• Title/Summary/Keyword: information needs analysis

Search Result 2,542, Processing Time 0.031 seconds

Trends in the AI-based Banking Conversational Agents Literature: A Bibliometric Review

  • Eden Samuel Parthiban;Mohd. Adil
    • Asia pacific journal of information systems
    • /
    • v.33 no.3
    • /
    • pp.702-736
    • /
    • 2023
  • Artificial Intelligence (AI) and the technologies powered by AI fuel the fourth industrial revolution. Being the primary adopter of such innovations, banking has recently started using the most common AI-based technology, i.e., conversational agents. Although research extensively focuses on this niche area and provides bibliometric understanding for such agents in other industries, a similar review with scientometric insights of the banking literature concerning AI conversational agents is absent till date. Furthermore, in the era following the pandemic, banks are faced with the imperative to provide solutions that align with the changing landscape of remote consumer behavior. As a result, banks are proactively integrating technology-driven solutions, such as automated agents, to effectively address the growing demand for remote customer support. Hence more research is needed to perfect such agents. In order to bridge these existing gaps, the present study undertook a comprehensive examination of two decades' worth of banking literature. A meticulous review was conducted, analyzing approximately 116 papers published from 2003 to 2023. The aim was to provide a scientometric overview of the topic, catering to the research needs of both academic and industrial professionals. Holistically, the study seeks to present a macro-view about the existing trends in AI based banking conversational agents' literature while focusing on quantity, qualitative and structural indicators that are effectively necessary to offer new directions for the AI-based banking solutions. Our study, therefore, presents insights surrounding the literature, using selected techniques related to performance analysis and science mapping.

An Analysis of Technology Needs for Environmental Issues in Developing Countries (개도국 환경 분야 기술 수요 분석)

  • Jeong, Seongpil;Sohn, Erica Jungmin;Kim, Junyoung;Hwang, Jiyun;Seok, Dockko;Choi, Young Gyun
    • Journal of Appropriate Technology
    • /
    • v.5 no.2
    • /
    • pp.106-113
    • /
    • 2019
  • In order to respond to the global environmental issues, developed countries have been helped the developing countries as the Official Development Assistance (ODA). It is important to understand technology needs of the developing countries to provide the optimum solutions. In this study, the information of the environmental R&D dealing with appropriate technology were comprehensively collected based on the conducted R&D projects from the ministry of environment in Korea. The technology needs by UNFCCC (United Nations Framework Convention on Climate Change) and Korean government were analyzed named as TNA and CPS according to the target developing countries. In South-East Asia and Africa region, there were technology needs on water, biota, air, solid wastes, infrastructures and resources. And they were related to the issues such as environmental pollution, construction, climate change, biodiversity, energy and water management. The technology needs by UNFCCC and Korean government were also compared. Furthermore, the environmental R&D on appropriate technology should be focused on localization and maintenance to provide sustainable solutions to the developing countries.

Predictors of Sexual Desire, Arousal, Lubrication, Orgasm, Satisfaction, and Pain in Women with Gynecologic Cancer (부인암 여성의 성 욕구, 성 흥분, 질분비, 절정감, 성 만족도, 성교 통증에 대한 심리사회적 예측요인)

  • Chun, Na-Mi
    • Journal of Korean Academy of Nursing
    • /
    • v.40 no.1
    • /
    • pp.24-32
    • /
    • 2010
  • Purpose: This study was done to identify psychosocial factors that might be predictive of sexual desire, arousal, lubrication, orgasm, satisfaction, and pain in women with gynecologic cancer. Methods: Two hundred and twelve women with cervical, ovarian, or endometrial cancer completed questionnaires on the Female Sexual Function Index including sexual desire, arousal, lubrication, orgasm, satisfaction, and pain, and data on their psychosocial factors including body image, sexual attitude, sexual information, depression, and marital intimacy. Stepwise multivariable regression analysis was performed to explore psychosocial predictors of women’s sexual function domains. Results: Predictors were identified as sexual attitude, depression, sexual information, and body image for sexual desire; sexual information, depression, and sexual attitude for sexual arousal; sexual information, marital intimacy, and depression for lubrication; sexual information, marital intimacy, depression, and body image for orgasm; marital intimacy, sexual information, sexual attitude, and depression for satisfaction; sexual information, depression, and marital intimacy for pain. Conclusion: The results indicate that women’s sexual function needs to be approached to domains of female sexual function psychosocially as well as to general sexual function. These factors should be considered in future interventions to positively promote sexual function in women with gynecologic cancer.

A Study on the Evaluation Indices for Evaluation of the Information Security Level on the Enterprise Organization (기업의 정보보호 수준 평가를 위한 평가지표)

  • Na, Yun-Ji;Ko, Il-Seok;Cho, Young-Suk
    • Convergence Security Journal
    • /
    • v.6 no.3
    • /
    • pp.135-144
    • /
    • 2006
  • Until now, most of the evaluation systems have performed evaluation with an emphasis on in-formation security products. However, evaluating information security level for an enterprise needs analysis of the whole enterprise organization, and a synthetic and systematic evaluation system based on it. In this study we subdivided the information security elements of the whole enterprise such as planning, environment, support, technology, and management; developed indices based on them; finally, made the information security level of the whole enterprise organization possible to be measured. And we tried to grasp the information security level of the whole enterprise organization and develop an evaluation system of information security level for suggesting a more developing direction of information security.

  • PDF

A Design and Implementation of Parking Guidance and Information System in u-City (U-City 주차 유도 및 정보 시스템 설계 및 구현)

  • Song, Kyu-Seog;Ryou, Jae-Cheol
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.940-947
    • /
    • 2010
  • A Parking Guidance and Information Service System is to provide real-time parking-information and the shortest parking-path for increasing the user's convenience, relieving traffic congestion, reducing illegal parking, and maximizing the efficiency of parking management. This paper discusses the result of the needs analysis, design, and implementation of the Parking Guidance and Information Service System. Furthermore, it analyzes and compares the parking time and vehicle turnover rate before and after the system installation.

The Concept and Analysis of Redundant Information in Space Perception - Focused on the Works of NOX - (공간지각에 있어 잉여정보의 의미와 분석 - NOX의 공간을 중심으로-)

  • Kim, Joo-Mi
    • Korean Institute of Interior Design Journal
    • /
    • v.15 no.6 s.59
    • /
    • pp.77-88
    • /
    • 2006
  • According to critics and architects, non-linear structure is not only an organic form of space, but also a form of space detached from modem style. Accordingly, non-linear structure can be accepted as an alternative to what has remained unsolved by deconstructionist. However, they are criticized for not clarifying the interdependent relationship between non-linearity of space and cognitive structure of human being. They ended up remaining the hypothesis just an intuitive and abstract one. This research began on the basis that their hypothesis is hard to be objectified, and it needs further inquiry. The purpose of this thesis is to explore how the redundant factors constitute non-linear structures of digital media centered space design. Geometric compositions of space structure were analyzed to define what types of redundant factors are contrived in the process of visual information. This study about the visual form, researching the Information Theory, and then offer a quantitative analysis that makes those more objective. Space structure and geometric composition were analyzed to define what types of redundancy are contrived in the process of visual information. In particular, I put higher theoretical emphasis on what characteristics are ensued in the process of structuring spaces than any other subjects. Followings are the conclusion of analysis. First, as a result of examining, we can assume that NOX' space structure is not a chaotic form, but has an operating the form of its own. Second, in case of curvilinear, the structure was found redundancy on mid deviation ratio and discontinuous circular fabric. Although most of their structures appeared complex with a higher coherent constant, they were found to be stable factors because of the low deviation ratio between systems. The amount of surplus information was stable structure as well.

Visualized Determination for Installation Location of Monitoring Devices using CPTED (CPTED기법을 통한 모니터링 시스템 설치위치 시각화 결정법)

  • Kim, Joohwan;Nam, Doohee
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.145-150
    • /
    • 2015
  • Needs about safety of residents are important in urbanized society, elderly and small-size family. People are looking for safety information system and device of CPTED. That is, Needs and Installations of CCTV increased steadily. But, scientific analysis about validity, systematic plan and location of security CCTV is nonexistent. It is simply put these devised in more demanded areas. It has limits to look for safety of residents by increasing density of CCTVs. One of the characteristics of crime is clustering and stong interconnectivity. So, exploratory spatial data of crime is geo-coded using 2 years data and carried out cluster analysis and space statistical analysis through GIS space analysis by dividing 18 variables into social economy, urban space, crime prevention facility and crime occurrence index. The result of analysis shows cluster of 5 major crimes, theft, violence and sexual violence by Nearest Neighbor distance analysis and Ripley's K function. It also shows strong crime interconnectivity through criminal correlation analysis. In case of finding criminal cluster, you can find criminal hotspot. So, in this study I found concept of hotspot and considered technique about selection of hotspot. And then, selected hotspot about 5 major crimes, theft, violence and sexual violence through Nearest Neighbor Hierarchical Spatial Clustering.

Analysis of Security Threats from Increased Usage of Mobile App Services (모바일 앱 서비스 이용 증가로 인한 보안 위협 분석)

  • Choi, Heesik;Cho, Yanghyun
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.1
    • /
    • pp.45-55
    • /
    • 2018
  • Recently, because the arrival of the fourth industrial revolution era, many information and telecommunication services have grown rapidly in the mobile business market. So, companies are based Mobile Apps on user customized services and expanding their services. From the standpoint of the business, to generate revenue, the company needs to maintain the existing current computer environment and develop Mobile Apps to offer convenience in various areas such as finance, admiration, e-commerce and sales support. However, as the number of users increase due to expansion of various Mobile services, security threats that are related to Mobile Apps are increasing and its damage is also increasing. Due to the rapid technological transformation of Mobile devices using the Internet, the level of security threats to Smartphones are rising and getting more advance, so this thesis is structured as follows. In Chapter 2, it will look at the overall trends of Mobile Apps as related research. In Chapter 3, it will discuss various security concerns that related to the latest Mobile Apps and learn about the threatening factors. In Chapter 4, it will compare and analyze the threatening factors. Then it will find and suggest the possible plan. In Chapter 5, it will end with conclusion. Finally, to protect mobile devices from security threats, the environment of operating system which manages the resources and data of Apps needs to be protected. Also, it is important that users to have awareness and check activation FinTech technology security in the process of simple payment with fingerprint or IC card.

Analysis on Acceptance Intention of Augmented Reality System - Using Logit Model (증강현실시스템의 수용 의도 분석 - 로짓모형 이용)

  • Kim, Mincheol
    • Journal of Digital Convergence
    • /
    • v.11 no.11
    • /
    • pp.373-380
    • /
    • 2013
  • Recently, AR(Augmented Reality) system as an information technology for the increased access of information has a potential possibility of next generation's system for tourism guide. In this regard, the objective of this study is to explore the technology acceptance factors of AR system on tourism destination. To achieve the objective of this study, logit regression model was used to analyze the influential level of the factors. This study was analyzed with the final 224 respondents and the results showed that if there will be assured with high trust and easy access via mobility device as smartphone, the AR system has the possibility of high acceptance level. The result of this study will be expected to be utilized as fundamental data from the viewpoint of the service providers and system developers that want to launch the appropriate service to users' needs of AR system.

Development of Web-based u-Health Self-nutrition Management Program for Diabetic Patients (당뇨환자를 위한 웹 기반의 유헬스 자가영양관리 프로그램 개발)

  • Ahn, Yun;Bae, Jeahurn;Kim, Hee-Seon
    • Korean Journal of Community Nutrition
    • /
    • v.19 no.4
    • /
    • pp.372-385
    • /
    • 2014
  • Objectives: The purpose of this study was to develop web-based self-nutrition management u-Health program for diabetic patients (DMDMG: Diabetes Mellitus Dietary Management Guide) for achieving systematic self-management of diet. Methods: The program consisted of five parts with different contents according to the results of needs assessment. Five major parts were 1) meal management part which contains calorie prescription, meals recording and dietary assessment, 2) prevention of disease part with information of diabetes and assessment of dietary behavior, 3) dietary behavior modification part with an education on dietary behavior modification plan and dietary behavior plan, 4) meal plan containing a training section for meal plan and self constructing part for meal planning by making tables, and 5) information about myself which composed with general and physical information. The system proposed in this study provides nutrients intake results right after input of diet intake, which is possible with simultaneous calculation of input data in the server with 3,495 food and 1,821 meal data base. The nutrients analysis program was evaluated with 26 diabetic patients with two-day 24 hr recall. Results: The differences of nutrients intakes between DMDMG and CANPRO 3.0 ranged from 13.5-16.5%, which was caused by the differences of databases of the two programs. The characteristics of DMDMG were; 1) it can provide an interactive tailored nutrition management, 2) it is a practical tool of diabetes nutritional management, 3) the program gives motivation for the dietary behavior modification. Conclusions: The effectiveness of whole program needs to be conducted, but the program was an innovative tool for self-management of nutrient intakes, diet behaviors, meal management and tailored nutrition education.