려에 관한 컨조인트 분석 : 한국에서의 사례)

  • Choi, Mi-Young;Lee, Sang-Yong Tom
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.45-65
    • /
    • 2008
  • The rapid growth of the Internet has increased the amount of transmission of personally identifiable information. At the same time, with new Internet related technologies, organizations are trying to collect and access more personal information than before, which in turn makes individuals concern more about their information privacy. For their successful businesses, organizations have tried to alleviate these concerns in two ways: (1) by offering privacy policies that promise certain level of privacy protection; (2) by offering benefits such as financial gains or convenience. In this paper, we interpret these actions in the context of the information processing theory of motivation. This paper follows Hann et al.(2007)'s methods to analyze Internet users privacy concerns in Korea and tries to compare the findings. Our research objectives are as follows: First, we analyze privacy concern mitigation strategies in the framework of the expectancy theory of motivation. Subsequently, we show how the expectancy theory based framework is linked o the conjoint analysis. We empirically validate the predictions that the means to mitigate privacy concerns are associated with positive valences resulting in an increase in motivational score. In order to accommodate real-life contexts, we investigate these means in trade-off situation, where an organization may only be able to offer partially complete privacy protection and/or promotions and/or convenience, While privacy protection (secondary use, improper access) are associated with positive valences, we also find that financial gains can significantly increase the individuals' motivational score of a website in Korea. One important implication of this empirical analysis is that organizations may possess means to actively manage the privacy concerns of Internet users. Our findings show that privacy policies are valued by users in Korea just as in the US or Singapore. Hence, organizations can capitalize on this, by stating their privacy policy more prominently. Also organizations would better think of strategies or means that may increase online users' willingness to provide personal information. Since financial incentives also significantly increase the individuals' motivational score of website participation, we can quantify the value of website privacy protection in terms of monetary gains. We find that Korean Internet users value the total privacy protection (protection against errors, improper access, and secondary use of personal information) as worthy as KW 25,550, which is about US 28. Having done this conjoint analysis, we next adopt cluster analysis methodology. We identify two distinct segments of Korea's internet users-privacy guardians and information sellers, and convenience seekers. The immediate implication of our study is that firms with online presence must differentiate their services to serve these distinct segments to best meet the needs of segments with differing trade-offs between money and privacy concerns. Information sellers are distinguished from privacy guardians by prior experience of information provision, To the extent that businesses cannot observe an individual's prior experience, they must use indirect methods to induce segmentation by self-selection as suggested in classic economics literature of price discrimination, Businesses could use monetary rewards to attract information sellers to provide personal information. One step forward from the societal trends that emphasize the need of legal protection of information privacy, our study wants to encourage organizations and related authorities to have the viewpoints to consider both importance of privacy protection and the necessity of information trade for the growth of e-commerce.

Direction To Propel Efficient National Highway ITS According to Public and Private Traffic Information Sharing (공공 및 민간 교통정보 공유에 따른 효율적인 국도 ITS 추진방향)

  • Yoon, Young-Min
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.10
    • /
    • pp.526-534
    • /
    • 2022
  • In August 2014, the Ministry of Land, Infrastructure, and Transport (MOLIT) devised an innovative ITS measure in which private and public sectors share roles to maximize investment efficiency and effectiveness in collecting and offering traffic information that had been separately implemented by the state and private sector. The main details of the innovative measure include the following: For communication information, the information collected by the private sector is used, and the state concentrates on safety-related information collection, such as unexpected situations, including construction, accidents, and deteriorating weather conditions. Consequently, safety-related information is offered in real-time through smartphones and navigation, in addition to electric road signs that have limitations in providing unexpected real-time situations due to installation at specific spots. This study presented a connected traffic information priority coordination plan to improve the accuracy of traffic information offering by analyzing problems of related traffic information, including a general national highway case study to enhance the efficiency of national highway ITS implementation, according to actual public-private traffic information sharing. In addition, this study reviewed whether to operate or demolish the information collection equipment by analyzing traffic volume level and availability of related traffic information in the existing ITS operation sections and presented ITS collection equipment installation judgment standards based on the cases concerned.