• Title/Summary/Keyword: information systems infusion

Search Result 14, Processing Time 0.017 seconds

A Study on the Design of multimedia Service Platform on Wireless Intelligent technology (무선인식 기술기반 멀티미디어 서비스 플렛폼 설계에 관한 연구)

  • Kang, Myoung-Ku
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.4 no.1
    • /
    • pp.25-32
    • /
    • 2009
  • The advancements in the infusion of broadcasting and communication and the radio frequency identification technology have made the next generation mobile communication service technology be recognized as an important technology in many different fields and demanded systems of practical service using the technology. Designed in the study was a multimedia platform that would increase the utilization efficiency of limited frequency resources, which made an important part of the next generation mobile communication technology using the radio frequency identification technology, search for vacant frequencies not generating interfering signals to the old frequency users, and consider the growth of infused and complex services. In order to implement the platform, the investigator applied STI as a research model to maximize the functions of a service system and improve reliability. And also suggested IDMA of information required for platform building to maximize the functions of a service system.

  • PDF

Comparative Analysis of Internet-based Business Strategy of Leading Companies in Korea, U.S., and Japan (한.미.일 3국 기업들의 인터넷 활용전략 비교분석)

  • 강현석;서영호;채영일
    • Journal of the Korean Society for information Management
    • /
    • v.17 no.3
    • /
    • pp.7-20
    • /
    • 2000
  • Many organizations have developed their own information systems not only for internal efficiency but also for effectiveness of external customer services. The infusion of powerful information networks into business environments is beginning to have a profound impact on the nature of governance between buyers and sellers in the market place. One of the most effective service tools for their customers is the use of information technology. The web technology is rapidly becoming one of the most effective online customer service tools toward strategic competitive advantage. In order to gain competitive edge, organizations must have effective web sites for customer services. A study on web service development phase has been conducted and present states of web usages by Korean, US., Japanese companies are surveyed. Cases of business web sites are empirically analyzed in order to compare the different levels of web site application in three countries. Conclusively, countries with longer experience with internet has more advanced level of web application such as business transaction and internet process innovation. In order to support effective web site planning, organizations have to understand their current position in Internet application and form strategies for e-business.

  • PDF

A Policy-based Secure Framework for Constructing Secure Networking (안전한 네트워크 구성을 위한 정책기반 보안 프레임워크)

  • 박상길;장종수;손승원;노봉남
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.8C
    • /
    • pp.748-757
    • /
    • 2002
  • Cyber-terror trials are increased in nowadays and these attacks are commonly using security vulnerability and information gathering method by variable services grew by the continuous development of Internet Technology. IDS's application environment is affected by this increasing Cyber Terror. General Network based IDS detects intrusion by signature based Intrusion Detection module about inflowing packet through network devices. Up to now security in network is commonly secure host, an regional issue adopted in special security system but these system is vulnerable intrusion about the attack in globally connected Internet systems. Security mechanism should be produced to expand the security in whole networks. In this paper, we analyzer the DARPA's program and study Infusion Detection related Technology. We design policy security framework for policy enforcing in whole network and look at the modules's function. Enforcement of security policy is acted by Intrusion Detection system on gateway system which is located in network packet's inflow point. Additional security policy is operated on-line. We can design and execute central security policy in managed domain in this method.

An Exploratory Study of e-Learning Satisfaction: A Mixed Methods of Text Mining and Interview Approaches (이러닝 만족도 증진을 위한 탐색적 연구: 텍스트 마이닝과 인터뷰 혼합방법론)

  • Sun-Gyu Lee;Soobin Choi;Hee-Woong Kim
    • Information Systems Review
    • /
    • v.21 no.1
    • /
    • pp.39-59
    • /
    • 2019
  • E-learning has improved the educational effect by making it possible to learn anytime and anywhere by escaping the traditional infusion education. As the use of e-learning system increases with the increasing popularity of e-learning, it has become important to measure e-learning satisfaction. In this study, we used the mixed research method to identify satisfaction factors of e-learning. The mixed research method is to perform both qualitative research and quantitative research at the same time. As a quantitative research, we collected reviews in Udemy.com by text mining. Then we classified high and low rated lectures and applied topic modeling technique to derive factors from reviews. Also, this study conducted an in-depth 1:1 interview on e-learning learners as a qualitative research. By combining these results, we were able to derive factors of e-learning satisfaction and dissatisfaction. Based on these factors, we suggested ways to improve e-learning satisfaction. In contrast to the fact that survey-based research was mainly conducted in the past, this study collects actual data by text mining. The academic significance of this study is that the results of the topic modeling are combined with the factor based on the information system success model.