• Title/Summary/Keyword: process model discovery

Search Result 108, Processing Time 0.018 seconds

An Exploratory Study on the Organizational Knowledge Discovery Process (조직지식 창출프로세스에 관한 탐색적 연구)

  • Kim, Sun-A;Kim, Young-Gul
    • Knowledge Management Research
    • /
    • v.1 no.1
    • /
    • pp.91-107
    • /
    • 2000
  • This paper proposes the Organizational Knowledge Discovery Process Model (OK-DPM) as an initiative for developing a knowledge management methodology. OK-DPM is a model designed to effectively discover knowledge useful to the organization. It explains the knowledge discovery process from the conceptual level to the application level. It decomposes the organizational knowledge discovery process into 3 sub-processes; Creation, Suggestion and Validation. For each sub-process, design components are identified and possible methods for supporting each one are suggested. Also, the relationship patterns between the knowledge discovery process and knowledge type are explored. By applying OK-DPM to two real cases where the knowledge management projects are ongoing, the model was validated and revised. Even though we need to investigate with more cases to refine the OK-DPM, we found that it could provide some insights in developing the effective knowledge discovery process.

  • PDF

E-Discovery Process Model and Alternative Technologies for an Effective Litigation Response of the Company (기업의 효과적인 소송 대응을 위한 전자증거개시 절차 모델과 대체 기술)

  • Lee, Tae-Rim;Shin, Sang-Uk
    • Journal of Digital Convergence
    • /
    • v.10 no.8
    • /
    • pp.287-297
    • /
    • 2012
  • In order to prepare for the introduction of the E-Discovery system from the United States and to cope with some causable changes of legal systems, we propose a general E-Discovery process and essential tasks of the each phase. The proposed process model is designed by the analysis of well-known projects such as EDRM, The Sedona Conference, which are advanced research for the standardization of E-Discovery task procedures and for the supply of guidelines to hands-on workers. In addition, Machine Learning Algorithms, Open-source libraries for the Information Retrieval and Distributed Processing technologies based on the Hadoop for big data are introduced and its application methods on the E-Discovery work scenario are proposed. All this information will be useful to vendors or people willing to develop the E-Discovery service solution. Also, it is very helpful to company owners willing to rebuild their business process and it enables people who are about to face a major lawsuit to handle a situation effectively.

Extended Linear Vulnerability Discovery Process

  • Joh, HyunChul
    • Journal of Multimedia Information System
    • /
    • v.4 no.2
    • /
    • pp.57-64
    • /
    • 2017
  • Numerous software vulnerabilities have been found in the popular operating systems. And recently, robust linear behaviors in software vulnerability discovery process have been noticeably observed among the many popular systems having multi-versions released. Software users need to estimate how much their software systems are risk enough so that they need to take an action before it is too late. Security vulnerabilities are discovered throughout the life of a software system by both the developers, and normal end-users. So far there have been several vulnerability discovery models are proposed to describe the vulnerability discovery pattern for determining readiness for patch release, optimal resource allocations or evaluating the risk of vulnerability exploitation. Here, we apply a linear vulnerability discovery model into Windows operating systems to see the linear discovery trends currently observed often. The applicability of the observation form the paper show that linear discovery model fits very well with aggregate version rather than each version.

Knowledge Discovery Process from the Web for Effective Knowledge Creation: Application to the Stock Market (효과적인 지식창출을 위한 웹 상의 지식채굴과정 : 주식시장에의 응용)

  • Kim, Kyoung-Jae;Hong, Tae-Ho;Han, In-Goo
    • Knowledge Management Research
    • /
    • v.1 no.1
    • /
    • pp.81-90
    • /
    • 2000
  • This study proposes the knowledge discovery process for the effective mining of knowledge on the web. The proposed knowledge discovery process uses the Prior knowledge base and the Prior knowledge management system to reflect tacit knowledge in addition to explicit knowledge. The prior knowledge management system constructs the prior knowledge base using a fuzzy cognitive map, and defines information to be extracted from the web. In addition, it transforms the extracted information into the form being handled in mining process. Experiments using case-based reasoning and neural network" are performed to verify the usefulness of the proposed model. The experimental results are encouraging and prove the usefulness of the proposed model.

  • PDF

The Web based Elementary Science Discovery Learning System (웹기반 초등학교 과학과 발견학습 시스템)

  • Lee, Jong-Hwa;Han, Kyu-Jung
    • Journal of The Korean Association of Information Education
    • /
    • v.12 no.1
    • /
    • pp.89-97
    • /
    • 2008
  • The purpose of this study was to design a system of web-based discovery learning and testify its effectiveness, in order to complement the difficulties of discovery learning considered to be hard to be applied to the school education because of shortage of time and materials, though discovery learning is one of inquiry learning emphasized in the 7th national curriculum of elementary science. As for the process of testifying, it compared the differences between comparative group with normal discovery learning model and experimental group with web-based system of discovery learning model, targeting the subject of extending spring among the 4th grade science. As a result, the experimental group achieved higher academic performance compared to the comparative group applied to the normal discovery learning model.

  • PDF

Development of a Knowledge Discovery System using Hierarchical Self-Organizing Map and Fuzzy Rule Generation

  • Koo, Taehoon;Rhee, Jongtae
    • Proceedings of the Korea Inteligent Information System Society Conference
    • /
    • 2001.01a
    • /
    • pp.431-434
    • /
    • 2001
  • Knowledge discovery in databases(KDD) is the process for extracting valid, novel, potentially useful and understandable knowledge form real data. There are many academic and industrial activities with new technologies and application areas. Particularly, data mining is the core step in the KDD process, consisting of many algorithms to perform clustering, pattern recognition and rule induction functions. The main goal of these algorithms is prediction and description. Prediction means the assessment of unknown variables. Description is concerned with providing understandable results in a compatible format to human users. We introduce an efficient data mining algorithm considering predictive and descriptive capability. Reasonable pattern is derived from real world data by a revised neural network model and a proposed fuzzy rule extraction technique is applied to obtain understandable knowledge. The proposed neural network model is a hierarchical self-organizing system. The rule base is compatible to decision makers perception because the generated fuzzy rule set reflects the human information process. Results from real world application are analyzed to evaluate the system\`s performance.

  • PDF

Modeling Vulnerability Discovery Process in Major Cryptocurrencies

  • Joh, HyunChul;Lee, JooYoung
    • Journal of Multimedia Information System
    • /
    • v.9 no.3
    • /
    • pp.191-200
    • /
    • 2022
  • These days, businesses, in both online and offline, have started accepting cryptocurrencies as payment methods. Even in countries like El Salvador, cryptocurrencies are recognized as fiat currencies. Meanwhile, publicly known, but not patched software vulnerabilities are security threats to not only software users but also to our society in general. As the status of cryptocurrencies has gradually increased, the impact of security vulnerabilities related to cryptocurrencies on our society has increased as well. In this paper, we first analyze vulnerabilities from the two major cryptocurrency vendors of Bitcoin and Ethereum in a quantitative manner with the respect to the CVSS, to see how the vulnerabilities are roughly structured in those systems. Then we introduce a modified AML vulnerability discovery model for the vulnerability datasets from the two vendors, after showing the original AML dose not accurately represent the vulnerability discovery trends on the datasets. The analysis shows that the modified model performs better than the original AML model for the vulnerability datasets from the major cryptocurrencies.

Empirical Risk Assessment in Major Graphical Design Software Systems

  • Joh, HyunChul;Lee, JooYoung
    • Journal of Multimedia Information System
    • /
    • v.8 no.4
    • /
    • pp.259-266
    • /
    • 2021
  • Security vulnerabilities have been reported in major design software systems such as Adobe Photoshop and Illustrator, which are recognized as de facto standard design tools in most of the design industries. Companies need to evaluate and manage their risk levels posed by those vulnerabilities, so that they could mitigate the potential security bridges in advance. In general, security vulnerabilities are discovered throughout their life cycles repeatedly if software systems are continually used. Hence, in this study, we empirically analyze risk levels for the three major graphical design software systems, namely Photoshop, Illustrator and GIMP with respect to a software vulnerability discovery model. The analysis reveals that the Alhazmi-Malaiya Logistic model tends to describe the vulnerability discovery patterns significantly. This indicates that the vulnerability discovery model makes it possible to predict vulnerability discovery in advance for the software systems. Also, we found that none of the examined vulnerabilities requires even a single authentication step for successful attacks, which suggests that adding an authentication process in software systems dramatically reduce the probability of exploitations. The analysis also discloses that, for all the three software systems, the predictions with evenly distributed and daily based datasets perform better than the estimations with the datasets of vulnerability reporting dates only. The observed outcome from the analysis allows software development managers to prepare proactively for a hostile environment by deploying necessary resources before the expected time of vulnerability discovery. In addition, it can periodically remind designers who use the software systems to be aware of security risk, related to their digital work environments.

Discovery of the DNA double helix structure as a model of Liberal Education for Engineers (공학소양교육 사례로서의 DNA 구조 발견)

  • Nam, Young
    • Journal of Engineering Education Research
    • /
    • v.21 no.6
    • /
    • pp.54-62
    • /
    • 2018
  • This study is an analysis of the process of the discovery of the DNA double helix structure from an engineering literacy education perspective. The explanation of the DNA double helix structure by James Watson and Francis Crick in 1952 is a well-known scientific episode. The process is also a combination of various incidents that can frequently happen in competitive engineering research and development situations. Therefore, the process of the discovery of the DNA structure is a remarkable event that can cover all subjects, such as engineering and ethics, research ethics, communication between researchers, engineering and leadership, engineering and teamwork, and engineering and women. This paper focuses on analyzing the research ethics issues associated with Rosalind Franklin and comparing and analyzing the three teams that were very close to the discovery of the DNA structure. By looking at why the Watson and Crick team got the final answer instead of the Linus Pauling's team or the Maurice Wilkins and Rosalind Franklin's team, the virtues of the technology development process that should be taught in engineering literacy education will be naturally presented.

Organizational Capabilities for Effective Knowledge Creation: An In-depth Case Analysis of Quinolone Antibacterial Drug Discovery Process (효과적 지식창출을 위한 조직능력 요건: 퀴놀론계 항생제 개발 사례를 중심으로)

  • Lee, Chun-Keun;Kim, Linsu
    • Knowledge Management Research
    • /
    • v.2 no.1
    • /
    • pp.109-132
    • /
    • 2001
  • The purpose of this article is to develop a dynamic model of organizational capabilities and knowledge creation, and at the same time identify the organizational capability factors for effective knowledge creation, by empirically analyzing the history of new Quinolone antibacterial drug compound (LB20304a) discovery process at LG, as a case in point. Major findings of this study are as follows. First, in a science-based area such as drug development, the core of successful knowledge creation lies in creative combination of different bodies of scientific explicit knowledge. Second, the greater the difficulty of learning external knowledge, the more tacit knowledge is needed for the recipient firm to effectively exploit that knowledge. Third, in science-based sector such as pharmaceutical industry, the key for successful knowledge creation lies in the capability of recruiting and retaining star scientists. Finally, for effective knowledge creation, a firm must keep its balance among three dimensions of organizational capabilities: local, process, architectural capabilities.

  • PDF