• Title/Summary/Keyword: information activities

Search Result 6,833, Processing Time 0.035 seconds

The Effect of Composition and Security Activities for Information Security Architecture on Information Asset Protection and Organizational Performance (정보보호 아키텍처 구성과 보안활동이 정보자산보호 및 조직성과에 미치는 영향)

  • Jeong, Gu-Heon;Yi, Dong-Wook;Jeong, Seung-Ryul
    • The KIPS Transactions:PartD
    • /
    • v.17D no.3
    • /
    • pp.223-232
    • /
    • 2010
  • This study was carried out for the purpose of inquiring into the effect of composition and security activities for information security architecture on information asset protection and organizational performance in terms of general information security. This study made a survey on 300 workers in the government, public institutions and private companies, which it showed that management factors of risk identification and risk analysis, in general, have an usefulness to composition and security activities for information security architecture to prevent inside information leakage. And the understanding and training factors of IT architecture and its component were rejected, requiring the limited composition and security activities for information security architecture. In other words, from the reality, which most institutions and organizations are introducing and operating the information security architecture, and restrictively carrying out the training in this, the training for a new understanding of architecture and its component as an independent variable made so much importance, or it did not greatly contribute to the control or management activities for information security as the generalized process, but strict security activities through the generalization of risk identification and risk analysis management had a so much big effect on the significant organizational performance.

An Evaluation of the Efficiency of Information Protection Activities of Private Companies (기업의 정보보호활동의 효율성 평가)

  • Choi, Won-Nyeong;Kim, Woo-Je;Kook, Kwang-Ho
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.25-32
    • /
    • 2018
  • Cyber hackings are increasing and becoming more intelligent. The government and private companies conduct various information protection activities by investing lots of money and employing security personnel to protect import ant assets and personal information. It is important to evaluate the efficiency of the information protection activities that cost lots of money and manpower. However, the studies on the efficiency of the information protection activities were mainly conducted for government agencies the information of which is more readily available. This study suggests a model that can evaluate the efficiency of the activities of information protection and information security certification of various private companies. Our model evaluates the efficiency of the information protection activities by applying AHP and DEA on the information that are publicly announced by the private companies. Our model identifies the DMUs that are efficiently operated and suggests the improvement policies for the DMU that are non-efficiently operated.

  • PDF

The Effects of Writing Future Autobiography Using Information Activities on High School Student's Ego-identity (정보활동을 통한 미래자서전 쓰기가 고등학생의 자아정체감에 미치는 영향)

  • Seo, Haeng-Min;Lee, Byeong-Ki
    • Journal of Korean Library and Information Science Society
    • /
    • v.46 no.4
    • /
    • pp.599-620
    • /
    • 2015
  • The purpose of this study was to examine effects of writing future autobiography program using information activities in school library on improving high school students' ego-identity. This study was conducted 198 high school students in grade 2. Writing an autobiography using information activities in library was conducted 15 times in total, once a week for 50 minutes, and students had done information activities to get to know about themselves and their own lives and they wrote their future autobiography based on those activities. Then they made their own books. As a result of analyzing the change of students' ego-identity before and after writing the future autobiography through t-test, it turned out that there were some meaningful differences.

Participatory Web Users’ Information Activities and Credibility Assessment

  • Rieh, Soo-Young
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.44 no.4
    • /
    • pp.155-178
    • /
    • 2010
  • Assessment of information credibility is a ubiquitous human activity given that people constantly make decisions and selections based on the value of information in a variety of information seeking and use contexts. Today, people are increasingly engaging in diverse online activities beyond searching for and reading information, including activities such as creating, tagging and rating content, shopping, and listening to and watching multimedia content. The Web 2.0 environment presents new challenges for people because the burden of information evaluation is shifted from professional gatekeepers to individual information consumers. At the same time, however, it also provides unprecedented opportunities for people to use tools and features that help them to make informed credibility judgments by relying on other people's ratings and recommendations. This paper introduces fundamental notions and dimensions of credibility, and contends that credibility assessment can be best understood with respect to human information behavior because it encompasses both the level of effort people exert as well as the heuristics they employ to evaluate information. The paper reports on a survey study investigating people's credibility judgments with respect to online information, focusing on the constructs, heuristics, and interactions involved in people's credibility assessment processes within the context of their everyday life information activities. Using an online activity diary method, empirical data about people's online activities and their associated credibility assessments were collected at multiple points throughout the day for three days. The results indicate that distinct credibility assessment heuristics are emerging as people engage in diverse online activities involving more user-generated and multimedia content. A heuristic approach suggests that people apply mental shortcuts or rules of thumb in order to minimize the amount of cognitive effort and time required to make credibility judgments. The paper discusses why a heuristic approach is key to reaching a more comprehensive understanding of people's credibility assessments within the information-abundant online environment.

Internet Based Managing Design and Production Processes in a Distributed Global Environment (인터넷 기반 디자인 및 생산지원 분산환경 프로세스관리 기법 연구)

  • 박화규
    • The Journal of Information Systems
    • /
    • v.9 no.1
    • /
    • pp.217-234
    • /
    • 2000
  • This paper is to develop an information infrastructure to support managing process in design, planning, production, and quality control. Multi-media data set of design, product, and management information flow between organizational units of a virtual enterprise. The process is the logical organization of people, technology and practices incorporated into work activities to make an end product. The core of the infrastructure is the enterprise framework which coordinates activities and controls the process. The proposed framework manages collaborative activities across space and time, and between users and computers who share information in virtual community. It utilizes knowledge distributed through virtual community and fosters cooperation between organizations. The framework provides the following facilities; coordinating activities, sharing data and processes, visualizing multi-media data, customizing and updating processes, reusing data and processes. This paper covers design and manufacturing activities but our focus is initially targeted at design area.

  • PDF

The Effects of Promotion Activities of Pharmaceutical Companies on Physicians' Prescription (제약회사의 판촉전략이 의약품 처방에 미치는 영향)

  • Park, Sang-Jun
    • Korean Management Science Review
    • /
    • v.28 no.2
    • /
    • pp.93-103
    • /
    • 2011
  • This paper has aimed to identify marketing variables which affect physicians' prescription of drug. Based on a literature review this paper derives the three factors (indirect commercial source, direct commercial source, academic information source) of information sources that physicians rely on for medicines, the three factors (research supporting activity, marketing supporting activity, medicine information supporting activity) of promotion activities physicians prefer, and the four factors (indirect quality of medicine, direct quality of medicine, experience of using medicine, price and design of medicine) of prescription criteria physicians use. Then it investigates using canonical correlation analysis whether or not physicians' prescriptions are affected by the information sources, the promotion activities, and the type of physicians. From the canonical correlation analysis this paper derives the meaningful three canonical functions of prescription for drugs. The first function explains the prescription which is insensitive to marketing activities, the second function does the prescription which is sensitive to them, and the final function does the prescription which is not affected by them.

Activation of Ontact Research Using Science & Technology Knowledge Infrastructure ScienceON

  • Han, Sangjun;Shin, Jaemin;Lee, Seokhyoung;Park, Junghun
    • Journal of Information Science Theory and Practice
    • /
    • v.10 no.spc
    • /
    • pp.1-11
    • /
    • 2022
  • As data-based research activities and outcomes increase and ontact or non-face-to-face activities become common, the demand for easy utilization of resources, tools, functions, and easily accessible information required for research in the R&D sector has increased accordingly. With the rapid increase in the demand for collaborative research based on online platforms, research support institutions strive to provide venues for research activities that merge various information and functions. ScienceON, an integrated science & technology (S&T) knowledge infrastructure service developed and operated by the Korea Institute of S&T Information (KISTI), supports open collaboration by connecting and merging all the information, functions, and infrastructure required for research activities. This paper describes the online research activity support tool provided by ScienceON and the remarkable results achieved through this activity. Specifically, the excellent creation of the following flow of meta-material research activities in the ontact space is elucidated. First, the papers required for a meta-material analysis are retrieved, virtual simulation is conducted with the experimental data extracted from the papers, and research data are accumulated. ScienceON's tools for supporting ontact research activity will play a role as an important service in the era of digital transformation and open science.

Intelligent Healthcare Service Provisioning Using Ontology with Low-Level Sensory Data

  • Khattak, Asad Masood;Pervez, Zeeshan;Lee, Sung-Young;Lee, Young-Koo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.11
    • /
    • pp.2016-2034
    • /
    • 2011
  • Ubiquitous Healthcare (u-Healthcare) is the intelligent delivery of healthcare services to users anytime and anywhere. To provide robust healthcare services, recognition of patient daily life activities is required. Context information in combination with user real-time daily life activities can help in the provision of more personalized services, service suggestions, and changes in system behavior based on user profile for better healthcare services. In this paper, we focus on the intelligent manipulation of activities using the Context-aware Activity Manipulation Engine (CAME) core of the Human Activity Recognition Engine (HARE). The activities are recognized using video-based, wearable sensor-based, and location-based activity recognition engines. An ontology-based activity fusion with subject profile information for personalized system response is achieved. CAME receives real-time low level activities and infers higher level activities, situation analysis, personalized service suggestions, and makes appropriate decisions. A two-phase filtering technique is applied for intelligent processing of information (represented in ontology) and making appropriate decisions based on rules (incorporating expert knowledge). The experimental results for intelligent processing of activity information showed relatively better accuracy. Moreover, CAME is extended with activity filters and T-Box inference that resulted in better accuracy and response time in comparison to initial results of CAME.

A Study on Improving the Relationship Marketing Activities of Tourist Hotels (관광호텔의 대 고객 관계 마케팅 활동 개선방안에 관한 연구)

  • 송용덕
    • Journal of Applied Tourism Food and Beverage Management and Research
    • /
    • v.10
    • /
    • pp.159-186
    • /
    • 1999
  • This study attempted to present the ways of improving relationship marketing activities of tourist hotels. The field survey was carried out at six deluxe hotels in Seoul to find out their relationship marketing activities and analyze the problems of the activities. The problems were analyzed as follow; 1) lack of adequate understanding of the importance of relationship marketing, 2) poor contents of customer file information, 3) insufficient service encounter management, 4) negative inducement of guests' complaints, 5) insufficient survey of guests' satisfaction, 6) insufficient relationship maintenance programs and regaining program of lost guests. This study relationship marketing activities should be improved with customer information file establishment, service encounter mangement, and communication enforcement as follow; 1. Customer Information File Establishment As relationship marketing Is marketing for individual, it needs customer file information. The guest information files should be made in detail in all the market segments. Hotels have to make use of the information strategically for establishing relationship with their guests. 2. Service Encounter Mnagement Because the guest-oriented mind and professionalism of hotel staff are prerequisite for relationship continuity, hotel should make efforts to make its staff keep the mind and cultivate expert service technique of the staff. 3. Communication Enforcement Communication enforcement consists of communication activities and communication programs which are focused on contact intensity and two-way communication.

  • PDF

A Study on the Information System Maintenance Activities and Performance

  • Lee, Young-Joo;Choi, Young-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.12
    • /
    • pp.175-180
    • /
    • 2015
  • It is important to maintain information system (IS) following the business and institutional change. Even if successfully developed information systems, we cannot gain the benefit from the systems without the proactive maintenance activities. However, the importance of IS maintenance has not been considered as much as the system development, and we don't have any specific performance management structure. The objective of this study is to identify the relationship between IS maintenance activities and utilization. For empirical test of the hypothesis model, the sample data is collected from public information system sites. Results from multiple regression analysis reveal that proactive maintenance activities including IS maintenance cost increase, improving functionality, and enhancing ease of use have a causal effect on the IS utilization.